Patent application number | Description | Published |
20150261556 | LARGE RECEIVE OFFLOAD FOR VIRTUAL MACHINES - A network interface controller (NIC) that includes a set of receive NIC queues capable of performing large receive offload (LRO) operations by aggregating incoming receive packets is provided. Each NIC queue turns on or off its LRO operation based a set of LRO enabling rules or parameters, whereby only packets that meet the set of rules or parameters will be aggregated in the NIC queue. Each NIC queue is controlled by its own set of LRO enabling rules such that the LRO operations of the different NIC queues can be individually controlled. | 09-17-2015 |
20150263968 | SNOOPING FORWARDED PACKETS BY A VIRTUAL MACHINE - A method for performing LRO aggregation on packets being forwarded by a VM is provided. The method segments the LRO aggregated packet according to the Maximum Segment Size (MSS) of the TCP protocol before forwarding the segmented packets to their destination. The method snoops the packets being forwarded for its MSS parameter before using the snooped MSS parameter to perform Transmit Segmentation Offload (TSO) operation. The PNIC performs both the aggregation operation (LRO) and the segmentation (TSO) within its own hardware without consuming CPU cycles at the host machine. The PNIC receives the MSS parameter from the network stack as a metadata that accompanies a LRO aggregated packet. | 09-17-2015 |
20150263974 | LARGE RECEIVE OFFLOAD FOR VIRTUAL MACHINES - A network interface controller (NIC) that includes a set of receive NIC queues capable of performing large receive offload (LRO) operations by aggregating incoming receive packets is provided. Each NIC queue turns on or off its LRO operation based a set of LRO enabling rules or parameters, whereby only packets that meet the set of rules or parameters will be aggregated in the NIC queue. Each NIC queue is controlled by its own set of LRO enabling rules such that the LRO operations of the different NIC queues can be individually controlled. | 09-17-2015 |
20150350087 | CONSISTENT HASHING FOR NETWORK TRAFFIC DISPATCHING - A method is provided that uses a consistent hashing technique to dispatch incoming packets in a stable system prior to adding of a node. The method uses a hash table and assigns hash buckets in the table to each network node. A set of fields in each incoming packet is hashed and is used to identify the corresponding hash bucket. The packets are then dispatched to the network nodes based on the nodes' hash buckets. During an observation period, the method identifies the ongoing sessions by creating a bit vector table that is used to identify the old and new sessions during a re-dispatching period. The method uses the consistent hashing method and the probabilistic method dispatch the incoming packets such that each packet that belongs to an old session is dispatched to the same old node that has been processing the other packets of the session. | 12-03-2015 |
20150358288 | USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSING - A novel method for stateful packet classification that uses hardware resources for performing stateless lookups and software resources for performing stateful connection flow handshaking is provided. To classify an incoming packet from a network, some embodiments perform stateless look up operations for the incoming packet in hardware and forward the result of the stateless look up to the software. The software in turn uses the result of the stateless look up to perform the stateful connection flow handshaking and to determine the result of the stateful packet classification. | 12-10-2015 |
20150358290 | USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSING - A novel method for stateful packet classification that uses hardware resources for performing stateless lookups and software resources for performing stateful connection flow handshaking is provided. To classify an incoming packet from a network, some embodiments perform stateless look up operations for the incoming packet in hardware and forward the result of the stateless look up to the software. The software in turn uses the result of the stateless look up to perform the stateful connection flow handshaking and to determine the result of the stateful packet classification. | 12-10-2015 |
20150358433 | EFFICIENT PACKET CLASSIFICATION FOR DYNAMIC CONTAINERS - A novel algorithm for packet classification that is based on a novel search structure for packet classification rules is provided. Addresses from all the containers are merged and maintained in a single Trie. Each entry in the Trie has additional information that can be traced back to the container from where the address originated. This information is used to keep the Trie in sync with the containers when the container definition dynamically changes. | 12-10-2015 |
20150358434 | EFFICIENT PACKET CLASSIFICATION FOR DYNAMIC CONTAINERS - A novel algorithm for packet classification that is based on a novel search structure for packet classification rules is provided. Addresses from all the containers are merged and maintained in a single Trie. Each entry in the Trie has additional information that can be traced back to the container from where the address originated. This information is used to keep the Trie in sync with the containers when the container definition dynamically changes. | 12-10-2015 |
Patent application number | Description | Published |
20140317677 | FRAMEWORK FOR COORDINATION BETWEEN ENDPOINT SECURITY AND NETWORK SECURITY SERVICES - Systems and techniques are described for virtual machine security. A described technique includes operating one or more virtual machines each in accordance with a respective security container, wherein the respective security container is associated with a respective rule that specifies transfer of the virtual machine from the respective security container to a quarantine container based on one or more criteria. One or more security services are operated on the one or more virtual machines to identify one or more security threats associated with one or more of the virtual machines. One or more tags generated by the endpoint security services are obtained, where each tag is for a virtual machine that is associated with one of the identified security threats. And one of the virtual machines is identified as requiring transfer to the quarantine container based on, at least, one or more of the obtained tags and the one or more criteria. | 10-23-2014 |
20140334485 | METHOD AND SYSTEM FOR SERVICE SWITCHING USING SERVICE TAGS - The disclosure herein describes a system, which provides service switching in a datacenter environment. The system can include a service switching gateway, which can identify a service tag associated with a received packet. During operation, the service switching gateway determines a source client, a requested service, or both for the packet based on the service tag, identifies a corresponding service portal based on the service tag, and forwards the packet toward the service portal. The service switching gateway can optionally maintain a mapping between the service tag and one or more of: a source client, a required service, the service portal, and a tunnel encapsulation. The service switching gateway can encapsulate the packet based on an encapsulation mechanism supported by the service portal and forward the packet based on the mapping. | 11-13-2014 |
20140376367 | SYSTEM AND METHOD FOR DISTRIBUTION OF POLICY ENFORCEMENT POINT - The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow. | 12-25-2014 |
20150096007 | Distributed Identity-Based Firewalls - Systems and techniques are described for monitoring network communications using a distributed firewall. One of the techniques includes receiving, at a driver executing in a guest operating system of a virtual machine, a request to open a network connection from a process associated with a user, wherein the driver performs operations comprising: obtaining identity information for the user; providing the identity information and data identifying the network connection to an identity module external to the driver; and receiving, by a distributed firewall, data associating the identity information with the data identifying the network connection from the identity module, wherein the distributed firewall performs operations comprising: receiving an outgoing packet from the virtual machine; determining that the identity information corresponds to the outgoing packet; and evaluating one or more routing rules based at least in part on the identity information. | 04-02-2015 |
Patent application number | Description | Published |
20100299314 | IDENTIFYING AND USING CRITICAL FIELDS IN QUALITY MANAGEMENT - Methods and systems for identifying critical fields in documents, for example so that quality improvement efforts can be prioritized on the critical fields. One aspect of the invention concerns a method for improving quality of a data processing operation in a plurality of documents. A set of documents is sampled. An error rate for fields in the documents is estimated based on the sampling. Critical fields are identified based on which fields have error rates higher than a threshold. | 11-25-2010 |
20100332899 | Quality Management in a Data-Processing Environment - A method, system and computer program for quality management of a plurality of documents associated with a data-processing operation of an organization is provided. The documents include several fields, the organization has employees, and the method comprises determination of error rates. Errors are reduced in the plurality of documents by focusing on critical fields. The occurrence of errors is predicted by determining a correlation between the errors and a set of attributes, which is updated. Reducing and predicting errors control the error rate. A method for measuring the quality of a plurality of documents is also provided. The measurement is based on the relative operational impact of the errors and the frequency of errors associated with each field. | 12-30-2010 |
20110055119 | Assessing and Managing Operational Risk in Organizational Operations - Methods and systems for automated assessment of the operational risk for an organization based on sampling the operations of the organization. These approaches can be used for automated comparison of the operational risk of two or more organizational operations. | 03-03-2011 |
20110055620 | Identifying and Predicting Errors and Root Causes in a Data Processing Operation - Methods and systems for automated quality management and/or monitoring of a data processing operation, including identifying root causes for errors, identifying which errors are likely to have root causes, predicting errors, and predicting increases in errors. | 03-03-2011 |
20110060618 | Statistical Determination of Operator Error - Various embodiments of the invention provide systems and methods for estimating a frequency of errors for data processing operators, but without human inspection of documents typed by the operators and without comparing documents typed by the operators against known transcriptions. | 03-10-2011 |
20110060728 | Operator-specific Quality Management and Quality Improvement - Methods and systems for improving a data processing operation based on operator-specific quality management and/or monitoring. For example, operator-specific frequency of errors, error rates, error patterns and/or root causes may be identified. Operator-specific actions may then be taken based on these. | 03-10-2011 |
20110066901 | Automated Quality Management System - Various embodiments of the invention provide methods and systems for automated quality management and/or monitoring of organization operations, including for example data processing operations. In one aspect of the invention, a quality management system uses an error rate measurement module to automatically monitor the quality of an organizational operation. Information is processed by the organizational operation. The error rate measurement module samples the processed information. It also automatically determines, without human intervention, an error rate based on the sampled information. The error rate accounts for both a frequency of errors and an operational impact of errors. | 03-17-2011 |
20110209053 | Shuffling Documents Containing Restricted Information - A method, system and computer program product for processing documents containing restricted information. The method for processing the documents includes the step of identifying data fields in the document. The method further includes the steps of identifying a critical section(s) containing data corresponding to restricted information, and shuffling this data to create synthesized documents. | 08-25-2011 |
20120047097 | Secure Handling of Documents with Fields that Possibly Contain Restricted Information - A method, system and computer program product for processing documents containing restricted information. One aspect concerns identifying which sections of a document may be critical, non-critical or possibly critical. | 02-23-2012 |
20120047552 | DYNAMICALLY UPDATED SECURE HANDLING OF DOCUMENTS CONTAINING RESTRICTED INFORMATION - A method, system and computer program product for processing documents containing restricted information. One aspect concerns updating the relevant information security rules applicable to the documents. | 02-23-2012 |
20120047553 | SECURE DISTRIBUTED STORAGE OF DOCUMENTS CONTAINING RESTRICTED INFORMATION, VIA THE USE OF KEYSETS - A method, system and computer program product for processing documents containing restricted information. One aspect concerns storing documents in a distributed but secure manner, for example using keysets. | 02-23-2012 |
20120259872 | Automatically Generating Data Transformations for Business Process Platforms - Business process providers implement client data processing processes for clients. The business process providers use certain formats (provider formats, defined by provider format fields). The clients use certain formats (client formats, defined by client format fields). A normative format is automatically defined and used as an intermediary between client and provider formats. Mappings between the normative format and the client and provider formats can be generated automatically. | 10-11-2012 |
20120259898 | Automatically Optimizing Business Process Platforms - Business process provider(s) process client data. The clients use certain formats (client formats, defined by client format fields). The client format fields instantiated in documents are analyzed. Based on this analysis, the client processes are automatically grouped into different process platforms for processing. For example, similar client processes preferably are grouped together into the same process platform, in order to increase efficiency of processing. In another aspect, the user interfaces used by the business process provider(s) may be constructed from different blocks, where the blocks are automatically defined based on the analysis of client format fields. | 10-11-2012 |
20130144813 | Analyzing Data Sets with the Help of Inexpert Humans to Find Patterns - A combined computer/human approach is used to detect actionable insights in large data sets. Automated computer analysis used to identify patterns (e.g., possibly meaningful patterns or subsets within the data). These are presented to humans for feedback, where the humans may have little to no training in the statistical methods used to detect actionable insights. Feedback from the humans is used to improve the pattern detection and facilitate the detection of actionable insights. | 06-06-2013 |
20140324787 | Analyzing Large Data Sets to Find Deviation Patterns - Operations, such as data processing operations, can be improved by applying clustering and statistical techniques to observed behaviors in the data processing operations. | 10-30-2014 |
20150205695 | Identifying Contributors That Explain Differences Between a Data Set and a Subset of the Data Set - Methods for analyzing and rendering business intelligence data allow for efficient scalability as datasets grow in size. Human intervention is minimized by augmented decision making ability in selecting what aspects of large datasets should be focused on to drive key business outcomes. Variable value combinations that are predominant drivers of key observations are automatically determined from several competing variable value combinations. The identified variable value combinations can then be then used to predict future trends underlying the business intelligence data. In another embodiment, an observed outcome is decomposed into multiple contributing drivers and the impact of each of the contributing drivers can be analyzed and numerically quantified—as a static snapshot or as a time-varying evolution. Similarly, differences in observations between two groups can be decomposed into multiple contributing sub-groups for each of the groups and pairwise differences among sub-groups can be quantified and analyzed. | 07-23-2015 |
20150205825 | Multi-screen Reporting of Deviation Patterns Within a Data Set - Methods for analyzing and rendering business intelligence data allow for efficient scalability as datasets grow in size. Human intervention is minimized by augmented decision making ability in selecting what aspects of large datasets should be focused on to drive key business outcomes. Variable value combinations that are predominant drivers of key observations are automatically determined from several competing variable value combinations. The identified variable value combinations can then be then used to predict future trends underlying the business intelligence data. In another embodiment, an observed outcome is decomposed into multiple contributing drivers and the impact of each of the contributing drivers can be analyzed and numerically quantified—as a static snapshot or as a time-varying evolution. Similarly, differences in observations between two groups can be decomposed into multiple contributing sub-groups for each of the groups and pairwise differences among sub-groups can be quantified and analyzed. | 07-23-2015 |
20150205827 | Analyzing Time Variations in a Data Set - Methods for analyzing and rendering business intelligence data allow for efficient scalability as datasets grow in size. Human intervention is minimized by augmented decision making ability in selecting what aspects of large datasets should be focused on to drive key business outcomes. Variable value combinations that are predominant drivers of key observations are automatically determined from several competing variable value combinations. The identified variable value combinations can then be then used to predict future trends underlying the business intelligence data. In another embodiment, an observed outcome is decomposed into multiple contributing drivers and the impact of each of the contributing drivers can be analyzed and numerically quantified—as a static snapshot or as a time-varying evolution. Similarly, differences in observations between two groups can be decomposed into multiple contributing sub-groups for each of the groups and pairwise differences among sub-groups can be quantified and analyzed. | 07-23-2015 |
20150206055 | Recommending Changes to Variables of a Data Set to Impact a Desired Outcome of the Data Set - Methods for analyzing and rendering business intelligence data allow for efficient scalability as datasets grow in size. Human intervention is minimized by augmented decision making ability in selecting what aspects of large datasets should be focused on to drive key business outcomes. Variable value combinations that are predominant drivers of key observations are automatically determined from several competing variable value combinations. The identified variable value combinations can then be then used to predict future trends underlying the business intelligence data. In another embodiment, an observed outcome is decomposed into multiple contributing drivers and the impact of each of the contributing drivers can be analyzed and numerically quantified—as a static snapshot or as a time-varying evolution. Similarly, differences in observations between two groups can be decomposed into multiple contributing sub-groups for each of the groups and pairwise differences among sub-groups can be quantified and analyzed. | 07-23-2015 |
20150220577 | Identifying Contributors That Explain Differences Between Subsets of a Data Set - Methods for analyzing and rendering business intelligence data allow for efficient scalability as datasets grow in size. Human intervention is minimized by augmented decision making ability in selecting what aspects of large datasets should be focused on to drive key business outcomes. Variable value combinations that are predominant drivers of key observations are automatically determined from several competing variable value combinations. The identified variable value combinations can then be then used to predict future trends underlying the business intelligence data. In another embodiment, an observed outcome is decomposed into multiple contributing drivers and the impact of each of the contributing drivers can be analyzed and numerically quantified—as a static snapshot or as a time-varying evolution. Similarly, differences in observations between two groups can be decomposed into multiple contributing sub-groups for each of the groups and pairwise differences among sub-groups can be quantified and analyzed. | 08-06-2015 |
Patent application number | Description | Published |
20120075190 | Multiple Touchpoints for Efficient Text Input - Methods and systems for using multiple simultaneous touchpoints of a touch-sensitive keyboard, such as an on-screen keyboard, for more efficient text input are provided. A method for generating text using a touch-sensitive keyboard may include receiving touch input from multiple simultaneous touchpoints. The method may also include determining a text character for each respective simultaneous touchpoint based on the touch input. The method may further include generating a text word based on the text characters determined from the multiple simultaneous touchpoints. A system for generating text using a touch-sensitive keyboard may include a touch input receiver, a slide detector and a text word generator. | 03-29-2012 |
20120078615 | Multiple Touchpoints For Efficient Text Input - Methods and systems for using multiple simultaneous touchpoints of a touch-sensitive keyboard, such as an on-screen keyboard, for more efficient text input are provided. A method for generating text using a touch-sensitive keyboard may include receiving touch input from multiple simultaneous touchpoints. The method may also include determining a text character for each respective simultaneous touchpoint based on the touch input. The method may further include generating a text word based on the text characters determined from the multiple simultaneous touchpoints. A system for generating text using a touch-sensitive keyboard may include a touch input receiver, a slide detector and a text word generator. | 03-29-2012 |
20120131365 | Delayed Shut Down of Computer - A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned. | 05-24-2012 |
20120191560 | Auction-Based Application Launching - Methods and systems for providing applications are provided. A method for providing applications may include determining a ranking for each of a plurality of applications based on an auction value of each corresponding application. In some cases, auction values may be determined by application provider bids. The method may also include determining a ranked placement of the applications based on the application rankings. The method may further include displaying the ranked placement according to a first user selection associated with the applications. The method may then include launching a selected application of the ranked placement in response to a second user selection. A system for providing applications may include an application ranker, an application placer and an application launcher. | 07-26-2012 |
20140122644 | COMPUTER-BASED EXPLORATION, RESEARCH AND CONTROL OF TV - A method for transferring content includes transferring content from a first device to a second device in response to a request from the first device to transfer the content, analyzing the transferred content at the second device, to determine a type of the transferred content and providing the transferred content for display at the second device according to the determined type of the transferred content. | 05-01-2014 |
20140157138 | PEOPLE AS APPLICATIONS - The subject disclosure relates to associating contacts with corresponding system actions. It includes identifying a contact profile for configuring with system actions, based on one or more of an address book, user input, online accounts, or an interaction with a contact corresponding to the contact profile, retrieving contact information for the identified contact profile and determining at least one available system action based on the retrieved contact information for the identified contact profile. The disclosure also includes generating, based on the retrieved contact information, a system icon representing the contact profile for displaying the contact profile in a graphic user interface component of an operating system and associating the at least one available system action with the contact profile by configuring the at least one available system action to automatically launch when selected at the system icon representing the contact profile. | 06-05-2014 |
20140180778 | Auction-Based Application Launching - Methods and systems for providing applications are provided. A method for providing applications may include determining a ranking for each of a plurality of applications based on an auction value of each corresponding application. In some cases, auction values may be determined by application provider bids. The method may also include determining a ranked placement of the applications based on the application rankings. The method may further include displaying the ranked placement according to a first user selection associated with the applications. The method may then include launching a selected application of the ranked placement in response to a second user selection. A system for providing applications may include an application ranker, an application placer and an application launcher. | 06-26-2014 |
20140337611 | KIOSK APPLICATION MODE FOR OPERATING SYSTEM - A method includes transforming a mode of a computer from an operating system mode to a kiosk mode, wherein the kiosk mode provides a user interface for one web application, and wherein the kiosk mode prevents access to any other application or the operating system of the computer. The computer automatically updates the web application via a network while the computer is operating in kiosk mode, and automatically updates an operating system of the computer via the network while the computer is operating in kiosk mode. The computer automatically re-launches the web application in response to detecting an interrupted status of the web application while the computer is operating in kiosk mode. | 11-13-2014 |
20150192984 | Delayed Shut Down of Computer - A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned. | 07-09-2015 |
20150296074 | LIMITING USER INTERACTION WITH A COMPUTING DEVICE BASED ON PROXIMITY OF A USER - A first computing device monitors a presence of a second computing device, and determines when the second computing device has moved out of an area proximate to the first computing device. In response to determining that the second computer moved out of the area, the first computing device is automatically configured to limit user interaction with one or more applications currently operating on the first computing device to a predetermined set of commands while preventing user interaction with other applications provided by the first computing device. | 10-15-2015 |
Patent application number | Description | Published |
20100234380 | CRYSTALLINE FORMS AND PROCESSES FOR THE PREPARATION OF PHENYL-PYRAZOLES USEFUL AS MODULATORS OF THE 5-HT2A SEROTONIN RECEPTOR - The present invention relates to processes for preparing phenyl-pyrazoles of Formula (I) and salts and pharmaceutical compositions thereof, useful as modulators of 5-HT | 09-16-2010 |
20120295947 | PROCESSES FOR THE PREPARATION OF (R)-2-(7-(4-CYCLOPENTYL-3-(TRIFLUOROMETHYL)BENZYLOXY)-1,2,3,4-TETRAHYDROC- YCLOPENTA[B]INDOL-3-YL)ACETIC ACID AND SALTS THEREOF - The present invention relates to processes and intermediates useful in the preparation of (R)-2-(7-(4-cyclopentyl-3-(trifluoromethyl)benzyloxy)-1,2,3,4-tetrahydrocyclopenta[b]indol-3-yl)acetic acid of Formula (Ia) and salts thereof, an S1P1 receptor modulator that is useful in the treatment of S1P1 receptor-associated disorders, for example, diseases and disorders mediated by lymphocytes, transplant rejection, autoimmune diseases and disorders, inflammatory diseases and disorders (e.g., acute and chronic inflammatory conditions), cancer, and conditions characterized by an underlying defect in vascular integrity or that are associated with angiogenesis such as may be pathologic (e.g., as may occur in inflammation, tumor development and atherosclerosis). | 11-22-2012 |
20130165648 | PROCESSES FOR PREPARING 3-BENZAZEPINES - The present invention provides processes and intermediates for the preparation of 3-benzazepines and salts thereof which can be useful as serotonin (5-HT) receptor agonists for the treatment of, for example, central nervous system disorders such as obesity. | 06-27-2013 |
20130178620 | PROCESSES FOR PREPARING 3-BENZAZEPINES - The present invention provides processes and intermediates for the preparation of 3-benzazepines and salts thereof which can be useful as serotonin (5-HT) receptor agonists for the treatment of, for example, central nervous system disorders such as obesity. | 07-11-2013 |
20130296321 | CRYSTALLINE FORMS AND PROCESSES FOR THE PREPARATION OF PHENYL-PYRAZOLES USEFUL AS MODULATORS OF THE 5-HT2A SEROTONIN RECEPTOR - The present invention relates to processes for preparing phenyl-pyrazoles of Formula (I) and salts and pharmaceutical compositions thereof, useful as modulators of 5-HT | 11-07-2013 |
20140275548 | SUBSTITUTED NAPHTHYRIDINE AND QUINOLINE COMPOUNDS AS MAO INHIBITORS - The invention provides a chemical entity of Formula (I) | 09-18-2014 |
20140315944 | SUBSTITUTED NAPHTHYRIDINE AND QUINOLINE COMPOUNDS AS MAO INHIBITORS - The invention provides a chemical entity of Formula (I) | 10-23-2014 |
20140357690 | PROCESSES FOR THE PREPARATION OF (R)-2-(7-(4-CYCLOPENTYL-3-(TRIFLUOROMETHYL)BENZYLOXY)-1,2,3,4-TETRAHYDROC- YCLOPENTA[B]INDOL-3-YL)ACETIC ACID AND SALTS THEREOF - The present invention relates to processes and intermediates useful in the preparation of (R)-2-(7-(4-cyclopentyl-3-(trifluoromethyl)benzyloxy)-1,2,3,4-tetrahydrocyclopenta[b]indol-3-yl)acetic acid of Formula (Ia) and salts thereof, an S1P1 receptor modulator that is useful in the treatment of S1P1 receptor-associated disorders, for example, diseases and disorders mediated by lymphocytes, transplant rejection, autoimmune diseases and disorders, inflammatory diseases and disorders (e.g., acute and chronic inflammatory conditions), cancer, and conditions characterized by an underlying defect in vascular integrity or that are associated with angiogenesis such as may be pathologic (e.g., as may occur in inflammation, tumor development and atherosclerosis). | 12-04-2014 |
Patent application number | Description | Published |
20140050378 | SYSTEM AND METHOD FOR DETECTING MATERIALS OR DISEASE STATES USING MULTI-ENERGY COMPUTED TOMOGRAPHY - The disclosed embodiments relate to characterizing or quantifying an element or composition of interest within an imaged volume. In accordance with one embodiment, high and low energy images are acquired of a volume of interest using a polychromatic emission source. The high and low energy images are processed to generate monochromatic images. Based on the observed attenuation within the monochromatic images, one or more elements or compositions of interest are characterized within the imaged volume. | 02-20-2014 |
20140270427 | METHODS AND SYSTEMS FOR ASSESSING IMAGE QUALITY IN MODELING OF PATIENT ANATOMIC OR BLOOD FLOW CHARACTERISTICS - Systems and methods are disclosed for assessing the quality of medical images of at least a portion of a patient's anatomy, using a computer system. One method includes receiving one or more images of at least a portion of the patient's anatomy; determining, using a processor of the computer system, one or more image properties of the received images; performing, using a processor of the computer system, anatomic localization or modeling of at least a portion of the patient's anatomy based on the received images; obtaining an identification of one or more image characteristics associated with an anatomic feature of the patient's anatomy based on the anatomic localization or modeling; and calculating, using a processor of the computer system, an image quality score based on the one or more image properties and the one or more image characteristics. | 09-18-2014 |
20140275945 | METHODS AND SYSTEMS FOR ASSESSING IMAGE QUALITY IN MODELING OF PATIENT ANATOMIC OR BLOOD FLOW CHARACTERISTICS - Systems and methods are disclosed for assessing the quality of medical images of at least a portion of a patient's anatomy, using a computer system. One method includes receiving one or more images of at least a portion of the patient's anatomy; determining, using a processor of the computer system, one or more image properties of the received images; performing, using a processor of the computer system, anatomic localization or modeling of at least a portion of the patient's anatomy based on the received images; obtaining an identification of one or more image characteristics associated with an anatomic feature of the patient's anatomy based on the anatomic localization or modeling; and calculating, using a processor of the computer system, an image quality score based on the one or more image properties and the one or more image characteristics. | 09-18-2014 |
20140275946 | METHODS AND SYSTEMS FOR ASSESSING IMAGE QUALITY IN MODELING OF PATIENT ANATOMIC OR BLOOD FLOW CHARACTERISTICS - Systems and methods are disclosed for assessing the quality of medical images of at least a portion of a patient's anatomy, using a computer system. One method includes receiving one or more images of at least a portion of the patient's anatomy; determining, using a processor of the computer system, one or more image properties of the received images; performing, using a processor of the computer system, anatomic localization or modeling of at least a portion of the patient's anatomy based on the received images; obtaining an identification of one or more image characteristics associated with an anatomic feature of the patient's anatomy based on the anatomic localization or modeling; and calculating, using a processor of the computer system, an image quality score based on the one or more image properties and the one or more image characteristics. | 09-18-2014 |
20140275947 | METHODS AND SYSTEMS FOR ASSESSING IMAGE QUALITY IN MODELING OF PATIENT ANATOMIC OR BLOOD FLOW CHARACTERISTICS - Systems and methods are disclosed for assessing the quality of medical images of at least a portion of a patient's anatomy, using a computer system. One method includes receiving one or more images of at least a portion of the patient's anatomy; determining, using a processor of the computer system, one or more image properties of the received images; performing, using a processor of the computer system, anatomic localization or modeling of at least a portion of the patient's anatomy based on the received images; obtaining an identification of one or more image characteristics associated with an anatomic feature of the patient's anatomy based on the anatomic localization or modeling; and calculating, using a processor of the computer system, an image quality score based on the one or more image properties and the one or more image characteristics. | 09-18-2014 |
20140376797 | METHODS AND SYSTEMS FOR ASSESSING IMAGE QUALITY IN MODELING OF PATIENT ANATOMIC OR BLOOD FLOW CHARACTERISTICS - Systems and methods are disclosed for assessing the quality of medical images of at least a portion of a patient's anatomy, using a computer system. One method includes receiving one or more images of at least a portion of the patient's anatomy; determining, using a processor of the computer system, one or more image properties of the received images; performing, using a processor of the computer system, anatomic localization or modeling of at least a portion of the patient's anatomy based on the received images; obtaining an identification of one or more image characteristics associated with an anatomic feature of the patient's anatomy based on the anatomic localization or modeling; and calculating, using a processor of the computer system, an image quality score based on the one or more image properties and the one or more image characteristics. | 12-25-2014 |
20150086093 | METHODS AND SYSTEMS FOR ASSESSING IMAGE QUALITY IN MODELING OF PATIENT ANATOMIC OR BLOOD FLOW CHARACTERISTICS - Systems and methods are disclosed for assessing the quality of medical images of at least a portion of a patient's anatomy, using a computer system. One method includes receiving one or more images of at least a portion of the patient's anatomy; determining, using a processor of the computer system, one or more image properties of the received images; performing, using a processor of the computer system, anatomic localization or modeling of at least a portion of the patient's anatomy based on the received images; obtaining an identification of one or more image characteristics associated with an anatomic feature of the patient's anatomy based on the anatomic localization or modeling; and calculating, using a processor of the computer system, an image quality score based on the one or more image properties and the one or more image characteristics. | 03-26-2015 |
20150199478 | SYSTEMS AND METHODS FOR IDENTIFYING MEDICAL IMAGE ACQUISITION PARAMETERS - Systems and methods are disclosed for identifying image acquisition parameters. One method includes receiving a patient data set including one or more reconstructions, one or more preliminary scans or patient information, and one or more acquisition parameters; computing one or more patient characteristics based on one or both of one or more preliminary scans and the patient information; computing one or more image characteristics associated with the one or more reconstructions; grouping the patient data set with one or more other patient data sets using the one or more patient characteristics; and identifying one or more image acquisition parameters suitable for the patient data set using the one or more image characteristics, the grouping of the patient data set with one or more other patient data sets, or a combination thereof. | 07-16-2015 |
20150269718 | SYSTEMS AND METHODS FOR IDENTIFYING MEDICAL IMAGE ACQUISITION PARAMETERS - Systems and methods are disclosed for identifying image acquisition parameters. One method includes receiving a patient data set including one or more reconstructions, one or more preliminary scans or patient information, and one or more acquisition parameters; computing one or more patient characteristics based on one or both of one or more preliminary scans and the patient information; computing one or more image characteristics associated with the one or more reconstructions; grouping the patient data set with one or more other patient data sets using the one or more patient characteristics; and identifying one or more image acquisition parameters suitable for the patient data set using the one or more image characteristics, the grouping of the patient data set with one or more other patient data sets, or a combination thereof. | 09-24-2015 |