COMPUTER MONITORS USE

Brand Owner Address Description
CURATOR EIZO CORPORATION 153 Shimokashiwano-machi Hakusan-shi, Ishikawa 924-8566 Japan Computer monitors for use in medical settings; video monitors for use in medical settings; liquid crystal display monitors for use in medical settings; computer graphics boards for medical monitors; recorded computer programs for medical imaging apparatus; downloadable computer programs for medical imaging apparatus; computer software for controlling images displayed on a computer monitor for use in medical setting; computer software for controlling and maintaining the performance of computer monitors for use in medical settings; computer software for managing surgical video; downloadable computer software for managing surgical procedure schedules; stands for computer monitors used in medical settings; luminance sensors for computer monitors used in medical settings; colorimeters for measuring the color characteristics of the images displayed on a computer monitor used in medical settings; video signal distribution amplifiers for surgery video used in an operating room; video signal splitters for surgical video used in an operating room; video signal converters for surgical video used in an operating room; wireless transmitters and receivers for computer and computer peripherals used in an operating room; computer network switches for selectively using multiple computers used in an operating room; video recorders for surgical videos; computer network servers, adapters, bridges, switches, routers, and hubs, used in an operating room;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An intrusion detection system (IDS) that uses application monitors for detecting application-based attacks against computer systems. The IDS implements application monitors in the form of a software program to learn and monitor the behavior of system programs in order to detect attacks against computer hosts. The application monitors implement machine learning algorithms to provide a mechanism for learning from previously observed behavior in order to recognize future attacks that it has not seen before. The application monitors include temporal locality algorithms to increased the accuracy of the IDS. The IDS of the present invention may comprise a string-matching program, a neural network, or a time series prediction algorithm for learning normal application behavior and for detecting anomalies.