Abstract:
A system and method that uses a text-based script file to capture a circuit design and allows a circuit designer to manipulate the script file. The circuit designer can add, delete, or move components using various tags and commands that are stored in the script file. When the design is complete, or ready to be tested, the script file is processed creating a layout representation file that is readable by a graphics-based circuit design tool.
Abstract:
A system and method is provided to map alternative short captions that are displayed in a constrained display environment instead of displaying standard captions. When designing a display panel, the designer identifies shorter captions to use in a constrained environment. Shorter captions are helpful in preventing text from wrapping or having to horizontally scroll to in order to read a longer caption. Varying levels of short captions are provided so that a standard size display displays the full caption, a somewhat smaller size display displays smaller captions, while an even smaller display displays even smaller captions. National language support is also provide to translate both full captions as well as the short version(s) of the captions.
Abstract:
A system and method that centrally manages desktop packages is provided allowing the administrator to recover component files previously sent to servers located throughout the organization. Applications are assigned to users and workstations. Self-contained desktop packages are transmitted to servers. The servers, in turn, provide the desktop packages to clients. The packages and the components included in the packages include unique identifiers used to identify the packages and components. A manifest is maintained detailing the individual components included in each of the self-contained desktop files. When a disaster event occurs at the administrator's computer system, the administrator retrieves the self-contained desktop files from the servers to which the packages were previously transmitted. The administrator repopulates the component libraries by unpacking the components from the self-contained desktop files. The administrator uses the manifest to determine whether additional self-contained package files need to be retrieved from other servers.
Abstract:
A system and method to observe user behavior and perform actions on interospectable objects is presented. A console logs backend events it receives from plug-ins and user actions it receives from a user. The console mines the logged entries and creates initial rules in response to mining the log entries. The console proceeds through a series of steps using the initial rules' cause nodes and effect nodes to generate deduced rules. The deduced rules include global user actions and global backend events. When the console receives subsequent backend events, the console matches the backend events with one of the global backend events included one of the deduced rules, and performs a corresponding global user action.
Abstract:
A system and method for gathering data regarding receivers of multicast content is provided. A spanning tree is used to connect a content producer, such as a pay-per-view broadcaster, to one or more receivers over a computer network, such as the Internet. Clients that wish to join a multicast group to which content is sent join the multicast group at the client's designated multicast router. The router sends information regarding the request, such as a tally of the number of clients that have joined the group, through intermediate routers to an endpoint router as identified by the spanning tree. The content producer is able to use the information, such as the tally and demographic information, to analyze the group of receivers. In a pay-per-view setting, the tally can further be compared to the number of subscribers to determine whether illicit receivers have joined the group, whereupon appropriate action is taken.
Abstract:
A system and method for processing caller information across heterogeneous networks is provided. An enterprise application receives a message from a name resolution adapter over a computer network. The message includes caller attributes and port location information. The enterprise application uses the caller attributes to retrieve a caller profile. The enterprise application determines whether to accept the call using the caller profile and whether a call exists on a telephone port corresponding to the port location information. Once enterprise application decides to accept the call, the enterprise application retrieves service subscriptions corresponding to the caller and processes the call using the caller's service subscriptions.
Abstract:
A system and method for terrain rendering using a limited memory footprint is presented. A system and method to perform vertical ray terrain rendering by using a terrain data subset for image point value calculations. Terrain data is segmented into terrain data subsets whereby the terrain data subsets are processed in parallel. A bottom view ray intersects the terrain data to provide a memory footprint starting point. In addition, environmental visibility settings provide a memory footprint ending point. The memory footprint starting point, the memory footprint ending point, and vertical ray adjacent data points define a terrain data subset that corresponds to a particular vertical ray. The terrain data subset includes height and color information which are used for vertical ray coherence terrain rendering.
Abstract:
A system and method that automatically adds contacts to a user's instant messaging buddy list is provided. The contacts are added based upon existing database (i.e., directory) information as well as meeting information extracted from the user's calendar. The list of calendar contacts is included with the user's calendar. This list is used to automatically populate the user's buddy list. In one embodiment, a buddy list “group” is initialized for calendar entries. Contacts are also added to a user's buddy list through database queries. The group of contacts resulting from the query are then added to the user's buddy list. Contacts added to the user's buddy list through the user's calendar or through database queries can be made permanent or temporary. Temporary contacts are automatically removed after a specified period of time.
Abstract:
Unauthorized access to a computer is disclosed by providing information to an authorized user to evaluate accesses to the computer. The computer or other information equipment increments a value in a storage area of the number of power-on times Furthermore, the equipment displays the number of power-on times after the increment on an LCD. Then, if a supervisor password is not entered, the equipment locks a block previously storage contents from being rewritten.
Abstract:
A system and method for developing custom programmable tags. A user specifies custom programmable tag attributes and actions using a user interface. Code is generated to handle actions, attributes, and Java beans. Actions include whether the tags the user is creating include nested objects, such as JSP tag, expressions, and scriptlets. Actions also controls how many times the tag processes its content and whether the tag accesses the results from processing the tag's content. Attributes are specified including the attribute name, type, whether it is required, and whether an expression is allowed for the attribute. Code is generated to handle the attributes. Code is also generated to handle Java beans that may be used in conjunction with the tag. The user's specification are processed and a package of custom tag files (tag handler, tag extended info (TEI), and tag library description (TLD)) are returned to the user.