Abstract:
A method and system for detecting and counting mitotic figures in an image of a biopsy sample stained with at least one dye, includes color filtering the image in a computer process to identify pixels in the image that have a color which is indicative a mitotic figure; extracting the mitotic pixels in the image that are connected to one another in a computer process, thereby producing blobs of mitotic pixels; shape-filtering and clustering the blobs of mitotic pixels in a computer process to produce mitotic figure candidates; extracting sub-images of mitotic figures by cropping the biopsy sample image at the location of the blobs; extracting two sets of features from the mitotic figure candidates in two separate computer processes; determining which of the mitotic figure candidates are mitotic figures in a computer classification process based on the extracted sets of features; and counting the number of mitotic figures per square unit of biopsy sample tissue.
Abstract:
Packet transmission is performed in a wireless adaptive hybrid automatic repeat request transmission system. An optimized assignment rate for a packet is determined based at least in part on a maximal number of transmission attempts and a long term signal to noise ration of the wireless transmission system, an optimized quadrature amplitude modulation set is determined for the packet based at least in part on the maximal number of transmission attempts and the long term signal to noise ration of the wireless transmission system, and information related to the packet is transmitted based at least in part on the determined optimized assignment rate and determined optimized quadrature amplitude modulation set.
Abstract:
Information, such as files received from a client, etc., is stored in a storage system, such as a content addressable storage system. A file server receives data from a client and chunks the data into blocks of data. The file server also generates metadata for use in forming a data structure. The blocks of data are stored in a block store and a copy of the data blocks and the metadata are locally cached at the file server. A commit server retrieves the metadata. In at least one embodiment, the metadata is retrieved from an update log shared between the file server and the commit server. Based on the retrieved metadata, the commit server generates a version of a data structure. The data structure is then stored at the block store.
Abstract:
PROBLEM TO BE SOLVED: To produce a broad band width optical channel which has high spectral efficiency, a high dispersion allowable range and functions at 100 Gbit/sec or more. SOLUTION: A production method includes processes of: producing, from an optical source, at least two optical carriers with a constant wavelength interval; producing an upper side sub-channel and a lower side sub-channel which are orthogonal to each other and are mutually separated based on a wavelength interval generated by the modulation of the optical carrier, depending on OFDM signals which are suppressed in their carrier waves and are up-converted; and combining one optical wave from the upper sub-channel and one optical wave from the lower sub-channel into an optical channel for transmission over an optical fiber. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To statically analyze a program by using abstract interpretation for an analysis sensitive to a path using an analysis insensitive to a path. SOLUTION: A system and a method for infeasible path detection include performing a static analysis on a program to prove a property of the program. If the property is not proved, infeasible paths in the program are determined by performing a path-insensitive abstract interpretation. Information about such infeasible paths is used to achieve the effects of path-sensitivity in path-insensitive program analysis. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To achieve the reduction of bogus warnings which exceeds the reduction of the bogus warnings obtained by using synchronization constraints. SOLUTION: A system and method for program verification includes generating a product transaction graph for a concurrent program, which captures warnings for potential errors. The warnings are filtered to remove bogus warnings, by using constraints from synchronization primitives and invariants that are derived by performing one or more dataflow analysis methods for concurrent programs. The dataflow analysis methods are applied in order of overhead expense. Concrete execution traces are generated for remaining warnings using model checking. COPYRIGHT: (C)2009,JPO&INPIT