commodities • c++ • derivatives pricing • risk management • credit risk • stochastic • Monte Carlo • time series analysis • python • trading system • exotics • energy • power
Gladinet Inc since Sep 2008
Testing
Alcatel-Lucent Apr 1999 - Aug 2008
MTS
Lucent Technologies 1999 - 2008
MTS
Education:
University of Alabama 1997 - 1999
MS, Computer Science
China University of Mining and Technology 1993 - 1996
MS, Power Electronics
Xiamen University 1989 - 1993
BS, Computer Science
Gustavo de los Reyes - Fair Haven NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G01C 21/34 G08G 1/01
US Classification:
701118, 701410, 4554565
Abstract:
A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices.
Methods, Devices, Systems, And Computer Program Products For Edge Driven Communications Network Security Monitoring
Gustavo de los Reyes - Fair Haven NJ, US Thusitha Jayawardena - Holmdel NJ, US Gang Xu - Piscataway NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Reno NV
International Classification:
G06F 21/00
US Classification:
726 22, 713188, 726 24
Abstract:
An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.
Method, Network, And Computer Product For Flow Based Quality Of Service
Gang Xu - Piscataway NJ, US Xiao Pan - Middletown NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G08C 15/00
US Classification:
370252, 709226
Abstract:
A method, network, and computer program product are provided for traffic flow quality of service. A quality of service priority table is received for services defined by a user at the network, and the quality of service priority table includes quality of service levels for the services. Traffic flows are determined to correspond to packets being communicated over the network for the user. The traffic flows are mapped to services. The traffic flows are mapped to the quality of service levels for the services. The quality of service levels are assigned to the traffic flows as assigned quality of service levels corresponding to the services. Each of the traffic flows is routed over the network according to its assigned quality of service levels, respectively.
A cellular-based live traffic service that does not require pre-deployment of infrastructure or GPS-enabled devices uses signals provided by cellular devices to determine course resolution localization and tracking information of the cellular devices. Specialized statistical analysis is performed on the course resolution data to infer the fine resolution positions of the cellular devices. In an example embodiment, the localization and tracking information is provided on a map, or the like, to show relative position and/or trajectory of cellular devices.
System And Method To Detect And Mitigate Distributed Denial Of Service Attacks Using Random Internet Protocol Hopping
Gang Xu - Piscataway NJ, US Gustavo de los Reyes - Fair Haven NJ, US Thusitha Jayawardena - Holmdel NJ, US Xiao Pan - Middletown NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G06F 15/173
US Classification:
709229, 709226
Abstract:
A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed.
Method And System For Controlling Physical Components Via A Virtual Environment
Gustavo De Los Reyes - Fair Haven NJ, US Sanjay MacWan - Marlboro NJ, US Gang Xu - Piscataway NJ, US Howard Shirokmann - Point Pleasant NJ, US Rachel Rosencrantz - Boulder CO, US Thusitha Jayawardena - Holmdel NJ, US
Assignee:
AT & T Intellectual Property, LP. - Atlanta GA
International Classification:
G06F 3/048
US Classification:
715771
Abstract:
A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction.
Method And System For Execution Monitor-Based Trusted Computing
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service transaction associated with the remote service, the service transaction being requested by a service requester. The method further includes determining whether a deviation exists between the runtime dependencies and a trusted list of dependencies associated with the remote service. The method also includes blocking execution of the service transaction based on determining that the deviation between the runtime dependencies and the trusted list of dependencies exists.
Methods And Apparatus To Enhance Security In Residential Networks
Thusitha Jayawardena - Holmdel NJ, US Gustavo De Los Reyes - Fair Haven NJ, US Gang Xu - Piscataway NJ, US
International Classification:
G06F 17/00 G06F 15/16
US Classification:
726 12
Abstract:
Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.