Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

37 results about "Surrogate function" patented technology

A surrogate is a function that approximates an objective function. The surrogate is useful because it takes little time to evaluate. So, for example, to search for a point that minimizes an objective function, simply evaluate the surrogate on thousands of points, and take the best value as an approximation to the minimizer of the objective function.

System, method and software for creating or maintaining local or distributed mapping and transparent persistence of complex data objects and their data relationships

The invention provides computer systems, computer data stores and methods and software for accessing and utilizing data stores. More particularly, the present invention provides systems, methods and software for creating or maintaining local or distributed mapping and optional transparent persistence of data objects, objects for stored procedures, complex data objects, data object graphs and associated data stores. The present invention further provides a computer system and software implemented method for a development mapping workspace for improved project management of mapping and persistence development activities along with a system implemented organization of mapping projects. In another aspect, the invention provides a computer system and software implemented methods for automatically mapping objects to one or more data source with an interface for setting variable stringency for such automatic mapping with an optional interface for editing the resulting system generated mapping, which system and software implemented methods may be collectively referred to as a “magic mapper” system. Further, such systems and software implemented methods are optionally integrated with IDEs, case tools and other third party platform or development environments to provide an extension of functionality or alternative functionality to such IDEs, third party platforms and other development environments, and to optionally provide for improved automatic or semi-automatic logic code generation.
Owner:MULLINS WARD R +1

System and method for inspecting dynamically generated executable code

A method for protecting a client computer from dynamically generated malicious content, including receiving at a gateway computer content being sent to a client computer for processing, the content including a call to an original function, and the call including an input, modifying the content at the gateway computer, including replacing the call to the original function with a corresponding call to a substitute function, the substitute function being operational to send the input to a security computer for inspection, transmitting the modified content from the gateway computer to the client computer, processing the modified content at the client computer, transmitting the input to the security computer for inspection when the substitute function is invoked, determining at the security computer whether it is safe for the client computer to invoke the original function with the input, transmitting an indicator of whether it is safe for the client computer to invoke the original function with the input, from the security computer to the client computer, and invoking the original function at the client computer with the input, only if the indicator received from the security computer indicates that such invocation is safe. A system and a computer-readable storage medium are also described and claimed.
Owner:FINJAN LLC

Distributed asynchronous optimization method based on continuous convex approximation

The invention relates to a distributed asynchronous optimization method based on continuous convex approximation and belongs to the field of network communication. The method comprises the following steps of: S1, constructing a problem model, namely selecting a global objective function of an actual problem; S2, initializing a local variable held by each node, and setting the maximum number of iterations; S3, constructing a directed strongly-connected unbalanced source network, and adding virtual nodes on the basis of the directed strongly-connected unbalanced source network to construct an augmented network; S4, setting a time delay threshold, the number of iterations and system parameters; S5, determining the relationship between an activated node and a time delay value associated with the activation node; S6, clearing out-of-date information in the system; S7, selecting an agent function, and setting proper step length and momentum parameters; and S8, enabling the activated node tocommunicate with the neighborhood or update by utilizing a time delay value variable, and enabling a non-activated node to keep the current variable value to enter the next iterative update until thethreshold value of the number of iterations is reached. The method has high robustness and fault tolerance for an asynchronous network, and the utilization efficiency of a communication link is improved.
Owner:SOUTHWEST UNIVERSITY

Erlang process timeout management method

The invention discloses an Erlang process timeout management method. The method comprises the following steps: S1, creating N timeout supervision processes of which the number is equal to the number of cores of a CPU; S2, when each timeout supervision process is started, creating an ordered ts table; S3, using an agent function as an entrance of the Erlang process to be supervised, randomly selecting an ts table by the agent function, and putting process execution expiration time endtime and a process identity pid into the ts table to form a primary key {endtime, pid}; S4, executing a real entry point function and parameters by the agent function; S5, enabling each timeout supervision process to scan out a primary key with endtime smaller than the current time in the ts table at set intervals, executing an ending operation on a process identity pid corresponding to the primary key, and removing the primary key from the ts table; S6, enabling the proxy function to remove timeout data ofthe process with the primary key being {end-time, pid}. The invention provides a process timeout supervision method which is extremely low in performance loss, has no single-point bottleneck and makes full use of a multi-core CPU, and destructive influence of abnormal processes such as endless loop and the like on system performance is avoided.
Owner:厦门极致互动网络技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products