Hash table expansion and contraction for use with internal searching
    81.
    发明授权
    Hash table expansion and contraction for use with internal searching 失效
    哈希表扩展和收缩用于内部搜索

    公开(公告)号:US6067547A

    公开(公告)日:2000-05-23

    申请号:US911105

    申请日:1997-08-12

    申请人: John R. Douceur

    发明人: John R. Douceur

    IPC分类号: G06F17/30

    CPC分类号: G06F17/3033 Y10S707/99943

    摘要: Hash tables are used to index an internal database--one that resides in primary memory. The hash tables are segmented into a sequence of segments that increase geometrically in size. To expand a table, an additional segment is allocated which is twice as large as the previously allocated segment. This most recently allocated segment is referred to as an expansion segment, while the previously existing segments are referred to as base segments. As records are added, entries from the base segments are gradually split, and some of the records referenced by these entries are assigned to new entries in the expansion segment. This distributes address recalculations over time, while also using memory quite efficiently.

    摘要翻译: 哈希表用于索引内部数据库 - 驻留在主内存中的数据库。 哈希表被分段成几何尺寸增加的段序列。 要扩展表,分配一个额外的段,它是先前分配的段的两倍。 这个最近分配的段被称为扩展段,而先前存在的段被称为基本段。 随着记录被添加,来自基本段的条目逐渐被拆分,并且由这些条目引用的一些记录被分配给扩展段中的新条目。 这会随着时间的推移分配地址重新计算,同时更有效地使用内存。

    Method and system for alignment of blocks in a program image
    82.
    发明授权
    Method and system for alignment of blocks in a program image 失效
    程序图像中块的对齐方法和系统

    公开(公告)号:US5903917A

    公开(公告)日:1999-05-11

    申请号:US797589

    申请日:1997-02-07

    CPC分类号: G06F12/10 G06F12/0864

    摘要: A computer system and method for aligning blocks within source program image in accordance with alignment constraints. The source program image is divided in pages. The alignment system receives an indication of which of the blocks are accessed during each time interval while the source program image is executed. The alignment system determines from the received indications which of the pages are accessed during each time interval. The alignment system then identifies the first block of the source program image that has an alignment constraint and repeats the following until all blocks have been aligned. The alignment system identifies a group of contiguous blocks that are adjacent to the identified block such that the identified blocks can be rearranged without increasing the number of pages that are accessed during each time interval. The alignment system then determines an arrangement of the blocks that tends to minimize the amount of padding that is needed to satisfy the alignment constraints. The alignment system then stores the rearranged blocks along with the padding in a destination program image.

    摘要翻译: 一种用于根据对准约束在源程序图像内对准块的计算机系统和方法。 源程序图像分为页面。 在执行源程序图像时,对准系统接收在每个时间间隔期间访问哪个块的指示。 对准系统从接收到的指示确定在每个时间间隔期间访问哪些页面。 对准系统然后识别具有对准约束的源程序图像的第一块,并重复以下操作,直到所有块都对齐。 对准系统识别与所识别的块相邻的一组连续的块,使得可以重新排列所识别的块,而不增加在每个时间间隔期间被访问的页数。 对准系统然后确定倾向于最小化满足对准约束所需的填充量的块的布置。 对准系统然后将重排的块与填充一起存储在目的节目图像中。

    Fast, non-write-cycle-limited persistent memory for secure containers
    83.
    发明授权
    Fast, non-write-cycle-limited persistent memory for secure containers 有权
    用于安全容器的快速,非写周期限制的持久性内存

    公开(公告)号:US08812908B2

    公开(公告)日:2014-08-19

    申请号:US12887938

    申请日:2010-09-22

    IPC分类号: G06F11/00

    CPC分类号: G06F11/1441 G06F21/86

    摘要: Techniques for providing fast, non-write-cycle-limited persistent memory within secure containers, while maintaining the security of the secure containers, are described herein. The secure containers may reside within respective computing devices (e.g., desktop computers, laptop computers, etc.) and may include both volatile storage (e.g., Random Access Memory (RAM), etc.) and non-volatile storage (NVRAM, etc.). In addition, the secure containers may couple to auxiliary power supplies that are located externally thereto and that power the secure containers at least temporarily in the event of a power failure. These auxiliary power supplies may be implemented as short-term power sources, such as capacitors, batteries, or any other suitable power supplies.

    摘要翻译: 在此保护安全容器的安全性的同时在安全容器内提供快速,非写周期限制的持久存储器的技术在这里被描述。 安全容器可以驻留在相应的计算设备(例如,台式计算机,膝上型计算机等)内,并且可以包括易失性存储器(例如,随机存取存储器(RAM)等)和非易失性存储器(NVRAM等) )。 此外,安全容器可以耦合到位于外部的辅助电源,并且在电源故障的情况下至少暂时为安全容器供电。 这些辅助电源可以实现为短期电源,例如电容器,电池或任何其它合适的电源。

    Method and apparatus for thwarting traffic analysis in online games
    84.
    发明授权
    Method and apparatus for thwarting traffic analysis in online games 有权
    阻止在线游戏流量分析的方法和装置

    公开(公告)号:US08719336B2

    公开(公告)日:2014-05-06

    申请号:US12364913

    申请日:2009-02-03

    IPC分类号: G06F15/16

    摘要: The subject disclosure relates to a method and apparatus for routing data in a network-based computer game via proxy computers. The method and system includes a set of techniques that utilizes the proxy computers to thwart traffic analysis in high-speed games while continuing to satisfy the games' latency requirements. The method and apparatus facilitates thwarting multiple classes of traffic analysis, including inspection of unencrypted header fields, observation of packet size, correlation of packet timing, and collusion among players. A matchmaking system for matching players in a network-based computer game in a manner that resists traffic analysis is also provided.

    摘要翻译: 本公开涉及一种用于经由代理计算机在基于网络的计算机游戏中路由数据的方法和装置。 该方法和系统包括利用代理计算机在继续满足游戏等待时间要求的同时阻止高速游戏中的流量分析的一套技术。 该方法和装置有助于阻止多类业务分析,包括对未加密报头字段的检查,分组大小的观察,分组定时的相关性和播放器之间的串通。 还提供了一种用于以抵抗流量分析的方式在基于网络的计算机游戏中匹配玩家的配对系统。

    Strategy-Resistant Referral Reward Distribution
    85.
    发明申请
    Strategy-Resistant Referral Reward Distribution 审中-公开
    抗战转介奖励分配

    公开(公告)号:US20130085821A1

    公开(公告)日:2013-04-04

    申请号:US13249049

    申请日:2011-09-29

    IPC分类号: G06Q30/02

    CPC分类号: G06Q30/02

    摘要: In a participatory system, a reward is distributed to participants based on their contributions to the system and the contributions of direct and indirect referrals of the participant (descendant referrals). A convex function is applied to the effective contribution of each participant to determine the weighted contribution of the participant, and the participant's reward is based on the participant's weighted contribution less the weighted contributions of child participants referred by the participant.

    摘要翻译: 在参与制度中,根据对系统的贡献以及参与者的直接和间接转介(后代转介)的贡献,向参与者分发奖励。 一个凸函数被应用于每个参与者的有效贡献以确定参与者的加权贡献,并且参与者的奖励是基于参与者的加权贡献减去参与者参与的儿童参与者的加权贡献。

    Transforming offline maps into interactive online maps
    86.
    发明授权
    Transforming offline maps into interactive online maps 有权
    将离线地图转换为互动式在线地图

    公开(公告)号:US08368695B2

    公开(公告)日:2013-02-05

    申请号:US11672912

    申请日:2007-02-08

    IPC分类号: G09G5/00

    摘要: A system is disclosed that transforms offline maps into interactive online maps. In the system, geo-coordinate relationships are determined between geo-coordinates on a source map and geo-coordinates on an online reference map. An image of the source map is transformed to form an image of a modified source map having geo-coordinates that substantially align with corresponding geo-coordinates on the reference map. Modified source tiles are formed with the image of the modified source map and displayed on a portion of the reference map.

    摘要翻译: 公开了将离线地图转换成互动在线地图的系统。 在系统中,在源地图上的地理坐标和在线参考地图上的地理坐标之间确定地理坐标关系。 源图像的图像被变换以形成具有与参考图上的相应地理坐标基本一致的地理坐标的修改源图的图像。 修改的源瓦片与修改的源地图的图像一起形成并显示在参考地图的一部分上。

    Secure application interoperation via user interface gestures
    87.
    发明授权
    Secure application interoperation via user interface gestures 有权
    通过用户界面手势确保应用程序的互操作

    公开(公告)号:US08335991B2

    公开(公告)日:2012-12-18

    申请号:US12814154

    申请日:2010-06-11

    IPC分类号: G06F3/048 G06F3/00

    CPC分类号: G06F3/0486

    摘要: Techniques for facilitating secure application interoperation via user interface (UI) gestures in computing devices that strictly isolate applications operating thereon are described herein. For instance, applications may define one or more specific UI gestures that, when executed by the user, express that the user desires for the computing device to allow for an instance of directed, ephemeral, by-value communication between two isolated applications. In some implementations, the gesture is an atomic gesture, such as a drag-and-drop operation. That is, the gesture is one that the user completes continuously and without interruption.

    摘要翻译: 本文描述了用于在严格隔离其上运行的应用的计算设备中的用户界面(UI)手势促进安全应用互操作的技术。 例如,应用可以定义一个或多个特定的UI手势,当用户执行时,用户表示用户期望计算设备允许在两个隔离的应用之间进行定向,短暂的副值通信的实例。 在一些实现中,手势是原子手势,例如拖放操作。 也就是说,手势是用户不间断地完成的手势。

    Collaborative speed determination in distributed systems
    88.
    发明授权
    Collaborative speed determination in distributed systems 失效
    分布式系统中的协同速度确定

    公开(公告)号:US08307077B2

    公开(公告)日:2012-11-06

    申请号:US13197435

    申请日:2011-08-03

    IPC分类号: G06F15/16

    摘要: The described implementations relate to collaborative speed determination in distributed systems. One method estimates upload speeds of a plurality of hosts. The method sends a first bandwidth probe from a first host to a second host. The method receives, at the first host, a second bandwidth probe sent from the second host. The method determines which of the first and second bandwidth probes was relatively slower. The method designates either of the first or second hosts that sent the relatively slower bandwidth probe as a loser and takes a speed of the bandwidth probe of the loser as a first estimate of the loser's upload speed.

    摘要翻译: 所描述的实现涉及分布式系统中的协作速度确定。 一种方法估计多个主机的上传速度。 该方法将第一个带宽探测器从第一个主机发送到第二个主机。 该方法在第一主机处接收从第二主机发送的第二带宽探测器。 该方法确定第一和第二带宽探测器中哪一个相对较慢。 该方法指定发送相对较慢的带宽探测器作为输入者的第一或第二主机之一,并且将失败者的带宽探测器的速度作为失败者上传速度的第一估计。

    Leveraging Remote Server Pools for Client Applications
    89.
    发明申请
    Leveraging Remote Server Pools for Client Applications 有权
    利用客户端应用程序的远程服务器池

    公开(公告)号:US20100318630A1

    公开(公告)日:2010-12-16

    申请号:US12484356

    申请日:2009-06-15

    IPC分类号: G06F15/16

    CPC分类号: G06F9/5055 G06F2209/509

    摘要: Techniques for enabling client computing devices to leverage remote server pools for increasing the effectiveness of applications stored on the client computing device are described herein. In some instances, the server pools comprise a “cloud”, “cluster” or “data center” that comprises hundreds or thousands of servers connected together by a network that has an extremely low latency and high bandwidth relative to the network through which the client computing device connects to the server pool. The client computing device may request that the server pool perform a certain task for an application whose canonical state resides on the client. After computation of a result of the task, a server of the server pool then provides the result to the client. By doing so, the techniques dramatically increase the amount of resources working on the request of the client and, hence, dramatically increase the speed and effectiveness of the client-side application.

    摘要翻译: 本文描述了使客户端计算设备能够利用远程服务器池来增加存储在客户端计算设备上的应用的有效性的技术。 在某些情况下,服务器池包括一个“云”,“集群”或“数据中心”,其中包含数百或数千个由网络连接在一起的服务器,网络具有相对于网络极低的延迟和高带宽,客户端 计算设备连接到服务器池。 客户端计算设备可以请求服务器池为其规范状态驻留在客户端上的应用执行特定任务。 在计算任务的结果之后,服务器池的服务器然后将结果提供给客户端。 通过这样做,这些技术大大增加了根据客户端请求工作的资源量,从而大大提高了客户端应用程序的速度和有效性。

    Executing Native-Code Applications in a Browser
    90.
    发明申请
    Executing Native-Code Applications in a Browser 有权
    在浏览器中执行本地代码应用程序

    公开(公告)号:US20100287618A1

    公开(公告)日:2010-11-11

    申请号:US12463892

    申请日:2009-05-11

    摘要: Techniques for leveraging legacy code to deploy native-code desktop applications over a network (e.g., the Web) are described herein. These techniques include executing an application written in native code within a memory region that hardware of a computing device enforces. For instance, page-protection hardware (e.g., a memory management unit) or segmentation hardware may protect this region of memory in which the application executes. The techniques may also provide a narrow system call interface out of this memory region by dynamically enforcing system calls made by the application. Furthermore, these techniques may enable a browser of the computing device to function as an operating system for the native-code application. These techniques thus allow for execution of native-code applications on a browser of a computing device and, hence, over the Web in a resource-efficient manner and without sacrificing security of the computing device.

    摘要翻译: 本文描述了利用传统代码通过网络(例如,Web)来部署本地代码桌面应用程序的技术。 这些技术包括执行在计算设备的硬件实施的存储器区域内以本地代码编写的应用程序。 例如,页面保护硬件(例如,存储器管理单元)或分段硬件可以保护应用程序执行的存储器区域。 这些技术还可以通过动态地执行由应用程序进行的系统调用来提供超出该存储器区域的窄系统调用接口。 此外,这些技术可以使得计算设备的浏览器能够用作本地代码应用的操作系统。 因此,这些技术允许在计算设备的浏览器上执行本地代码应用,并因此允许以资源有效的方式在Web上执行,而不会牺牲计算设备的安全性。