Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
Sugar Land, Texas, United States
12K followers
500+ connections
About
I am a strategic, mission-driven global consulting executive that serves as the fuel to…
Articles by Dr. Sanjoy
Activity
-
Some moments are more than milestones—they’re movements. Today, I’m thrilled to highlight Rice University’s game-changing partnership with…
Some moments are more than milestones—they’re movements. Today, I’m thrilled to highlight Rice University’s game-changing partnership with…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Rice University is partnering with Greentown Labs to accelerate climate tech innovation in Houston’s Ion District. This coalition is supported by a…
Rice University is partnering with Greentown Labs to accelerate climate tech innovation in Houston’s Ion District. This coalition is supported by a…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Rice and Houston Methodist have launched the Digital Health Institute — an exciting collaboration to transform health care for millions through…
Rice and Houston Methodist have launched the Digital Health Institute — an exciting collaboration to transform health care for millions through…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
Experience
-
University of Maryland, Department of Electrical and Computer Engineering
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
-
Honored Listee
Marquis Who's Who
Issued ExpiresCredential ID 6c0080b1e6b04d2a93bdaf86f000c6fab0add3cfa16e47acb6f0f05a596b6296
Patents
-
Multimodal biometric profiling
Issued US 9672581
Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image…
Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image based on cover image intensity associated with the predetermined bit position.
-
Adaptive architecture for a mobile application based on rich application, process, and resource contexts and deployed in resource constrained environments
Issued US 9619254
Abstract: A method for adapting execution of an application on a mobile device may be performed by a mobile device including a processor and a memory. The method may include receiving an application context, a process context, and one other context. The method also includes analyzing at least one of the application context or the process context together with the one other context. The method also includes dynamically adapting execution of the application on the mobile device based on the…
Abstract: A method for adapting execution of an application on a mobile device may be performed by a mobile device including a processor and a memory. The method may include receiving an application context, a process context, and one other context. The method also includes analyzing at least one of the application context or the process context together with the one other context. The method also includes dynamically adapting execution of the application on the mobile device based on the analysis. Adapting execution of the application may include transferring processing related to the application to a backend server for processing.
-
Biometric authentication technology
Issued US 9600730
Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the…
Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the accessed biometric image and the reference image. The biometric verification system searches the sorted similarity scores included in the biometric data using the computed similarity score and outputs a result based on the searching.
-
Biometric matching technology
Issued US 9582723
Abstract: Biometric matching technology, in which a watch list is managed, multiple images of a potential suspect are accessed, and parallel pre-processing of the multiple images is controlled. Based on the pre-processing, an image of the potential suspect to use in matching against the watch list is determined and the determined image is used to search sorted biometric data included in the watch list. A subset of persons from the watch list is identified based on the search and parallel…
Abstract: Biometric matching technology, in which a watch list is managed, multiple images of a potential suspect are accessed, and parallel pre-processing of the multiple images is controlled. Based on the pre-processing, an image of the potential suspect to use in matching against the watch list is determined and the determined image is used to search sorted biometric data included in the watch list. A subset of persons from the watch list is identified based on the search and parallel analysis of the determined image of the potential suspect against detailed biometric data associated with the subset of persons in the watch list is controlled. Based on the parallel analysis, it is determined whether the potential suspect matches a person in the watch list and a result is outputted based on the determination.
-
Adaptive sensor data selection and sampling based on current and future context
Issued US 9568895
Abstract: A method for controlling a sensor may be performed by a mobile device including a processor and a memory. The method may include receiving raw data from the sensor, classifying the raw data into a context value, interpreting the context value into a higher-level context, receiving a predicted context based on the higher-level context, and controlling the sensor based on the predicted context. Controlling the sensor may include controlling a frequency at which raw data is received from…
Abstract: A method for controlling a sensor may be performed by a mobile device including a processor and a memory. The method may include receiving raw data from the sensor, classifying the raw data into a context value, interpreting the context value into a higher-level context, receiving a predicted context based on the higher-level context, and controlling the sensor based on the predicted context. Controlling the sensor may include controlling a frequency at which raw data is received from the sensor, or an on/off state of the sensor. Control of the sensor may also be based on both the higher-level context and the predicted context.
-
Biometric authentication technology
Issued US 9558415
Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the…
Abstract: Biometric authentication technology, in which biometric data is maintained for a group of people. The biometric data includes sorted similarity scores, where each of the sorted similarity scores is computed to represent similarity between a corresponding biometric image and a reference image. A biometric verification system accesses a biometric image of at least a portion of a person, accesses the reference image, and computes a similarity score that represents similarity between the accessed biometric image and the reference image. The biometric verification system searches the sorted similarity scores included in the biometric data using the computed similarity score and outputs a result based on the searching.
-
Dynamic ETA and STA transportation system
Issued US 9530314
Abstract: A transportation system may store a standard time of arrival table including standard time of arrivals for fixed stops and waypoints or geo-sections. Delay of a vehicle reaching a fixed stop is determined and may be used to determine an estimated time of arrival to a destination on the route. Delay may be determined in response to traversing the waypoints or geo-sections on the route, and the estimated time of arrival may be updated according to the delay at each waypoint or…
Abstract: A transportation system may store a standard time of arrival table including standard time of arrivals for fixed stops and waypoints or geo-sections. Delay of a vehicle reaching a fixed stop is determined and may be used to determine an estimated time of arrival to a destination on the route. Delay may be determined in response to traversing the waypoints or geo-sections on the route, and the estimated time of arrival may be updated according to the delay at each waypoint or geo-section.
-
Secure online distributed data storage services
Issued US 9483657
Abstract: The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to…
Abstract: The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to the attacker, stores data across multiple cloud storage providers and/or parties using keys (e.g., tokens) provided by multiple parties (including the owners of the data) and maintains data confidentiality and integrity even where one or more data storage provider is compromised. The data vaporizer is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations, and backup and recovery constraints.
-
Biometric matching technology
Issued US 9483689
-
Method and system for caching streaming multimedia on the internet
Issued US 9462074
Abstract: An apparatus and method to enhance existing caches in a network to better support streaming media storage and distribution. Helper machines are used inside the network to implement several methods which support streaming media including segmentation of streaming media objects into smaller units, cooperation of Helper machines, and novel placement and replacement policies for segments of media objects.
-
Multimodal biometric profiling
Issued US 9424478
Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image…
Abstract: Multimodal biometric profiling may include receiving a cover image and a biometric template for a person. An indication of a security requirement related to biometric profiling for the person may be received. A threshold value may be determined based on the indicated security requirement. The threshold value may be used to limit a number of biometric template bits of the biometric template that are embedded in a predetermined bit position of a cover image pixel of the cover image based on cover image intensity associated with the predetermined bit position.
-
Intelligent application back stack management
Issued US 9405578
Abstract: Intelligent application back stack management may include generating a first back stack for activities of an application that have been executed by a device that executes the application. The first back stack may include a back stack size limit. A further back stack may be generated for selected ones of the activities of the application if a total number of the activities of the application and further activities of the application exceeds the back stack size limit. The first back…
Abstract: Intelligent application back stack management may include generating a first back stack for activities of an application that have been executed by a device that executes the application. The first back stack may include a back stack size limit. A further back stack may be generated for selected ones of the activities of the application if a total number of the activities of the application and further activities of the application exceeds the back stack size limit. The first back stack may be an in-memory back stack for the device that executes the application, and the further back stack may include an external on-device back stack for the device that executes the application and/or a Cloud storage based back stack. Intelligent application back stack management may further include regenerating an activity of the selected ones of the activities that is pulled from the further back stack.
-
Biometric Matching Technology
Issued US 9390338
-
Situation-aware mobile travel advisory to public transport commuters
Issued US 9373259
-
Customer-centric demand side management for utilities
Issued US 9,329,650
-
Method and system for providing real-time communications services
Issued US 9,305,301
-
Method and system for resource optimized, coarse and fine grained location tracking for planned journey
Issued US 9,294,866
-
Biometric matching technology
Issued US 9,292,749
-
Method and system for providing applications to various devices
Issued US 9,286,045
-
Biometric recognition
Issued US 9,262,675
-
Configurable key-based data shuffling and encryption
Issued US 9,258,112
-
Method and system for providing real-time communications services
Issued US 9,235,844
-
Systems and methods for replication of test results in a network environment
Issued US 9,218,266
-
Adaptive architecture for a mobile application based on rich application, process, and resource contexts and deployed in resource constrained environments
Issued US 9,207,957
-
Biometric matching technology
Issued US 9,195,893
-
Adaptive sensor data selection and sampling based on current and future context
Issued US 9,191,442
-
Method and system for caching streaming multimedia on the Internet
Issued US 9,167,015
-
Method and system for determining a best price for multimedia content
Issued US 9,141,962
-
Method and system for providing real time communications services by a service provider in collaboration with a communications service provider
Issued US 9,111,288
-
Biometric Authentication Technology
Issued US 9,020,207
-
Method and system for measuring, monitoring and controlling electrical power consumption
Issued US 9013060
-
Method and system for providing real time communications services by a service provider in collaboration with a communications service provider
Issued US 9,009,059
-
System and method for facilitating communication between different protocol stacks via virtual communication devices
Issued US 8,990,428
-
Method and system for providing applications to various devices
Issued US 8,959,536
-
Biometric matching technology
Issued US 8,948,465
-
Methods, systems, and computer-readable media for detecting scene changes in a video
Issued US 8,947,600
-
Method and system for performing transcoding resistant watermarking
Issued US 8,885,871
-
Method And System For Real Time Detection Of Conference Room Occupancy
Issued US 8,743,198
-
Method and system for seamless interaction and content sharing across multiple networks
Issued US 8,676,908
-
System and method for protection of electrical appliances
Issued US 8,659,865
-
Apparatus and method for fair message exchanges in distributed multi-player games
Issued US 8,597,124
-
System and method for dynamic management and distribution of data in a data network
Issued US 8,478,876
-
Method and system for testing an application
Issued US 8,402,312
-
Providing an Advertisement to a Calling Party before Ringback
Issued US 8,385,514
-
Method and system for efficient watermarking of video content
Issued US 8,379,911
-
User message delivery to calling party device
Issued US 8,270,590
-
Method and apparatus for enabling persistent connections with wireless networks
Issued US 8,068,502
-
Class-based bandwidth allocation and admission control for virtual private networks with differentiated service
Issued US 8,027,361
-
Method and apparatus for seamless roaming for wireless networks
Issued US 7,894,407
-
Apparatus and method for fair message exchanges in distributed multi-party games
Issued US 7,801,957
-
Apparatus and method for fair message exchanges in distributed multi-player games
Issued US 7,584,248
-
Class-based bandwidth allocation and admission control for virtual private networks with differentiated service
Issued US 7,577,161
-
High quality streaming multimedia
Issued US 7,526,564
-
Distributed Network Monitoring With Bounded Link Utilization In IP Networks
Issued US 7,502,329
-
Method And Apparatus For Providing Adaptive VPN To Enable Different Security Levels In Virtual Private Networks (VPNs)
Issued US 7,478,427
-
Method And Apparatus For Providing User Identity Based Routing In A Wireless Communications Environment
Issued US 7,426,195
-
Method And Apparatus For Enabling Peer-To-Peer Virtual Private Network (P2P-VPN) Services In A VPN-Enabled Network
Issued US 7,421,736
-
Method And System For Caching Streaming Multimedia On The Internet
Issued US 7398312
-
Method and Apparatus for Supporting Real-Time Multi-User Distributed Applications
Issued US 7,133,927
-
Method Of Cache Replacement For Streaming Media
Issued US 6721850
-
Method For Streaming Multimedia Information Over Public Networks
Issued US 6708213
-
Data Streaming Using Caching Servers With Expandable Buffers And Adjustable Rate Of Data Transmission To Absorb Network Congestion
Issued US 6405256
-
Method And Apparatus For Caching Web-Based Information
Issued US 6389510
-
High Quality Streaming Multimedia
Issued US 6377972
-
Method and Apparatus for Load Sharing on a Wide Area Network
Issued US 6314465
-
Method and Apparatus for Load Sharing on a Wide Area Network
Issued US 6314465
-
Hierarchical Rate Control Of Receivers In A Communication System Transmitting Layered Video Multicast Data With Retransmission
Issued US 6215766
-
System and Method for Multicast Conferencing and Online discussion groups
Issued US 6154463
-
A Layered Video Multicast Transmission System With Retransmission-Based Error Recovery
Issued US 6148005
-
Real-Time Processing for Virtual Circuits in Packet Switching
Issued US 6122275
-
Efficient Unified Replication and Caching Protocol
Issued US 6088721
-
Method of Multicasting
Issued US 5905871
-
Method and System for Data Transfer in the Presence of Disconnects
Issued US 5751719
-
Methods for Providing Secure Access to Shared Information
Issued US 5719938
-
Methods and Apparatus for Generating Conformance Test Sequences
Issued US 5623499
-
Adaptive Forward Error
Issued US 5600663
-
Asymmetric Protocol for Wireless Communications
Issued US 5570367
-
A method of Multicasting
Issued US 5541927
-
Anonymous Credit Card
Issued US 5420926
-
Electronic Publishing
Issued US 5509074
-
Community energy management system
US 9798298
-
Method and system for preauthenticating a mobile node
US 9491619
Abstract: A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is…
Abstract: A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.
Honors & Awards
-
• Distinguished Alumnus Award, IIT, Awarded to 5-8 alumni each year out of 10,000, Kharagpur, India, 2015
-
-
• IEEE Fellow, awarded to the top 0.1% of IEEE members worldwide, 2004
-
-
• Infosys Excellence Award for Innovations and Thought Leadership, awarded to the most innovative product of the year, 2010
-
-
• MIT Technology Reviews’ Grand Challenges for India, Awarded to the most successful project solving societal problems, 2011
-
-
• Schwarzkopf Prize for Technological Innovation, awarded to the most innovative project of the year, 2010
-
-
• Thomas Alva Edison Patent Award, New Jersey R&D Council, Awarded to the most influential patent of the year, 2013
-
-
• William R. Bennett Prize for the best original paper in IEEE/ACM Transactions on Networking, 1997
-
Recommendations received
3 people have recommended Dr. Sanjoy
Join now to viewMore activity by Dr. Sanjoy
-
Rice University and Houston Methodist are joining forces to establish the Digital Health Institute aiming to transform health care through advanced…
Rice University and Houston Methodist are joining forces to establish the Digital Health Institute aiming to transform health care through advanced…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
From the Nature Magazine editorial on the imminent arrival of A(G)I: "François Chollet, a software engineer formerly at Google, based in Mountain…
From the Nature Magazine editorial on the imminent arrival of A(G)I: "François Chollet, a software engineer formerly at Google, based in Mountain…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Check out our new review paper on ML for climate physics and simulations in the Annual Review for Condense Matter Physics
Check out our new review paper on ML for climate physics and simulations in the Annual Review for Condense Matter Physics
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Very excited about launching this new lecture series in the Rice University School of Engineering and Computing -- the Raleigh W. Johnson Lecture…
Very excited about launching this new lecture series in the Rice University School of Engineering and Computing -- the Raleigh W. Johnson Lecture…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Fun, thought provoking and collaborative is how I would describe our event last night. Already looking forward to the next one. Thanks you Entergy,…
Fun, thought provoking and collaborative is how I would describe our event last night. Already looking forward to the next one. Thanks you Entergy,…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Visited and had discussions with Shri N. Chandrasekaran of Tata Sons and his team along with Prof Raj Reddy on creating rural skills &…
Visited and had discussions with Shri N. Chandrasekaran of Tata Sons and his team along with Prof Raj Reddy on creating rural skills &…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Thank you, Michael Duffy and the Capgemini Team, for inviting me to deliver the Keynote presentation on Innovative Platforms for Cross-Industry…
Thank you, Michael Duffy and the Capgemini Team, for inviting me to deliver the Keynote presentation on Innovative Platforms for Cross-Industry…
Shared by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
-
Over the last few years, we’ve made remarkable strides in advancing the deployment and fine-tuning of #LLM and #FoundationModels, making them orders…
Over the last few years, we’ve made remarkable strides in advancing the deployment and fine-tuning of #LLM and #FoundationModels, making them orders…
Liked by Dr. Sanjoy Paul, MBA (Wharton), IEEE Fellow
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More