1
Elias Nemer
Elias Nemer, Ahmed Said: Method and apparatus for compensating I/Q imbalance in receivers. Intel Corporation, Blakely Sokoloff Taylor & Zafman, October 9, 2007: US07280619 (14 worldwide citation)

A method and apparatus for compensating I/Q imbalance in receivers is described. The method includes determining a difference between energies of two quadratures, correcting an amplitude imbalance using the difference between the energies of two quadratures, determining a cross-correlation between t ...


2
Elias Nemer
Ahmed Said, Varadanarayanan Mugundhan, Elias Nemer, Gregory R Goslin: System and method for enhanced symbol generation. Intel Corporation, Buckley Maschoff & Talwalkar, November 15, 2011: US08059762 (3 worldwide citation)

According to some embodiments, an input symbol may be received, and a hard symbol may be generated from the input symbol. A probability associated with the hard symbol may be calculated along with a probability associated with a previous hard symbol. An enhanced symbol may then be determined as a fu ...


3
Elias Nemer
Ahmed Said, Elias J Nemer, Gregory R Goslin: Effective adaptive filtering techniques. Intel Corporation, Kacvinsky Daisak PLLC, November 2, 2010: US07826523

A noise level of an input signal is determined by a noise calculation module. based on the noise level, a boundary setting module sets a reduced constellation boundary interval. This reduced constellation boundary interval is employed by an equalizer to perform adaptive equalization of the input sig ...


4
SALLAM Ahmed Said: SYSTÈME ET PROCÉDÉ POUR SÉCURITÉ ANTI-MALICIELS BASÉE SUR UN MONITEUR DE MACHINE VIRTUELLE, SYSTEM AND METHOD FOR VIRTUAL MACHINE MONITOR BASED ANTI-MALWARE SECURITY. MCAFEE, SALLAM Ahmed Said, SUVA II Jerry F, October 4, 2012: WO/2012/135192 (51 worldwide citation)

A system for securing an electronic device includes a memory, a processor, one or more operating systems residing in the memory for execution by the processor, a resource of the electronic device communicatively coupled to the operating system, a virtual machine monitor configured to execute on the ...


5
Ahmed Said, Michael Seckora: Symmetric transposed FIR digital filter. Tektronix, Boulden G Griffith, August 16, 1994: US05339264 (38 worldwide citation)

A finite impulse response (FIR) digital filter (100, 170, 175, 180) incorporates both symmetric and transposed structures in a configuration that suites ASIC implementation. The filter coefficients can be arranged in ascending order to implement coefficient block floating point, or in descending ord ...


6
Ahmed Said Sallam: Systems and method for regulating software access to security-sensitive processor resources. McAfee, Baker Botts L, October 1, 2013: US08549644 (20 worldwide citation)

A method for protecting an electronic device against malware includes consulting one or more security rules to determine a processor resource to protect, in a module below the level of all operating systems of the electronic device, intercepting an attempted access of the processor resource, accessi ...


7
Ahmed Said Sallam: Systems and methods for identifying hidden processes. McAfee, Baker Botts L, October 1, 2013: US08549648 (18 worldwide citation)

A security module may be configured to execute on the electronic device at a level below all of the operating systems of an electronic device accessing the one or more system resources. The security module may be configured to: trap one or more attempts to access system resources of the electronic d ...


8
Ahmed Said Sallam: System, method, and computer program product for populating a list of known wanted data. McAfee, Patent Capital Group, September 3, 2013: US08527978 (16 worldwide citation)

A system, method, and computer program product are provided for populating a list of known wanted data. In use, an update to data is identified. In addition, a list of known wanted data is populated with the data, in response to the update.


9
Ahmed Said Sallam: System and method for protecting and securing storage devices using below-operating system trapping. McAfee, Baker Botts L, December 31, 2013: US08621620 (16 worldwide citation)

In one embodiment, a system for securing a storage device includes an electronic device comprising a processor, a storage device communicatively coupled to the processor, and a security agent. The security agent is configured to execute at a level below all of the operating systems of the electronic ...


10
Ahmed Said Sallam: System and method for securing access to system calls. McAfee, Baker Botts L, October 14, 2014: US08863283 (13 worldwide citation)

In one embodiment, a system for securing access to system calls includes a memory, an operating system configured to execute on an electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to identify one or more resources associated with ...