437 research outputs found

    Personal Jurisdiction over Aliens in Patent Infringement Actions: A Uniform Approach Toward the Situs of the Tort

    Get PDF
    This Note examines current approaches to the question of personal jurisdiction over alien patent infringers. Part I describes personal jurisdiction requirements in the context of patent infringement suits against aliens. The leading case addressing these requirements has been interpreted differently by several courts, thus resulting in conflicting outcomes. Part II explains the current controversy over the locus of the tort of patent infringement. The three different modes of reasoning currently used by courts to determine the locus of the tort would allow immunity from suit for the alien in at least two hypothetical cases. This Part concludes that in order to prevent the possibility of immunity in such situations, the courts should carefully choose and apply the same approach to the locus of the tortious injury. Part III examines the theories behind two competing approaches to the locus of the tortious injury and argues for the uniform adoption of a single rule. This Note concludes that courts should deem the tort to occur where the distributor made the infringing sales

    Actual Malice: Twenty-Five Years After \u3cem\u3eTimes v. Sullivan\u3c/em\u3e

    Get PDF
    A Review of Actual Malice: Twenty-Five Years After Times v. Sullivan. by W. Wat Hopkin

    Evolutionary descent of prion genes from a ZIP metal ion transport ancestor

    Get PDF
    In the more than 20 years since its discovery, both the phylogenetic origin and cellular function of the prion protein (PrP) have remained enigmatic. Insights into the function of PrP may be obtained through a characterization of its molecular neighborhood. Quantitative interactome data revealed the spatial proximity of a subset of metal ion transporters of the ZIP family to mammalian prion proteins. A subsequent bioinformatic analysis revealed the presence of a prion-like protein sequence within the N-terminal, extracellular domain of a phylogenetic branch of ZIPs. Additional structural threading and ortholog sequence alignment analyses consolidated the conclusion that the prion protein gene family is phylogenetically derived from a ZIP-like ancestor molecule. Our data explain structural and functional features found within mammalian prion proteins as elements of an ancient involvement in the transmembrane transport of divalent cations. The connection to ZIP proteins is expected to open new avenues to elucidate the biology of the prion protein in health and disease

    Protection and Enforcement of New Intellectual Property

    Get PDF
    The desirability of new forms of intellectual property protection for databases and domain names is beyond the scope of this Article. Instead, this Article focuses on the protection and enforcement of intellectual property rights in databases and domain names under existing law. Because of the increased value of these assets, owners should increasingly pay attention to their protection

    Family Mining of State Charts: Master's Thesis

    Get PDF

    Towards Reducing the Complexity of Enterprise Architectures by Identifying Standard Variants Using Variability Mining

    Get PDF
    For decades, Enterprise Architectures (EAs) of car manufacturers have been constantly evolved to respond to growing requirements. As a consequence, EAs have often reached a very high level of complexity, which leads to problems in adapting EAs to new environmental condi­tions. Such a new condition is, for instance, digitalization of society (e.g., social media, Internet of Things) which has a huge effect on the automotive industry and the grown EA. Resulting changes in complex EAs have long implementation cycles, require enormous communica­tion efforts, and lead to high development costs. To alle­viate these problems, in this paper, we present a concept to reduce the complexity of grown EAs by adapting the Family Mining approach. This approach is originally used to compare block-oriented models, such as MATLAB/Si­mulink models, and to identify commonalities and diffe­rences between these models. In our concept, we utilize the Family Mining approach to analyze the variability of a particular EA and to identify the contained variants. All information about the variability and the variants will be used to derive standard variants representing default so­lutions for different issues. Using these standard variants, the existing EA will be restructured involving economic considerations (e.g., which standard variant yields best benefits under certain circumstances). Hence, applying this concept to a complex EA should allow reducing the complexity of the EA, alleviating related problems and making suitable design decisions for future extensions

    Maßgeschneiderte Produktlinienextraktion

    Get PDF
    Industry faces an increasing number of challenges regarding the functionality, efficiency and reliability of software. A common approach to reduce the linked development effort and respective costs are model-based languages, such as Matlab/Simulink and statecharts. While these languages help companies during development of single systems, the high demand for customized software is an increasing challenge. As a result, variants with high similarity and only slight differences have to be developed in an efficient way. As reimplementation of complex functionality for each variant is no option, copies of existing solutions are often modified for new customers. In the short-run, this so-called clone-and-own approach allows to save costs as existing solutions can easily be reused. However, this approach also involves risks as the relations between the copied systems are rarely documented and errors have to be fixed for each variant in isolation. Thus, with a growing number of potentially large system copies, the resulting maintenance effort can become a problem. To overcome these problems, this thesis contributes an approach to semi-automatically migrate existing model variants to software product lines. These product lines allow to generate all variants from the identified reusable artifacts. As industry uses a variety of different modeling languages, the focus of the approach lies on an easy adaptation for different languages. Furthermore, the approach can be custom-tailored to include domain knowledge or language-specific details in the variability identification. The first step of the approach performs a high-level analysis of variants to identify outliers (e.g., variants that diverged too much from the rest) and clusters of strongly related variants. The second step executes variability mining to identify corresponding low-level variability relations (i.e. the common and varying parts) for these clusters. The third step uses these detailed variability relations for an automatic migration of the compared variants to a delta-oriented software product line. The approach is evaluated using publicly available case studies with industrial background as well as model variants provided by an industry partner.Die Industrie steht einer steigenden Anzahl an Herausforderungen bezĂŒglich der FunktionalitĂ€t, Effizienz und ZuverlĂ€ssigkeit von Software gegenĂŒber. Um den damit verbundenen Entwicklungsaufwand und entsprechende Kosten zu reduzieren, werden hĂ€ufig modellbasierte Sprachen wie Matlab/Simulink oder Zustandsautomaten eingesetzt. Obwohl diese Sprachen die Unternehmen wĂ€hrend der Entwicklung von Einzelsystemen unterstĂŒtzen, fĂŒhrt die große Nachfrage nach maßgeschneiderter Software zu neuen Herausforderungen. Entsprechend mĂŒssen Varianten mit hoher Ähnlichkeit und nur geringfĂŒgigen Unterschieden effizient entwickelt werden. Da eine Neuimplementierung komplexer FunktionalitĂ€t fĂŒr jede Variante keine Option darstellt, werden hĂ€ufig Kopien existierender Lösungen fĂŒr Kunden angepasst. Auf kurze Sicht ermöglicht dieser sogenannte clone-and-own-Ansatz Kosten zu sparen, da existierende Lösungen leicht wiederverwendet werden können. Jedoch birgt der Ansatz auch Risiken, da Beziehungen zwischen den Systemkopien selten dokumentiert werden und Fehler fĂŒr jede der Variante einzeln behoben werden mĂŒssen. Somit kann mit einer wachsenden Anzahl an möglicherweise umfangreichen Systemkopien der Wartungsaufwand zu einem Problem werden. Um diese Probleme zu lösen, bietet diese Arbeit einen Ansatz zur semi-automatischen ÜberfĂŒhrung existierender Modellvarianten in Softwareproduktlinien. Diese ermöglichen eine anschließende Generierung der Varianten aus den identifizierten wiederverwendbaren Artefakten. Da in der Industrie eine große Menge von Modellierungssprachen eingesetzt wird, liegt der Fokus auf der einfachen Adaption fĂŒr unterschiedliche Sprachen. ZusĂ€tzlich kann durch Einbeziehung von Expertenwissen oder sprachspezifische Details die VariabilitĂ€tsidentifikation beeinflusst werden. Der erste Schritt des Ansatzes analysiert die Varianten auf hohem Abstraktionslevel, um Außenseiter (z.B. Varianten die stark von den restlichen Variaten abweichen) und Cluster von stark verwandten Varianten zu identifizieren. Der zweite Schritt analysiert diese Cluster auf niedrigem Abstraktionslevel, um entsprechende VariabilitĂ€tsrelationen (d.h. gemeinsame und unterschiedliche Teile) zu identifizieren. Der dritte Schritt nutzt diese detaillierten VariabilitĂ€tsrelationen fĂŒr eine automatische Migration der verglichenen Varianten in eine delta-orientierte Softwareproduktlinie. Der Ansatz ist an Fallstudien mit industriellem Kontext sowie Modellvarianten eines Industriepartners evaluiert worden

    Clones in Graphs

    Full text link
    Finding structural similarities in graph data, like social networks, is a far-ranging task in data mining and knowledge discovery. A (conceptually) simple reduction would be to compute the automorphism group of a graph. However, this approach is ineffective in data mining since real world data does not exhibit enough structural regularity. Here we step in with a novel approach based on mappings that preserve the maximal cliques. For this we exploit the well known correspondence between bipartite graphs and the data structure formal context (G,M,I)(G,M,I) from Formal Concept Analysis. From there we utilize the notion of clone items. The investigation of these is still an open problem to which we add new insights with this work. Furthermore, we produce a substantial experimental investigation of real world data. We conclude with demonstrating the generalization of clone items to permutations.Comment: 11 pages, 2 figures, 1 tabl
    • 

    corecore