摘要:
A technique for facilitating identification of a matching search term in one or more images includes selecting at least a portion of an image and creating search enriched metadata for a document that includes the image. The search enriched metadata includes a text portion that provides one or more search terms that are associated with the selected portion of the image and a location portion that provides a location of the selected portion of the image.
摘要:
A computer implemented method, data processing system, and computer program product for efficiently using disk space when unarchiving files in the same file system. An archive file is read to identify a total number of data files in the archive file. The number of headers in the archive file is determined based on the total number of data files. A location in a first disk space of a largest data file in the archive file is determined from an offset in a header corresponding to the largest data file. The largest data file is then copied from the first disk space to a second disk space. The first disk space occupied by the largest data file is then released by truncating the archive file. The obtaining, copying, and releasing steps are repeated for each data file in the archive file until all of the data files are unarchived.
摘要:
Methods, systems, and media are disclosed for improved granularity of a response-request communication on a networked computer system. One example embodiment includes receiving the request-response communication by the networked computer system, and associating the request-response communication with a port, having a nodelay setting, from a set of ports on the networked computer system. Further, the example embodiment includes enabling, based upon the associating, the nodelay setting upon connection of the request-response communication with the port. Further still, the example embodiment includes sending, in accordance with the enabling, the request-response communication to a destination in communication with the networked computer system. In addition, further example embodiments include configuring the ports on the networked computer system with nodelay values indicating whether a particular port is assigned nodelay or no nodelay for a request portion or request portion of a request-response communication connecting to that particular port.
摘要:
Responsive to detecting a need for a mobile device to transfer out of a first network, requests are sent from the mobile device to a communication endpoint in mSCTP. The first request is to stop transmissions to a first address of said mobile device. The second request is to add an intermediary address of a mobility support service designated for receiving any communications already in transmission when the first request is sent. The communication link for the mobile device is then transitioned from the current address at the first network to a second address at a second network. The first network and the second network are non-intersecting networks. The mobile device then indicates to the mobility support service that the handover from the first network to the second network is complete. The mobility support service responds to the completion by sending a third request in mSCTP to the communication endpoint to continue communication with the mobile client at the second address.
摘要:
A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request.
摘要:
The present invention provides a method, system, and computer program product for splicing proxied web requests with callback for subsequent requests. The method comprises: initiating by a proxy a Transmission Control Protocol (TCP) splice between first and second socket connections in order to service a request; and returning control of the first and second socket connections to the proxy in response to a completion event associated with the TCP splice.
摘要:
The reassembly timer in a TCP/IP receiver is dynamically set to avoid data corruption on fast networks caused by IP identification wrap-around. A sender generates IP packets with a special option specifying a reassembly time for fragments based on the subnet of the destination or on the calculated round-trip time of the connection. A receiver sets the reassembly timer to the reassembly time specified in the option. A sender can generate IP packets with an alternative option setting a time stamp for the generated packet. A receiver calculates a traversal time based on the difference between the arrival time of the fragment and this time stamp, and sets the reassembly timer based on this traversal time.
摘要:
A method, system, and computer program product for optimizing a message size for communication in a communication network are disclosed. The method comprises identifying a connection to a target, sending to a path maximum transmission unit value server (which is not the target) a request for a path maximum transmission unit value for the connection to the target, and, in response to receiving the path maximum transmission unit value for the connection to the target from the server, optimizing a communication by sending to the target a packet having a size in accordance with the value.
摘要:
Data communications through a split connection proxy in a data communications protocol, including receiving in a proxy from a client, asynchronously with respect to any other messages between the client and the proxy, one or more client messages including client message data items including a connection request for a connection between the client and the proxy, destination connection data identifying a destination server, and a message from the client to the destination server; and sending from the proxy to the server, asynchronously with respect to any messages between the client and the proxy and asynchronously with respect to any other messages between the proxy and the server, one or more proxy messages including proxy message data items including a connection request for a connection between the proxy and the destination server and the message from the client to the destination server.
摘要:
An automated, embedded & intelligent E-mail Attachment Document manager automatically tracks email and their associated attachments and assists users in locating an email message (email-chain/thread) that is the original source from where the email attachment document. The present invention can perform the tracking action using the given name of the saved attachment file.