in Conducting verification in event processing applications using formal methods By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method of applying formal verification methodologies to event processing applications is provided herein. The method includes the following stages: representing an event processing application as an event processing network, being a graph with event processing agents as nodes; generating a finite state machine based on the event processing network, wherein the finite state machine is an over-approximation of the event processing application; expressing stateful rules and policies that are associated with the event processing application using temporal logic, to yield a temporal representation of the event processing application; combining the temporal representation and the finite state machine into a model; generating a statement associated with a user-selected verification-related property of the event processing application, wherein the statement is generated using the temporal representation; and applying the statement to the model, to yield an indication for: (i) a correctness of the statement or (ii) a counter example, respectively. Full Article
in Applying coding standards in graphical programming environments By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Graphical programming or modeling environments in which a coding standard can be applied to graphical programs or models are disclosed. The present invention provides mechanisms for applying the coding standard to graphical programs/models in the graphical programming/modeling environments. The mechanisms may detect violations of the coding standard in the graphical model and report such violations to the users. The mechanisms may automatically correct the graphical model to remove the violations from the graphical model. The mechanisms may also automatically avoid the violations in the simulation and/or code generation of the graphical model. Full Article
in Methods and devices for managing a cloud computing environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods, devices, and systems for management of a cloud computing environment for use by a software application. The cloud computing environment may be an N-tier environment. Multiple cloud providers may be used to provide the cloud computing environment. Full Article
in System for selecting software components based on a degree of coherence By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a novel system and method to select software components. A set of available software components are accessed. Next, one or more dimensions are defined. Each dimension is an attribute to the set of available software components. A set of coherence distances between each pair of the available software components in the set of available software components is calculated for each of the dimensions that have been defined. Each of the coherence distances are combined between each pair of the available software components that has been calculated in the set of the coherence distances into an overall coherence degree for each of the available software components. Using the overall coherence degree, one or more software components are selected to be included in a software bundle. Full Article
in System and method for recommending software artifacts By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method for recommending at least one artifact to an artifact user is described. The method includes obtaining user characteristic information reflecting preferences, particular to the artifact user, as to a desired artifact. The method also includes obtaining first metadata about each of one or more candidate artifacts, and scoring, as one or more scored artifacts, each of the one or more candidate artifacts by evaluating one or more criteria, not particular to the artifact user, applied to the first metadata. The method further includes scaling, as one or more scaled artifacts, a score of each of the one or more scored artifacts, by evaluating the suitability of each of the one or more scored artifacts in view of the user characteristic information. The method lastly includes recommending to the artifact user at least one artifact from among the one or more scaled artifacts based on its scaled score. Full Article
in Compound versioning and identification scheme for composite application development By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention provides a method, a system and a computer program product for defining a version identifier of a service component. The method includes determining various specification levels corresponding to the service component. Thereafter, the determined specification levels are integrated according to a predefined hierarchy to obtain the version identifier of the service component. The present invention also enables the identification of the service components. The service components are identified from one or more service components on the basis of one or more user requirements. Full Article
in Identifying differences between source codes of different versions of a software when each source code is organized using incorporated files By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An aspect of the present invention identifies differences between source codes (e.g. of different versions of a software), when each source code is organized using incorporated files. In one embodiment, in response to receiving identifiers of a first and second source codes (each source code being organized as a corresponding set of code files), listings of the instructions in the first and second source codes are constructed. Each listing is constructed, for example, by replacing each incorporate statement in the source code with instructions stored in a corresponding one of code files. The differences between the first and second source codes are then found by comparing the constructed listings of instructions. Full Article
in System for generating readable and meaningful descriptions of stream processing source code By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An information processing system, computer readable storage medium, and method for automatically generating human readable and meaningful documentation for one or more source code files. A processor of the information processing system receives one or more source code files containing source code artifacts (SCA) and infers semantics therefrom based on predefined rules. The processor, based on the inferred semantics, extracts documentation from another source code file. The extracted documentation and the inferred semantics are used to generate new human readable and meaningful documentation for the SCA, such new documentation being previously missing from the SCA. The generated new documentation is included with the SCA in one or more source code files. Full Article
in System and method for generating software unit tests simultaneously with API documentation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method may generate unit tests for source code concurrently with API documentation. The system may receive a source code file including several comments sections. Each comments section may include a description of a source code unit such as a class, method, member variable, etc. The description may also correspond to input and output parameters the source code unit. The system and method may parsing the source code file to determine a source code function type corresponding to the unit description and copy the unit description to a unit test stub corresponding to the function type. A developer or another module may then complete the unit test stub to transform each stub into a complete unit test corresponding to the source code unit. Additionally, the system and method may execute the unit test and generate a test result indication for each unit test. Full Article
in Fault localization using condition modeling and return value modeling By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Disclosed is a novel computer implemented system, on demand service, computer program product and a method that leverages combined concrete and symbolic execution and several fault-localization techniques to automatically detects failures and localizes faults in PHP Hypertext Preprocessor (“PHP”) Web applications. Full Article
in Information editing apparatus By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An information editing device is provided with an object storage portion 11 in which a character string object or image object is stored, a placement information storage portion 12 that stores placement area designation information that sets two or more placement areas that do not overlap each other for respectively placing the objects, and that correspond to the objects, an object output portion 13 that outputs, into placement areas that are set based on the placement area designation information, each of the objects corresponding to the respective placement areas, an input receiving portion 14 that receives a deletion instruction or a modification instruction for at least one of the objects output by the object output portion 13, and a placement modification portion 15 that, according to the deletion instruction or modification instruction, modifies the placement area of the object such that the placement area is placed without overlapping. Full Article
in Simultaneously targeting multiple homogeneous and heterogeneous runtime environments By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A single software project in an integrated development environment (IDE) may be built for multiple target environments in a single build episode. Multiple different output artifacts may be generated by the build process for each of the target environments. The output artifacts are then deployed to the target environments, which may be homogeneous or heterogeneous environments. The same source project may be used to generate multiple output artifacts for the same target environment. Full Article
in Language translation using preprocessor macros By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method is provided for providing consistent logical code across specific programming languages. The method incorporates preprocessor macros in a source computer program code to generate a program control flow. The preprocessor macros can be used to describe program control flow in the source programming language for execution in the source computer program code. The preprocessor macros can also be used to generate control flow objects representing the control flow, which converts the source computer program code into a general language representation. The general language representation when executed is used to output computer programming code in specific programming languages representing the same logical code as that of the source computer program code. Full Article
in System and method for efficient compilation and invocation of function type calls By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system and method for efficient compilation and invocation of function type calls in a virtual machine (VM), or other runtime environment, and particularly for use in a system that includes a Java Virtual Machine (JVM). In accordance with an embodiment, the system comprises a virtual machine for executing a software application; a memory space for the application byte code comprising callsites generated using a function type carrier; a bytecode to machine code compiler which performs MethodHandle invocation optimizations; a memory space for the compiled machine code; and a memory space for storing software objects as part of the software application. The system enables carrying the function type from the original MethodHandle to a callsite in the generated bytecode, including maintaining generics information for a function type acquired from a target function, and generating a callsite based on the generics information for the function object invocation. Full Article
in Optimization of loops and data flow sections in multi-core processor environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention relates to a method for compiling code for a multi-core processor, comprising: detecting and optimizing a loop, partitioning the loop into partitions executable and mappable on physical hardware with optimal instruction level parallelism, optimizing the loop iterations and/or loop counter for ideal mapping on hardware, chaining the loop partitions generating a list representing the execution sequence of the partitions. Full Article
in Program module applicability analyzer for software development and testing for multi-processor environments By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In one embodiment, a machine-implemented method programs a heterogeneous multi-processor computer system to run a plurality of program modules, wherein each program module is to be run on one of the processors The system includes a plurality of processors of two or more different processor types. According to the recited method, machine-implemented offline processing is performed using a plurality of SIET tools of a scheduling information extracting toolkit (SIET) and a plurality of SBT tools of a schedule building toolkit (SBT). A program module applicability analyzer (PMAA) determines whether a first processor of a first processor type is capable of running a first program module without compiling the first program module. Machine-implemented online processing is performed using realtime data to test the scheduling software and the selected schedule solution. Full Article
in Software modification methods to provide master-slave execution for multi-processing and/or distributed parallel processing By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In one embodiment of the invention, a method is disclosed for modifying a pre-existing application program for multi-processing and/or distributed parallel processing. The method includes searching an application program for a computational loop; analyzing the computational loop to determine independence of the computational transactions of the computational loop; and replacing the computational loop with master code and slave code to provide master-slave execution of the computational loop in response to analyzing the computational loop to determine independence of the computational transactions of the computational loop. Multiple instances of the modified application program are executed to provide multi-processing and/or distributed parallel processing. Full Article
in Optimization hints for a business process flow By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In one embodiment, an optimization hint may be included in a business process flow. An executable process may be generated from the business process flow where the optimization hint is included in the executable process. While executing the executable process, the runtime engine encounters an optimization hint and determines an optimization to perform. The optimization hint may be related to an aspect of a business process being orchestrated by the business process flow. The optimization is then performed while executing the executable process. For example, the runtime engine may start pre-processing the branch while the condition is being evaluated. If the condition evaluates such that the pre-processed branch should be executed, then the runtime engine has already started processing of that branch. The processing is thus optimized in that the runtime engine is not sitting idle while waiting for the condition to be evaluated. Full Article
in Systems and methods for information flow analysis By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Computer-implemented methods for analyzing computer programs written in semi-structured languages are disclosed. The method is based on unification of the two classic forms of program flow analysis, control flow and data flow analysis. As such, it is capable of substantially increased precision, which increases the effectiveness of applications such as automated parallelization and software testing. Certain implementations of the method are based on a process of converting source code to a decision graph and transforming that into one or more alpha graphs which support various applications in software development. The method is designed for a wide variety of digital processing platforms, including highly parallel machines. The method may also be adapted to the analysis of (semi-structured) flows in other contexts including water systems and electrical grids. Full Article
in Method for identifying problematic loops in an application and devices thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT This invention relates to a method, computer readable medium, and apparatus for identifying one or more problematic loops in an application. This invention provides a Directed Acyclic Graph or DAG representation of structure of one or more loops in the application by performing a static and a dynamic analysis of the application source code and depicts the loop information as LoopID, loop weight, total loop iteration, average loop iteration, total loop iteration time, average loop iteration time and embedded vector size. This aids a programmer to concentrate on problematic loops in the application and analyze them further for potential parallelism. Full Article
in Transferring files to a baseboard management controller (‘BMC’) in a computing system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Transferring files to a baseboard management controller (‘BMC’) in a computing system, including: receiving, by the BMC, a request to initiate an update of the computing system; identifying, by the BMC, an area in memory within the computing system for storing an update file; and transmitting, by the BMC, a request to register the BMC as a virtual memory device. Full Article
in Transferring files to a baseboard management controller (‘bmc’) in a computing system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Transferring files to a baseboard management controller (‘BMC’) in a computing system, including: receiving, by the BMC, a request to initiate an update of the computing system; identifying, by the BMC, an area in memory within the computing system for storing an update file; and transmitting, by the BMC, a request to register the BMC as a virtual memory device. Full Article
in Method and system for upgrading software By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments of the present disclosure provide a method and a system for upgrading software. The method includes: a client reports a software upgrade request to a server, wherein the upgrade request carries file information of the local software to be upgraded; the server determines the difference with the latest version software according to the file information of the software to be upgraded in the upgrade request, and generates upgrade instruction information according to the difference and sends it to the client; the client downloads and updates the relevant files and performs the relevant local upgrade operations according to the instructions in received upgrade instruction information. Technical solutions of the present disclosure can save bandwidth resources and reduce the workload for upgrading software. Full Article
in Loading remote binaries onto a write-protected device By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A binary library overload instruction is received at an embedded computing device that executes a write-protected firmware build. The binary library overload instruction specifies a write-protected binary library of the write-protected firmware build to be overloaded by execution of an alternative binary library instead of the write-protected binary library of the write-protected firmware build. The alternative binary library is configured within a random access memory (RAM) storage area to execute instead of the write-protected binary library as specified in the received binary library overload instruction. The write-protected firmware build is executed using the alternative binary library instead of the write-protected binary library specified in the binary library overload instruction. Full Article
in Predictive software streaming By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A software streaming platform may be implemented that predictively chooses units of a program to download based on the value of downloading the unit. In one example, a program is divided into blocks. The sequence in which blocks of the program historically have been requested is analyzed in order to determine, for a given history, what block is the next most likely to be requested. Blocks then may be combined into chunks, where each chunk represents a chain of blocks that have a high likelihood of occurring in a sequence. A table is then constructed indicating, for a given chunk, the chunks that are most likely to follow the given chunk. Based on the likelihood table and various other considerations, the value of downloading particular chunks is determined, and the chunk with the highest expected value is downloaded. Full Article
in Generic download and upload functionality in a client/server web application architecture By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The present invention relates generally to client-server architectures for allowing generic upload and download functionality between a web application at a server and a client. One exemplary method includes sending a download/upload request to a web application at the server, where the download/upload request specifies at least one file to download/upload; receiving a transmission from the server; parsing the transmission to identify a download/upload command and an associated download/upload manifest, where the download/upload manifest includes executable code that, when executed on the client, will perform the download/upload of the at least one file. Full Article
in Blueprint-driven environment template creation in a virtual infrastructure By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A system for blueprint-driven environment template creation in a virtual infrastructure comprises a processor and a memory. The processor is configured to receive a blueprint, receive an environment template configuration, and build an environment template using the blueprint and the environment template configuration. The environment template is for provisioning an environment. The environment is for deploying an application. The memory is coupled to the processor and is configured to provide the processor with instructions. Full Article
in Adjustment of threads for execution based on over-utilization of a domain in a multi-processor system by destroying parallizable group of threads in sub-domains By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments provide various techniques for dynamic adjustment of a number of threads for execution in any domain based on domain utilizations. In a multiprocessor system, the utilization for each domain is monitored. If a utilization of any of these domains changes, then the number of threads for each of the domains determined for execution may also be adjusted to adapt to the change. Full Article
in Methods and systems to identify and reproduce concurrency violations in multi-threaded programs using expressions By www.freepatentsonline.com Published On :: Tue, 15 Sep 2015 08:00:00 EDT Methods and systems to identify and reproduce concurrency bugs in multi-threaded programs are disclosed. An example method disclosed herein includes defining a data type. The data type includes a first predicate associated with a first thread of a multi-threaded program that is associated with a first condition, a second predicate that is associated with a second thread of the multi-threaded program, the second predicate being associated with a second condition, and an expression that defines a relationship between the first predicate and the second predicate. The relationship, when satisfied, causes the concurrency bug to be detected. A concurrency bug detector conforming to the data type is used to detect the concurrency bug in the multi-threaded program. Full Article
in Method and system for program building By www.freepatentsonline.com Published On :: Tue, 20 Oct 2015 08:00:00 EDT An improved method for program building uses predefined source files and predefined build scripts comprising a sequence of build commands; wherein each build command comprises an origin command line interpretable by an operating system and addressed to at least one compiling tool. Full Article
in Malodor counteracting compositions and method for their use By www.freepatentsonline.com Published On :: Tue, 08 Jul 2014 08:00:00 EDT The present invention relates to the field of perfumery and more particularly to the field of malodor counteractancy. In particular, it relates to a method for application of malodor counteracting (MOC) compositions capable of neutralizing in an efficient manner, through chemical reactions, malodors of a large variety of origins and which can be encountered in the air, on textiles, bathroom or kitchen surfaces, and the like. The composition may be applied as is or in the form of a perfuming composition or in a consumer product or article containing the compound or perfume composition. Full Article
in 2-hydroxy-6-methyl-heptane derivatives as perfuming ingredients By www.freepatentsonline.com Published On :: Tue, 19 Aug 2014 08:00:00 EDT The invention relates to a method of use of certain derivatives of formula (I) in the form of any one of its stereoisomers or a mixture thereof, and wherein R1 represents a hydrogen atom, a C1-4 alkyl or alkenyl group, or a (CHR)2OH group, each R being a hydrogen atom or a methyl group; R2 represents a hydrogen atom or a methyl, ethyl or n-propyl group; and R3 represents a hydrogen atom or a methyl group, as perfuming ingredients. The present invention concerns also certain compounds and compositions or articles containing such compounds. Full Article
in Perfuming ingredients of the floral and/or anis type By www.freepatentsonline.com Published On :: Tue, 26 Aug 2014 08:00:00 EDT The present invention concerns a compound of formula wherein R represents a hydrogen atom or a C1-2 alkyl or alkoxyl group; each R1, R2 or R3 represents a hydrogen atom or a methyl or ethyl group; and X represents a CHO, COOR4 or CN group, R4 being a methyl or ethyl group; and at least one of said R, R1 or R2 represents a group containing at least one carbon atom; and it use as perfuming ingredient, for instance to impart odor notes of the floral and/or anis type. Full Article
in Perfuming compositions and uses thereof By www.freepatentsonline.com Published On :: Tue, 02 Sep 2014 08:00:00 EDT A perfuming composition capable of prolonging the release of a perfuming component into the surrounding environment when applied on a body surface. The composition includes isocetyl alcohol as a fragrance evaporation modulator in the presence of high amounts of ethanol. Also, consumer articles containing such compositions and methods for the perfuming of a body surface and for increasing the long-lastingness of a perfuming component using these compositions. Full Article
in Use of alkamides for masking an unpleasant flavor By www.freepatentsonline.com Published On :: Tue, 09 Sep 2014 08:00:00 EDT An individual alkamide and/or a mixture having two or more different alkamides, is disclosed for changing, masking or reducing the unpleasant flavor impression of an unpleasant-tasting substance or mixture of substances. The alkamide can be trans-pellitorine; cis-pellitorine; 2Z,4Z- or 2Z,4E-decadienoic acid-N-isobutylamide; 2E,4E-decadienoic acid-N-([2S]-2-methylbutyl)amide; 2E,4E-decadienoic acid-N-([2R]-2-methylbutylamide); 2E,4Z-decadienoic acid-N-(2-methylbutyl)amide; achilleamide; sarmentine; 2E- or 3E-decenoic acid-N-isobutylamide; 3E-nonenoic acid-N-isobutylamide; spilanthol; homospilanthol; 2E,6Z,8E-decatrienoic acid-N-([2R]-2-methylbutyl)amide; 2E- or 2Z-decen-4-oic acid-N-isobutylamide; α-sanshool; α-hydroxysanshool; γ-hydroxysanshool; γ-hydroxysanshool; γ-hydroxyisosanshool; γ-dehydrosanshool; γ-sanshool; bungeanool; isobungeanool; dihydrobungeanool; or tetrahydrobungeanool, or combinations thereof. Full Article
in Absorbent articles including an odor control system By www.freepatentsonline.com Published On :: Tue, 16 Sep 2014 08:00:00 EDT Absorbent articles provided with an odor control system. The odor control system includes at least two classes of odor control materials, wherein one class acts on malodors or a malodorous substance in the absorbent article and a second class acts on nose receptors. The classes of odor control materials may be selected to provide a synergistic effect in terms of malodor reduction. Full Article
in Lipid composition having excellent shape retention property and product By www.freepatentsonline.com Published On :: Tue, 30 Sep 2014 08:00:00 EDT It is to provide a technique for preventing aggregation or caking of menthol at the time of its keeping. In addition, it is to provide a lipid composition, which can show excellent thermal stability even in the case of high temperature at the time of keeping menthol and at the time of blending in a product, does not cause mutual aggregation of powders, particles, flakes, pellets, sticks and the like of menthol, and can maintain its shape retention property. From 10 to 50% by mass of sterols are added to and mixed with from 50 to 90% by mass of menthol, and the resultant is melted with heating. Paraffins may be further added and mixed in an amount of 20% by mass or less, based on the lipid composition. Full Article
in Odour-reducing substances By www.freepatentsonline.com Published On :: Tue, 07 Oct 2014 08:00:00 EDT The use is described (i)(a) of a single alcohol of formula (1) or(i)(b) of a mixture comprising or consisting of two or more different alcohols of formula (1), wherein in each case one of the two radicals Ra or Rb represents hydrogen and in each case the other radical Ra or Rb represents an acyl radical having 2 to 6 C atoms,for reducing an odororas an auxiliary for reducing an odor. Full Article
in 3-methyl-6-cyclohexadecen-1-one and its use in perfume compositions By www.freepatentsonline.com Published On :: Tue, 14 Oct 2014 08:00:00 EDT The present invention is directed to a novel fragrance compound, 3-methyl-cyclohexadec-6-enone. Full Article
in 4-alkyl substituted pyridines as odiferous substances By www.freepatentsonline.com Published On :: Tue, 21 Oct 2014 08:00:00 EDT The present invention primarily concerns certain 4-alkyl pyridines of the following formula (I), wherein R is C8-C12 alkyl, odiferous substance mixtures and aromatic substance mixtures containing these 4-alkyl pyridines, the respective uses thereof as an odiferous or aromatic substance (mixture) and corresponding perfumed products. Full Article
in Long-lasting fragrance delivery system By www.freepatentsonline.com Published On :: Tue, 28 Oct 2014 08:00:00 EDT Long-lasting fragrance delivery systems and uses of the systems to provide fragrance-emitting articles with a long-lasting fragrance are disclosed herein. The long-lasting fragrance delivery systems include an emulsion of silicone-based polyurethane, fragrance, and a carrier. Full Article
in Esters as perfuming ingredients By www.freepatentsonline.com Published On :: Tue, 28 Oct 2014 08:00:00 EDT The present invention relates to some perfuming ingredients which are esters of formula (I) wherein R1 and R2 represent each a hydrogen atom or a methyl or ethyl group; and R3 represents a C5-C8 group of formula satured or unsatured linear, branched or cyclic group. Full Article
in Predicting odor pleasantness with an electronic nose By www.freepatentsonline.com Published On :: Tue, 04 Nov 2014 08:00:00 EST Apparatus and method for assessing odors, comprises an electronic nose, to be applied to an odor and to output a structure identifying the odor; a neural network which maps an extracted structure to a first location on a pre-learned axis of odor pleasantness; and an output for outputting an assessment of an applied odor based on said first location. The assessment may be a prediction of how pleasant a user will consider the odor. Full Article
in Perfuming ingredient of the galbanum family By www.freepatentsonline.com Published On :: Tue, 09 Dec 2014 08:00:00 EST The present invention relates to 1-(5-ethyl-5-methyl-1-cyclohexen-1-yl)-4-penten-1-one and its use as perfuming ingredient. Full Article
in Process for preparing macrocyclic ketones By www.freepatentsonline.com Published On :: Tue, 27 Jan 2015 08:00:00 EST The present invention relates to a process for preparing cyclic compounds having at least eight carbon atoms and at least one keto group, to the cyclic compounds obtained by this process and to the use thereof, in particular as fragrance or for providing a fragrance. Full Article
in Fragrance mixtures containing cyclopent-2-enyl ethyl acetate By www.freepatentsonline.com Published On :: Tue, 07 Apr 2015 08:00:00 EDT A fragrance mixture, preferably perfume oil, is described, comprising the constituents (a) (cyclopent-2-enyl ethyl acetate) and additionally (b) one or a plurality of fragrances, preferably with a floral odor note, from the group consisting of alcohols and aldehydes with a molecular weight of 210 g/mol or less and/or (c) one or a plurality of fragrances from the group consisting of ketones, ethers and esters with a molecular weight in the range from 190 g/mol through 250 g/mol. Full Article
in Aldehydes as perfuming ingredients By www.freepatentsonline.com Published On :: Tue, 07 Apr 2015 08:00:00 EDT An aldehyde of formula (I) in the form of any one of its stereoisomers or a mixture thereof, wherein each dotted line, independently from each other, represents a single or double bond; n is 0 or 1; R1 is a hydrogen atom or a methyl group; R2 is a hydrogen atom or a methyl or ethyl group; and R3, which can be present in any of positions 2 to 6 of the cyclic moiety, is a hydrogen atom or a methyl or ethyl group, or a CH2 group bridging positions 3 and 6. Also, the use of the aldehyde as perfuming ingredient to impart odor notes of the aldehyde, lily of the valley type. Full Article
in Odorant composition containing allyl ethers as odorant precursors By www.freepatentsonline.com Published On :: Tue, 14 Apr 2015 08:00:00 EDT The deliberate release of odorants or aroma substances is desirable in many fields of application, and in particular in the field of washing and cleaning agents. Said deliberate release is achieved by using an odorant composition that comprises an odorant precursor, which is an allyl ether of the formula (I), R1R2C═CR3—CR4R5—O—CHR6R7, in which the residues R1, R2, R3, R4, R5, R6 and R7 mutually independently denote H or a hydrocarbon residue that can be acyclic or cyclic, substituted or unsubstituted, branched or unbranched, as well as saturated or unsaturated. Thus, in particular odorants in the form of an alkene having an allylic hydrogen atom, such as α-pinene, can be released in a deliberate manner. Full Article
in Particles comprising a releasable dopant therein By www.freepatentsonline.com Published On :: Tue, 28 Apr 2015 08:00:00 EDT A process for making particles comprising a hydrophobic dopant for subsequent release therefrom is disclosed. The process comprises providing an emulsion comprising a hydrophilic phase and a hydrophobic phase dispersed in the hydrophilic phase, and reacting the precursor material to form the particles comprising the dopant therein. The hydrophobic phase comprises a precursor material and the dopant. Full Article
in Pyrimidine derivatives and their use in perfume compositions By www.freepatentsonline.com Published On :: Tue, 12 May 2015 08:00:00 EDT The present invention relates to novel pyrimidine derivatives and their use in perfume compositions. The novel pyrimidine derivatives of the present invention are represented by the following formula: wherein m and n are integers of 0 or 1, with the proviso that when m is 0, n is 1 and when m is 1, n is 0; andwherein the dashed circle represents either single or double bonds. Full Article