Abstract:
A system and method for creating a campaign for a product in an electronic commerce environment. The type of distribution for the product is determined. An identification and a priority of the product is specified to create the campaign for the product. Coupons may be replicated after creating a base coupon, and the product may be tagged.
Abstract:
A method for producing a DIMM having a reduced memory capacity. The method includes determining an amount by which a memory capacity of a DIMM can be reduced, and reducing the memory capacity of the DIMM in accordance with the determined amount to produce a DIMM having a reduced memory capacity which is available for use and a dormant memory capacity which is not available for use. A DIMM produced in accordance with the method. A computer assembly having a computer, and a DIMM disposed in the computer and having reduced memory capacity
Abstract:
A method of determining a value for a function which is particularly useful for mapping values from one colour space to another comprises a series of steps, as follows. The method is applicable to n-dimensional spaces, but is particularly described for three dimensions. The first step is to establish a three dimensional lattice, the function having values at the lattice points. The next step is to record values of the function for a subset of the lattice points, the lattice points of the subset being known value lattice points. These known value lattice points form a sparse lattice (preferably the sparse lattice points are regularly spaced along orthogonal axes). A value of the function for a given lattice point is established by returning a weighted average of the values of one or more of four known value lattice points defining a tetrahedron 42 touching or enclosing the given lattice point. Each of the lattice points which are intermediate points in a coarse lattice cube 41 is either within, or on the boundary of, at least one tetrahedron 42 whose vertices are four of the vertices of the cube.
Abstract:
The system comprises a terminal apparatus that views or plays the content acquired from a data provider which embeds an identifier to the content. The system comprises a database for storing information tickets for each of the identifiers. The terminal apparatus captures the identifier embedded in the content. The system further comprises a service portal that, in response to the identifier which has been captured by and transmitted from the terminal apparatus over the Internet, searches the database and provides a service for connecting the terminal apparatus to a web page associated with the identifier.
Abstract:
An audio signal is decomposed into lower and upper sub-band and at least the noise component of the upper sub-band is encoded. At the decoder the audio signal is synthesized by a decoding means which utilizes a synthesized noise excitation signal and a filter to reproduce the noise component in the upper sub-band.
Abstract:
A method and apparatus for unique and secure identification of a computing service node. The service node is coupled to an administrative node and to a certificate authority node via a computer network. The administrative and certificate authority nodes have respective public and private keys. A shared key is established between the certificate authority node and the administrative node, and while booting the service node, the service node generates its public key and private key. The administrative node double encrypts a selected value, first using the shared key and second using the public key of the service node, whereby a double encrypted value is generated. The double encrypted value is decrypted at the service node, whereby a single encrypted value is generated. Whether the certificate authority node is able to successfully decrypt the single encrypted value using the shared key determines whether the administrative node is authentic.
Abstract:
Method and apparatus for handling call stack unwinding when execution of an instrumented program is stopped in a first function of the instrumented program. When unwinding is initiated and a call to a second function of unwind software is made, the call to the second function is intercepted. The second function returns a reference to unwind information associated with the first function of the instrumented program. The unwind information includes references to locations of selected instructions in the function. If the first function of the instrumented program is instrumented with instrumentation code, then updated unwind information is created. The updated unwind information includes updated references to the locations of the selected instructions in the first function as offset by the instrumentation code. A reference to the updated unwind information is returned.
Abstract:
A method for authorising discounted printing, comprising identifying content which has been captured by a consumer in authorised defined circumstances, and authorising discounted consumer printing of the identified content or of further content linked to the identified content
Abstract:
A speech input stream is fed to a first speech recogniser. A confidence measure is formed for each recognition hypothesis produced in output by the first speech recogniser and this confidence measure is compared against an acceptability threshold. Where the confidence measure of a recognition hypothesis is below the threshold, the corresponding portion of the speech input is passed to a second speech recogniser and the recognition hypothesis produced is used instead of, or as a supplement to, that output by the first speech recogniser. In a preferred embodiment, the first speech recogniser is a recogniser trained to a particular user whilst the second recogniser is one associated with a particular speech application currently being accessed by the user.
Abstract:
A client computer system is suitable for connection to a data processing network having a controlling system. The controlling system is operable to issue a wake-up request to the client computer system. The wake-up request is issued by means of a wireless connection between the controlling system and the client computer system. The client computer system, on receipt of the wake-up request, powers itself on so as to allow normal operation of the client computer system.