Cremel
Gerard Cremel, Lingolsheim FR
Patent application number | Description | Published |
---|---|---|
20100222261 | PEPTIDIC ANTAGONISTS OF CLASS III SEMAPHORINS/NEUROPILINS COMPLEXES - The present invention concern a peptidic antagonist of class III semaphorins/neuropilins complexes comprising an amino acid sequence, which is derived from the transmembrane domain of a protein selected in the group consisting of neuropilin-1, neuropilin-2, plexin-A1, plexin-A2, plexin-A3, plexin-A4, Nr-CAM, L1-CAM, integrin Beta 1 and integrin beta 2, and including at least a GxxxG motif, eventually fused to an heterologous sequence; a nucleic acid encoding for said peptidic antagonist, a pharmaceutical composition comprising such a peptidic antagonist or a nucleic acid encoding thereof and uses thereof. | 09-02-2010 |
20150307589 | PEPTIDIC ANTAGONISTS OF CLASS III SEMAPHORINS/NEUROPILINS COMPLEXES - The present invention concern a peptidic antagonist of class III semaphorins/neuropilins complexes comprising an amino acid sequence, which is derived from the transmembrane domain of a protein selected in the group consisting of neuropilin-1, neuropilin-2, plexin-A1, plexin-A2, plexin-A3, plexin-A4, Nr-CAM, L1-CAM, integrin Beta 1 and integrin beta 2, and including at least a GxxxG motif, eventually fused to an heterologous sequence; a nucleic acid encoding for said peptidic antagonist, a pharmaceutical composition comprising such a peptidic antagonist or a nucleic acid encoding thereof and uses thereof. | 10-29-2015 |
Olivier Cremel, Los Altos, CA US
Patent application number | Description | Published |
---|---|---|
20080294825 | Handling Interrupts When Virtual Machines Have Direct Access to a Hardware Device - In virtualized computer system in which a guest operating system runs on a virtual machine of a virtualized computer system and has direct access to a hardware device coupled to the virtualized computer system via a communication interface, a computer-implemented method of handling interrupts from the hardware device to the guest operating system includes: (a) receiving a physical interrupt from the hardware device on a shared interrupt line of an interrupt controller; (b) masking the shared interrupt line of the interrupt controller; (c) generating a virtual interrupt corresponding to the physical interrupt to the guest operating system; and (d) the guest operating system executing an interrupt service routine. | 11-27-2008 |
20100161863 | COMMUNICATING WITH USB DEVICES AFTER A COMPUTER SYSTEM CRASH - One embodiment is a method of transferring data from a computer system to a Universal Serial Bus (USB) device after a computer system crash where interrupts are masked, the method comprising: (a) detecting the computer system crash; (b) transferring at least a portion of the data to a USB driver for the USB device; (c) the USB driver transferring the portion of the data to a USB controller driver for a USB controller for the USB device; (d) the USB controller driver causing the USB controller to transfer the portion of the data to the USB device; (e) polling the USB controller to determine whether the data transfer was completed; and (f) if the data transfer was completed, providing a notification to the computer system. Another embodiment is a method of transferring data from a Universal Serial Bus (USB) device to a computer system after a computer system crash where interrupts are masked, the method comprising: (a) detecting the computer system crash; (b) identifying a USB device used to communicate data to the computer system; (c) polling a USB controller for the identified USB device to determine whether new input has been received; (d) if so, obtaining the new input; and (e) transferring the new output to the computer system for further processing. | 06-24-2010 |
Olivier A. Cremel, Los Altos, CA US
Olivier Alain Cremel, Palo Alto, CA US
Patent application number | Description | Published |
---|---|---|
20120324212 | CACHING BASED OPERATING SYSTEM INSTALLATION - An image of system software is installed by loading an executable image of the system software using a boot loader, where the executable image includes a kernel and a plurality of files used by the kernel. The kernel of the system software is executed to generate the image of the system software that includes a copy of the kernel. Generating the image of the system software involves the steps of generating a plurality of pointers that each point to a different one of the files, retrieving the files using the pointers, and storing a copy of the kernel and the files in a storage device from which the system software is to be booted as the image of the system software. | 12-20-2012 |