NEC Laboratories America Inc. | Date: 2017-04-26
Systems and methods for full-duplex communication in a communications network, including generating a combined channel matrix including two or more channel matrices and determining a null space and a basis for the combined channel matrix. Common, individual, and disjoint vector spaces are determined, and common vector space is determined for each of one or more receiving nodes and each or one or more transmitting nodes, disjoint vector spaces for each of the one or more nodes are determined based on the common vector space for each of the one or more nodes, and individual vector spaces are determined based on the common and the disjoint vector spaces. Signals are mapped at each of the nodes to determine corresponding vector spaces; and interference alignment is performed in common vector spaces and zero forcing in disjoint vector spaces using a hardware processor.
NEC Laboratories America Inc. | Date: 2016-11-15
Systems and methods are disclosed for handling log data from one or more applications, sensors or instruments by receiving heterogeneous logs from arbitrary/unknown systems or applications; generating regular expression patterns from the heterogeneous log sources using machine learning and extracting a log pattern therefrom; generating models and profiles from training logs based on different conditions and updating a global model database storing all models generated over time; tokenizing raw log messages from one or more applications, sensors or instruments running a production system; transforming incoming tokenized streams are into data-objects for anomaly detection and forwarding of log messages to various anomaly detectors; and generating an anomaly alert from the one or more applications, sensors or instruments running a production system.
NEC Laboratories America Inc. | Date: 2017-02-01
A computer implemented method for network monitoring includes providing network packet event characterization and analysis for network monitoring that includes supporting summarization and characterization of network packet traces collected across multiple processing elements of different types in a virtual network, including a trace slicing to organize individual packet events into path-based trace slices, a trace characterization to extract at least 2 types of feature matrix describing those trace slices, and a trace analysis to cluster, rank and query packet traces based on metrics of the feature matrix.
NEC Laboratories America Inc. | Date: 2017-03-22
Methods and systems for process constraint include collecting system call information for a process. It is detected whether the process is idle based on the system call information and then whether the process is repeating using autocorrelation to determine whether the process issues system calls in a periodic fashion. The process is constrained if it is idle or repeating the limit an attack surface presented by the process.
NEC Laboratories America Inc. | Date: 2017-02-06
Methods and systems for detecting anomalous network activity include determining whether a network event exists within an existing topology graph and port graph. A connection probability for the network event is determined if the network does not exist within the existing topology graph and port graph. The network event is identified as abnormal if the connection probability is below a threshold.
NEC Laboratories America Inc. | Date: 2017-01-06
Systems and methods are disclosed to assist a driver with a dangerous condition by creating a graph representation where traffic participants and static elements are the vertices and the edges are relations between pairs of vertices; adding attributes to the vertices and edges of the graph based on information obtained on the driving vehicle, the traffic participants and additional information; creating a codebook of dangerous driving situations, each represented as graphs; performing subgraph matching between the graphs in the codebook and the graph representing a current driving situation to select a set of matching graphs from the codebook; determining a distance metric between each selected codebook graphs and the matching subgraph of the current driving situation; from codebook graphs with a low distance, determining potential dangers; and generating an alert if one or more of the codebook dangers are imminent.
NEC Laboratories America Inc. | Date: 2017-06-07
A method, system, and computer program product for minimizing intra-cell and inter-cell interference in a multi-cell full duplex communication system in a wireless network. The method includes selecting, by a client selector, a plurality of clients, wherein the plurality of clients includes a plurality of uplink clients configured to transmit signals and a plurality of downlink clients configured to receive signals over a plurality of data streams in each cell of the multi-cell full duplex communication system, and performing, by a spatial interference aligner, spatial interference alignment on interfering data streams to align the interfering data streams of uplink clients towards downlink clients in its own cell and downlink clients in a neighboring cell.
NEC Laboratories America Inc. | Date: 2017-06-28
Systems and methods for decoupled searching and optimization for one or more data centers, including determining a network topology for one or more networks of interconnected computer systems embedded in the one or more data centers (304), searching for routing candidates based on a network topology determined (310), and updating (314) and applying (316) one or more objective functions to the routing candidates to determine an optimal routing candidate to satisfy embedding goals based on tenant requests, and to embed the optimal routing candidate in the one or more data centers (412).
NEC Laboratories America Inc. | Date: 2017-02-08
The present invention enables capturing API level calls using a combination of dynamic instrumentation and library overriding. The invention allows event level tracing of API function calls and returns, and is able to generate an execution trace. The instrumentation is lightweight and relies on dynamic library/shared library linking mechanisms in most operating systems. Hence we need no source code modification or binary injection. The tool can be used to capture parameter values, and return values, which can be used to correlate traces across API function calls to generate transaction flow logic.
Cvijetic N.,NEC Laboratories America Inc.
Journal of Lightwave Technology | Year: 2012
In this tutorial overview, the principles, advantages, challenges, and practical requirements of optical orthogonal frequency division multiplexing (OFDM)-based optical access are presented, with an emphasis on orthogonal frequency division multiple access (OFDMA) for application in next-generation passive optical networks (PON). General OFDM principles, including orthogonality, cyclic prefix use, frequency-domain equalization, and multiuser OFDMA are summarized, followed by an overview of various optical OFDM(A) transceiver architectures for next-generation PON. Functional requirements are outlined for high-speed digital signal processors (DSP) and data converters in OFDMA-PON. A techno-economic outlook for such a software-defined, DSP-based optical access platform is also provided. © 2006 IEEE.