摘要:
A method and system for geocasting data packets in a MANET. The MANET is combined with a long-range network such that a wireless terminal can decide whether to rebroadcast a geocast packet over the MANET, the long-range network, or not at all, depending on the wireless terminal's proximity to the geocast region, the location of the originating wireless terminal, or both. A wireless terminal close to or within the geocast region can rebroadcast on the MANET, whereas a wireless terminal far from the geocast region can rebroadcast on the long-range network.
摘要:
A system and method for circumventing schemes that use duplication detection to detect and block unsolicited e-mail (spam.) An address on a list is assigned to one of m sublists, where m is an integer that is greater than one. A set of m different messages are created. A different message from the set of m different messages is sent to the addresses on each sublist. In this way, spam countermeasures based upon duplicate detection schemes are foiled.
摘要:
In a method for providing musical accompaniment in response to playing of a processor-controlled musical instrument, a plurality of processes corresponding to different musical components of the accompaniment are executed in a pseudo-concurrent manner. Each component includes a plurality of musical events related according to a tempo at which the accompaniment is to be sounded. A portion of one of the processes is executed to perform at least one of the musical events, whereupon the process is suspended for a musically appropriate period of time substantially equal to the time before the next event of the process. While the first process is suspended, a portion of at least one other process is executed to perform another musical event. The other process is then suspended for another musically appropriate period of time. Execution of the processes is continued in this manner, one portion of a process at a time, such that the processes overlap to produce a coherent musical accompaniment.
摘要:
A method and associated apparatus for sounding music played by a performer according to a preselected style. Accompaniment notes having a harmonious tonal relationship to preselected melody and chord information are arranged into a plurality of groups. Appropriate accompaniment notes are selected from the groups in accordance with musically derived sequences and sounded for preselected periods of time so that the melody and chord chosen by the performer are sounded in accordance with a derived playing style.
摘要:
An electronic musical instrument by which a performer can provide a musical accompaniment in different musical harmonies by playing on a standard keyboard. The performer adjusts a tempo clock in order to determine the period of the rhythmic beat of the accompaniment. The instrument enables the performer to change to a different harmony at the end of a beat (e.g., by changing his hand position on the keyboard) without interrupting the continuity of the accompaniment and to hear much of the subsequent beat in the changed harmony even if his hand does not complete the change to the new harmony position until a portion of the subsequent beat has elapsed.
摘要:
Apparatus for controlling the duty cycle of a rectangular input signal so that the duty cycle normally remains constant irrespective of the frequency of the input signal, but can be adjusted with accuracy. A generator initiates a rectangular output signal in synchronism with the input signal. A comparator enables the generator to terminate the output signal after a time period related to the relative amplitudes of the output signal and another reference voltage. An adjustment transistor can adjust the amplitude of the reference voltage in order to control the overall duty cycle of the output signal.
摘要:
Techniques for translating the harmony expressed by the keyboard playing of a performer into a chord type and root. Playing key pattern representations are stored in a digital memory at locations having addresses defining the corresponding chord type. A playing key pattern signal identifying the pattern of the keys played by the performer is then generated. The playing key pattern signal is used to locate the corresponding stored playing key pattern representation. When a match occurs, the chord type and root are derived by a processor.
摘要:
In a geographic location based game (geogame), players, utilizing wireless devices, are required to continuously physically move within a defined boundary throughout the geogame. The wireless devices, with the aid of a location system, such as GPS, track the movements of the players. As players move, virtual tails are generated behind each player, and their locations are determined and geocast, via a wireless geographic broadcast protocol, to all players of the geogame. Each player observes all players movements and tail locations on his/her wireless device. If a player stops moving, the player is expelled from the game. If a player exits the confines of the boundary, the player is expelled from the game. If a player crosses a virtual tail, the player is expelled from the game. If two virtual tails cross, both players are expelled from the game. The last player remaining is the winner.
摘要:
A first iterative Grover Search process is performed by causing at least one quantum computer to perform a first series of Grover Searches according to a characteristic function for varying numbers of iterations to identify a first search target. The characteristic function is modified according to the identified first search target. A second iterative Grover Search process is performed by causing the at least one quantum computer to perform a second series of Grover Searches according to the modified characteristic function beginning with a number of iterations determined based on a number of iterations required for at least one prior iterative Grover Search process to identify a second search target.
摘要:
A server processes a service request message (SRM) including a credential string and information (I) specifying a requested service. The server determines (305) whether or not the received credential string is valid, by comparing the received credential string and a key in an authorization database (FIG. 1 Auth DB; Table 1) that is associated with the server. Records of the authorization database include the key, and zero or more parameters constituting respective restrictions on performing the requested service for the service requester associated with the credential string that matches the key. The server tests (305, and FIG. 4A) any parameter values against the restrictions to judge whether or not the restrictions are met, and causes (322) performance of the requested service if the credential string is determined to be valid and the restrictions are judged to be met. An alternative method involves receiving (352) a credential string, and determining (354) whether or not the received credential string is valid, by comparing the received credential string and an authorization database string from an authorization database (FIG. 1 Auth DB; Table 1) that is associated with the server and that includes a set of records including respective authorization database strings. If the received credential string is determined to be valid, the method further involves receiving (372) the SRM that includes information (I) specifying a requested service, and causing (374) performance of the requested service.