摘要:
In a social networking system, users may perform different types of actions with respect to objects (e.g., for a song, a user can buy, listen to, recommend, or like the song). Objects on the social networking system may include object properties (e.g., for a song, an artist, genre, and album are the song's object properties). Each type of action performed on a type of object may be aggregated in a different way. Actions may be performed on objects by users through the social networking system, a third-party application installed on the social networking system, and systems external to the social networking system. An advertiser may specify targeting criteria based on multiple different action types and aggregations of an action with respect to a particular object. Users may be categorized based on their interactions with objects having a common element. Ads may then be targeted to the categorized users.
摘要:
Synthesis process of dasatinib is disclosed, which includes the step of reacting the compound of formula I with that of formula II to obtain the compound of formula III. Also disclosed is the compound of formula III which is used as an intermediate for synthesizing dasatinib. The substituents of R1, R2, R3 or R4 in formulae I, II or III are defined as in the description.
摘要:
The present invention provides polymorph of 3-(4-amino-1-oxo-1,3-dihydro-2H-isoindole-2-yl)-piperidine-2,6-dione, and also the preparing methods and pharmaceutical compositions thereof.
摘要:
Provides methods for tracing and identifying a piracy in a wireless rights management system, wherein the content provider allow the protected digital content to be super-distributed, when unauthorized holding a pirated copy of the protected digital content is detected, based on the gateway controlling ability of the wireless operator within the wireless digital rights management system, a specific fingerprint is embedded in or removed from the protected digital content so as to trace the suspected persons and further identify the pirate. The fingerprint is related to information of a suspected person holding the protected digital content without authorization. A process of screening singles out highly suspected persons. Therefore the operator can determine whether the suspected person is a real pirate by comparing the similarity of the pirated version of content and the version held by the suspected person, and the exact tracing and identifying is achieved.
摘要:
The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for securely receiving a data stream, and for secure transmission of a data stream. The data stream, after at least a part of it being encrypted, is transmitted from a sender to a receiver via a channel. An exemplary method for encrypting comprises: adjusting encryption attributes during transmission; encrypting the data stream according to the adjusted encryption attributes; and transmitting the encrypted data stream and information of the encryption attributes to the receiver.
摘要:
A scalable layered video coding scheme that encodes video data frames into multiple layers, including a base layer of comparatively low quality video and multiple enhancement layers of increasingly higher quality video, adds error resilience to the enhancement layer. Unique resynchronization marks are inserted into the enhancement layer bitstream in headers associated with each video packet, headers associated with each bit plane, and headers associated with each video-of-plane (VOP) segment. Following transmission of the enhancement layer bitstream, the decoder tries to detect errors in the packets. Upon detection, the decoder seeks forward in the bitstream for the next known resynchronization mark. Once this mark is found, the decoder is able to begin decoding the next video packet. With the addition of many resynchronization marks within each frame, the decoder can recover very quickly and with minimal data loss in the event of a packet loss or channel error in the received enhancement layer bitstream. The video coding scheme also facilitates redundant encoding of header information from the higher-level VOP header down into lower level bit plane headers and video packet headers. Header extension codes are added to the bit plane and video packet headers to identify whether the redundant data is included.
摘要:
Embodiments of the present disclosure target advertising to a group of related users of a social networking system. To target advertising to a group of users, the social networking system receives targeting criteria specifying a group to receive an advertisement at substantially the same time. To identify a group of users of the social networking system satisfying the targeting criteria, the social networking system observes the interactions of connected social networking system users. Connected users interacting with each other in a manner that satisfies the targeting criteria may be added to a group. The social networking system serves the advertisement to a set of users included in the group because the served users are members of the group.
摘要:
The present invention discloses methods for synthesizing 3-(substituted dihydroisoindolinone-2-yl)-2,6-dioxopiperidine and intermediates thereof, namely, the synthesis of compounds of the Formula (I), with each substitutional group defined in the patent specification. Owing to the advantages of high productivity, little influence to the environment and material accessibility, the methods of the present invention is suitable for industrial production.
摘要:
The present invention discloses methods for synthesizing 3-(substituted dihydroisoindolinone-2-yl)-2,6-dioxopiperidine and intermediates thereof, namely, the synthesis of compounds of the Formula (I), with each substitutional group defined in the patent specification. Owing to the advantages of high productivity, little influence to the environment and material accessibility, the methods of the present invention is suitable for industrial production.
摘要:
Methods and systems are provided for analyzing parallelism of program code. According to a method, the sequential execution of the program code is simulated so as to trace the execution procedure of the program code, and parallelism of the program code is analyzed based on the result of the trace to the execution procedure of the program code. Execution information of the program code is collected by simulating the sequential execution of the program code, and parallelism of the program code is analyzed based on the collected execution information, so as to allow programmers to perform parallel task partitioning of the program code with respect to a multi-core architecture more effectively, thus increasing the efficiency of parallel software development.