摘要:
A system and method for tracing acceleration in an embedded device. Various embedded devices that generate debug trace output for which the usage of the processor can benefit from optimization include mobile phones, TV set-top-boxes, and networking equipment. Tracing acceleration is accomplished using a logic unit that is implemented in hardware, which thereby enables the processing of tracing data to be handled in parallel to the operation of the processor.
摘要:
Systems, methods, apparatus, computer program code and means for rating and pricing insurance policies are provided. In some embodiments, an automated insurance processing platform rates and prices insurance policies by including a territory factor in the calculation of a premium for the policy. Pursuant to some embodiments, the territory factor is calculated by receiving historical loss data, geographical data, and demographic data, analyzing the historical loss data, the geographical data, and the demographic data to identify data having similar claim behaviors. The historical loss data is analyzed to identify at least a frequency and severity of historical loss by coverage type. The frequency and severity of loss data, the geographical data, and the demographic data is iteratively analyzed to create a territory set having different geographical boundaries for the different coverage types; and the territory set is used to generate a set of territory factors for the different coverage types and the territories.
摘要:
A system and method for tracing acceleration in an embedded device. Various embedded devices that generate debug trace output for which the usage of the processor can benefit from optimization include mobile phones, TV set-top-boxes, and networking equipment. Tracing acceleration is accomplished using a logic unit that is implemented in hardware, which thereby enables the processing of tracing data to be handled in parallel to the operation of the processor.
摘要:
A pest control system (20) includes pest control devices (110) installed about an area or building (22). These devices (110) each include a bait member and a communication circuit. The communication circuit may be in the form of a passive RF tag that transmits information indicative of bait status and an identifier unique to each pest control device (110). A hand held interrogator (30) is provided to locate and communicate with the pest control devices (110) via the communication circuit. A data collection unit (40) to accumulate data gathered from the pest control devices (110) may alternatively or additionally be utilized. The bait member may be configured with a magnetic component to provide a magnetic signature indicative of the bait consumption behavior of targeted varieties of pest. The devices optionally include one or more environmental sensors to evaluate and predict pest behavior.
摘要:
Systems and methods provide a mechanism to protect the integrity of electronically derivative works. One aspect of the systems and methods includes receiving an original document including a first digital signature. After the document is derived, a second digital signature is created. The second digital signature may include the first digital signature, a message digest from the first digital signature, and a message digest for the second digital signature. A further aspect of the systems and methods include assigning a security key to a document processing application. The assigned key may be used to produce the second document signature.
摘要:
The present invention is directed to a multi-compartment autoclave using inter-compartment dividers having one or more underflow openings for passing a feed stream between compartments.
摘要:
This program is one of many approaches to correlating nucleotides, amino acids or any biophysical parameter in quantum biology. The output is a correlation coefficient and the innovative result is the quanification of any biomolecular sequence. This reading frame distance approach is the most important of all, as it gives a quantity to intronic sequences which regulate all exonic sequences. Amino acids can be correlated as parameters for they give a nice statistical distribution as there are twenty of them. By transposing the matrix of numbers produced by this program, one can obtain the relative significance of each sequence position for any variable such as malaria, dengue fever, etc. This QBASIC, DOS approach is valuable for Africa and LDC's as they do not have to update their old PC's. It can be written in any modern language and used by any industrialized nation.
摘要:
Methods, systems, and products for including a content-description file in a viewable aggregate file. A content-description file that has a first native file format and a second file that has a second native file format are identified and are inserted into an aggregate file in a form that preserves the first and second native file formats. The content-description file and the second file are extractable from the aggregate file in their respective native file formats. The content-description file is extractable without processing any part of the second file, and the second file is extractable without processing any part of the content-description file. An indication is provided for the aggregate file that indicates a default behavior for when the aggregate file is opened for viewing.
摘要:
A first host system can be configured initially with a first host identity and a second host system can be configured initially with a second host identity. A host identity can belong to only one host system at a time. An administrator system can hold an additional host identity. The administrator system can securely connect to the first host system and can pass the additional host identity to the first host system. The first host system can reconfiguring itself to use the additional host identity and can pass the first host identity to the administrator system. The administrator system can securely connect to the second host system and can pass the first host identity to the second host system. The second host system can then reconfigure itself to use the first host identity and pass the second host identity to the administrator system. In this manner the first host identity can be passed securely from the first to the host system without a risk of duplication.
摘要:
First and second host systems can each include a respective repository of host identities. The first host system can encode a host identity to be transferred to the second host system using a parameter, for example a property of the second host system. The first host system can divulge the result of the encoding and remove the host identity from its repository. The second host system can decode the host identity to be transferred using the parameter, and can then add the host identity to be transferred to its repository.