Patents by Inventor Simon Cheng
Simon Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230330000Abstract: Provided is a dietary supplement and method of use that promote skin hydration and thus improve its appearance. The supplement includes a form of hyaluronic acid and at least one ceramide—the hyaluronic acid promoting water retention in the deep layers of the epidermis and the ceramide promoting the surface retention of moisture.Type: ApplicationFiled: April 18, 2023Publication date: October 19, 2023Inventor: Simon Cheng
-
Publication number: 20220211752Abstract: Ferroptosis (cell death mediated by iron-dependent lipid peroxide accumulation) results from lipid peroxidation of phospholipids containing polyunsaturated fatty acyl moieties. Glutathione, the key cellular antioxidant capable of inhibiting lipid peroxidation via the activity of the enzyme glutathione peroxidase 4 (GPX-4), is generated directly from the sulfur-containing aminoacid cysteine, and indirectly from methionine via the transsulfuration pathway. Cysteine and methionine deprivation (CMD) in the diet can synergistically increase RSL3-mediated cell death and lipid peroxidation in both murine and human glioma cell lines and in ex-vivo organotypic slice cultures. A cysteine-depleted, methionine-restricted diet can improve survival in an syngeneic orthotopic murine glioma model. This CMD diet leads to profound in-vivo metabolomic, proteomic and lipidomic alterations, leading to improvements in the efficacy of ferroptotic therapies in glioma treatment with a non-invasive dietary modification.Type: ApplicationFiled: November 26, 2021Publication date: July 7, 2022Inventors: Pavan Upadhyayula, Dominique Higgins, Jeffrey N. Bruce, Simon Cheng, Kunal Chaudhary, Peter Canoll, Brent Stockwell, Athanassios Dovas
-
Publication number: 20220193047Abstract: The present disclosure provides, inter alia, methods for treating or ameliorating the effects of a cancer in a subject in need thereof by combining a radiosensitizer such as a ferroptosis inducer with radiation. Methods for identifying and treating a subject with a cancer that is resistant to radiotherapy, methods for enhancing the anti-tumor effect of radiation in a subject undergoing radiotherapy, and methods for enhancing the effect of radiation on a cancer cell are also provided.Type: ApplicationFiled: March 2, 2022Publication date: June 23, 2022Inventors: Brent R. Stockwell, Ling Feng Ye, Simon Cheng
-
Patent number: 11058957Abstract: The present disclosure relates to a method, a device and a system for computer game difficulty assessment. The method comprises: recording game data by a data collector in a process of simulating game playing by operating a computer game through an API (Application Programming Interface) of the computer game using an agent algorithm; measuring a goal attainment difficulty of the computer game at this timing according to goal completion degrees of a plurality of goals corresponding to all attempts at each decision-making timing in the recorded game data; measuring a strategy space-related difficulty of the computer game at this timing according to goal completion degrees of a plurality of goals corresponding to all actions at each decision-making timing in the recorded game data; assessing difficulty of the computer game based on a goal attainment difficulty and a strategy space-related difficulty at each timing.Type: GrantFiled: March 27, 2019Date of Patent: July 13, 2021Assignee: BEIJING BYTEDANCE NETWORK TECHNOLOGY CO., LTD.Inventors: Chaoran Li, Simon Cheng Liu, Heng Ma, Xianghao Guo, Cong Chen
-
Publication number: 20190351334Abstract: The present disclosure relates to a method, a device and a system for computer game difficulty assessment. The method comprises: recording game data by a data collector in a process of simulating game playing by operating a computer game through an API (Application Programming Interface) of the computer game using an agent algorithm; measuring a goal attainment difficulty of the computer game at this timing according to goal completion degrees of a plurality of goals corresponding to all attempts at each decision-making timing in the recorded game data; measuring a strategy space-related difficulty of the computer game at this timing according to goal completion degrees of a plurality of goals corresponding to all actions at each decision-making timing in the recorded game data; assessing difficulty of the computer game based on a goal attainment difficulty and a strategy space-related difficulty at each timing.Type: ApplicationFiled: March 27, 2019Publication date: November 21, 2019Inventors: Chaoran Li, Simon Cheng Liu, Heng Ma, Xianghao Guo, Cong Chen
-
Patent number: 10331629Abstract: Methods, apparatus, and other embodiments facilitate transitioning a database between two modes. The two modes include a mode where table information for separate tables in the database is stored in a single monolithic file and a mode where the table information for separate tables is stored in separate files. Conventional attempts to make this type of transition lock the database for an unacceptable amount of time. Example methods and apparatus make a copy of a database that is to be transitioned, lock the copy, make a second instance of the copy, and then perform the work necessary for the transition in the second instance. This allows the original database to remain running. When the second instance is complete, the second instance is synchronized to the original database and then the transition is completed by copying the second instance to the original or failing the original over to the second instance.Type: GrantFiled: July 13, 2015Date of Patent: June 25, 2019Assignee: Quantum CorporationInventors: Camden Davis, Simon Cheng, Adam Manthei
-
Publication number: 20160217150Abstract: Methods, apparatus, and other embodiments facilitate transitioning a database between two modes. The two modes include a mode where table information for separate tables in the database is stored in a single monolithic file and a mode where the table information for separate tables is stored in separate files. Conventional attempts to make this type of transition lock the database for an unacceptable amount of time. Example methods and apparatus make a copy of a database that is to be transitioned, lock the copy, make a second instance of the copy, and then perform the work necessary for the transition in the second instance. This allows the original database to remain running. When the second instance is complete, the second instance is synchronized to the original database and then the transition is completed by copying the second instance to the original or failing the original over to the second instance.Type: ApplicationFiled: July 13, 2015Publication date: July 28, 2016Inventors: Camden Davis, Simon Cheng, Adam Manthei
-
Patent number: 8965897Abstract: A method for improving the usability of product feedback data can begin with the receipt of product feedback search parameters by an intelligent product feedback analytics tool. The product feedback search parameters can represent a product or a group of products. Product feedback search results having a rating value and/or textual feedback content can be obtained for the product feedback search parameters. For each product in the search results, a composite rating value can be synthesized from the rating values contained in the search results. For each product in the search results, the product feedback search results can be analyzed for analytic parameters using natural language processing techniques. An analytic parameter can represent a commonality within a subset of the search results. The product feedback search results, composite rating values, and analytic parameters can be presented within a user interface, providing context for the composite rating value.Type: GrantFiled: February 29, 2012Date of Patent: February 24, 2015Assignee: International Business Machines CorporationInventors: Lee A. Carbonell, Tsz Simon Cheng, Jeffrey L. Edgington, Pandian Mariadoss
-
Publication number: 20130226925Abstract: A method for improving the usability of product feedback data can begin with the receipt of product feedback search parameters by an intelligent product feedback analytics tool. The product feedback search parameters can represent a product or a group of products. Product feedback search results having a rating value and/or textual feedback content can be obtained for the product feedback search parameters. For each product in the search results, a composite rating value can be synthesized from the rating values contained in the search results. For each product in the search results, the product feedback search results can be analyzed for analytic parameters using natural language processing techniques. An analytic parameter can represent a commonality within a subset of the search results. The product feedback search results, composite rating values, and analytic parameters can be presented within a user interface, providing context for the composite rating value.Type: ApplicationFiled: February 29, 2012Publication date: August 29, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: LEE A. CARBONELL, TSZ SIMON CHENG, JEFFREY L. EDGINGTON, PANDIAN MARIADOSS
-
Patent number: 8346863Abstract: A method of initiating contact based upon automatically shared profile data can include a step of automatically and wirelessly exchanging profile information between at least two computing devices. A determination can be made as to whether a contact opportunity exists by comparing received profile information with a set of previously established contact rules. A notification of a contract opportunity can be automatically presented upon one of the computing devices, depending upon whether the profile information favorably compares with the contact rules.Type: GrantFiled: August 15, 2006Date of Patent: January 1, 2013Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Daniel Hassell, Mathews Thomas
-
Patent number: 8234499Abstract: In the invention, incorrect authentication information for accessing at least one secured computing asset can be received. A similarity score between the incorrect authentication information and correct authentication information can be determined. One of many different access levels can be assigned to a computing session based upon the similarity score. Access consistent with the assigned access level can be granted. One access level can be an emulation access level that grants access to at least one simulated asset designed to mimic the secured asset. Access to the simulated asset can be provided in a fashion so that a user, who is likely an intruder, is unaware that they are not receiving the secured asset information. A tracking action can be optionally initiated against the intruder. Further, user behavior with the simulated session or a limited access session can be compared against a behavior profile to dynamically increase or decrease session permissions.Type: GrantFiled: June 26, 2007Date of Patent: July 31, 2012Assignee: International Business Machines CorporationInventors: Subil M. Abraham, Lee A. Carbonell, Tsz Simon Cheng, Mathews Thomas
-
Patent number: 7904833Abstract: An electronic commerce method can include the step of determining a plurality of e-commerce partners. For each partner, a partner identifier can be presented within a commerce GUI. In the commerce GUI, the partner identifier can be an expandable node. An expansion of at least one of the nodes can be presented within the commerce GUI. For each expansion, a transaction identifier can be presented as a child node of the expanded node. The transaction identifier can represent an electronic commerce transaction between a user of the commerce GUI and the associated e-commerce partner.Type: GrantFiled: December 8, 2003Date of Patent: March 8, 2011Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Brent W. Cossey, Gregory P. Fitzpatrick
-
Patent number: 7756751Abstract: A software architecture can include an artifact layer and a configuration layer. The artifact layer can contain multiple application independent artifacts. A configuration layer can contain at least one application. The application can include multiple states in which the application executes instructions. The states can exist within execution spaces that are distributed across a network. The application uses artifacts of the artifact layer, which can operate in a state dependent manner.Type: GrantFiled: November 17, 2003Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Ying Huang, Santhosh Kumaran, Amaresh Rajasekharan, Mathews Thomas, Frederick Y. Wu, Yiming Ye
-
Patent number: 7523316Abstract: A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.Type: GrantFiled: December 8, 2003Date of Patent: April 21, 2009Assignee: International Business Machines CorporationInventors: Tsz Simon Cheng, Brent W. Cossey, Gregory P. Fitzpatrick
-
Publication number: 20090006856Abstract: In the invention, incorrect authentication information for accessing at least one secured computing asset can be received. A similarity score between the incorrect authentication information and correct authentication information can be determined. One of many different access levels can be assigned to a computing session based upon the similarity score. Access consistent with the assigned access level can be granted. One access level can be an emulation access level that grants access to at least one simulated asset designed to mimic the secured asset. Access to the simulated asset can be provided in a fashion so that a user, who is likely an intruder, is unaware that they are not receiving the secured asset information. A tracking action can he optionally initiated against the intruder. Further, user behavior with the simulated session or a limited access session can be compared against a behavior profile to dynamically increase or decrease session permissions.Type: ApplicationFiled: June 26, 2007Publication date: January 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUBIL ABRAHAM, LEE A. CARBONELL, TSZ SIMON CHENG, MATHEWS THOMAS
-
Patent number: 7313615Abstract: A method for managing communications including receiving a multitude of communication attempts from a multitude of communication sources. For each communication attempt, a communication event can be responsively determined. For each communication event, an event weight for the communication event can be determined. Each event weight can be compared to an event threshold associated with the communication event. At least one communication management action can be responsively performed. The communication management action can include a busy indication action, a queuing action, an automated response action, a linking action, a notification action, and/or a reformatting action.Type: GrantFiled: June 16, 2003Date of Patent: December 25, 2007Assignee: International Business Machines CorporationInventors: Gregory P Fitzpatrick, Tsz (Simon) Cheng
-
Publication number: 20050125673Abstract: A method (10) for managing the display of sensitive content in non-trusted environments can include the steps of interrogating (12) a list of policies associated with a given user and a physical device, determining (14) a location of the physical device, comparing (18) the location of the physical device with a list of trusted locations, and enforcing (20) a plurality of rules contained in the policy by limiting or restricting access to sensitive information based on the location.Type: ApplicationFiled: December 8, 2003Publication date: June 9, 2005Applicant: International Business Machines CorporationInventors: Tsz Simon Cheng, Brent Cossey, Gregory Fitzpatrick
-
Publication number: 20040255015Abstract: A method for managing communications including receiving a multitude of communication attempts from a multitude of communication sources. For each communication attempt, a communication event can be responsively determined. For each communication event, an event weight for the communication event can be determined. Each event weight can be compared to an event threshold associated with the communication event. At least one communication management action can be responsively performed. The communication management action can include a busy indication action, a queuing action, an automated response action, a linking action, a notification action, and/or a reformatting action.Type: ApplicationFiled: June 16, 2003Publication date: December 16, 2004Applicant: International Business Machines CorporationInventors: Gregory P. Fitzpatrick, Tsz (Simon) Cheng