摘要:
Methods of predicting future connectivity of a portable electronic device is described along with systems and devices for implementing the methods. The method includes receiving an indication of a plurality of radio scenes detected at the portable electronic device at different reference times. Each of the plurality of radio scenes identifies transmitters and associated signal strength of signals received by the portable electronic device at the respective reference time. One or more connectivity predictions can be retrieved from a corpus of pairs of a composite signature vector and associated connectivity information. Each of the one or more connectivity predictions can be retrieved based on a similarity between the associated respective composite signature vector and a query composite signature vector. A future connectivity prediction of the portable electronic device can be provided based on the one or more retrieved connectivity predictions.
摘要:
A method performed on an electronic device for migrating tags across entities. The migration of the tags is performed following an analysis of one or more personal electronically encoded items associated with a previously created perspective or album associated with the previously created perspective, responsive to a user decision the creation of a new perspective, a new album associated with one of the previously created perspectives, or a new perspective and a new album associated with the new perspective, responsive to a user decision to treat the previously created perspective or album as an individual entity, and association of the previously created perspective or album with the new perspective or new album. The tags are respectively migrated from the new perspective or the new album to the associated previously created perspective or the previously created album and to associated ones of the one or more personal electronically encoded items.
摘要:
A method performed on an electronic device for clustering personal electronically encoded items. Such items are clustered in response to one or more perspective directives from a user that are received by the device by creating one or more perspectives each representative of a personal area of user interest identified by the user. Responsive to one or more first clustering directives from the user, the system clusters one or more of the user's personal electronically encoded items with one or more of the created one or more perspectives and develops a probability model for managing the user's personal electronically encoded items based on the one or more perspective directives and the one or more first clustering directives.
摘要:
A method performed on an electronic device for creating a proposal to a user. The proposal is created from an analysis of one or more personal electronically encoded items associated with one or more previously created perspectives unique to a user with each of the previously created perspectives representative of user interest and is based on similarities determined from the analysis. The proposal includes the creation of a new perspective, a new album, or a new perspective and a new album associated with the new perspective and the association therewith of one or more of the one or more analyzed personal electronically encoded items. Responsive to user acceptance of the proposal, the system creates the new perspective, the new album, or the new perspective and the new album associated with the new perspective and associates therewith one or more of the one or more analyzed personal electronically encoded items.
摘要:
A system and method for generating an m-dimensional signature vector with aliasing across synonyms in a computing device is provided. Data representable by a plurality of key-value pairs, each comprising a unique identifier and an associated non-zero value of n-dimensional data is received at the computing device. Elements of the m-dimensional aliased signature vector are generated using synonym information of keys from the plurality of key-value pairs.
摘要:
A system and method for generating an m-dimensional signature vector in a computing device is provided. The signature vector may be generated from a plurality of key-value pairs, each comprising a unique identifier and an associated non-zero value. Each element of the m-dimensional signature vector is calculated based on a summation of a plurality of terms. Each of the terms is calculated from a respective key-value pair by generating a seed based on the key of the respective key-value pair and an element identifier associated with the vector element being calculated; generating a pseudo-random number from the generated seed; and multiplying the pseudo-random number by the value of the respective key-value pair, wherein m
摘要:
A method includes receiving signals from force-sensing resistors, detecting a touch on a touch-sensitive display and determining a location of the touch, receiving, from force-sensing resistors, signals related to the touch, and calibrating the force-sensing resistors by adjusting the gain for a first force-sensing resistor, of the force-sensing resistors, based on at least the signals and the location of the touch.
摘要:
Systems, methods and programmed instructions are disclosed useful for transmitting signals representing data messages to and from a wireless handheld telephony device along a first call leg of a communication session previously established between the wireless handheld telephony device and at least one second telephony device, the communication session being controlled by a call control server.
摘要:
A method of synchronizing force data with touch data and a portable electronic device configured to perform the same are provided. In accordance with one embodiment, there is provided a method of synchronizing data acquisition in a portable electronic device, the method comprising: detecting touch events on a touch-sensitive display and storing touch data for each touch event with a time stamp for the touch event; detecting force events on the touch-sensitive display and storing force data for each force event with a time stamp for the force event; matching touch data for a particular touch event with force data for a force event corresponding to the particular touch event; and outputting the matched touch data and force data for input processing operations.
摘要:
In one aspect there is provided a computer-implemented method for encrypting a data element. The method includes generating a symmetric key and encrypting the data element using the symmetric key. The method also includes identifying one or more entities in a policy database that are authorized to access the data element, and retrieving a public key associated with each of the one or more entities. The method also includes, for each entity of the entities that are authorized to access the data element, encrypting the symmetric key using the public key associated with the entity to obtain an encrypted symmetric key, and appending the encrypted symmetric key to a file storing the encrypted data element.