摘要:
In a distributed hash table overlay network, messages directed to a message ID are relayed to one or more nodes that have published interest in that message ID. Messages are distributed, processed, and/or cached in accordance with relay policies, which enable a wide variety of different applications. Nodes specify relay policies on a per-node, per-message, and/or per-message ID basis. Relay policies can specify any behavior associated with messages, including: message caching, distribution, and processing as well as migration of relay policies when nodes join or leave the network. Intermediate nodes can perform any arbitrary processing of messages based on relay policies. Intermediate nodes can offload processing to other nodes, either by forwarding messages to a different message ID or by enlisting the help of nodes subscribed to the message ID. Messages can include one or more subfields specifying commands and/or data to be evaluated by the intermediate node.
摘要:
An input control signal is adjusted to account for a portion of the input control signal that may be attributable to unintended forces. Such unintended forces may include, but are not limited to, one or more of operator initiated unintended forces, vehicle-generated unintended forces, and extra-vehicular unintended forces. The amount by which the input control signal is adjusted correlates to a determined probability. The probability is an indicator as to how likely the input control value is affected by unintended forces.
摘要:
A processor system may implement multiple contexts on one or more processors having a local memory. Code and/or data for first and second contexts may be respectively stored simultaneously in first and second regions of a processor's local memory, storing code and/or data for a second context in a second region of the local memory, the secondary processor may execute the first context while the second context waits. Code and/or data for the first context may be transferred from the first region to the second and code and/or data for the second context may be transferred from the second region to the first, and the processor may execute the second context during a pause or stoppage of execution of the first context. Alternatively, the code and/or data for the second context may be transferred to another processor's local memory.
摘要:
Network bandwidth detection and distribution and prioritizing network traffic among two or more distinct channels of communication within a single application in a node configured to communicate with one or more other nodes over a network is disclosed. For a particular time quantum, a bandwidth quantum may be distributed amongst two or more communication channels according to priorities associated with those channels.
摘要:
Broadcast messages are efficiently directed to nodes of an overlay network. Broadcast messages include an End ID parameter specifying the range of key values for nodes that should receive the broadcast message. Each node of an overlay network maintains a list of finger nodes and their respective key values. Upon receiving a broadcast message, a node assigns a finger node a new End ID value based upon the End ID value of the broadcast message or the key value of an adjacent finger node. The node compares a finger node's new End ID value with the finger node's key value to determine whether to forward the broadcast message to that finger node. A broadcast message forwarded to a finger node includes an End ID parameter equal to the new End ID value determined for the finger node. Nodes can aggregate response messages from its finger nodes.
摘要:
Methods for obtaining and distributing auxiliary content assets for an interactive environment and a client device and server that may implement such methods are disclosed. The client device displays a scene of a portion of the simulated environment from a camera point of view (camera POV) on a video display. The client device generates a pre-hint vector based on position of the camera POV, sends the vector to a server and receives auxiliary content information from the server. The server receives the pre-hint vector, determines the future field from the pre-hint vector, identifies one or more auxiliary content targets within the potential future field of view, and sends auxiliary content information for the identified targets to the client device.
摘要:
Broadcast messages are efficiently directed to nodes of an overlay network. Broadcast messages include an End ID parameter specifying the range of key values for nodes that should receive the broadcast message. Each node of an overlay network maintains a list of finger nodes and their respective key values. Upon receiving a broadcast message, a node assigns a finger node a new End ID value based upon the End ID value of the broadcast message or the key value of an adjacent finger node. The node compares a finger node's new End ID value with the finger node's key value to determine whether to forward the broadcast message to that finger node. A broadcast message forwarded to a finger node includes an End ID parameter equal to the new End ID value determined for the finger node. Nodes can aggregate response messages from its finger nodes.
摘要:
In a distributed hash table overlay network, messages directed to a message ID are relayed one or more nodes that have published interest in that message ID. Messages are distributed, processed, and/or cached in accordance with relay policies, which enable a wide variety of different applications. Nodes to specify relay policies on a per-node, per-message, and/or per-message ID basis. Relay policies can specify any behavior associated with messages, including: message caching, distribution, and processing as well as migration of relay policies when nodes join or leave the network. Intermediate nodes can perform any arbitrary processing of message based on relay policies. Intermediate nodes can offload processing to other nodes, either by forwarding messages to a different message ID or by enlisting the help of nodes subscribed to the message ID. Messages can include one or more subfields specifying commands and/or data to be evaluated by the intermediate node.
摘要:
A method for user interaction with a three-dimensional virtual world is disclosed. The virtual world comprises one or more public spaces and one or more private spaces. A user may be represented in the virtual world by an avatar. The user can manipulate the avatar via a user interface. According to the method a custom gesture may be generated for the avatar. The gesture may be associated with one or more user interface signals.
摘要:
A system and method for routing communications among real and virtual communication devices are disclosed. The system includes one or more processors configured to generate a virtual world. The one or more processors may be configured to generate a virtual communication device and implement a configurable router adapted to facilitate routing of a communication among one or more real communication devices and the virtual communication device. A user of the virtual world may be associated with a virtual communication device and one or more real communication devices. A routing preference for reception of communications targeted to the user is implemented among the virtual communication device and the one or more real communication devices.