are Games Where You Can Play Optimally with Arena-Independent Finite Memory. (arXiv:2001.03894v2 [cs.GT] UPDATED) By arxiv.org Published On :: For decades, two-player (antagonistic) games on graphs have been a framework of choice for many important problems in theoretical computer science. A notorious one is controller synthesis, which can be rephrased through the game-theoretic metaphor as the quest for a winning strategy of the system in a game against its antagonistic environment. Depending on the specification, optimal strategies might be simple or quite complex, for example having to use (possibly infinite) memory. Hence, research strives to understand which settings allow for simple strategies. In 2005, Gimbert and Zielonka provided a complete characterization of preference relations (a formal framework to model specifications and game objectives) that admit memoryless optimal strategies for both players. In the last fifteen years however, practical applications have driven the community toward games with complex or multiple objectives, where memory -- finite or infinite -- is almost always required. Despite much effort, the exact frontiers of the class of preference relations that admit finite-memory optimal strategies still elude us. In this work, we establish a complete characterization of preference relations that admit optimal strategies using arena-independent finite memory, generalizing the work of Gimbert and Zielonka to the finite-memory case. We also prove an equivalent to their celebrated corollary of great practical interest: if both players have optimal (arena-independent-)finite-memory strategies in all one-player games, then it is also the case in all two-player games. Finally, we pinpoint the boundaries of our results with regard to the literature: our work completely covers the case of arena-independent memory (e.g., multiple parity objectives, lower- and upper-bounded energy objectives), and paves the way to the arena-dependent case (e.g., multiple lower-bounded energy objectives). Full Article
are Active Intent Disambiguation for Shared Control Robots. (arXiv:2005.03652v1 [cs.RO]) By arxiv.org Published On :: Assistive shared-control robots have the potential to transform the lives of millions of people afflicted with severe motor impairments. The usefulness of shared-control robots typically relies on the underlying autonomy's ability to infer the user's needs and intentions, and the ability to do so unambiguously is often a limiting factor for providing appropriate assistance confidently and accurately. The contributions of this paper are four-fold. First, we introduce the idea of intent disambiguation via control mode selection, and present a mathematical formalism for the same. Second, we develop a control mode selection algorithm which selects the control mode in which the user-initiated motion helps the autonomy to maximally disambiguate user intent. Third, we present a pilot study with eight subjects to evaluate the efficacy of the disambiguation algorithm. Our results suggest that the disambiguation system (a) helps to significantly reduce task effort, as measured by number of button presses, and (b) is of greater utility for more limited control interfaces and more complex tasks. We also observe that (c) subjects demonstrated a wide range of disambiguation request behaviors, with the common thread of concentrating requests early in the execution. As our last contribution, we introduce a novel field-theoretic approach to intent inference inspired by dynamic field theory that works in tandem with the disambiguation scheme. Full Article
are Defending Hardware-based Malware Detectors against Adversarial Attacks. (arXiv:2005.03644v1 [cs.CR]) By arxiv.org Published On :: In the era of Internet of Things (IoT), Malware has been proliferating exponentially over the past decade. Traditional anti-virus software are ineffective against modern complex Malware. In order to address this challenge, researchers have proposed Hardware-assisted Malware Detection (HMD) using Hardware Performance Counters (HPCs). The HPCs are used to train a set of Machine learning (ML) classifiers, which in turn, are used to distinguish benign programs from Malware. Recently, adversarial attacks have been designed by introducing perturbations in the HPC traces using an adversarial sample predictor to misclassify a program for specific HPCs. These attacks are designed with the basic assumption that the attacker is aware of the HPCs being used to detect Malware. Since modern processors consist of hundreds of HPCs, restricting to only a few of them for Malware detection aids the attacker. In this paper, we propose a Moving target defense (MTD) for this adversarial attack by designing multiple ML classifiers trained on different sets of HPCs. The MTD randomly selects a classifier; thus, confusing the attacker about the HPCs or the number of classifiers applied. We have developed an analytical model which proves that the probability of an attacker to guess the perfect HPC-classifier combination for MTD is extremely low (in the range of $10^{-1864}$ for a system with 20 HPCs). Our experimental results prove that the proposed defense is able to improve the classification accuracy of HPC traces that have been modified through an adversarial sample generator by up to 31.5%, for a near perfect (99.4%) restoration of the original accuracy. Full Article
are Real-Time Context-aware Detection of Unsafe Events in Robot-Assisted Surgery. (arXiv:2005.03611v1 [cs.RO]) By arxiv.org Published On :: Cyber-physical systems for robotic surgery have enabled minimally invasive procedures with increased precision and shorter hospitalization. However, with increasing complexity and connectivity of software and major involvement of human operators in the supervision of surgical robots, there remain significant challenges in ensuring patient safety. This paper presents a safety monitoring system that, given the knowledge of the surgical task being performed by the surgeon, can detect safety-critical events in real-time. Our approach integrates a surgical gesture classifier that infers the operational context from the time-series kinematics data of the robot with a library of erroneous gesture classifiers that given a surgical gesture can detect unsafe events. Our experiments using data from two surgical platforms show that the proposed system can detect unsafe events caused by accidental or malicious faults within an average reaction time window of 1,693 milliseconds and F1 score of 0.88 and human errors within an average reaction time window of 57 milliseconds and F1 score of 0.76. Full Article
are Does Multi-Encoder Help? A Case Study on Context-Aware Neural Machine Translation. (arXiv:2005.03393v1 [cs.CL]) By arxiv.org Published On :: In encoder-decoder neural models, multiple encoders are in general used to represent the contextual information in addition to the individual sentence. In this paper, we investigate multi-encoder approaches in documentlevel neural machine translation (NMT). Surprisingly, we find that the context encoder does not only encode the surrounding sentences but also behaves as a noise generator. This makes us rethink the real benefits of multi-encoder in context-aware translation - some of the improvements come from robust training. We compare several methods that introduce noise and/or well-tuned dropout setup into the training of these encoders. Experimental results show that noisy training plays an important role in multi-encoder-based NMT, especially when the training data is small. Also, we establish a new state-of-the-art on IWSLT Fr-En task by careful use of noise generation and dropout methods. Full Article
are Bitvector-aware Query Optimization for Decision Support Queries (extended version). (arXiv:2005.03328v1 [cs.DB]) By arxiv.org Published On :: Bitvector filtering is an important query processing technique that can significantly reduce the cost of execution, especially for complex decision support queries with multiple joins. Despite its wide application, however, its implication to query optimization is not well understood. In this work, we study how bitvector filters impact query optimization. We show that incorporating bitvector filters into query optimization straightforwardly can increase the plan space complexity by an exponential factor in the number of relations in the query. We analyze the plans with bitvector filters for star and snowflake queries in the plan space of right deep trees without cross products. Surprisingly, with some simplifying assumptions, we prove that, the plan of the minimal cost with bitvector filters can be found from a linear number of plans in the number of relations in the query. This greatly reduces the plan space complexity for such queries from exponential to linear. Motivated by our analysis, we propose an algorithm that accounts for the impact of bitvector filters in query optimization. Our algorithm optimizes the join order for an arbitrary decision support query by choosing from a linear number of candidate plans in the number of relations in the query. We implement our algorithm in Microsoft SQL Server as a transformation rule. Our evaluation on both industry standard benchmarks and customer workload shows that, compared with the original Microsoft SQL Server, our technique reduces the total CPU execution time by 22%-64% for the workloads, with up to two orders of magnitude reduction in CPU execution time for individual queries. Full Article
are Enhancing Software Development Process Using Automated Adaptation of Object Ensembles. (arXiv:2005.03241v1 [cs.SE]) By arxiv.org Published On :: Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply general code, searching techniques and some approaches use an online based repository mining strategies. But it gets quite difficult to help programmers when they need particular type conversion problems. More specifically when they want to adapt existing interfaces according to their expectation. One of the familiar triumph to guide developers in such situation is adapting collections and arrays through automated adaptation of object ensembles. But how does it help to a novice developer in real time software development that is not explicitly specified? In this paper, we have developed a system that works as a plugin-tool integrated with a particular Data Mining Integrated environment (DMIE) to recommend relevant interface while they seek for a type conversion situation. We have a mined repository of respective adapter classes and related APIs from where developer, search their query and get their result using the relevant transformer classes. The system that recommends developers titled automated objective ensembles (AOE plugin).From the investigation as we have ever made, we can see that our approach much better than some of the existing approaches. Full Article
are Shared Autonomy with Learned Latent Actions. (arXiv:2005.03210v1 [cs.RO]) By arxiv.org Published On :: Assistive robots enable people with disabilities to conduct everyday tasks on their own. However, these tasks can be complex, containing both coarse reaching motions and fine-grained manipulation. For example, when eating, not only does one need to move to the correct food item, but they must also precisely manipulate the food in different ways (e.g., cutting, stabbing, scooping). Shared autonomy methods make robot teleoperation safer and more precise by arbitrating user inputs with robot controls. However, these works have focused mainly on the high-level task of reaching a goal from a discrete set, while largely ignoring manipulation of objects at that goal. Meanwhile, dimensionality reduction techniques for teleoperation map useful high-dimensional robot actions into an intuitive low-dimensional controller, but it is unclear if these methods can achieve the requisite precision for tasks like eating. Our insight is that---by combining intuitive embeddings from learned latent actions with robotic assistance from shared autonomy---we can enable precise assistive manipulation. In this work, we adopt learned latent actions for shared autonomy by proposing a new model structure that changes the meaning of the human's input based on the robot's confidence of the goal. We show convergence bounds on the robot's distance to the most likely goal, and develop a training procedure to learn a controller that is able to move between goals even in the presence of shared autonomy. We evaluate our method in simulations and an eating user study. Full Article
are Electricity-Aware Heat Unit Commitment: A Bid-Validity Approach. (arXiv:2005.03120v1 [eess.SY]) By arxiv.org Published On :: Coordinating the operation of combined heat and power plants (CHPs) and heat pumps (HPs) at the interface between heat and power systems is essential to achieve a cost-effective and efficient operation of the overall energy system. Indeed, in the current sequential market practice, the heat market has no insight into the impacts of heat dispatch on the electricity market. While preserving this sequential practice, this paper introduces an electricity-aware heat unit commitment model. Coordination is achieved through bid validity constraints, which embed the techno-economic linkage between heat and electricity outputs and costs of CHPs and HPs. This approach constitutes a novel market mechanism for the coordination of heat and power systems, defining heat bids conditionally on electricity market prices. The resulting model is a trilevel optimization problem, which we recast as a mixed-integer linear program using a lexicographic function. We use a realistic case study based on the Danish power and heat system, and show that the proposed model yields a 4.5% reduction in total operating cost of heat and power systems compared to a traditional decoupled unit commitment model, while reducing the financial losses of each CHP and HP due to invalid bids by up-to 20.3 million euros. Full Article
are Beware the Normative Fallacy. (arXiv:2005.03084v1 [cs.SE]) By arxiv.org Published On :: Behavioral research can provide important insights for SE practices. But in performing it, many studies of SE are committing a normative fallacy - they misappropriate normative and prescriptive theories for descriptive purposes. The evidence from reviews of empirical studies of decision making in SE suggests that the normative fallacy may is common. This article draws on cognitive psychology and behavioral economics to explains this fallacy. Because data collection is framed by narrow and empirically invalid theories, flawed assumptions baked into those theories lead to misleading interpretations of observed behaviors and ultimately, to invalid conclusions and flawed recommendations. Researchers should be careful not to rely solely on engineering methods to explain what people do when they do engineering. Instead, insist that descriptive research be based on validated descriptive theories, listen carefully to skilled practitioners, and only rely on validated findings to prescribe what they should do. Full Article
are AVAC: A Machine Learning based Adaptive RRAM Variability-Aware Controller for Edge Devices. (arXiv:2005.03077v1 [eess.SY]) By arxiv.org Published On :: Recently, the Edge Computing paradigm has gained significant popularity both in industry and academia. Researchers now increasingly target to improve performance and reduce energy consumption of such devices. Some recent efforts focus on using emerging RRAM technologies for improving energy efficiency, thanks to their no leakage property and high integration density. As the complexity and dynamism of applications supported by such devices escalate, it has become difficult to maintain ideal performance by static RRAM controllers. Machine Learning provides a promising solution for this, and hence, this work focuses on extending such controllers to allow dynamic parameter updates. In this work we propose an Adaptive RRAM Variability-Aware Controller, AVAC, which periodically updates Wait Buffer and batch sizes using on-the-fly learning models and gradient ascent. AVAC allows Edge devices to adapt to different applications and their stages, to improve computation performance and reduce energy consumption. Simulations demonstrate that the proposed model can provide up to 29% increase in performance and 19% decrease in energy, compared to static controllers, using traces of real-life healthcare applications on a Raspberry-Pi based Edge deployment. Full Article
are When Retired Soccer Star Briana Scurry Knew Her Career Was Over By feedproxy.google.com Published On :: Thu, 23 Jan 2014 00:00:00 EST After several weeks of not playing because of a concussion and then failing several baseline tests, Briana Scurry became very worried. Full Article video
are The Hit That Ended Briana Scurry's Soccer Career By feedproxy.google.com Published On :: Thu, 23 Jan 2014 00:00:00 EST "I knew I was in trouble ... I didn't know how much trouble," says retired soccer star Briana Scurry. Full Article video
are 6 Best CMS Software for Website Development & SMBs By feedproxy.google.com Published On :: Tue, 07 Jan 2020 15:55:11 +0000 Are you looking for a content management system (CMS) that will help you create the digital content you need? With so many options on the market, it’s challenging to know which one is the best CMS software for your business. On this page, we’ll take a look at the six best CMS’s for website development […] The post 6 Best CMS Software for Website Development & SMBs appeared first on WebFX Blog. Full Article Web Design
are Printed Solar Cells Hold Promise for Unlit Rural Areas By feedproxy.google.com Published On :: Wed, 17 Jun 2015 08:36:16 +0000 By Sci Dev Net Advances in printed solar cell technology promise clean renewable energy, opening possibilities for 1.3 billion people still without electric power in developing countries. The technology, which only requires the use of existing industrial-size printers, can produce … Continue reading → Full Article Solar organic photovoltaics solar cell film solar cell technology solar cells Solar Energy
are In Washington's rural pot shops, the effects of the coronavirus scare can be dramatic By www.inlander.com Published On :: Thu, 16 Apr 2020 01:30:00 -0700 The Cannabis Issue During normal times, I-90 Green House is like a destination resort for marijuana lovers.… Full Article Cannabis Issue
are From culinary arts to binge-watching, here are some weed-friendly activities to get you through your isolation By www.inlander.com Published On :: Thu, 16 Apr 2020 01:30:00 -0700 The Cannabis Issue It's been almost a month since the COVID-19 pandemic forced folks inside and made "social distancing" part of our daily lexicons.… Full Article Cannabis Issue
are These are are our neighbors. These are readers. These are the people we're all trying to save. By www.inlander.com Published On :: Thu, 26 Mar 2020 01:30:00 -0700 How the coronavirus outbreak has upended people's lives across the Inland Northwest The numbers don't lie.… Full Article News/Local News
are 1917 is designed to look like a single take. Here are some other films that use similar tricks to great effect By www.inlander.com Published On :: Thu, 09 Jan 2020 01:30:00 -0800 Sam Mendes' 1917, which took Best Picture and Best Director awards at the Golden Globes earlier this week, looks like a standard period piece.… Full Article Film/Film News
are Portland's Jenny Don't and the Spurs are back with new music after a quiet 2019 By www.inlander.com Published On :: Thu, 19 Mar 2020 01:30:00 -0700 Jenny Don't and the Spurs were right in the middle of recording their third full-length album when a vocal polyp put a halt to the process.… Full Article Music News
are Musicians are posting live streams and personal concerts to make your self-isolation a bit more tuneful By www.inlander.com Published On :: Thu, 19 Mar 2020 16:07:20 -0700 Celebrities: They're just like us! Along with everyone else, famous people are self-isolating at home, and some of them have taken to social media to alleviate the stress of the outside world. We don't need to tell you that events everywhere are canceled, so a few big-time musicians are putting on personal concerts for their fans and followers, and a lot of them — save for that cringe-inducing, star-studded cover of "Imagine" that was going around yesterday — are actually pretty good.… Full Article Music News
are In lieu of in-person performances, musicians are using social media and live streams to connect with fans By www.inlander.com Published On :: Thu, 09 Apr 2020 01:31:00 -0700 Ask any working musician why they play live, why they lug their equipment to and from bars and restaurants and wine-tasting rooms week after week, and they'll point to the same nebulous thing: It's the connection with an audience.… Full Article Music News
are Aerosmith and Guided By Voices celebrate landmark albums this month and are worlds apart in style and popularity — but maybe not as far as you think By www.inlander.com Published On :: Mon, 27 Apr 2020 10:13:40 -0700 Put pictures of 1975-era Aerosmith and 1995-era Guided By Voices next to each other and you probably wouldn’t think the bands have anything in common.… Full Article Music News
are Share your Mount St. Helens memories with us By www.inlander.com Published On :: Wed, 29 Apr 2020 15:56:18 -0700 Forty years ago, Mount St. Helens in southwestern Washington was just days away from a devastating eruption. When the mountain finally did blow, after weeks of frequent quakes and ash belching, on the morning of May 18, 1980, it caused the deadliest and most economically destructive volcanic event in U.S. history.… Full Article Arts & Culture
are Meat gets rarer in the grocery aisle and the drive-thru By www.inlander.com Published On :: Tue, 05 May 2020 17:30:31 -0700 By David Yaffe-Bellany and Michael Corkery The New York Times Company Hundreds of Wendy’s restaurants have run out of hamburgers.… Full Article Nation & World
are Supreme Court divided over Obamacare’s contraceptive mandate By www.inlander.com Published On :: Wed, 06 May 2020 17:40:24 -0700 By Adam Liptak The New York Times Company… Full Article Local News
are How local wineries are trying to adjust to the new business landscape By www.inlander.com Published On :: Thu, 07 May 2020 01:30:00 -0700 Drink Local Life under the COVID-19 pandemic is rough for everyone, individuals and businesses alike.… Full Article Food/Food News
are Local distilleries are relying on curbside bottle sales - and small batches of hand sanitizer - to stay afloat By www.inlander.com Published On :: Thu, 07 May 2020 01:30:00 -0700 Drink Local In tumultuous times, one thing remains true: People still want their spirits.… Full Article Food/Food News
are Local breweries are forced to adapt and an upcoming beer collaboration aims to support the industry By www.inlander.com Published On :: Thu, 07 May 2020 01:32:00 -0700 Drink Local For the majority of regional craft breweries, most revenue comes from two avenues: direct-to-consumer sales out of a tasting room and selling beer to local bars and restaurants.… Full Article Food/Food News
are A first-timer hits the Bloomsday course on its original date and walks away with some memories - barely By www.inlander.com Published On :: Thu, 07 May 2020 01:33:00 -0700 The chafing.… Full Article Culture/Arts & Culture
are Food banks prepare to feed far more as COVID-19 disrupts America's food system at every level By www.inlander.com Published On :: Thu, 07 May 2020 01:35:00 -0700 At every level of America's food system, mandated closures and outbreaks of COVID-19 have interrupted the finely tuned network that normally gets food from farmers and food processors to restaurants, grocery stores and food banks.… Full Article News/Local News
are The 'Church at Planned Parenthood' guy is proudly defying Inslee's ban on in-person church services By www.inlander.com Published On :: Thu, 07 May 2020 14:53:44 -0700 The puppet's felt hair bounces as she stage-whispers to the other puppets, almost conspiratorially, about their plans.… Full Article News/Local News
are Why COVID-19 patients at the VA hospital in Spokane aren't counted as 'hospitalized' By www.inlander.com Published On :: Fri, 08 May 2020 15:20:19 -0700 If you go to check how many people are hospitalized with COVID-19 in Spokane, the Spokane County Regional Health District website will give you an answer. Right now, it lists eight people as currently hospitalized with COVID-19, and that number has been trending downward.… Full Article News/Local News
are Deanna Goguen's favorite spaces in her home are nothing alike By www.inlander.com Published On :: Wed, 08 Apr 2020 18:30:00 -0700 Designology Interiors' Deanna Goguen has three bathrooms in her South Hill-area home, each with its own personality.… Full Article Home
are With support from schools and parents, students can better prepare for a career in the arts By www.inlander.com Published On :: Wed, 08 Apr 2020 18:30:00 -0700 For parents of budding artists and creative types, it can often seem like the arts get short shrift in the K-12 curricula, especially at a time when STEM — short for science, technology, engineering and math — is the buzzword in education and the most visible casualties of school budget cuts are librarians and music teachers.… Full Article Family & Parenting
are Thai Bamboo founder shares her love of cooking and her culture By www.inlander.com Published On :: Wed, 08 Apr 2020 18:30:00 -0700 Ever wonder why there are no Thai fast food places?… Full Article Food & Cooking
are The Zags are the WCC champs. But why was this season so surprising? By www.inlander.com Published On :: Tue, 03 Mar 2020 15:48:00 -0800 It’s March. The regular season is now in the rearview mirror.… Full Article Culture/Sports
are CONCERT REVIEW: Tool's same ol' sound still bursts to creative new highs live at Spokane Arena By www.inlander.com Published On :: Tue, 10 Mar 2020 10:38:09 -0700 Tool's music is not only not for everyone, it's such a challenging polyglot of oft-derided musical styles that it risks not being for anyone. And yet, the quartet's blend of prog-rock, art-rock, metal and performance art has become a genre unto itself over the course of 30 years, and it's a genre that has proved remarkably commercial.… Full Article Music/Music News
are Community leaders are feeding Spokane and supporting local restaurants at the same time By www.inlander.com Published On :: Thu, 09 Apr 2020 01:33:00 -0700 As soon as state Rep. Marcus Riccelli returned home from Olympia, he jumpstarted a community-wide effort to feed Spokane constituents deeply affected by the COVID-19 crisis.… Full Article Food/Food News
are Graphene prepared by using edge functionalization of graphite By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT Disclosed is a method for producing graphene functionalized at its edge positions of graphite. Organic material having one or more functional groups is reacted with graphite in reaction medium comprising methanesulfonic acid and phosphorus pentoxide, or in reaction medium comprising trifluoromethanesulfonic acid, to produce graphene having organic material fuctionalized at edges. And then, high purity and large scaled graphene and film can be obtained by dispersing, centrifugal separating the functionalized graphene in a solvent and reducing, in particular heat treating the graphene. According to the present invention graphene can be produced inexpensively in a large amount with a minimum loss of graphite. (FIG. 1) Full Article
are Optimization to identify nearest objects in a dataset for data analysis By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In one embodiment, a plurality of objects associated with a dataset and a specified number of nearest objects to be identified are received. The received objects are sorted in a structured format. Further, a key object and a number of adjacent objects corresponding to the key object are selected from the sorted plurality of objects, wherein the number of adjacent objects is selected based on the specified number of nearest objects to be identified. Furthermore, distances between the key object and the number of adjacent objects are determined to identify the specified number of nearest objects, wherein the distances are determined until the specified number of nearest objects is identified. Based on the determined distances, the specified number of nearest objects in the dataset is identified for data analysis. Full Article
are Method and apparatus for declarative data warehouse definition for object-relational mapped objects By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A data warehouse is constructed using the relational mapping of a transactional database without reconstructing the data relationships of the transactional database. First, an application programmer analyzes an object model in order to describe facts and dimensions using the objects, attributes, and paths of the object model. Each of the dimensions has an identifier that correlates an item in the transactional database to a dimension record in the data warehouse. The fact and dimension descriptions are saved to a description file. Second, a Data Warehouse Engine (DWE) then access the description file and uses the object model, fact and dimension descriptions, and object-relational mapping to map transactional data to the data warehouse. Full Article
are Polyamide moulding materials containing copolyamides for producing transparent moulding parts with low distorsion in climatic testing By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT Polyamide molding materials for transparent molding parts. The materials comprise transparent copolyamides that contain: (A) 40 to 100 wt % of at least one transparent copolyamide with a glass transition temperature (Tg) of at least 80° C. and not more than 150° C., composed of at least two diamines that are different from each other, wherein the at least two diamines are a mixture of (a) 50 to 90 mol % bis-(4-amino-3-methylcyclohexyl)methane (MACM) and/or bis-(4-amino-3-ethylcyclohexyl)methane (EACM) and/or bis-(4-amino-3,5-dimethylcyclohexyl)methane (TMACM) and b) 10 to 50 mol % aliphatic diamine having 9 to 14 carbon atoms, in particular decandiamine, particularly preferably at least 20 mol % decandiamine, each relative to the total amount of diamines, and of one or more aliphatic dicarboxylic acids, having 6 to 36 carbon atoms, (B) 0 to 60 wt % of at least one further polymer, (C) 0 to 10 wt % of additives, the sum of the components (A), (B) and (C) totaling 100% by weight. Full Article
are Arene-transition metal linkers for solid phase synthesis By www.freepatentsonline.com Published On :: Tue, 02 May 2000 08:00:00 EDT Compositions and methods for the solid phase synthesis of organic compounds are provided. The compositions are solid supports having an attached traceless linker precursor and are represented by the formula: ##STR1## In this formula, S0 is a solid support; B is a connecting group; M is a transition metal, for example ruthenium, chromium, iron, molybdenum and manganese; each L is independently a transition metal ligand; the letter n represents an integer of from 1 to 4, such that M has a sufficient number of ligands to fill the available valences; and X- represents an anion which is typically a non-nucleophilic anion. Full Article
are Process of preparing a fluid rare earth alkoxylation catalyst By www.freepatentsonline.com Published On :: Tue, 04 Feb 2003 08:00:00 EST A process to prepare an improved fluid rare earth phosphate catalyst composition useful in preparing alkylene oxide adducts of organic compounds having active hydrogen atoms is provided. The catalyst is prepared by dissolving a rare earth salt in a C9-C30 active hydrogen containing organic compound and then adding phosphoric acid to the organic compound rare earth mixture. Full Article
are Intelligently responding to hardware failures so as to optimize system performance By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance. Full Article
are Introspection of software program components and conditional generation of memory dump By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An approach for introspection of a software component and generation of a conditional memory dump, a computing device executing an introspection program with respect to the software component is provided. An introspection system comprises one or more conditions for generating the conditional memory dump based on operations of the software component. In one aspect, a computing device detects, through an introspection program, whether the one or more conditions are satisfied by the software component based on information in an introspection analyzer of the introspection program. In addition, the computing device indicates, through the introspection program, if the one or more conditions are satisfied by the software component. In another aspect, responsive to the indication, the computing device generates the conditional memory dump through the introspection program. Full Article
are Avoiding processing flaws in a computer processor triggered by a predetermined sequence of hardware events By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system, method and computer program product for avoiding a processing flaw in a computer processor triggered by a predetermined sequence of hardware events. The system may include a detecting unit and a power-on reset unit. The detecting unit detects that the predetermined sequence of hardware events is going to occur at the computer processor. The power-on reset unit initializes the computer processor to a state stored in computer memory in response to detecting the sequence of hardware events. Full Article
are Nonvolatile memory device and bad area managing method thereof By www.freepatentsonline.com Published On :: Tue, 15 Sep 2015 08:00:00 EDT Example embodiments relate to a bad area managing method of a nonvolatile memory device. The nonvolatile memory device may include a plurality of memory blocks and each block may contain memory layers stacked on a substrate. According to example embodiments, a method includes accessing one of the memory blocks, judging whether the accessed memory block includes at least one memory layer containing a bad memory cell. If a bad memory cell is detected, the method may further include configuring the memory device to treat the at least one memory layer of the accessed memory block as a bad area. Full Article
are Method and apparatus for performing logical compare operations By www.freepatentsonline.com Published On :: Tue, 19 May 2015 08:00:00 EDT A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location. Full Article