Weidong Dong Xu

age ~56

from Westford, MA

Also known as:
  • Wei Dong Xu
  • Wei D Xu
  • Wei Dongxu
  • Weidong Li
  • Wedong Li
  • Li Wedong
Phone and address:
4 Juneberry Ln, Graniteville, MA 01886
9786922022

Weidong Xu Phones & Addresses

  • 4 Juneberry Ln, Westford, MA 01886 • 9786922022
  • Winter Park, FL
  • 8 Charlesbank Way, Waltham, MA 02453 • 7816426925
  • 14 Abel Jones Pl, Acton, MA 01720 • 9782637831
  • Warrenton, VA
  • Boston, MA
  • 4 Juneberry Ln, Westford, MA 01886

Education

  • Degree:
    Graduate or professional degree

Resumes

Weidong Xu Photo 1

Senior Mts

view source
Location:
Westford, MA
Industry:
Computer & Network Security
Work:
Juniper Networks
Senior Mts

Verivue
Mts

Crossbeam Systems Apr 2005 - Apr 2007
Principle Hw

Enterasys Networks Mar 2003 - Apr 2005
Hw V

Mindspeed Technologies Jun 2002 - Jun 2003
Principle Hw
Education:
Northeastern University
University of Electronic Science and Technology of China
Skills:
Embedded Systems
Device Drivers
Distributed Systems
Fpga
Perl
Tcp/Ip
Ethernet
Weidong Xu Photo 2

Weidong Xu

view source
Skills:
Microsoft Excel
Weidong Xu Photo 3

Weidong Xu

view source

Medicine Doctors

Weidong Xu Photo 4

Weidong Xu

view source
Specialties:
Internal Medicine
Rheumatology
Education:
Fourth Military Medical University (1975)
Weidong Xu Photo 5

Weidong Xu

view source

Us Patents

  • Systems And Methods For Processing Data Flows

    view source
  • US Patent:
    7979368, Jul 12, 2011
  • Filed:
    Oct 29, 2007
  • Appl. No.:
    11/926307
  • Inventors:
    Harsh Kapoor - Boxborough MA, US
    Moisey Akerman - Upton MA, US
    Stephen D. Justus - Portland OR, US
    John C. Ferguson - Harvard MA, US
    Yevgeny Korsunsky - Bedford MA, US
    Paul S. Gallo - Newton MA, US
    Charles Ching Lee - Ashland MA, US
    Timothy M. Martin - Westford MA, US
    Chunsheng Fu - Amesbury MA, US
    Weidong Xu - Westford MA, US
  • Assignee:
    Crossbeam Systems, Inc. - Boxboro MA
  • International Classification:
    G06N 5/00
  • US Classification:
    706 20, 706 45
  • Abstract:
    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
  • Systems And Methods For Processing Data Flows

    view source
  • US Patent:
    8010469, Aug 30, 2011
  • Filed:
    Oct 29, 2007
  • Appl. No.:
    11/926292
  • Inventors:
    Harsh Kapoor - Boxborough MA, US
    Moisey Akerman - Upton MA, US
    Stephen D. Justus - Portland OR, US
    JC Ferguson - Harvard MA, US
    Yevgeny Korsunsky - Bedford MA, US
    Paul S. Gallo - Newton MA, US
    Charles Ching Lee - Ashland MA, US
    Timothy M. Martin - Westford MA, US
    Chunsheng Fu - Amesbury MA, US
    Weidong Xu - Westford MA, US
  • Assignee:
    Crossbeam Systems, Inc. - Boxborough MA
  • International Classification:
    G06E 1/00
  • US Classification:
    706 20, 726 11, 726 22
  • Abstract:
    Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security are described. Such flow processing facilities may be used for inspecting network traffic packet payloads to detect security threats and intrusions across accessible layers of the network IP stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources.
  • Systems And Methods For Processing Data Flows

    view source
  • US Patent:
    8135657, Mar 13, 2012
  • Filed:
    Aug 24, 2011
  • Appl. No.:
    13/216739
  • Inventors:
    Harsh Kapoor - Boxborough MA, US
    Moisey Akerman - Upton MA, US
    Stephen D. Justus - Portland OR, US
    John C. Ferguson - Harvard MA, US
    Yevgeny Korsunsky - Waban MA, US
    Paul S. Gallo - Newton MA, US
    Charles Ching Lee - Ashland MA, US
    Timothy M. Martin - Westford MA, US
    Chunsheng Fu - Amesbury MA, US
    Weidong Xu - Westford MA, US
  • Assignee:
    Crossbeam Systems, Inc. - Boxborough MA
  • International Classification:
    G06F 17/00
  • US Classification:
    706 45, 726 11, 726 22
  • Abstract:
    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
  • Canonical Scheduling For Heterogeneous Content Delivery

    view source
  • US Patent:
    8325764, Dec 4, 2012
  • Filed:
    Feb 24, 2009
  • Appl. No.:
    12/391975
  • Inventors:
    Craig Frink - Chelmsford MA, US
    Santosh Krishnan - Windham NH, US
    Weidong Xu - Westford MA, US
    Qin-Fan Zhu - Acton MA, US
  • Assignee:
    Verivue, Inc. - Westford MA
  • International Classification:
    H04J 3/24
  • US Classification:
    370474, 370392, 370412, 370465, 386211, 725 90
  • Abstract:
    Described are computer-based methods and apparatuses, including computer program products, for canonical scheduling for heterogeneous content delivery. A content stream of bits is preprocessed by dividing the content stream of bits into data packets and assigning a timestamp to each data packet. The preprocessed content stream of bits is transmitted upon request from a receiver. A second timestamp based on the assigned timestamp from at least a portion of the respective data packets is established. The data packets are scheduled for transmission based on the second timestamp. The data packets are transmitted based on the schedule.
  • Systems And Methods For Processing Data Flows

    view source
  • US Patent:
    8402540, Mar 19, 2013
  • Filed:
    Oct 24, 2007
  • Appl. No.:
    11/877819
  • Inventors:
    Harsh Kapoor - Boxborough MA, US
    Moisey Akerman - Upton MA, US
    Stephen D. Justus - Portland OR, US
    JC Ferguson - Harvard MA, US
    Yevgeny Korsunsky - Bedford MA, US
    Paul S. Gallo - Newton MA, US
    Charles Ching Lee - Ashland MA, US
    Timothy M. Martin - Westford MA, US
    Chunsheng Fu - Amesbury MA, US
    Weidong Xu - Westford MA, US
  • Assignee:
    Crossbeam Systems, Inc. - Boxborough MA
  • International Classification:
    H04L 29/06
  • US Classification:
    726 23, 709224, 726 22
  • Abstract:
    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
  • Input Queued Content Switching Using A Playlist

    view source
  • US Patent:
    8650602, Feb 11, 2014
  • Filed:
    Feb 27, 2009
  • Appl. No.:
    12/395503
  • Inventors:
    Daniel Pond - Andover MA, US
    Thomas V. Radogna - Westboro MA, US
    Weidong Xu - Westford MA, US
    Qin-Fan Zhu - Acton MA, US
    Steve Branam - Ayer MA, US
    Craig Frink - Chelmsford MA, US
    Michael G. Hluchyj - Wellesley MA, US
    Santosh Krishnan - Windham NH, US
  • Assignee:
    Akamai Technologies, Inc. - Cambridge MA
  • International Classification:
    H04N 7/173
  • US Classification:
    725 93, 725 91, 725 92, 725 97
  • Abstract:
    Described are computer-based methods and apparatuses, including computer program products, for input queued content switching using a playlist. A retrieval sequence is generated using a plurality of content requests based on content location information. A first portion of content is requested to be queued at a first content source, and a second portion of content is requested to be queued at a second content source. A content stream of the first portion and the second portion of content is generated using the retrieval sequence. The generating includes selecting the first portion of content from a queue associated with the first content source and transferring the first portion of content to an output buffer, then terminating transfer of the first portion of content and initiating transfer of the second portion of content from a queue associated with the second content source. The portion of content in the output buffer is transmitted to a client device.
  • Systems And Methods For Processing Data Flows

    view source
  • US Patent:
    20070192863, Aug 16, 2007
  • Filed:
    Dec 13, 2006
  • Appl. No.:
    11/610296
  • Inventors:
    Harsh Kapoor - Boxborough MA, US
    Moisey Akerman - Upton MA, US
    Stephen Justus - Lexington MA, US
    JC Ferguson - Harvard MA, US
    Yevgeny Korsunsky - Bedford MA, US
    Paul Gallo - Newton MA, US
    Charles Lee - Ashland MA, US
    Timothy Martin - Westford MA, US
    Chunsheng Fu - Amesbury MA, US
    Weidong Xu - Westford MA, US
  • International Classification:
    G06F 12/14
  • US Classification:
    726023000
  • Abstract:
    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
  • Systems And Methods For Processing Data Flows

    view source
  • US Patent:
    20080133517, Jun 5, 2008
  • Filed:
    Oct 24, 2007
  • Appl. No.:
    11/877792
  • Inventors:
    Harsh Kapoor - Boxborough MA, US
    Moisey Akerman - Upton MA, US
    Stephen D. Justus - Portland OR, US
    JC Ferguson - Harvard MA, US
    Yevgeny Korsunsky - Bedford MA, US
    Paul S. Gallo - Newton MA, US
    Charles Ching Lee - Ashland MA, US
    Timothy M. Martin - Westford MA, US
    Chunsheng Fu - Amesbury MA, US
    Weidong Xu - Westford MA, US
  • International Classification:
    G06F 17/30
  • US Classification:
    707 6, 707E17014
  • Abstract:
    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

Myspace

Weidong Xu Photo 6

Weidong XU

view source
Locality:
WESTFORD, Massachusetts
Birthday:
1935
Weidong Xu Photo 7

Weidong Xu

view source
Locality:
IOWA CITY, Iowa
Birthday:
1930

Youtube

USC MSBusiness Analytics Admissions Video 202...

  • Duration:
    1m 1s

Veronica XU's piano

Souvenir D'enfance by Veronica XU.

  • Duration:
    3m 11s

carmen

27/06/2021.

  • Duration:
    4m 3s

Isabella XU, Westford, MA

Sonatina by Muzio Clementi.

  • Duration:
    2m 1s

manage-store

manage my store with GoSpecial.com.au...

  • Duration:
    52s

Cao Wei/Xu Haidong vs Zhou Kai/Ren Hao | MD F...

Download the new WTT app and follow us on social media for a full 360 ...

  • Duration:
    10m 3s

Googleplus

Weidong Xu Photo 8

Weidong Xu

Weidong Xu Photo 9

Weidong Xu

Weidong Xu Photo 10

Weidong Xu

Weidong Xu Photo 11

Weidong Xu

Weidong Xu Photo 12

Weidong Xu

Weidong Xu Photo 13

Weidong Xu


Get Report for Weidong Dong Xu from Westford, MA, age ~56
Control profile