Patent application number | Description | Published |
20090048266 | Effects of Inhibitors of Fgfr3 on Gene Transcription - Methods of utilizing biomarkers to identify patients for treatment or to monitor response to treatment are taught herein. Alterations in levels of gene expression of the biomarkers, particularly in response to FGFR3 inhibition, are measured and identifications or adjustments may be made accordingly. | 02-19-2009 |
20100009392 | USE OF MELANOMA INHIBITORY ACTIVITY (MIA) PROTEIN AS AN EARLY INDICATOR FOR THERAPEUTIC RESPONSE IN MELANOMA - The present invention provides a method for determining a response of a mammalian subject having melanoma tumor cells to treatment with a melanoma inhibitory agent. In one aspect, the method comprises (a) determining a first concentration of melanoma inhibitory activity protein (MIA) in a first biological sample taken from the mammalian subject before treatment with the melanoma inhibitory agent; (b) determining a second concentration of MIA in a second biological sample from the mammalian subject taken after treatment with the melanoma inhibitory agent; and (c) comparing the first and second concentrations of MIA, wherein a decrease in the second concentration of MIA measured in the second biological sample as compared to the first concentration of MIA measured in the first biological sample indicates a positive response to the treatment with the melanoma inhibitory agent. | 01-14-2010 |
20100173873 | TREATMENT OF METASTASIZED TUMORS - Methods of treating metastatic cancer such as metastasized tumors include administering a compound of Structure I, a tautomer of the compound, a pharmaceutically acceptable salt of the compound, a pharmaceutically acceptable salt or the tautomer, or a mixture thereof to a subject. The compound, tautomer, salt of the compound, salt of the tautomer, or mixture thereof may be used to prepare medicaments for treating metastatic cancer. The variable A has the values defined herein. | 07-08-2010 |
20120149714 | Effects of Inhibitors of FGFR3 on Gene Transcription - Methods of utilizing biomarkers to identify patients for treatment or to monitor response to treatment are taught herein. Alterations in levels of gene expression of the biomarkers, particularly in response to FGFR3 inhibition, are measured and identifications or adjustments may be made accordingly. | 06-14-2012 |
20130237546 | USE OF MELANOMA INHIBITORY ACTIVITY (MIA) PROTEIN AS AN EARLY INDICATOR FOR THERAPEUTIC RESPONSE IN MELANOMA - The present invention provides a method for determining a response of a mammalian subject having melanoma tumor cells to treatment with a melanoma inhibitory agent. In one aspect, the method comprises (a) determining a first concentration of melanoma inhibitory activity protein (MIA) in a first biological sample taken from the mammalian subject before treatment with the melanoma inhibitory agent; (b) determining a second concentration of MIA in a second biological sample from the mammalian subject taken after treatment with the melanoma, inhibitory agent; and (c) comparing the first and second concentrations of MIA, wherein a decrease in the second concentration of MIA measured in the second biological sample as compared to the first concentration of MIA measured in the first biological sample indicates a positive response to the treatment with the melanoma inhibitory agent. | 09-12-2013 |
20140199404 | METHOD FOR TREATING CANCER BASED ON LEVEL OF A NUCLEOSIDE TRANSPORTER - The present invention provides methods and compositions for treating cancer by administering a) a composition comprising nanoparticles that comprise paclitaxel and an albumin and b) a nucleoside analog (e.g., gemcitabine) based upon levels of a nucleoside transporter (e.g., hENT1). | 07-17-2014 |
Patent application number | Description | Published |
20120070029 | USING CAMERA SIGNATURES FROM UPLOADED IMAGES TO AUTHENTICATE USERS OF AN ONLINE SYSTEM - Users of an online system are authenticated based on signatures of cameras that were used to capture images uploaded to the online system. Users of an online system upload photos taken from their cameras. The online system extracts characteristic information about the camera that captured the photos. This information includes a mapping of faulty pixels, metadata included with the photos, a naming convention, and the like. The online system stores an association between the user and the camera. This association is used for authentication of the user. For authentication, the user is asked to upload new photos taken from the camera that the user used previously. The information extracted from the newly uploaded photos is matched against stored information of cameras used previously by the user. The user is successfully authenticated if the camera used for the newly uploaded photos matches a previously stored camera. | 03-22-2012 |
20120072493 | ASSOCIATING CAMERAS WITH USERS OF A SOCIAL NETWORKING SYSTEM - Images uploaded by users of a social networking system are analyzed to determine signatures of cameras used to capture the images. A camera signature comprises features extracted from images that characterize the camera used for capturing the image, for example, faulty pixel positions in the camera and metadata available in files storing the images. Associations between users and cameras are inferred based on actions relating users with the cameras, for example, users uploading images, users being tagged in images captured with a camera, and the like. Associations between users of the social networking system related via cameras are inferred. These associations are used beneficially for the social networking system, for example, for recommending potential connections to a user, recommending events and groups to users, identifying multiple user accounts created by the same user, detecting fraudulent accounts, and determining affinity between users. | 03-22-2012 |
20130011007 | USING CAMERA SIGNATURES FROM UPLOADED IMAGES TO AUTHENTICATE USERS OF AN ONLINE SYSTEM - Users of an online system are authenticated based on signatures of cameras that were used to capture images uploaded to the online system. Users of an online system upload photos taken from their cameras. The online system extracts characteristic information about the camera that captured the photos. This information includes a mapping of faulty pixels, metadata included with the photos, a naming convention, and the like. The online system stores an association between the user and the camera. This association is used for authentication of the user. For authentication, the user is asked to upload new photos taken from the camera that the user used previously. The information extracted from the newly uploaded photos is matched against stored information of cameras used previously by the user. The user is successfully authenticated if the camera used for the newly uploaded photos matches a previously stored camera. | 01-10-2013 |
20130282821 | ASSOCIATING CAMERAS WITH USERS AND OBJECTS IN A SOCIAL NETWORKING SYSTEM - Images uploaded by users of a social networking system are analyzed to determine signatures of cameras used to capture the images. A camera signature comprises features extracted from images that characterize the camera used for capturing the image, for example, faulty pixel positions in the camera and metadata available in files storing the images. Associations between users and cameras are inferred based on actions relating users with the cameras, for example, users uploading images, users being tagged in images captured with a camera, and the like. Associations between users of the social networking system related via cameras are inferred. These associations are used beneficially for the social networking system, for example, for recommending potential connections to a user, recommending events and groups to users, identifying multiple user accounts created by the same user, detecting fraudulent accounts, and determining affinity between users. | 10-24-2013 |
20140282837 | PRIVACY VERIFICATION TOOL - Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool. The verification tool uses the expressed privacy policies along with language-level assumptions and assertions in the verification process. For example, high-level models of the privacy policies can be reduced to a simpler verification representation (e.g., a Boolean representation) based on a set of assertions. This verification representation can then be submitted to a constraint solver (e.g., Satisfiability Modulo Theories solver) for verification. | 09-18-2014 |
20140328542 | ASSOCIATING CAMERAS WITH USERS AND OBJECTS IN A SOCIAL NETWORKING SYSTEM - Images uploaded by users of a social networking system are analyzed to determine signatures of cameras used to capture the images. A camera signature comprises features extracted from images that characterize the camera used for capturing the image, for example, faulty pixel positions in the camera and metadata available in files storing the images. Associations between users and cameras are inferred based on actions relating users with the cameras, for example, users uploading images, users being tagged in images captured with a camera, and the like. Associations between users of the social networking system related via cameras are inferred. These associations are used beneficially for the social networking system, for example, for recommending potential connections to a user, recommending events and groups to users, identifying multiple user accounts created by the same user, detecting fraudulent accounts, and determining affinity between users. | 11-06-2014 |
20150067777 | SYSTEMS AND METHODS FOR AUTHENTICATING NODES - To authenticate nodes, a connection between a first node and a second node may be identified. A first set of nodes having connections with the first node and assigned to a first plurality of clusters may be identified. A second set of nodes having connections with the second node and assigned to a second plurality of clusters may be identified. A first distribution of clusters may be generated based on the first set of nodes. A second distribution of clusters may be generated based on the second set of nodes. The first distribution and the second distribution may be analyzed. An authenticity metric for at least one of the first node and the second node may be generated based on the analyzing the first distribution and the second distribution. | 03-05-2015 |
20150100661 | SYSTEMS AND METHODS FOR MAPPING AND ROUTING BASED ON CLUSTERING - Unique identifiers (IDs) associated with a plurality of nodes may be provided. Nodes clustered within a community may be assigned numerically proximate unique IDs. A number of partitions associated with a plurality of machines may be determined. The unique IDs may be segmented into divisions based on the number of partitions. The unique IDs may be mapped to the plurality of machines based on the divisions. | 04-09-2015 |
20150124107 | ASSOCIATING CAMERAS WITH USERS AND OBJECTS IN A SOCIAL NETWORKING SYSTEM - Images uploaded by users of a social networking system are analyzed to determine signatures of cameras used to capture the images. A camera signature comprises features extracted from images that characterize the camera used for capturing the image, for example, faulty pixel positions in the camera and metadata available in files storing the images. Associations between users and cameras are inferred based on actions relating users with the cameras, for example, users uploading images, users being tagged in images captured with a camera, and the like. Associations between users of the social networking system related via cameras are inferred. These associations are used beneficially for the social networking system, for example, for recommending potential connections to a user, recommending events and groups to users, identifying multiple user accounts created by the same user, detecting fraudulent accounts, and determining affinity between users. | 05-07-2015 |