Abstract:
Embedded block entropy coding with optimized truncation is useful for image compression schemes in conjunction, for example, with a Wavelet transform, so as to form a bit-stream which can be stored or transmitted with increased efficiency. In the arithmetic coding phase, several opportunities exist for minimizing complexity and improving compression and computational performance as compared to existing systems. One method involves bypassing the arithmetic coding procedure for certain lower significance bit-planes of each code-block. Then, the raw binary digits from these bit-planes can be interleaved into the arithmetically coded bit-stream. As a result, both the average number of arithmetically coded symbols and the maximum number of coding passes per code-block can be significantly reduced.
Abstract:
A memory apparatus, which may be of resistive cross point memory (RXPtM) cell type (one example of which is a magnetic random access memory (MRAM)) includes multiple serial data paths which are merged and may exchange data as needed by the data input/output (I/O) circuits connected to a serial I/O port. A plurality of scan path registers are connected by an array of static random access memory (SRAM) memory units of plural memory cells. The scan paths and SRAM memory units perform a parallel transfer of data from scan path registers to and from temporary registers of the SRAM memory units in order to effect parallel data exchange between the multiple scan path registers.
Abstract:
A system for selling personal information through a trusted third party. An owner of the personal information provides policy governing the sale of the owner's personal information and authorizes information sources to provide the personal information to the trusted third party. The trusted third party provides for validation of the personal information and sells it to requesters in accordance with the policy, and provides payment or credit to the owner as compensation for the sale.
Abstract:
A network-based game system is provided that includes a game processing subsystem for providing a virtual game environment in which player-controlled virtual game entities can move. Players communicate with the game processing subsystem via connectivity subsystems, such as wireless and wired LANs, that each permit access by multiple players. The processing subsystem associates each connectivity subsystem with a respective particular location in the game environment. Each such particular location has at least one special game-play significance for a virtual game entity associated with a player communicating with the processing subsystem via the corresponding connectivity subsystem; for example, the game entity may only be allowed to enter and leave the game at this location.
Abstract:
A user is presented with a picture image either in hard-copy or electronic form. Particular picture features in the image each have associated information that is presented to the user upon the user requesting such information by at least selecting the picture feature using a feature-selection arrangement. Should the user select a picture feature for which no information is provided, an identifier of the feature, for example its image coordinates, are output to inform a person involved in providing the picture and related information. Preferably, to request information about a picture feature, the user as well as selecting the feature, also inputs a query by voice; in this case, where the selected feature has no associated information, the user query is also provided back to the person involved in providing the picture and related information.
Abstract:
Wireless LANs can be used to provide connectivity over limited areas such as public spaces and publicly-accessible premises, both commercial and non-commercial. A variety of digital objects can be made available via a wireless LAN which can enhance the experience of persons in its coverage zone. Indeed, the availability of such digital objects (such as unusual graphic images and readings by authors of their works) can be a strong incentive for people to frequent the coverage zone. This obviously has application to premises wishing to attract people. However, the incentive to visit provided by the digital objects is degraded rapidly if it becomes easy to download copies of the digital objects into a mobile device and take them away for future enjoyment. In order to limit such activity, functionality required by mobile devices to make use of the digital objects, is so arranged that in order to operate, it requires the continual reception of enabling signals from a wireless LAN of a restricted group of wireless LANs with which the digital object is associated.
Abstract:
A method and apparatus for searching a parent code sequence for a target code sequence. In various embodiments, a first circuit arrangement selects and stores subsets of codes of the parent code sequence. A matching circuit determines in parallel matches between the subset of codes and the target code sequence, and provides a programmed binary value for each match. The binary values provided by the matching circuit are summed in a pipelined fashion.
Abstract:
Method and system for migrating a logical volumes in a distributed file system having multiple partitions servers. Each partition server owns one or more volumes, and each volume including a subset of logically related objects of the file system. In response to a migration request that requests migration of a selected logical volume from a source partition server to the target partition server, an ownership map is updated to indicate the selected logical volume is owned by the target partition server. At the source partition server, forwarding information is stored to reference the target partition server. When the source partition server receives a request for access to the object, the forwarding information is transmitted to the requester.
Abstract:
Method and apparatus for assigning policies which are rules that govern the use of or access to network services. Each rule defines conditions that when evaluated true trigger actions to allow or deny the service. Techniques are disclosed which provide for explicit, flexible, and centralized assignment of policy to targets which are specified network services. These techniques include explicitly associating a policy with a network resource or process, grouping policy related processes, grouping related targets, associating groups of targets with groups of policies, mapping a user name contained in a policy to an associated network address such as an Internet Protocol (IP) address, and providing dynamically mapped policy identified user and host names with associated network addresses, such as IP addresses, to client processes.
Abstract:
An audio user interface is provided in which items are represented in an audio field by corresponding synthesized sound sources from where sounds related to the items appear to emanate. To facilitate user navigation in the audio field, sound sources are arranged to indicate their location in the audio field relative to a preset reference (such as the user's current facing direction or straight-ahead facing direction) by a corresponding audio indication such as an approximate relative bearingnullfor example nullupper leftnull. The audio indication given by a sound source is arranged to change dynamically as the sound source and/or the present reference changes position.