Abstract:
An apparatus including a memory, a first circuit and a second circuit. The memory may be divided into eight banks. Each bank may store a portion of a three-dimensional (3D) color correction lookup table. The first circuit may be configured to address the memory in response to an index of an input point. The second circuit may be configured to arrange outputs of the eight banks for color interpolation.
Abstract:
Described here are methods and compositions for treating tumors and metastases that improve anti-angiogenesis therapy. By inhibiting these mechanisms in a biological system with an anti-beta one integrin composition in combination with an anti-angiogenic composition, tumors and metastases may be deprived of an adequate blood supply, thereby resulting in tumor cell growth arrest and possibly regression, including tumor cell death. The present compositions comprise an anti-beta one integrin agent in combination with an anti-VEGF agent, in a pharmaceutical composition or compositions. Methods of treatment and of imaging are also described.
Abstract:
Embodiments of the invention provide methods for preparing high density membrane protein membranes by slow, controlled removal of detergent from mixtures of detergent, block copolymers and membrane protein mixtures. Membranes created by this method are also provided. The structure of these membranes may be varied by varying the amount of membrane protein.
Abstract:
Improved techniques of identifying actions to take in response to events involve assigning, to each set of event parameter values which characterizes an event, a set of weight values, each weight value indicative of a probability of the event belonging to a cluster of events which follow a set of rules. To continue the previous example, an event management system may determine the probability of the first event belonging to the first cluster is 51% and that for the first event belonging to the second cluster is 49%, while the probability of the second event belonging to the first cluster is 49% and that for the second event belonging to the second cluster is 51%. In such a case, the event management system can be configured to respond to such similarly configured events in similar ways.
Abstract:
Systems, methods, and other embodiments associated with data editing in a web-based interactive web response system are described. In one embodiment, a method includes receiving a request to perform an edit on a data field over a web-based protocol. The request is sent to an approval function that accesses stored authorization data to select an approval level associated with the data field. The approval function also determines an authorized approver mapped to the approval level to generate a notification over the web-based protocol. The notification is transmitted to at least one authorized approver over the web-based protocol. Approval to perform the edit is received from the at least one authorized approver over the web-based protocol.
Abstract:
In one embodiment, the methods and apparatuses detect devices participating in a conference; monitor the devices for an attribute corresponding to an attention level of each of the devices; and determine whether each device is active based on the attention level.
Abstract:
The disclosure relates to ensuring wanted electronic messages are reliably delivered to recipients by distinguishing between wanted, authenticated messages and other messages. Notifications of messages that have been identified as spam are received (60) by a messaging recovery engine (30). The engine (30) via recovery module (44) determines (62) whether the email is in fact spam and if it is not spam generates (64) a notification to this effect, such as storing details in a database (34) or by generating instructions (48) to have the message delivered. The advantage is that after-the-fact analysis of security screened electronic messages can be performed. This makes it possible to use the method disclosed with existing messaging security systems with little or no modification to those existing systems. This in turn minimises barriers that would otherwise prevent adoption of methods for reducing false identification of a wanted message as an unwanted message allowing the messaging systems to benefit from improved message delivery.
Abstract:
A system to implement a zero overhead software pipelined (SFP) loop includes a Very Long Instruction Word (VLIW) processor having an N number of execution slots. The VLIW processor executes a plurality of instructions in parallel without any limitation of an instruction buffer size. A program memory receives a Program Memory address to fetch an instruction packet. The program memory is closely coupled with the instruction buffer size to implement the zero overhead software pipelined (SFP) loop. The size of the zero overhead software pipelined (SFP) loop can exceed the instruction buffer size. A CPU control register includes a block count and an iteration count. The block count is loaded into a block counter and counts the plurality of instructions executed in the SFP loop, and the iteration count is loaded into an iteration counter and counts a number of iterations of the SFP loop based on the block count.
Abstract:
The disclosure relates to ensuring wanted electronic messages are reliably delivered to recipients by distinguishing between wanted, authenticated messages and other messages. Also, it provides for automatically compiling a datastore with senders of wanted inbound electronic communications. This is done by entering part entries into the datastore as messages are send outbound, and completing the entry as messages are sent inbound or with reference to an external datasource. The whitelist is automatically created and accurately populated and maintained without the need for any human involvement making it self training. This enables mass automation for whitelist generation and maintenance, and enables consistent, scalable deployment across any and all organisations to ensure accuracy in classification of wanted message senders. This disclosure also concerns using the datastore by identifying senders of inbound messages as senders of wanted emails according to a full or part match of their identification information.
Abstract:
A method is provided for creating a plurality of substantially uniform nano-scale features in a substantially parallel manner in which an array of micro-lenses is positioned on a surface of a substrate, where each micro-lens includes a hole such that the bottom of the hole corresponds to a portion of the surface of the substrate. A flux of charged particles, e.g., a beam of positive ions of a selected element, is applied to the micro-lens array. The flux of charged particles is focused at selected focal points on the substrate surface at the bottoms of the holes of the micro-lens array. The substrate is tilted at one or more selected angles to displace the locations of the focal points across the substrate surface. By depositing material or etching the surface of the substrate, several substantially uniform nanometer sized features may be rapidly created in each hole on the surface of the substrate in a substantially parallel manner.