Patents by Inventor Michelle Christian

Michelle Christian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160283621
    Abstract: Possible outcomes can be determined by combining simulation methods on a pool of input variables. Certain members of the pool are identified as members of a first set of variables (e.g., priority set), and certain other members of the pool of input variables are identified as members of a second set of variables (e.g., non-priority set). A first set of possible values for the first set of variables can be generated by applying a first simulation method. A second set of possible values for the second set of variables can be generated by applying a second simulation method that differs from the first simulation method in various ways, such as accuracy, completion time, and computational expense. A copula data structure can be used to maintain correlations between the variables of the pool of input variables when generating a hybrid set of simulated values based on the first and second simulation.
    Type: Application
    Filed: February 26, 2016
    Publication date: September 29, 2016
    Applicant: SAS Institute Inc.
    Inventors: Zhiping Yang, Donald James Erdman, Stacey Michelle Christian, Wei Chen
  • Patent number: 8586363
    Abstract: Materials and Methods related to gene targeting (e.g., gene targeting with transcription activator-like effector nucleases; “TALENS”) are provided.
    Type: Grant
    Filed: December 10, 2010
    Date of Patent: November 19, 2013
    Assignees: Regents of the University of Minnesota, Iowa State University Research Foundation, Inc.
    Inventors: Daniel F. Voytas, Adam Bogdanove, Feng Zhang, Michelle Christian, Tomas Cermak, Clarice Lauer Schmidt, Erin Doyle, Li Wang
  • Patent number: 8312260
    Abstract: Systems and methods are provided for providing secure transmission of software code, which includes a mathematical function, from a first computer to a second computer so that the mathematical function's content cannot be determined at the second computer. A method includes generating a secure container, where the secure container includes an encrypted representation of the mathematical function and metadata identifying the mathematical function encrypted in the secure container. The method further includes providing the secure container from the first computer to the second computer over a communication transmission medium, where the secure container is accessed at the second computer using the metadata to identify the mathematical function, and where the mathematical function contained within the secure container is decrypted and incorporated into program code in a compiled form so that the mathematical function can be used but the mathematical function's content cannot be determined at the second computer.
    Type: Grant
    Filed: October 9, 2009
    Date of Patent: November 13, 2012
    Assignee: SAS Institute Inc.
    Inventors: Stacey Michelle Christian, Donald James Erdman
  • Publication number: 20110213692
    Abstract: Systems and methods for determining a future conversion curve between a first metric and a second metric are provided. A system and method can include receiving a first metric and a second metric. A plurality of conversion curves are retrieved, where each conversion curve has a corresponding weight. One or more paths between the first metric and the second metric are calculated using two or more conversion curves, where each path begins with the first metric and ends with the second metric, and where each path is associated with a path weight based upon the sum of the weights used to calculate the path. A shortest path between the first metric and the second metric is determined, where the shortest path is the path having the least weight, and a future conversion curve is generated by collapsing the two or more conversion curves of the shortest path.
    Type: Application
    Filed: March 1, 2010
    Publication date: September 1, 2011
    Inventors: Keith Eugene Crowe, Stacey Michelle Christian, Wei Chen
  • Publication number: 20110167020
    Abstract: Computer-implemented systems and methods are provided for generating a simulated forecast based on members of a pool of input risk factor variables. Certain members of the pool of input risk factor variables are identified as members of a first set of variables, and certain other members of the pool of input risk factor variables are identified as members of a second set of variables. A first simulation is generated via a first simulation method using the first set of variables, and a second simulation is generated via a second simulation method that differs from the first simulation method using the second set of variables. The first simulation and the second simulation are generated using correlations among variables in the first set of variables and variables in the second set of variables.
    Type: Application
    Filed: January 6, 2010
    Publication date: July 7, 2011
    Inventors: Zhiping Yang, Donald James Erdman, Stacey Michelle Christian, Wei Chen
  • Publication number: 20110145940
    Abstract: Materials and Methods related to gene targeting (e.g., gene targeting with transcription activator-like effector nucleases; “TALENS”) are provided.
    Type: Application
    Filed: December 10, 2010
    Publication date: June 16, 2011
    Inventors: Daniel F. Voytas, Adam Bogdanove, Feng Zhang, Michelle Christian, Tomas Cermak, Clarice Lauer Schmidt, Erin Doyle, Li Wang
  • Publication number: 20110087876
    Abstract: Systems and methods are provided for providing secure transmission of software code, which includes a mathematical function, from a first computer to a second computer so that the mathematical function's content cannot be determined at the second computer. A method includes generating a secure container, where the secure container includes an encrypted representation of the mathematical function and metadata identifying the mathematical function encrypted in the secure container. The method further includes providing the secure container from the first computer to the second computer over a communication transmission medium, where the secure container is accessed at the second computer using the metadata to identify the mathematical function, and where the mathematical function contained within the secure container is decrypted and incorporated into program code in a compiled form so that the mathematical function can be used but the mathematical function's content cannot be determined at the second computer.
    Type: Application
    Filed: October 9, 2009
    Publication date: April 14, 2011
    Inventors: Stacey Michelle Christian, Donald James Erdman