Abstract:
In one embodiment, the methods and apparatuses view content that corresponds with a particular time period during a collaboration session; identify a plurality of attendee devices participating in the collaboration session at the particular time period; determine an attention status of each attendee device at the particular time period; and display the attention status of the plurality of attendee devices at the particular time period.
Abstract:
A communication network comprises a first digital subscriber line (DSL) unit having a plurality of application ports and at least one DSL port; and a second DSL unit having a plurality of application ports and at least one DSL port; wherein the first DSL unit is communicatively coupled to the second DSL unit via a DSL pair coupled to the at least one DSL port in each of the first and second DSL units; and wherein each of the first and second DSL units are configured to receive a signal of a first interface format over one of the plurality of application ports, extract timeslots from the received first interface format signal, transmit the timeslots over the at least one DSL port, and use timeslots received over the at least one DSL port to generate at least one second signal of a dissimilar interface format.
Abstract:
A communication network comprises a first central digital subscriber line (DSL) unit having at least one application port and a plurality of DSL ports; a first remote DSL unit having at least one application port and at least one DSL port, wherein the first remote DSL unit is communicatively coupled to the central DSL unit via a first single independent DSL pair having a first EOC channel; and a second remote DSL unit having at least one application port and at least one DSL port, wherein the second remote DSL unit is communicatively coupled to the central DSL unit via a second single independent DSL pair having a second EOC channel; wherein the at least one application port in the central DSL unit is communicatively coupled to an application port in at least one of the first remote DSL unit and the second remote DSL unit.
Abstract:
This invention is a high-level language to specify electronic system design patterns for functional verification. This invention includes automatic translation of the high-level language specification into assertion code from these patterns and temporal properties for design verification. This eliminates the need to code extra RTL to handle features such as pipelines and bus priorities. Such common features are specified only in high-level patterns and temporal properties to be verified. This is advantageous because less verification code to be written, automated synthesis of assertions enforces monitor-style of writing assertions rather than generator-style, and the high-level code can be seamlessly migrated to another verification tool by producing another code generator for the new assertion language.
Abstract:
In one embodiment, the methods and apparatuses detect devices participating in a collaboration session; monitor the devices for an attribute corresponding to an attention level of each of the devices; and determine whether each device is active based on the attention level.
Abstract:
The present invention relates to a catalytic process for preparation of isolongifolene using nanocrystalline solid super acid. This process is an eco-friendly, single step, solvent free catalytic process for the preparation of a tricyclic sesqui-terpene hydrocarbon, isolongifolene. More particularly, the present invention provides a process for the catalytic isomerisation of longifolene to iso-longifolene using nano-crystalline sulfated zirconia as a solid super acid catalyst.
Abstract:
Systems, methods, and computer program products for controlling a drone using a tether. A drone is coupled to a distal end of the tether, and a force sensor measures one or more force parameters exerted on the drone by the tether. The force parameters are in turn used to generate control parameters, and the control parameters provided to a flight controller. The flight controller generates one or more propulsion parameters based on the control parameters, and provides the propulsion parameters to respective propulsion units of the drone. The drone can thereby be controlled by manipulating a proximate end of the tether, which changes the force parameters measured by the force sensor.
Abstract:
A method, non-transitory computer readable medium, and apparatus that quantitatively assesses the impact of a project change request to software quality including determining at least one initial project request defect value based on an initial project request effort value and a defect insertion rate, determining at least one project change request defect value based on a project change request effort value and the defect insertion rate, comparing at least one project change request defect value to at least one initial project request defect value, and providing a quality impact value based on the result of the comparison.
Abstract:
A method for cardiac imaging for determining a myocardial region of interest (ROI) is disclosed. The method includes acquiring functional imaging data of a subject, where the functional imaging data includes at least the myocardium. A ROI encompassing at most the myocardium from the acquired functional imaging data, and diagnostic parameters relating to the myocardium are estimated and quantified based on the determined ROI. In one embodiment, the ROI is determined from a projection image representation utilizing histogram based thresholding and ray casting based localization to determine the extents of the ROI. In another embodiment, the ROI is determined from a volumetric image representation utilizing clustering Manhattan distance based cleaning to determine cardiac angles used for reorienting the left ventricle.
Abstract:
User input to a web service including content from one or more media providers is subjected to a security analysis based on extracting whitelisted attributes and/or properties, the extracted attributes/properties validated, a template selected based on a source of the content, and a secure embedded code generated based on the whitelisted attributes/properties if the source is also a whitelisted source. The generated secure embedded code may then be provided as content by the web service.