摘要:
A method, system and program storage device are provided for allowing chat room participants to communicate with other participants privately without requiring general chat “friends” or “buddies” pre-authorization. All chatting dialog including private and public chats are consolidated into a unified group chat dialog window that requires no special handling by a user to see public and private chats. The private and public chat messages are displayed chronologically in a single chat message log within the chat group window.
摘要:
A web page is adaptively transcribed and rendered at a client endpoint. A request for a web page is received, and full page content of the web page is obtained from a remote web server, including assembly of previously cached parts of the web page. The web page is transcribed according to prescribed rules. The prescribed rules are selected according to user preferences, the environmental factors and information learned from prior handling of the web page. The transcribed web page is rendered.
摘要:
Disclosed herein are methods and apparatus that improve the perceived responsiveness of a multi-server web site or web environment to web requests issued by web browsers. In one aspect, the methods and apparatus operate by determining a likely sequence of web pages to be accessed by users. The methods and apparatus then incorporate information identifying web pages and web page content likely to be requested later in the sequence in web pages responsive to web page requests received earlier in the sequence. In one such method, the URL of a second web is incorporated in a first web page that is expected to be requested before the second web page. A web client receiving the first web page will then issue a DNS request for address information corresponding to the URL of the second web page even if no request has been received for the second web page. Thus, the probability of a DNS system cache miss occurring when a web request for the second web page is actually received by the web client is significantly reduced.
摘要:
A method for validating that a networked system of modules conforms to at least one interoperability rule pertinent to interoperability of at least two of the modules includes the steps of obtaining the at least one interoperability rule, the at least one rule being encoded in computer-operable format; obtaining configuration information pertinent to at least one of the modules, the configuration information being encoded in computer-operable format; and comparing the at least one interoperability rule to the configuration information to validate whether the system conforms to the at least one interoperability rule
摘要:
A method and system for multi-modal fusion of physical and virtual information channels is provided. The method and system include a virtual information channel and physical information channel. The method and system also provide for tracking virtual events and physical events corresponding to the virtual event and altering delivery of virtual space content via the virtual information channel upon determining the tracked at least one virtual event meets predetermined criteria.
摘要:
One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).
摘要:
Methods, systems and program storage devices receive actions taken by a user during an interaction with a web resource, wherein the actions cause the web resource to assume a particular state; and save information describing the actions. Other methods, systems and program storage devices retrieve the information; and perform at least one action using the information, causing a graphical user interface to display the web resource in a state in accordance with the action. The particular state can include without limitation a plurality of states assumed sequentially when the web resource is displayed, and the information can describe a sequential series of actions that cause the web resource to assume the sequential series of states. In such variants further operations include receiving a series of commands to step through the sequential states of the web resource; and using the information to display the sequential states. The series of commands can be issued automatically or under user control.
摘要:
Methods, apparatus and computer program products implement session-specific URIs for allocating network resources by receiving a request from a user for at least one network resource; assigning a session-specific URI to the at least one network resource for use in identifying the at least one network resource and controlling access to the at least one network resource; updating a network directory service with the session-specific URI; and communicating the session-specific URI to the user. The user communicates the session-specific URI to other participants in the session during which the at least one network resource will be used. After a pre-determined time, the session ends and the at least one network resource is de-allocated by, for example, changing the URI of the at least one network resource. Frequent changes of URIs hinder efforts by unauthorized individuals to gain access to network resources.
摘要:
One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).
摘要:
One embodiment of the present method and apparatus for re-establishing anonymous data transfers between a first endpoint and a second endpoint in a network includes receiving, from a first node, the identity of a second node connected to the first node, where at least the first node is a neighbor node. A third node (a neighbor node) is then selected, and instructed to connect to the second node in order to establish a link for the path. In this manner, the first endpoint and the second endpoint remain unknown at least to each other (e.g., where “unknown” means that neither endpoint knows any identifying information, such as network address, about the other endpoint), and likely to all other nodes in the path as well. In another embodiment, a failure is detected at a neighbor node, where the neighbor node is part of an original path between the first endpoint and the second endpoint. The neighbor node's repair server is contacted for a repair node associated with the neighbor node, and a connection to the repair node is made such that the path is established in a manner that maintains anonymity of the first endpoint and the second endpoint relative to each other.