摘要:
The invention provides a pharmaceutical formulation comprising: (1) THAM, which is tris(hydroxymethyl)aminomethane, as a selective absorbefacient to enhance through the nasal mucosa-lined epithelium the absorption of substances of peptide nature; and (2) a therapeutically effective amount of active nasal peptide, its pharmaceutically acceptable salt or its peptidic fragment; in a pharmaceutically acceptable, aqueous liquid diluent or carrier, said formulation being in a form suitable for nasal administration.
摘要:
The method comprises modelling a delay-tolerant dynamic network comprising time-varying links transforming it into a static time-expanded network graph, and managing bulk data transfer on the basis of said static time-expanded network graph.The device comprises a scheduler unit with processing capabilities implementing an algorithm which processes arc costs (cijt) and storage costs (pit) as per the method of the first aspect of the invention.
摘要:
Method for downloading segments of a video file in a peer to peer network which comprises requesting to create new neighbourhood lists according to a health parameter which indicates availability of video segments among neighbors. Scheduling methods for the upload and download schedulers which work in synergy with the aforementioned features are also disclosed.
摘要:
Power converters such as power modules configured as inverters employ modularized approaches. In some aspects, semiconductor devices are thermally coupled directly to thermally conductive substrates without intervening dielectric or insulative structures. Additionally, or alternatively, semiconductor devices are thermally coupled to thermally conductive substrates with relatively large surface areas before heat transferred from the semiconductor devices encounters a dielectric or electrically insulating structure with correspondingly high thermal impedance.
摘要:
The Translucent Proxying of TCP (TPOT) device and methods use TCP-OPTIONS and IP tunneling to guarantee that all IP packets belonging to a specific TCP connection will traverse the proxy which intercepts the first packet of data. This guarantee allows the ad-hoc deployment of TPOT devices anywhere within the communication network, and does not restrict the placement of proxy devices at the edge of the network. Furthermore, no extra signaling support is required for the TPOT device to properly function while the addition of TPOT devices to communication networks significantly improves the throughput of intercepted TCP packets of data.
摘要:
A method and apparatus for providing user specific request redirection in a content delivery network includes parsing a page having embedded objects intended for redirection to at least one cache server, and transforming the embedded objects into relative uniform resource locators (URLs). A content-base token is inserted into an HTTP response header in response to a user request for the page. In an instance where the content-base token is not supported by the server and/or client devices, a base token is inserted into the page in response to a user request for the page. The content-base token and base token provide identification of a server or URL prefix where the embedded objects in the page are to be retrieved. The requested page is then sent to the user's browser. The browser constructs absolute URLs from the embedded URLs using either the received content-base token or base token, to retrieve embedded objects from the server.
摘要:
Power converters such as power modules configured as inverters employ modularized approaches. In some aspects, semiconductor devices are thermally coupled directly to thermally conductive substrates without intervening dielectric or insulative structures. Additionally, or alternatively, semiconductor devices are thermally coupled to thermally conductive substrates with relatively large surface areas before heat transferred from the semiconductor devices encounters a dielectric or electrically insulating structure with correspondingly high thermal impedance.
摘要:
An electronic component includes a semiconductor substrate (101, 301, 401), an electrically conductive layer (102, 103, 302, 303, 402, 403) supported by the semiconductor substrate (101, 301, 401), and a lead (110, 120, 210, 310, 410, 420) having an electrical coupling portion (112, 122, 212, 312, 412, 422) coupled to and supported by the electrically conductive layer (102, 103, 302, 303, 402, 403) wherein the electrical coupling portion (112, 122, 212, 312, 412, 422) has at least one notch (115, 215, 315) adjacent to the electrically conductive layer (102, 103, 302, 303, 402, 403).
摘要:
A method and apparatus for retrieving embedded objects of a web page across links. The method and apparatus include receiving, at a gateway, a requested top-level web page having at least one embedded uniform resource locator (URL) from at least one content server in response to a request for the web page from an end-user browser.The at least one embedded URL is modified with an IP address of a caching proxy. The caching proxy may be either co-located or separate from the gateway. The top-level web page and modified embedded URLs are sent to the end-user browser, wherein the caching proxy forwards the at least one embedded URL from the at least one content server to the end-user browser.
摘要:
A content distribution mechanism that relies on cooperative desktop PCs to distribute content is disclosed. The mechanism distributes content in a robust manner by allowing at least one intermediate network node (i.e., between a source and client) to generate and send packets that contain a linear combination of the portions of content available at the node. Such linear combinations may be created by the source and client using at least a portion of the original content file in either encoded or unencoded form. After the client has received enough linearly independent combinations of packets, the original content may be reconstructed. Further, security for network coding file distribution may be employed to maintain the efficiency and security of the content distribution mechanism. A security server may generate security information using a hashing algorithm including the property of producing security information for each block which survives the process of creating encoded blocks. The security server may generate a unique set of security information for each node participating in the content distribution which each node may then use to verify that the blocks being examined are valid and were created from a linear combination of the original blocks of the file.