Boehringer Ingelheim - Shanghai, China since Jun 2012
Senior Biostatistician
The University of Iowa May 2006 - May 2012
Graduate Research Assistant
Shanghai Conserv Information System Company Apr 2003 - Aug 2005
Project Manager
Education:
University of Iowa 2006 - 2012
Doctor of Philosophy (PhD), Biostatistics
East China University of Science and Technology 2000 - 2003
Master, Applied Mathematics
East China University of Science and Technology 1996 - 2000
Bachelor, Applied Mathematics
Changzhou No 1 High School
Marek Podgorny - DeWitt NY Lukasz Beca - Syracuse NY Gang Cheng - Nashua NH Geoffrey C. Fox - Jamesville NY Tomasz Jurga - Syracuse NY Konrad Olszewski - Syracuse NY Piotr Sokolowski - Syracuse NY Krzysztof Walczak - Poznan, PL
Assignee:
Syracuse University - Syracuse NY
International Classification:
G06F 15163
US Classification:
709204
Abstract:
Platform-independent collaboration backbone and framework for forming virtual communities having virtual rooms with collaborative sessions. Demon logic is embedded in a room page as downloadable platform-independent instructions. The demon, when downloaded, is caused to be in communication with control logic and an application, which, for example, may itself be downloadable. The downloaded demon is also in communication with a server. The server is in communication with similarly-arranged, though not necessarily identical, clients, which for example may have the downloaded demon but a different arrangement of applications. The application at a first and second client node may collaborate by causing their respective demons to send messages from a predefined protocol to the server, which in turn will forward them to other relevant demons. Some of the messages are control messages which facilitate certain collaborative actions, such as joining a session or entering a room. Other messages carry meaning only to the applications.
Address Verification, Seed Splitting And Firmware Extension For Secure Cryptocurrency Key Backup, Restore, And Transaction Signing Platform Apparatuses, Methods And Systems
The Address Verification, Seed Splitting and Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (“SFTSP”) transforms contract deployment request, transaction signing request, key backup request, key recovery request inputs via SFTSP components into contract deployment response, transaction signing response, key backup response, key recovery response outputs. A transaction signing request message datastructure associated with a transaction is obtained. Owner key identification parameters associated with an owner datastructure associated with a verified address wallet datastructure are determined. A contract address for the verified address wallet datastructure is calculated as a function of a deployment factory address, a salt value for the smart contract, contract code for the smart contract, and an owner address generated using the owner key identification parameters. A contract deployment signature is validated. A transaction hash for the transaction is calculated and a transaction signature is generated and returned.
Address Verification, Seed Splitting And Firmware Extension For Secure Cryptocurrency Key Backup, Restore, And Transaction Signing Platform Apparatuses, Methods And Systems
The Address Verification, Seed Splitting and Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (“SFTSP”) transforms contract deployment request, transaction signing request, key backup request, key recovery request inputs via SFTSP components into contract deployment response, transaction signing response, key backup response, key recovery response outputs. A contract deployment request message datastructure is obtained. Owner key identification parameters are determined. An owner public key is determined using the owner key identification parameters. An owner address is generated using the owner public key. A salt value is generated. A contract address for the smart contract is calculated as a function of the deployment factory address, the salt value, the contract code, and the owner address. An owner private key is determined using the owner key identification parameters and used to sign the contract address. A contract deployment data datastructure is provided.
Shifting Substitution Cipher Based Efficient Vaultless Data Tokenization Apparatuses, Methods And Systems
The Shifting Substitution Cipher Based Efficient Vaultless Data Tokenization Apparatuses, Methods and Systems (“VDT”) transforms tokenized data storage request, detokenized data retrieval request, tokenized data retokenization request inputs via VDT components into tokenized data storage response, detokenized data retrieval response, tokenized data retokenization response outputs. A tokenized data storage request datastructure is obtained. Data type and data type instance of a plaintext data value are determined. A first data tokenization key token for the data type instance is determined. A first data shift position for the first data tokenization key token is calculated. A first tokenized data value is generated by translating the plaintext data value from a plaintext alphabet to a first shifted ciphertext data alphabet generated by shifting the first data tokenization key token using the first data shift position. A first token envelope datastructure comprising the first tokenized data value and first data shift position is generated.
Youtube
Chang Gang Anthem - P Money feat. CG (Officia...
Chang Gang Anthem - P Money feat. CG (Official Music Video) Chang Gang...
Duration:
3m 17s
The Pretenders - Back On The Chain Gang HQ Mu...
"Back on the Chain Gang" is a single by The Pretenders released in Nov...
Duration:
3m 47s
Pretenders - Back on the Chain Gang (Official...
Pretenders - Back on the Chain Gang (Official Music Video) Official mu...
Duration:
3m 46s
James Gang - Walk Away (1971)
The James Gang was a rock band formed in Cleveland, Ohio in 1966. Thou...