Patent application number | Description | Published |
20080268171 | APPARATUS AND PROCESS FOR PLASMA-ENHANCED ATOMIC LAYER DEPOSITION - Embodiments of the invention provide an apparatus configured to form a material during an atomic layer deposition (ALD) process, such as a plasma-enhanced ALD (PE-ALD) process. In one embodiment, a plasma baffle assembly for receiving a process gas within a plasma-enhanced vapor deposition chamber is provided which includes a plasma baffle plate containing an upper surface to receive a process gas and a lower surface to emit the process gas, a plurality of openings configured to flow the process gas from above the upper surface to below the lower surface, wherein each opening is positioned at a predetermined angle of a vertical axis that is perpendicular to the lower surface, and a conical nose cone on the upper surface. In one example, the openings are slots positioned at a predetermined angle to emit the process gas with a circular flow pattern. | 10-30-2008 |
20090314370 | CHEMICAL DELIVERY APPARATUS FOR CVD OR ALD - Embodiments are related to ampoule assemblies containing bypass lines and valves. In one embodiment, ampoule assembly is provided which includes inlet and outlet lines coupled with and in fluid communication to an ampoule body, a bypass line connected between the inlet and outlet lines and containing a bypass valve disposed therein. The ampoule assembly further contains a shut-off valve disposed in the inlet line between the ampoule body and a connection point of the bypass line and the inlet line, a shut-off valve disposed in the outlet line between the ampoule body and a connection point of the bypass line and the outlet line, another shut-off valve disposed in the inlet line between the ampoule body and a disconnect fitting disposed on the inlet line, and another shut-off valve disposed in the outlet line between the ampoule body and a disconnect fitting disposed on the outlet line. | 12-24-2009 |
20100006167 | CHEMICAL DELIVERY APPARATUS FOR CVD OR ALD - Embodiments described herein provide ampoule assemblies to contain, store, or dispense chemical precursors. In one embodiment, an ampoule assembly is provided which includes an ampoule containing a first material layer disposed on the outside of the ampoule and a second material layer disposed over the first material layer, wherein the first material layer is thermally more conductive than the second material layer, an inlet line in fluid communication with the ampoule and containing a first manual shut-off valve disposed therein, an outlet line in fluid communication with the ampoule and containing a second manual shut-off valve disposed therein, and a first bypass line connected between the inlet line and the outlet line. In some embodiments, the ampoule assembly may contain disconnect fittings. In other embodiments, the first bypass line has a shut-off valve disposed therein to fluidly couple or decouple the inlet line and the outlet line. | 01-14-2010 |
Patent application number | Description | Published |
20090204385 | E-SERVICES TRANSLATION UTILIZING MACHINE TRANSLATION AND TRANSLATION MEMORY - A system and method for translating data from a source language to a target language is provided wherein machine generated target translation of a source sentence is compared to a database of human generated target sentences. If a matching human generated target sentence is found, the human generated target sentence may be used instead of the machine generated sentence, since the human generated target sentence is more likely to be a well-formed sentence than the machine generated sentence. The system and method does not rely on a translation memory containing pairs of sentences in both source and target languages, and minimizes the reliance on a human translator to correct a translation generated by machine translation. | 08-13-2009 |
20120046934 | E-Services Translation Utilizing Machine Translation and Translation Memory - A system and method for translating data from a source language to a target language is provided wherein machine generated target translation of a source sentence is compared to a database of human generated target sentences. If a matching human generated target sentence is found, the human generated target sentence may be used instead of the machine generated sentence, since the human generated target sentence is more likely to be a well-formed sentence than the machine generated sentence. The system and method does not rely on a translation memory containing pairs of sentences in both source and target languages, and minimizes the reliance on a human translator to correct a translation generated by machine translation. | 02-23-2012 |
20150142415 | E-Services Translation Utilizing Machine Translation and Translation Memory - A system and method for translating data from a source language to a target language is provided wherein machine generated target translation of a source sentence is compared to a database of human generated target sentences. If a matching human generated target sentence is found, the human generated target sentence may be used instead of the machine generated sentence, since the human generated target sentence is more likely to be a well-formed sentence than the machine generated sentence. The system and method does not rely on a translation memory containing pairs of sentences in both source and target languages, and minimizes the reliance on a human translator to correct a translation generated by machine translation. | 05-21-2015 |
Patent application number | Description | Published |
20080263665 | NETWORK ATTACK DETECTION USING PARTIAL DETERMINISTIC FINITE AUTOMATON PATTERN MATCHING - This disclosure describes techniques for determining whether network traffic contains one or more computer security threats. In order to determine whether a symbol stream conforms to the symbol pattern, a security device stores a full deterministic finite automaton (fDFA) that accepts streams of symbols that conform to the symbol pattern. The security device also creates a partial deterministic finite automaton (pDFA) that includes nodes that correspond to the nodes in the fDFA that have the highest visitation levels. The security device processes each symbol in the symbol stream using the pDFA until a symbol causes the pDFA to transition to a failure node or to an accepting node. If the symbol causes the pDFA to transition to the failure node, the security device processes the symbol and subsequent symbols in the symbol stream using the fDFA. | 10-23-2008 |
20100150164 | FLOW-BASED QUEUING OF NETWORK TRAFFIC - A method is provided for queuing packets. A packet may be received and its flow identified. It may then be determined whether a flow queue has been assigned to the identified flow. The identified flow may be dynamically assigning to an available flow queue when it is determined that a flow queue has not been assigned to the identified flow. The packet may be enqueued into the available flow queue. | 06-17-2010 |
20110235653 | WEIGHT-BASED BANDWIDTH ALLOCATION FOR NETWORK TRAFFIC - A network device may implement packet scheduling with administrator-configurable packet scheduling policies. In one implementation, the network device includes a filter component configured to assign priority levels to data units, the priority levels defining traffic classes for the data units. The network device may also include a scheduler component configured to schedule transmission of the traffic classes based on an assignment of weights to the traffic classes using at least one bandwidth allocation policy that exhibits a bandwidth allocation profile that varies based on one or more parameters of the bandwidth allocation policy that are configurable by an administrator. | 09-29-2011 |
20150109931 | FLOW CONTROL SCHEME FOR PARALLEL FLOWS - A method includes a proxy device receiving from a source device a request to establish a flow to a destination device; generating, based on the request, a meta-packet that indicates that the flow to the destination device is to be proxied; determining whether a pre-established flow connecting the proxy device to another proxy device that leads toward the destination device exists; sending the meta-packet on the pre-established flow, when it is determined that the pre-established flow exists; receiving by the other proxy device, the meta-packet, and establishing the flow to the destination device based on the meta-packet, where the proxy devices assign one or more of a source address, a source port, a destination address, or a destination port, associated with the source device and the destination device, to the pre-established flow. | 04-23-2015 |
Patent application number | Description | Published |
20130268994 | SYSTEM AND METHOD FOR DETERMINING AND USING LOCAL REPUTATIONS OF USERS AND HOSTS TO PROTECT INFORMATION IN A NETWORK ENVIRONMENT - A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node. | 10-10-2013 |
20140250492 | SYSTEM AND METHOD FOR INTERLOCKING A HOST AND A GATEWAY - A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received. The session descriptor and the content tag may be correlated with a network policy, which may be applied to the network connection. In some embodiments, the content tag may be received with the session descriptor. The file may be tainted by another file in some embodiments, and the content tag may be associated with other file. | 09-04-2014 |
20150180903 | SYSTEM AND METHOD FOR DETERMINING AND USING LOCAL REPUTATIONS OF USERS AND HOSTS TO PROTECT INFORMATION IN A NETWORK ENVIRONMENT - A method in an example embodiment includes correlating a first set of event data from a private network and determining a local reputation score of a host in the private network based on correlating the first set of event data. The method further includes providing the local reputation score of the host to a security node, which applies a policy, based on the local reputation score of the host, to a network communication associated with the host. In specific embodiments, the local reputation score of the host is mapped to a network address of the host. In further embodiments, the first set of event data includes one or more event indicators representing one or more events, respectively, in the private network. In more specific embodiments, the method includes determining a local reputation score of a user and providing the local reputation score of the user to the security node. | 06-25-2015 |
Patent application number | Description | Published |
20080254638 | ETCH PROCESS WITH CONTROLLED CRITICAL DIMENSION SHRINK - Methods to etch an opening in a substrate layer with reduced critical dimensions are described. A multi-layered mask including a lithographically patterned photoresist and an unpatterned organic antireflective coating (BARC) is formed over a substrate layer to be etched. The BARC layer is etched with a significant negative etch bias to reduce the critical dimension of the opening in the multi-layer mask below the lithographically define dimension in the photoresist. The significant negative etch bias of the BARC etch is then utilized to etch an opening having a reduced critical dimension into the substrate layer. To plasma etch an opening in the BARC with a significant negative etch bias, a polymerizing chemistry, such as CHF | 10-16-2008 |
20080286977 | Process to open carbon based hardmask overlying a dielectric layer - A method of opening a carbon-based hardmask layer composed of amorphous carbon containing preferably at least 60% carbon and between 10 and 40% hydrogen. The hardmask is opened by plasma etching using an etching gas composed of H | 11-20-2008 |
20090023294 | METHOD FOR ETCHING USING ADVANCED PATTERNING FILM IN CAPACITIVE COUPLING HIGH FREQUENCY PLASMA DIELECTRIC ETCH CHAMBER - A method for etching wafers using advanced patterning film (APF) to reduce bowing and improve bottom-to-top ratios includes providing a wafer having an APF layer into a processing chamber, wherein the processing chamber is configured with a power source operating at about 162 MHz, supplying a process gas into the chamber, applying a source power using the 162 MHz power source, and applying a bias power to the wafer. The process gas comprises hydrogen gas (H2), nitrogen gas (N2), and carbon monoxide gas (CO). The ratio of H2:N2 is about 1:1. Additionally, the wafer temperature is adjusted to improve the etching characteristics. | 01-22-2009 |
20090212010 | PLASMA ETCHING CARBONACEOUS LAYERS WITH SULFUR-BASED ETCHANTS - Etching of carbonaceous layers with an etchant gas mixture including molecular oxygen (O | 08-27-2009 |
Patent application number | Description | Published |
20120166259 | Adjusting Demand Parameters To Reduce Allocation Errors in Display Advertising - A system and method for adjusting demand parameters to produce an optimized allocation plan for delivering a plurality of impressions to a plurality of contracts for display advertising. The method commences upon receiving a first eligibility graph, the first eligibility graph comprising a plurality of impressions, a plurality of contracts and at least one first demand parameter. For reducing errors in sampling that affect the eligibility graph, demand parameters contained within the first eligibility graph are adjusted, resulting in an adjusted first eligibility graph. Once the adjusted first eligibility graph is available, a network solver is used for solving the adjusted first eligibility graph to produce an adjusted allocation plan, which adjusted allocation plan is used for displaying at least one of the plurality of impressions. | 06-28-2012 |
20130166395 | SYSTEM AND METHOD FOR CREATING A DELIVERY ALLOCATION PLAN IN A NETWORK-BASED ENVIRONMENT - The present application provides systems and corresponding methods for creating a delivery allocation plan in a network-based environment. The methods may include receiving and storing advertising contracts and data related to the advertising contracts; constructing a bipartite graph based on the received contract data; annotating each demand node; and receiving impression data and other eligible contract data. Thereafter, the method may include for each impression, calculating a first supply value and for each contract, calculating a first demand value. The first demand value may be used to calculate a second supply value and a delivery allocation may be calculated using the second supply value and the second demand value for each contract. | 06-27-2013 |
20130246161 | SYSTEMS AND METHODS FOR OPTIMIZATION-AWARE DELIVERY PACING ADJUSTMENT IN ADVERTISEMENT SERVING - Systems and methods for adjusting online ads delivery pace derive, in a computer system, a current impression delivery for an ads display contract. A plurality of estimation bands are delivered corresponding to over delivery and under delivery for the ads display contract. A relative distance is determined between the current impression delivery and the plurality of estimation bands. An adjustment factor is selected according to the relative distance. The adjustment factor is sent to a database. | 09-19-2013 |
Patent application number | Description | Published |
20100163846 | Nano-tube mosfet technology and devices - This invention discloses a semiconductor power device disposed in a semiconductor substrate and the semiconductor substrate has a plurality of trenches. Each of the trenches is filled with a plurality of epitaxial layers of alternating conductivity types constituting nano tubes functioning as conducting channels stacked as layers extending along a sidewall direction with a “Gap Filler” layer filling a merging-gap between the nano tubes disposed substantially at a center of each of the trenches. The “Gap Filler” layer can be very lightly doped Silicon or grown and deposited dielectric layer. In an exemplary embodiment, the plurality of trenches are separated by pillar columns each having a width approximately half to one-third of a width of the trenches. | 07-01-2010 |
20110127606 | Lateral super junction device with high substrate-drain breakdwon and built-in avalanche clamp diode - This invention discloses configurations and methods to manufacture lateral power device including a super junction structure with an avalanche clamp diode formed between the drain and the gate. The lateral super-junction structure reduces on-resistance, while the structural enhancements, including an avalanche clamping diode and an N buffer region, increase the breakdown voltage between substrate and drain and improve unclamped inductive switching (UIS) performance. | 06-02-2011 |
20110147830 | METHOD OF FORMING A SELF-ALIGNED CHARGE BALANCED POWER DMOS - Self-aligned charge balanced semiconductor devices and methods for forming such devices are disclosed. One or more planar gates are formed over a semiconductor substrate of a first conductivity type. One or more deep trenches are etched in the semiconductor self-aligned to the planar gates. The trenches are filled with a semiconductor material of a second conductivity type such that the deep trenches are charge balanced with the adjacent regions of the semiconductor substrate This process can form self-aligned charge balanced devices with a cell pitch less than 12 microns. | 06-23-2011 |
20110183499 | Nano-tube MOSFET technology and devices - This invention discloses a semiconductor power device disposed in a semiconductor substrate and the semiconductor substrate has a plurality of trenches. Each of the trenches is filled with a plurality of epitaxial layers of alternating conductivity types constituting nano tubes functioning as conducting channels stacked as layers extending along a sidewall direction with a “Gap Filler” layer filling a merging-gap between the nano tubes disposed substantially at a center of each of the trenches. The “Gap Filler” layer can be very lightly doped Silicon or grown and deposited dielectric layer. In an exemplary embodiment, the plurality of trenches are separated by pillar columns each having a width approximately half to one-third of a width of the trenches. | 07-28-2011 |
20130221430 | NANO-TUBE MOSFET TECHNOLOGY AND DEVICES - This invention discloses a semiconductor power device disposed in a semiconductor substrate and the semiconductor substrate has a plurality of trenches. Each of the trenches is filled with a plurality of epitaxial layers of alternating conductivity types constituting nano tubes functioning as conducting channels stacked as layers extending along a sidewall direction with a “Gap Filler” layer filling a merging-gap between the nano tubes disposed substantially at a center of each of the trenches. The “Gap Filler” layer can be very lightly doped Silicon or grown and deposited dielectric layer. In an exemplary embodiment, the plurality of trenches are separated by pillar columns each having a width approximately half to one-third of a width of the trenches. | 08-29-2013 |
20130341689 | METHOD OF FORMING A SELF-ALIGNED CHARGE BALANCED POWER DMOS - Self-aligned charge balanced semiconductor devices and methods for forming such devices are disclosed. One or more planar gates are formed over a semiconductor substrate of a first conductivity type. One or more deep trenches are etched in the semiconductor self-aligned to the planar gates. The trenches are filled with a semiconductor material of a second conductivity type such that the deep trenches are charge balanced with the adjacent regions of the semiconductor substrate Source and body regions are formed by implanting dopants onto the filled trenches. This process can form self-aligned charge balanced devices with a cell pitch less than 12 microns. | 12-26-2013 |
20150115333 | LATERAL SUPER JUNCTIONS WITH HIGH SUBSTRATE BREAKDOWN AND BUILD IN AVALANCHE CLAMP DIODE - This invention discloses configurations and methods to manufacture lateral power device including a super-junction structure with an avalanche clamp diode formed between the drain and the gate. The lateral super-junction structure reduces on-resistance, while the structural enhancements, including an avalanche clamping diode and an N buffer region, increase the breakdown voltage between substrate and drain and improve unclamped inductive switching (UIS) performance. | 04-30-2015 |
Patent application number | Description | Published |
20080232593 | SYSTEM AND METHOD FOR LOGICAL SHREDDING OF DATA STORED ON WORM MEDIA - Files are encrypted and stored on a WORM media device along with their encryption keys, the binary values of which are stored as a combination of written and unwritten sectors in a key storage portion of the media. To shred a file, the associated key is destroyed simply by writing into the unwritten sectors that are associated with the key. | 09-25-2008 |
20080270372 | System And Method For Verifying The Integrity And Completeness Of Records - A correctness verification system receives a query, executes the query using a query logic, and produces a query result. The query result comprises data records that satisfy the query, data verification objects associated with the data records, index segments accessed during the execution of the query, index verification objects associated with the index segments, and the query. The system transfers the query result to a verification system. The verification system verifies correctness of the query result by executing the query using the query logic. The verification system uses the data verification objects to verify integrity of the data objects, uses the index verification objects to verify the integrity of the index segments, and uses the index verification objects and the data verification objects to verify the completeness of the query result. | 10-30-2008 |
20090041253 | SYSTEM AND METHOD FOR PRIVACY PRESERVING QUERY VERIFICATION - The present invention relates to a method for proving the correctness of a query result produced by a data publisher while preserving the privacy of the query result. The method comprises delivering a public key of a public key/private key pair from a data owner to a client and delivering data and cryptographic metadata to at least one data publisher, wherein the metadata is associated both with the data and the public key of the public key/private key pair. The method further comprises receiving a query from the client, returning a query result and a verification object from the data publisher to the client in response to the query, and verifying the correctness of the query result, wherein the correctness of the query result is verified utilizing the verification object and the public key. | 02-12-2009 |
20090049086 | SYSTEM AND METHOD FOR PROVIDING AN OBJECT TO SUPPORT DATA STRUCTURES IN WORM STORAGE - An object storage system provides a storage object to support index structures, logs, and audit trails in WORM storage. The storage object includes a mutable object, an immutable object, or an appendable object. For each storage object, the system maintains an indication of type, such as mutable, immutable, or appendable object type. A mutable object can be arbitrarily modified, an immutable object cannot be modified, and the contents of the appendable object cannot be modified but can be appended with new data. Appended data becomes immutable. The system enables a protection level represented by the object type to be upgraded but not downgraded. Consequently, data committed to be immutable cannot be changed by changing the type of the storage object. | 02-19-2009 |
20100030729 | METHOD AND SYSTEM FOR MITIGATING IMPACT OF USER ERRORS IN DATA STORES - The invention provides a method and system for managing data access. The method includes receiving a request for accessing a file, determining a type of the received request that corresponds to an access pattern based on history of many files, marking the request based on the type of request to identify the request as a candidate to be part of a sequential scan for accessing files in a sequential order, and processing the request based on the marking to throttle access of the file in the case of a potential ongoing erroneously requested sequential scan. | 02-04-2010 |
20100212017 | SYSTEM AND METHOD FOR EFFICIENT TRUST PRESERVATION IN DATA STORES - The invention provides a method and system for preserving trustworthiness of data, the method includes storing data on an untrusted system, and committing the data to a trusted computing base (TCB). The committing includes upon an end of a predetermined time interval, transmitting a constant size authentication data from the untrusted system to the TCB, and the TCB preserving trustworthiness of the authentication data based on performing a single hash operation of a first root and a second root of a general hash tree representing authenticated data. | 08-19-2010 |
20110307654 | WRITE OPERATIONS IN A FLASH MEMORY-BASED OBJECT STORE - Approaches for improving writing to solid state devices. An object cache or store, maintained on one or more flash storage devices, comprises two or more slabs. A slab is an allocated amount of memory for storing objects of a particular size. A request to write requested data to a slab is received. The size of the requested data is less than the maximum capacity of objects stored in the slab. After writing the requested data to the slab, unrequested data is written up to the maximum capacity of an object in the slab in the same write operation. Writing the unrequested data to the particular slab is performed for purposes of reducing the time required to write the requested data to the SSD. | 12-15-2011 |
Patent application number | Description | Published |
20080244747 | Network context triggers for activating virtualized computer applications - A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vulnerability profiles, and to cause the remedial action. | 10-02-2008 |
20110173295 | OFFLOAD STACK FOR NETWORK, BLOCK AND FILE INPUT AND OUTPUT - An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems. | 07-14-2011 |
Patent application number | Description | Published |
20090148846 | Modified Oligonucleotides and Applications Thereof - Disclosed, among other things, are primers containing certain modified nucleobases in the 3′ terminal region of the primers that provide reduced formation of primer-dimers during amplification reactions, and various methods of use thereof. | 06-11-2009 |
20090269759 | UNNATURAL POLYMERASE SUBSTRATES THAT CAN SUSTAIN ENZYMATIC SYNTHESIS OF DOUBLE STRANDED NUCLEIC ACIDS FROM A NUCLEIC ACID TEMPLATE AND METHODS OF USE - Nucleotide analogs that can sustain the enzymatic synthesis of double-stranded nucleic acid from a nucleic template are described. The nucleotide analogs include: (i) a base selected from the group consisting of adenine, guanine, cytosine, thymine, uracil and their analogs; (ii) a label attached to the base or analog of the base via a cleavable linker; (iii) a deoxyribose; and (iv) one or more phosphate groups. The linker and/or the label inhibits template directed polymerase incorporation of a further nucleotide substrate onto an extended primer strand. In addition, cleavage of the linker leaves a residue attached to the base which is not present in the natural nucleotide and which does not inhibit extension of the primer strand. The nucleotide analogs can therefore be used as reversible terminators in sequencing by synthesis methods without blocking the 3′ hydroxyl group. Methods of sequencing DNA using the substrates are also described. | 10-29-2009 |
20100112712 | Modified Oligonucleotides and Applications Thereof - Disclosed, among other things, are primers containing certain modified nucleobases in the 3′ terminal region of the primers that provide reduced formation of primer-dimers during amplification reactions, and various methods of use thereof. | 05-06-2010 |
20100267938 | USE OF ANTIBODY-SURROGATE ANTIGEN SYSTEMS FOR DETECTION OF ANALYTES - Compositions, methods and kits for labeling proteins and uses in reporter systems for detecting, quantifying and/or characterizing analytes. | 10-21-2010 |
20110144319 | Modified Oligonucleotides and Applications Thereof - Disclosed, among other things, are primers containing certain modified nucleobases in the 3′ terminal region of the primers that provide reduced formation of primer-dimers during amplification reactions, and various methods of use thereof. | 06-16-2011 |
20110287431 | MODIFIED OLIGONUCLEOTIDES AND APPLICATIONS THEREOF - Disclosed, among other things, are primers containing certain modified nucleobases in the 3′ terminal region of the primers that provide reduced formation of primer-dimers during amplification reactions, and various methods of use thereof. | 11-24-2011 |
20110294122 | Synthesis of 2', 3'-Dideoxynucleosides for Automated DNA Synthesis and Pyrophosphorolysis Activated Polymerization - Methods for preparation of 2′,3′-dideoxynucleotides support structures, such as 2′,3′-dideoxyguanosine, 2′,3′-dideoxyadenosine, and 3′-deoxythymidine support structures are disclosed. Various methods of using such structures are also provided, such as their use for automated DNA synthesis and pyrophosphorolysis activated polymerization. | 12-01-2011 |
20120156728 | CLONAL AMPLIFICATION OF NUCLEIC ACID ON SOLID SURFACE WITH TEMPLATE WALKING - Novel methods of generating a localized population of immobilized clonal amplicons on a support are provided. | 06-21-2012 |
20120196329 | POLYMERIZATION OF NUCLEIC ACIDS USING ACTIVATION BY POLYPHOSPHOROLYSIS (APP) REACTIONS - This disclosure relates to methods of performing activation by polyphosphorolysis (APP) reactions using at least one of the polyphosphorylating agents triphosphate, polyphosphate, imidodiphosphate, thiodiphosphate (or μ-monothiopyrophosphate), and related compounds. | 08-02-2012 |
20130203607 | METHODS, COMPOSITIONS, SYSTEMS, APPARATUSES AND KITS FOR NUCLEIC ACID AMPLIFICATION - In some embodiments, the present teachings provide methods for paired end sequencing. In some embodiment, a polynucleotide template to be subjected to paired end sequencing comprises at least one cross linking moiety and at least one scissile moiety. In some embodiments, a paired end sequencing reaction comprises (a) a forward sequencing step, (b) a cleavage step, and (c) a reverse sequencing step. In some embodiments, a paired end sequencing reaction comprises (a) a forward sequencing step, (b) a cross-linking step, (c) a cleavage step, and (d) a reverse sequencing step. | 08-08-2013 |
20150045547 | Synthesis Of 2' , 3' -Dideoxynucleosides For Automated DNA Synthesis And Pyrophosphorolysis Activated Polymerization - Methods for preparation of 2′,3′-dideoxynucleotides support structures, such as 2′,3′-dideoxyguanosine, 2′,3′-dideoxyadenosine, and 3′-deoxythymidine support structures are disclosed. Various methods of using such structures are also provided, such as their use for automated DNA synthesis and pyrophosphorolysis activated polymerization. | 02-12-2015 |
20150191775 | POLYMERIZATION OF NUCLEIC ACIDS USING ACTIVATION BY POLYPHOSPHOROLYSIS (APP) REACTIONS - This disclosure relates to methods of performing activation by polyphosphorolysis (APP) reactions using at least one of the polyphosphorylating agents triphosphate, polyphosphate, imidodiphosphate, thiodiphosphate (or μ-monothiopyrophosphate), and related compounds. | 07-09-2015 |
20150198605 | USE OF ANTIBODY-SURROGATE ANTIGEN SYSTEMS FOR DETECTION OF ANALYTES - Compositions, methods and kits for labeling proteins and uses in reporter systems for detecting, quantifying and/or characterizing analytes. | 07-16-2015 |