摘要:
In a method of loading checked luggage on unit load devices corresponding to an aircraft having a passenger compartment, each piece of checked luggage is associated with a unique identifier. Each piece of checked luggage is weighed and its weight is associated with its corresponding unique identifier. A best possible luggage placement is calculated considering a distribution of passenger weight, thereby allowing the passengers to sit at their preferred location rather than by pre-allocation. A desired placement of the checked luggage is calculated based on the weight of each piece of checked luggage, the acceptable distribution of weight in the passenger compartment and overall fuel state over mission profile. Loading personnel are allowed to place luggage in the unit load devices and are instructed to stop loading the selected ones of the unit load devices when a deciding point is dynamically achieved by a recalculation of center of gravity shift each time a bag is loaded onto one of the unit load devices so as to achieve the best possible placement of check luggage. The recalculation of the center of gravity shift is done based on placement of the unit load devices in the aircraft luggage compartments.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for using an intermediate database management layer to manage communications between an application layer and a database layer. The database management layer can receive an initial communication from the application layer and transmit a subsequent communication to a particular database based upon a rule. The rules can specify the particular database based upon the initial communication and an availability status of the database. The rules specify criteria by which the initial communication is identified and logic specifying the particular database to receive the subsequent communication based upon the identification of the initial communication. The rules can specify a plurality of potential particular databases to receive the subsequent communication and an order in which to select one of the databases to receive the subsequent communication based upon the determined availability status of each of the potential particular databases.
摘要:
The present disclosure involves ensuring that items sold by a merchant appear in certain network pages. A network page is automatically accessed in a computing device. The network page is generated by a referral network site that displays at least one offering of an item by at least one competitor merchant. A unique identifier associated with the item is identified from the network page in the computing device. The unique identifier is stored in association with the item in a data store accessible to the computing device. The item and the unique identifier are included in a feed sent from the computing device of a merchant to the referral network site. The feed includes a listing of the item and a plurality of other items, wherein the item and the other items are offered for sale by the merchant.
摘要:
Depth values in a scene are measured by projecting sets of patterns on the scene, wherein each set of patterns is structured with different spatial frequency using different encoding functions. Sets of images of the scene is acquired, wherein there is one image for each pattern in each set. Depth values are determining for each pixel at corresponding locations in the sets of images. The depth values of each pixel are analyzed, and the depth value is returned if the depth values at the corresponding locations are similar. Otherwise, the depth value is marked as having an error.
摘要:
This disclosure relates to determining whether to include items in a feed to a referral network site. A catalog is maintained of a plurality of items sold through an electronic commerce network site, wherein at least a portion of a plurality of sales of the items originate by virtue of a referral from a referral network site. A quantity of commercial data associated with the items is stored in a data store, and a predictive model is trained with the commercial data associated with the items. Each of the items is applied to the predictive model to determine whether such items are to be included in a feed to the referral network site. The feed that includes a subset of the items is sent to the referral network site.
摘要:
Gap values for a collection of images are obtained; each gap value is a temporal difference between temporally adjacent images. A first grouping of the collection of images into one or more groups is determined based at least in part on the gap values. The first grouping is performed such that each group is temporally contiguous. The first grouping is presented and input from a user is received in response to the presented first grouping. A second grouping of the collection of images into two or more groups is determined based at least in part on the user input. The second grouping is presented.
摘要:
An automated task centered collaboration technique is described that significantly lowers the technological entry barrier for the development and deployment of a broad class of collaborative applications, which are termed Task Centered Collaboration (TCC) applications. TCC applications facilitate the processing of a large number of work items, or tasks, by people working independently or in small, synchronously collaborating groups. The technique also provides a mechanism for the study of computer mediated communication and human-computer interactions for this class of applications. The technique creates an abstraction applicable to the broad class of TCC applications, which enables the factoring out of significant portions of the application into a common infrastructure. It provides a programming model that enables a developer to focus on the User Interface and logic associated with operations on a single task, without being exposed to issues such as security, authentication, binding users to activities, synchronization, concurrency and persisting data.
摘要:
Architecture that facilitates the creation of a customized document with embedded or linked code that can be run on a client or a server without invoking the host application. A programming model makes it transparent to the code whether it is running on the client or the server. The programming model automatically “scales” to provide more features while running the document on the client and fewer features when running on the server. A transparent data island is automatically generated for the customized document that is embedded in the document and can be edited while requiring only a subset of all components of the host application to be running. A data binding mechanism is provided wherein changes that are made to the transparent data island while the host is not running can be moved back into the host document content when the document is reopened by the full host application.
摘要:
In various embodiments, network-traffic records overlapping multiple binning windows are prorated such that partial records are stored in each binning window of overlap. In addition, the full, non-prorated record is stored in at least one of the binning windows.
摘要:
In certificate chain validation, a parent certificate is used to validate a child certificate. The child certificate can indicate which parent certificate can be used to validate it. In some situations, a child certificate may not contain a certificate authority identifier that can be used to identify the parent certificate. Instead, the child certificate can contain a hash value of a modulus of the parent public key that can be used to identify the parent certificate. The hash value of the modulus of the parent public key can be associated with the parent public key. As such, the parent public key used in certificate chain validation of the child certificate can be identified using the hash value of the modulus of the parent public key.