Simon Lok

Simon Lok

Reno, Nevada, United States
1K followers 500+ connections

Services

Articles by Simon

  • Edge RAG LLM with rXg

    Edge RAG LLM with rXg

    AI is all the buzz right now; these intelligent systems are reshaping industries from crafting imaginative text to…

    2 Comments
  • Blockchain Mining for Passive Income

    Blockchain Mining for Passive Income

    Most of the people I know think of residential rental properties whenever the phrase "passive income" is mentioned. Buy…

    28 Comments

Activity

Join now to see all activity

Licenses & Certifications

Publications

  • Evaluation of Visual Balance for Automated Layout

    Proceedings of the 2004 Conference on Intelligent User Interfaces

    Layout refers to the process of determining the size and position of the visual objects in an information presentation. We introduce the WeightMap, a bitmap representation of the visual weight of a presentation. In addition, we present algorithms that use WeightMaps to allow an automated layout system to evaluate the effectiveness of its layouts. Our approach is based on the concepts of visual weight and visual balance, which are fundamental to the visual arts. The objects in the layout are…

    Layout refers to the process of determining the size and position of the visual objects in an information presentation. We introduce the WeightMap, a bitmap representation of the visual weight of a presentation. In addition, we present algorithms that use WeightMaps to allow an automated layout system to evaluate the effectiveness of its layouts. Our approach is based on the concepts of visual weight and visual balance, which are fundamental to the visual arts. The objects in the layout are each assigned a visual weight, and a WeightMap is created that encodes the visual weight of the layout. Image-processing techniques, including pyramids and edge detection, are then used to efficiently analyze the WeightMap for balance. In addition, derivatives of the sums of the rows and columns are used to generate suggestions for how to improve the layout.

    See publication
  • Employing Natural Language Summarization and Automated Layout for Effective Presentation and Navigation of Information Retrieval Results.

    Proceedings of the 12th International World Wide Web Conference

    This paper describes the employment of multi-document summarization and automated layout as a post-processing step in document retrieval. We also examine the use of an interactive textual fisheye that employs automated layout techniques to present a generated natural language summary as a replacement to the standard ranked list.

    See publication
  • A Graphical User Interface Toolkit Approach to Thin Client Computing

    Proceedings of the 11th International World Wide Web Conference

    Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a PC today has been largely reduced to a terminal for running a client or viewer such as a Web browser. Implementers of network-centric applications typically rely on the limited capabilities of HTML, employing proprietary "plug ins" or transmitting the binary image of an entire application that will be executed on the…

    Network and server-centric computing paradigms are quickly returning to being the dominant methods by which we use computers. Web applications are so prevalent that the role of a PC today has been largely reduced to a terminal for running a client or viewer such as a Web browser. Implementers of network-centric applications typically rely on the limited capabilities of HTML, employing proprietary "plug ins" or transmitting the binary image of an entire application that will be executed on the client. Alternatively, implementers can develop without regard for remote use, requiring users who wish to run such applications on a remote server to rely on a system that creates a virtual frame buffer on the server, and transmits a copy of its raster image to the local client.We review some of the problems that these current approaches pose, and show how they can be solved by developing a distributed user interface toolkit. A distributed user interface toolkit applies techniques to the high level components of a toolkit that are similar to those used at a low level in the X Window System. As an example of this approach, we present RemoteJFC, a working distributed user interface toolkit that makes it possible to develop thin-client applications using a distributed version of the Java Foundation Classes.

    See publication
  • The AIL Automated Interface Layout System

    Proceedings of the 2002 Conference on Intelligent User Interfaces

    We describe an automated layout system called AIL that generates the user interface for the PERSIVAL digital library project. AIL creates a layout based on a variety of content components and associated meta-data information provided by the PERSIVAL generation and retrieval modules. By leveraging semantic links between the content components, the layout that AIL provides is both context and user-model aware. In addition, AIL is capable of interacting intelligently with the natural language…

    We describe an automated layout system called AIL that generates the user interface for the PERSIVAL digital library project. AIL creates a layout based on a variety of content components and associated meta-data information provided by the PERSIVAL generation and retrieval modules. By leveraging semantic links between the content components, the layout that AIL provides is both context and user-model aware. In addition, AIL is capable of interacting intelligently with the natural language generation components of PERSIVAL to tailor the length of the text content for a given layout.

    See publication
  • A Survey of Automated Layout Techniques for Information Presentations

    Proceedings of the 2001 SmartGraphics Symposium

    Layout refers to the process of determining the sizes and positions of the visual objects that are part of an information presentation. Automated layout refers to the use of a computer program to au- tomate either all or part of the layout process. This field of re- search lies at the crossroads between artificial intelligence and hu- man computer interaction. Automated layout of presentations is be- coming increasingly important as the amount of data that we need to present rapidly overtakes…

    Layout refers to the process of determining the sizes and positions of the visual objects that are part of an information presentation. Automated layout refers to the use of a computer program to au- tomate either all or part of the layout process. This field of re- search lies at the crossroads between artificial intelligence and hu- man computer interaction. Automated layout of presentations is be- coming increasingly important as the amount of data that we need to present rapidly overtakes our ability to present it manually. We survey and analyze the techniques used by research systems that have automated layout components and suggest possible areas of future work.

    See publication

Patents

  • Implemented per-room VLANs

    Issued US 10,354,346

    An inventive system related to implementation of dynamic virtual local area network (VLAN) assignment and provisioning in communication networks. The inventive system enables per-room 802.1q VLANs that are enforced through 802.1X distribution equipment. This inventive system enables facilities such as hotels to implement per-room VLANs to increase security and efficiency in handling a plurality of devices brought in by guests as well as devices that are provided by the facility itself.

    See patent
  • System and method for dynamic VLAN assignment

    Issued US 9025533

    A system and method for dynamically assigning VLANs to devices for reliable, high performance and low support volume mechanism that allows service providers to affordably deploy dynamic per-unit VLAN assignment with zero operator intervention provisioning.

    See patent
  • Distributed computer system using a graphical user interface toolkit

    Issued US 20030182469

    A distributed computer system having a server and remote client for executing an application on the server. A remote-capable user interface toolkit resides on the server and has remote-capable components that correspond to components of a user interface toolkit which resides on the remote client. The remote-capable components are substantially the same as corresponding components of the user interface toolkit, and interact with the application according to the same application programming…

    A distributed computer system having a server and remote client for executing an application on the server. A remote-capable user interface toolkit resides on the server and has remote-capable components that correspond to components of a user interface toolkit which resides on the remote client. The remote-capable components are substantially the same as corresponding components of the user interface toolkit, and interact with the application according to the same application programming interface. However, when invoked by the application, the remote-capable components issue a message to the component on the remote client to perform the corresponding function on the client. A network communication protocol of sending messages between the remote-capable user interface toolkit on the server and the user interface toolkit on the client is thereby generated.

  • Directed Multiplexing of Data Traffic in a Link Control Environment

    Issued US 20070147438

    A link controller that is capable of asymmetric network traffic multiplexing. A typical link controller treats all provisioned links as being equal (i.e., traffic is symmetrically multiplexed or distributed between all provisioned links) except when a link failure is detected. Our link controller is capable of modifying the multiplexing behavior of the link controller based on a wide range of parameters including but not limited to link characteristics, network traffic type, source and/or…

    A link controller that is capable of asymmetric network traffic multiplexing. A typical link controller treats all provisioned links as being equal (i.e., traffic is symmetrically multiplexed or distributed between all provisioned links) except when a link failure is detected. Our link controller is capable of modifying the multiplexing behavior of the link controller based on a wide range of parameters including but not limited to link characteristics, network traffic type, source and/or destination address, link saturation and overall network load.

  • Fusion Intrusion Protection System

    Issued US 20070056038

    An intrusion protection system that fuses a network instrumentation classification with a packet payload signature matching system. Each of these kinds of systems is independently capable of being effectively deployed as an anomaly detection system. By employing sensor fusion techniques to combine the instrumentation classification approach with the signature matching approach, the present invention provides an intrusion protection system that is uniquely capable of detecting both well known…

    An intrusion protection system that fuses a network instrumentation classification with a packet payload signature matching system. Each of these kinds of systems is independently capable of being effectively deployed as an anomaly detection system. By employing sensor fusion techniques to combine the instrumentation classification approach with the signature matching approach, the present invention provides an intrusion protection system that is uniquely capable of detecting both well known and newly developed threats while having an extremely low false positive rate.

  • Unified memory IP packet processing platform

    Issued US 20060277267

    A unified memory architecture IP packet processing platform (e.g., IPv4) that is designed to execute on a standard general purpose computer. Unlike the traditional packet processing paradigm, our platform is software pluggable and can integrate all of the functionality that is typically only available by chaining a series of discrete devices. The present invention uses a unified memory architecture that precludes the need to transfer packets between modules that implement processing…

    A unified memory architecture IP packet processing platform (e.g., IPv4) that is designed to execute on a standard general purpose computer. Unlike the traditional packet processing paradigm, our platform is software pluggable and can integrate all of the functionality that is typically only available by chaining a series of discrete devices. The present invention uses a unified memory architecture that precludes the need to transfer packets between modules that implement processing functionality.

  • Out-of-order superscalar IP packet analysis

    Issued US 20060268866

    An out-of-order network packet analysis architecture that decouples deep packet inspection from the packet forwarding process. Rather than placing the packet inspection engine inline into the packet forwarding pipeline, the packet forwarding and packet inspection processes operate asynchronously on a single unified packet buffer. Furthermore, the present invention reduces the load on the packet inspection engine by employing a packet marking preprocessor to designate appropriate packets for…

    An out-of-order network packet analysis architecture that decouples deep packet inspection from the packet forwarding process. Rather than placing the packet inspection engine inline into the packet forwarding pipeline, the packet forwarding and packet inspection processes operate asynchronously on a single unified packet buffer. Furthermore, the present invention reduces the load on the packet inspection engine by employing a packet marking preprocessor to designate appropriate packets for inspection.

  • Unified roaming profile network provisioning system

    Issued US 20060259952

    A method of network provisioning where a profile is associated with a specific end-user node and policies are enforced via a unified network provisioning appliance. Unlike traditional back-ends where multiple discrete devices are deployed to provision a network, the present invention can be implemented as a single unified device with all of the functionality implemented as software plug-ins. In accordance with embodiments of the present invention, features execute on the same device and share a…

    A method of network provisioning where a profile is associated with a specific end-user node and policies are enforced via a unified network provisioning appliance. Unlike traditional back-ends where multiple discrete devices are deployed to provision a network, the present invention can be implemented as a single unified device with all of the functionality implemented as software plug-ins. In accordance with embodiments of the present invention, features execute on the same device and share a common provisioning profile. Hence, the present invention features unbounded interoperability between what are normally considered separate sets of functionality. This capability allows provisioning services such as bandwidth shaping, identity manager, content filter and the like to enforce policies that are defined for the user of a node. Furthermore, our system is capable of dynamically changing policies enforced on a node to reflect a change in the user who is operating the node.

  • Quarantine Filesystem

    Issued US 20060137013

    A quarantine filesystem driver having a first interface for communicating with an operating system library, a second interface for communicating with a primary filesystem, and a third interface for communicating with a secondary filesystem. Preferably the secondary filesystem is a delta filesystem that records a log of changes to data recorded in the primary filesystem. The primary filesystem couples to a primary mass storage device or devices that may be internal to (i.e., closely coupled to)…

    A quarantine filesystem driver having a first interface for communicating with an operating system library, a second interface for communicating with a primary filesystem, and a third interface for communicating with a secondary filesystem. Preferably the secondary filesystem is a delta filesystem that records a log of changes to data recorded in the primary filesystem. The primary filesystem couples to a primary mass storage device or devices that may be internal to (i.e., closely coupled to) the computing system in which the quarantine filesystem is implemented. The secondary filesystem couples to a mass storage system such as a hard disk drive that is independent of the primary mass storage device or devices. Most preferably the secondary mass storage device or devices is/are implemented externally to the system in which the quarantine filesystem is implemented.

  • Single Use Secure Token Appliance

    Issued US 20050154923

    Systems, methods, software and data structures that facilitate the trusted, secure data exchange of data over networks, including open networks such as the Internet.

Languages

  • Cantonese

    Professional working proficiency

  • English

    Native or bilingual proficiency

More activity by Simon

View Simon’s full profile

  • See who you know in common
  • Get introduced
  • Contact Simon directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Simon Lok

Add new skills with these courses