Abstract:
A method performed by a processor allows an individual to update or maintain a database including a core and an extension. The core contains core tables including general data and the extension contains extension tables including specific data. The core tables and the extension tables have the same primary keys and the specific data are an extension of the general data. The method includes receiving an input from the individual for modifying the database, modifying the core using the received input, and automatically modifying the extension to reflect the modifying of the core.
Abstract:
A characterized cell library for EDA tools includes one or more mathematical models for each cell, and one or more preconditioning functions (and/or inverse preconditioning functions) for each mathematical model. Each mathematical model represents a performance parameter (e.g., delay, power consumption, noise) or a preconditioned performance parameter of the cell. The preconditioning functions convert an operating parameter (e.g., input slew, output capacitance) associated with the performance parameter into a preconditioned input variable for the mathematical models. In doing so, the preconditioning functions allow for more accurate modeling of complex data relationships without increasing the complexity (e.g., order and number of coefficients) of the mathematical models. Also, because the cell library can be substantially similar to conventional polynomial-based cell libraries except for the inclusion of preconditioning functions, preconditioning does not significantly increase storage requirements and conventional EDA tools can be readily adapted to use the preconditioned cell library.
Abstract:
Shape recognition is performed based on determining whether one or more ink strokes is not part of a shape or a partial shape. Ink strokes are divided into segments and the segments analyzed employing a relative angular distance histogram. The histogram analysis yields stable, incremental, and discriminating featurization results. Neural networks may also be employed along with the histogram analysis to determine complete shapes from partial shape entries and autocomplete suggestions provided to users for conversion of the shape into a known object.
Abstract:
An improved mobile electronic device enables the inputting of text in one alphabet, Traditional Chinese in the present example, by transliteration of inputs in another alphabet, BoPoMoFo in the present example. Since some of the inputs can be ambiguous, transliteration of an ambiguous input is delayed until a detection of a finalization event, thus avoiding the outputting of unnecessary transliteration results, and thus advantageously avoiding a distraction to the user.
Abstract:
A computer-implemented mechanism for granting rights to a resource is described. A license identifies one or more principals, resources, rights and conditions in fields of the license. The license fields include one or more instances of one or more variables. The variables are universally quantified so that each variable may be any one of a set of values. All instances of any given variable are bound to the same value.
Abstract:
The present invention relates to a green ceramic coating composition, the composition comprises nano-sized particles dispersed within a carrier medium together with preformed particles. The composition optionally comprises an infiltration medium.
Abstract:
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time. To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record. If they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record.
Abstract:
Method of enhancing a resident population of microorganism in a selected site of the gastrointestinal tract of an animal, the method comprising providing to the animal a selected modified or unmodified resistant startch or mixtures thereof in combination with one or more probiotic microogranisms such that upon ingestion the starch passes through the gastrointestinal tract substantially unutilized until it reaches the selected site where it is utilised by the resident and/or the probiotic microogranisms thereof causing an increase in number and/or activity of the microogranisms.
Abstract:
Methods for transferring among key holders in encoding and cryptographic systems the right to decode and decrypt messages in a way that does not explicitly reveal decoding and decrypting keys used and the original messages. Such methods are more secure and more efficient than typical re-encoding and re-encryption schemes, and are useful in developing such applications as document distribution and long-term file protection.