摘要:
Methods, systems, and apparatus, including computer program products, for detecting writing systems and languages are disclosed. In one implementation, a method is provided. The method includes receiving text; detecting a first segment of the text, where a substantial amount of the first segment represents a first language; detecting a second segment of the text, where a substantial amount of the second segment represents a second language; identifying scores for each n-gram of size x included in the text; and detecting an edge that identifies a transition from the first language to the second language in the text based on variations of the scores.
摘要:
Methods, apparatus, computer program products and systems are provided for editing an image in a browser. One method includes receiving crop data at a server including information defining a crop size and location associated with a cropping operation to be applied to an image in accordance with user instructions received at a client device and transmitting from the server to the client device a modified image, the modified image having a uniform resource locator (URL) and being cropped in accordance with the crop data.
摘要:
Methods and apparatus for document based ambiguous character resolution. An application searches a document for words that do not contain ambiguous characters and adds them to a dictionary, then searches the document for words that do contain ambiguous characters. For each ambiguous word, a set of candidate solutions is created by resolving the ambiguous characters in all possible ways. The dictionary is searched for words matching members of the candidate solution set. When a single member is matched, the ambiguous characters are resolved accordingly. When no member or more than one member is matched, a user is prompted to resolve the ambiguous characters. Alternatively, when more than one member is matched, the ambiguous characters are resolved to obtain the largest word, the smallest word, the most words, or the fewest words.
摘要:
Methods, apparatus, computer program products and systems are provided for editing an image in a browser. One method includes receiving crop data at a server including information defining a crop size and location associated with a cropping operation to be applied to an image in accordance with user instructions received at a client device and transmitting from the server to the client device a modified image, the modified image having a uniform resource locator (URL) and being cropped in accordance with the crop data.
摘要:
Methods, tools, and systems are provided for editing an image in a browser. One method includes presenting an image in a browser, receiving a selection from a user to transform the image and transforming the image in the browser without interaction with the server.
摘要:
Methods, tools, and systems are provided for editing an image in a browser. One method includes presenting an image in a browser, receiving a selection from a user to transform the image and transforming the image in the browser without interaction with the server.
摘要:
Methods and apparatus for creating a license defining permissions to use electronic content. The methods include selecting a plurality of habitat types, each an aspect of a user environment to which a license can be bound, the selection based on input from a retail customer; determining one or more habitat values and relations for each selected type; and creating a license to use the electronic content, the license including an and-or logic expression of habitat terms, each term containing one of the selected types and its set of corresponding values and relations. Each habitat term may include a key for decrypting or unlocking the electronic content. In another aspect, the methods include receiving from a retail customer an input selecting habitat types and one or more habitat values for each selected type; and requesting from a server a license file to permit use of an electronic content, the license file including an and-or logic expression of habitat terms, each term containing one of the selected types and its corresponding values. In another aspect, the methods include receiving electronic content at a user computer; receiving a license file permitting use of the electronic content at the user computer, the license file including an and-or logic expression of habitat terms, each term containing a set of access permissions; extracting the set of permissions from an evaluation of the expression that renders the expression true; and allowing an end user to access the electronic content according to the extracted permissions.
摘要:
Methods and apparatus implementing a technique for retrieving requested data. In general, in one aspect, the technique includes receiving a request from an application to read a portion of an application file and consulting a filter-system file. The filter-system file contains processed data that corresponds to data in the application file and correspondence information indicating how the set of processed data corresponds to the data in the application file. The technique also includes deriving the requested portion of the application file from the processed data using the correspondence information, and delivering the requested portion of the application file to the application. In another aspect, the technique includes receiving data to be retrieved in response to a request from an application with reference to the application's view of the application file, processing the received data to generate processed data that corresponds to the received data, producing correspondence information indicating how the processed data corresponds to the received data is produced, and storing the processed data and the correspondence information in a filter-system file.
摘要:
A data flow of a processor is traced while accessing data stored in a memory and in a plurality of registers during operation of the processor. The tracing involves detecting an unpredictable accessing of data on the assumption that a predictable accessing can be reconstructed without any further input. The unpredictable accessing is identified by setting and clearing a trace bit associated with each of the registers according to identifying the accessing as direct memory-to-register, register-to-register, constant-to-register, and indirect memory. If a trace bit is set on a register storing data being used as a base address during the indirect memory acceding, data flow control information, such as the base address stored in the register being used during the indirect acceding is recorded in a queue, and from the queue the information can be stored in a trace buffer. During reconstruction of the operation, the trace buffer, and a copy of the data having an initial state can be examined to analyze the data flows during the real-time operation of the processor.
摘要:
A high-performance CPU of the RISC (reduced instruction set) type employs a standardized, fixed instruction size, and permits only simplified memory access data width and addressing modes. The instruction set is limited to register-to-register operations and register load/store operations. Byte manipulation instructions, included to permit use of previously-established data structures, include the facility for doing inregister byte extract, insert and masking, along with non-aligned load and store instructions. The provision of load/locked and store/conditional instructions permits the implementation of atomic byte writes.