摘要:
A method, system and computer program provide a mechanism for smoothing the transition back from a virtual (computer generated) scene to a related video stream. An event such as a user input or timeout is received triggering a return to display of the video stream from a virtual scene related to content of the video stream. A number of time points and/or camera angles are either presented to the user or are automatically searched for the best match. The list may be presented in order according to an automatically detected matching criteria. The virtual scene may a scene constructed locally within a computer or digital video recorder (DVR) and the matching performed locally based on angle and time information provided from a content provider such as a server, or the virtual scene generation and matching may be performed at a remote location such as the content server.
摘要:
A system, method, and program product controls an operation of a vehicle based on the presence of one or more foreign objects within one or more monitored zones about the vehicle. One or more transceivers receive information about the one or more foreign objects. Based on the received information and the one or more corresponding zones, one or more controllers identify a response, which may include notifying the user about the foreign object and/or generating a signal that inhibits the ignition from turning on. The system, method, and program product also control an operation of a vehicle based on the absence of an object of the vehicle. Likewise, the one or more controllers identify a response, which may include notifying the user about the missing object and/or generating a signal that inhibits the ignition from turning on.
摘要:
Web application users are able to specify power constraints for remote web servers. These may be based on individual performance needs and energy-conservation desires. They enable the user to exercise control over the amount of energy that the web server expends in serving the needs of the user. The invention may employ such features as vertical scaling using power capacity on demand (CUoD) type functionality. The method includes providing a user-interactive interface to enable the user to indicate a preference for power restrictions with respect to its web requests. The user then instructs the web site provider to reduce power consumption in response to the user's request. The user specifies a reduction in overall power consumption for the user's needs, such as instructing the web service provider to use an energy-conserving server to handle the user's web requests, or specifying a acceptable delay or fulfilling the user's web requests.
摘要:
Details relating to the operation of a vehicle under adverse conditions are recorded and collected. This data is particularly useful to forestall catastrophic failures, and to provide valuable information for potential buyers of used vehicles. Among the operating conditions that are considered are high levels of air contaminants, operation in extreme hot or cold temperatures, hauling heavy loads, as well as hard braking, turning and acceleration. In addition to the detection and recording of data, prorated maintenance schedules are recalculated and adjusted to accommodate for the operation of the vehicle under these adverse or less than ideal conditions. Typically, the data is stored in the on-board computers present in most vehicles. Periodic off loading of the data to the dealer and service providers is also provided.
摘要:
A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI).
摘要:
Systems, methods, and articles of manufacture embodied as computer program products for facilitating the avoiding of sending a message to an unintended recipient. In some embodiments of the invention, in an instant messaging (IM) environment, the relatedness of a first entry in a first IM session to previous entries in the first IM session is determined. In response to the entry not meeting a first pre-determined relatedness threshold, an alert is issued. In one embodiment, the relatedness of the first entry to previous entries in a second IM session is determined, in response to the entry meeting a second pre-determined relatedness threshold, an alert is issued. In one implementation, relatedness is determined based on a matching of keywords between the first entry and the previous entries. In another implementation, relatedness is determined based on a matching of topics associated with one or more IM sessions, which topics can be associated with keywords.
摘要:
Systems, methods and program codes are provided wherein an analyzer analyzes input from a terminal device; ascertains human-like behavior; and terminates an active session, generates a time-out warning, manipulates an idle session timer or presents a challenge in response to a humanness likelihood determination or to a challenge result. In one aspect a keystroke analyzer and a command sequence analyzer determine whether the terminal device input is likely from a human user or from an automaton. In another aspect a Completely Automated Public Turing Test to tell Computers and Humans Apart challenge is presented. Timing characteristics include maximum generation rate, burstiness, and keystroke sequence delays, and command characteristics include a no-action-required characteristic and a query characteristic. A command sequence analyzer may have an affinity for a command line interface. Weighting algorithms or artificial intelligence routines may be applied to humanness likelihood outputs.
摘要:
A protection mechanism(s) for a virtual universe account maintains integrity of the virtual universe account as well as the virtual universe. An avatar associated with a virtual universe account may be misappropriated and/or used inappropriately by a non-comporting user against the wishes or without the knowledge of the virtual universe account owner. A non-comporting user (i.e., a user not authorized to use the virtual universe account, an authorized user who misuses a virtual universe account, etc.) can use an avatar to perform potentially damaging and/or damaging activities in the virtual universe (e.g., destroy property, impact reputation associated with the virtual universe account, reduce value of the virtual universe account, etc.) Embodiments of the inventive subject matter detect when a user misappropriates and/or misuses a virtual universe account (i.e., detects a non-comporting user), and attempts to restore state of the virtual universe prior to the misuse and/or misappropriation.
摘要:
The present invention is directed to a system, method and program product for providing secure communications in a virtual universe. A system is disclosed that includes a system for allowing a first avatar to request a secure communication mode and for allowing a second avatar to accept the secure communication mode. Once accepted, a secure session is initiated within the virtual universe between the first avatar and the second avatar and at least one feature of the virtual universe is altered to effectuate the secure communication mode.
摘要:
A computer-implemented method of predicting a future location of a mobile node can include determining a current location of a first mobile node, determining a location of at least a second mobile node, wherein the second mobile node is associated with the first mobile node via a social network, and generating a list including at least one candidate destination determined, at least in part, according to the location of the first mobile node and the location of the second mobile node. For each candidate destination on the list, a probability that the first mobile node is in route to that candidate destination location can be calculated. A candidate destination can be selected, according to the probabilities, from the list as a predicted future location of the first mobile node. The predicted future location of the first mobile node can be output.