Abstract:
Technologies are generally described herein for a non-volatile static random access memory device with multiple storage states. The multi-storage state non-volatile random access memory device has two or more memory cells. Each memory cell may include one or more programmable resistive devices that may be dynamically programmed to configure the memory cell in a particular logic state.
Abstract:
Technologies are described for positioning a group of devices. In some examples, multiple computing devices may be identified as a proximal set of computing devices. Data indicative of a gesture that spans at least some of the computing devices is received from the proximal set. The relative motion of the gesture is determined with respect to the proximal set. Based on the determined relative motion, the relative spatial positioning of the computing devices in the proximal set is determined.
Abstract:
Technologies are generally described for methods and systems effective to store a source ontology that is effective to represent first explicit data and second explicit data. In an example, a processor may evaluate the source ontology to identify the first explicit data and the second explicit data. The processor may also identify a relationship between the first and second explicit data. The processor may also partition the source ontology into first decomposed data and second decomposed data based on the relationship between the first and second explicit data. The first decomposed data may include the first explicit data, and the second decomposed data may include the second explicit data. The processor may also store the first decomposed data in a first concealment module. The processor may also store the second decomposed data in a second concealment module that may be different from the first concealment module.
Abstract:
Technologies are generally described to correct color smear in an image generated using a sequential color system. In some examples, a correction system for see-through displays may use inertial movement data to compute the relative motion of the visual backdrop to correct color amplitudes and reduce or eliminate motion-caused color smear. A system according to embodiments may compute the angular motion of the background from inertial inputs, compute the pixel-angle equivalent motion time, and apply sequential color balancing across a time that corresponds to the pixel-angle motion time.
Abstract:
Technologies are generally provided for a pill dispensing device to track removal of a pill from a pill package. The device may include circuits printed/embedded on a composite sheet configured to be locally or completely flexible/stretchable with a multitude of slits corresponding to locations of pill containing cavities of the pill package. Composite sheet may include embedded rigid sections and be flexible near the slits. Additionally, top and/or bottom plates may further provide structural rigidity to achieve desired flexible behavior of the composite sheet. Electronic circuits printed/embedded on or in the composite sheet may detect removal of a pill from the pill package through the slits. Slits may include electrical contacts configured to switch a circuit corresponding to each slit between an active and an inactive state. Upon removal of the pill, the contacts may separate or touch each other, opening or closing the circuit corresponding to the expanded slit.
Abstract:
Electrophoretic displays with an electrophoretic medium having charged fluorescent particles are disclosed. The charged fluorescent particles have a dendrimer core covalently bonded with fluorophores of various emissive wavelengths so that microparticles that emit a variety of different colored electromagnetic radiation may be produced. Methods for producing the microparticles and using the microparticles in an electrophoretic display are also disclosed. Such microparticles may be provided separately, or kits may be provided for producing the microparticles.
Abstract:
Technologies are generally described for a distributed system to provide wireless energy sharing between electrically powered vehicles. In some examples, two or more vehicles traveling on a roadway may be configured to share energy while in route to a destination. The vehicles may be equipped with wireless energy transfer units to enable the vehicles to exchange energy. At least one of the vehicles may be a mobile electric charging station configured to store a large amount of charge and to provide charge to vehicles. The electric charging station may be in communication with a controller, where the controller may be configured to identify vehicles in need of recharge and to identify at least one vehicle having sufficient charge to share. The controller may schedule a time and place for the two vehicles to meet in order to share charge. Additionally, the vehicles may be self-coordinated without a controller.
Abstract:
Technologies are generally described for methods and systems effective to monitor a data access activity. In some examples, a method may include receiving, by a processor, a destination concept. The processor may identify a set of concepts, which may include the destination concept and at least one related concept associated with the destination concept, in an ontology. The processor may generate a planned path, which may define a first data access order associated with access of at least one of the related concepts and the destination concept, using the set of concepts. The processor may generate a browsing path which may define a second data access order associated with the data access activity. The processor may compare the planned path with the browsing path. The processor may determine a deviation based on the comparison of the planned path and the browsing path. The processor may monitor the data access activity using the deviation.
Abstract:
Technologies are generally described for providing a fully homomorphic encryption scheme. In some examples, a method performed under control of a first device may include determining an enciphering function, based at least in part on a secret key of the first device and a system parameter; enciphering a plaintext into a first ciphertext, based at least in part on the enciphering function; transmitting, to a server, the first ciphertext and the system parameter; receiving, from a second device, a second ciphertext to which the first ciphertext has been processed by the second device without deciphering the first ciphertext; and deciphering the second ciphertext, based at least in part on the system parameter and a deciphering function.
Abstract:
The present disclosure relates to methods and apparatuses for forming a packaged application based on a selected subset of user-interface elements. One example method includes receiving a selection of a subset of user-interface elements of a packaged application at a device, determining data of the packaged application associated with execution of the subset of user-interface elements, and packaging the data to form another packaged application for executing the subset of user-interface elements.