Abstract:
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions.
Abstract:
A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering.
Abstract:
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.
Abstract:
A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable —radar or radio coverage—area. The system uses a database of —radar or radio coverage—areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a —radar or radio coverage—area in the database meeting the —radar or radio coverage—requirements for the aircraft.
Abstract:
A multi-instance, multi-user animation platform includes a plurality of modeled parallel dimensions in a computer memory. Each of the parallel dimensions may be an independent model of a physical, three-dimensional space having corresponding features such that the parallel dimensions are recognizable as counterparts to each other. Avatars are located within corresponding ones of the parallel dimensions so as to prevent over-population of any one of the parallel dimensions by avatars. Avatars are animated within different ones of the parallel dimensions using input from respective users to provide virtual-reality data. The virtual-reality data may be configured to cause remote clients to output an animated display of a corresponding one of the parallel dimensions and avatars therein.
Abstract:
A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering.
Abstract:
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums.
Abstract:
An electronic communication system provides text or voice messages to remote receiving devices, such as cell phones or PDA's. The remote receiving devices are equipped with velocity sensors, or position sensors from which velocity may be inferred. The remote receiving devices periodically report a velocity or current position to an alert signal control node of the communication system. The alert signal control node determines a most recent-determinable velocity for each receiving device before transmitting a message alert signal. If the velocity exceeds a predetermined threshold, the alert signal may be delayed until the velocity drops below the threshold. The system may be operated as a safety measure to prevent reception of distracting alert signals while driving, thereby silencing messaging devices at appropriate times.
Abstract:
A game engine is configured to accept human intelligence tasks as in-game content and present the in-game content to the game player. A method performed by the game engine enables performance of human intelligence tasks, such as visual discrimination, in a video game context. The game engine may receive a definition of human intelligence tasks from one or more remote sources. The game engine may present the human intelligence tasks to multiple video game participants as in-game content. The game engine defines and enables game play rules for the in-game content. The game play rules set parameters for the multiple video game participants to perform the human intelligence tasks to achieve desired results. The game engine may award each of the multiple video game participants an improved game score upon successful performance of the human intelligence tasks in accordance with the game play rules. The game engine may measure success by consistency in responses between different participants or trials.
Abstract:
A method for operating a host layer of a distributed computing system on a wide area network includes attaching an autonomous agent to a client-requested carrier, such as web content. The method includes the steps of receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client via the wide area network. The agent has program instructions configured to execute autonomously on the client node to perform a processing function. The processing function is configured to operate on raw data to produce process data, according to instructions determined by a solution algorithm of the distributed computing system. The method further includes sending the raw data to the client node and receiving the process data from the client node as it is processed by the agent. The host layer may comprise a web server hosting a web site containing consumer-oriented web pages, and the carrier may comprise an HTML page containing user content. The agent may comprise a web page-enabled application embedded in the HTML page, such as a Java™ applet.