Abstract:
A computer-implemented method for providing security in a relational database hosted by a first server, and configured to interact with a second server, includes associating a first ownership vector with an object in the relational database, detecting a change to the object, and associating a second ownership vector with the object in response to detecting the change to the object.
Abstract:
A computer-implemented method for selecting an item from a list in a user interface. The method receives a first input from a user. The first input comprises an interaction with an icon displayed on a computer screen. The interaction involves either a first action from the user or a second action from the user different from the first action. Next, if the first input involves the first action, the method displays on the computer screen a first menu comprising a subset of the items of the list. Otherwise, if the input involves the second action, the method displays on the computer screen a second menu comprising the whole list of items. Lastly, the method selects an item of the displayed menu upon receiving a second input from the user.
Abstract:
A method for projecting onto a real workpiece an image calculated on the basis of a digital mockup recorded on a digital information server associated with the real workpiece, for the viewing of the workpiece under augmented reality, comprises the following steps: capture by a camera of the image of the real workpiece, real-time alignment of the reference frame associated with the digital mockup with the reference frame of the video capture system and the reference frame of the real workpiece, comprising a step of reprocessing of the image calculated as a function of the topology of the digital mockup and as a function of the orientation of the projection means with respect to the real workpiece.
Abstract:
The databases and methods disclosed herein reduce costly dictionary access (writes and reads) by storing data directly in an index (e.g., storing literal values or taking advantage of Universally Unique Identifiers (UUIDs)), thereby saving time and memory. One example embodiment is a database that includes a dictionary and an index. The dictionary stores associations between keys and data. Each entry in the index includes a plurality of values corresponding to data. A value of the index includes either (i) a direct representation of corresponding data for certain data types, or (ii) a hash of the corresponding data for other data types. The hash is used in the dictionary as a key associated with the corresponding data.
Abstract:
In one embodiment, a computer method of verifying an operator is human includes automatically selecting a pattern and dividing the pattern into a plurality of textures. The method further includes projecting each texture onto a different respective displayed element in a 3D experience. The method additionally includes randomizing a position and/or an orientation of at least one displayed element of the different respective display elements in the 3D experience. The method also includes receiving operator manipulations of the randomized elements to solve for the pattern and make the pattern appear/reappear. The method further includes granting access to the operator if the pattern is made to appear/reappear. Access is granted upon determining that the operator has made the pattern is appear/reappear, and access is denied if the operator fails to make the pattern appear/reappear.
Abstract:
The invention is directed to a computer-implemented method for designing a three-dimensional modeled assembly of objects in a three-dimensional scene, wherein the method comprises the steps of: positioning and orienting a predefined set of trihedrals in the three-dimensional scene, each trihedral defining a position and an orientation; providing a set of objects; attaching each object of the set of objects to one corresponding trihedral of the predefined set of trihedrals; and positioning and orienting each object according to the position and the orientation of the corresponding trihedral of the predefined set of trihedrals.
Abstract:
A computer-implemented method is provided for use in location correction of virtual objects in a virtual model of a real-world scene. Location of an object consists of both position and orientation of the virtual object. The method includes generating the virtual model, including a virtual object, and acquiring at least one digital image of a real-world object within the real-world scene, wherein the real-world object corresponds to the virtual object. The method also includes calculating an image-based positional difference between at least one predefined point on the virtual object and at least one corresponding point on the real-world object, adjusting the position and/or the orientation of the virtual object based on this image positional difference, and adjusting the virtual model with respect to the corrected location of the virtual object.
Abstract:
A computer-implemented method includes creating a video record of user interactions with a computer program, and displaying a control area configured to receive a rewind user command and an advance user command. In response to receiving the rewind user command, the computer program reverts to a first state that is prior to at least one of the recorded user interactions. In response to receiving the advance user command, the computer program progresses to a second state of that is between the first state and a last-known state of the computer program.
Abstract:
A method is provided for degrading 3D information such as a 3D image file from its original form so that that the subject matter of the 3D image is altered in a way which prevents one from reverse engineering or manufacturing the subject matter of the 3D image while the degraded image is still identifiable or recognizable as that of the original 3D image. The degrading method selectively alters dimensions or relationships between portions or parts of the 3D image from their original form while maintaining the integrity and recognizablility of the image as that of which was in the original 3D image. The present method can be applied to both original CAD files as well as reduced or lightweight files produced from an original CAD file.
Abstract:
Embodiments generate computer based models, e.g., computer aided design (CAD) models, of materials. One such embodiment selects at least one section of a model representing a unit of a material. In turn, at least one physical or chemical property of the model is estimated based upon a proposed modification to the selected at least one section of the model and a proposed modification to a remainder of the model representing the unit of material. This selecting and estimating is iterated until the estimated at least one physical or chemical property conforms to a user specification of the at least one physical or chemical property. In this way, such an embodiment creates a model of a subject material that conforms to user specified physical and chemical properties.