Opstad
Anne Opstad, Sarpsborg NO
Patent application number | Description | Published |
---|---|---|
20120090192 | METHOD FOR DRYING MICROFIBRILLATED CELLULOSE - The invention relates to a method for drying microfibrillated cellulose, comprising at least the following steps: (i) applying a composition comprising microfibrillated cellulose and a liquid onto a cold surface; (H) removing the frozen composition formed in step (i) from said surface to form frozen particles; (iii) optionally increasing the size of the frozen particles formed in step (ii); (iv) drying the frozen particles formed in step (iii) comprising: subjecting said particles to a cold moving gas thus removing liquid by means comprising sublimation and optionally (v) isolating the microfibrillated cellulose formed in step (iv). The invention also relates to a device for carrying out the method of the invention. | 04-19-2012 |
Christer Lorentz Opstad, Sandefjord NO
Patent application number | Description | Published |
---|---|---|
20140364540 | POWDER COATING - A particulate coating composition, preferably a powder coating composition comprising at least one epoxy containing compound, at least one polycarboxyl polymer, at least one organic Lewis acid and at least one organic Lewis base. | 12-11-2014 |
Edwin Lars Opstad, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20120304010 | CODE COVERAGE-BASED TAINT PERIMETER DETECTION - A code coverage-based taint perimeter detection system and method for testing software code by determining code coverage and detecting new coverage of the code. Embodiments of the system and method perform tainted data flow analysis on execution traces of the code to determine tainted branch targets. The tainted branch targets may be filtered to remove any tainted branch targets that have already been covered. New coverage can be determined by monitoring the filtered tainted branch targets, which in some embodiments involves the use of software breakpoints that are automatically placed at the locations in the tainted branch targets at runtime. Embodiments of the system and method use an iterative process to ensure that only tainted branch targets that have not already been covered or tested are examined. | 11-29-2012 |