Abstract:
A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. The system can then automatically determine an instruction in a first time limit based on the calculated scored and command the executing system to execute the instruction.
Abstract:
Systems and methods for verifying human users through cognitive processes that computers cannot imitate are described herein. Human cognitive language processing techniques may be used to verify human users. Visual patterns and tests may be used to distinguish between humans and computers because computer-based visual recognition is fundamentally different from human visual processing. Persistent plugins and tests may be used to continuously verify human users.
Abstract:
A method and system for searching a wide area network that enables users to find the information they seek more quickly and more easily than prior art search engines are disclosed. Aspects of this disclosure include a process for making use of a user's prior search queries for query definition; a process for similarly making use of prior search queries by other users; a process for expanding and clarifying the meaning of queries; a process for including paid and other preferred results in an overall query result; and a process for using user evaluation data from previous search query results to identify results that should be included or removed from a current result.
Abstract:
A system for determining an instruction in a first time limit that can be executed by an executing system is disclosed. The system is configured to request proposed action regarding an event from each of a plurality of operator systems. In some embodiments, the system can calculate a score for each of the proposed actions received from the plurality of operator systems. The system can then automatically determine an instruction in a first time limit based on the calculated scored and command the executing system to execute the instruction.
Abstract:
In a multi-participant modeled virtual reality environment, avatars are modeled beings that include moveable eyes creating the impression of an apparent gaze direction. Control of eye movement may be performed autonomously using software to select and prioritize targets in a visual field. Sequence and duration of apparent gaze may then be controlled using automatically determined priorities. Optionally, user preferences for object characteristics may be factored into determining priority of apparent gaze. Resulting modeled avatars are rendered on client displays to provide more lifelike and interesting avatar depictions with shifting gaze directions.
Abstract:
A method for operating a server to improve bandwidth efficiency in a computer network is disclosed. The server is operable to transmit files between a memory of the server and destinations on the computer network through a communication link having a finite bandwidth. The files are distinguishable by type and the server is provided with a rule set for prioritizing transmission of files by type. The method comprises monitoring a bandwidth usage of the communication link, and triggering application of the rule set when the bandwidth usage exceeds a threshold amount. The threshold amount is determined relative to the finite bandwidth. The method further comprises distinguishing between the files according to type, and prioritizing transmission of the files according to type and according to the rule set.
Abstract:
A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amount or betting odds, some combinations of the foregoing, or any other useful remuneration. The house retains its edge via the premium. The method may be implemented for play at a physical or virtual card table.
Abstract:
A server is configured to transfer information to a plurality of client devices in accordance with bandwidth-limiting and bandwidth-adjustment techniques. Bandwidth may be reduced based on an amount of data previously transferred to a client device (e.g., within a prior time period). Bandwidth may also be reduced based on variable input parameters such as file size, data type, server load, network response time, and number of transfer requests from a client device within a prior period of time. In some embodiments, bandwidth may be reduced by inserting delays between portions of data being transmitted. A length of a delay period may be determined based on the various factors above (amount of previous data transfer(s), file size, etc.). Bandwidth to a client device may also be adjusted dynamically. In some embodiments, bandwidth may be increased (rather than decreased).
Abstract:
Retail consumers may hedge the price of volatile commodities such as gasoline via the advance purchase of a policy, which may be represented by a hedge card. The card may be priced to cover uncertainty in the price of the commodity over a defined future period, plus a small profit for the card issuer, optionally plus a pre-paid residual cash value. The card may permit the purchase of a defined amount of the commodity at a price not to exceed a defined ceiling over the defined future period. The card issuer may contact with one or more fuel providers to apportion the risks and benefits of the hedge card. In the alternative, the card issuer may contract with the consumer only, and may rebate commodity purchase amounts in excess of the defined price ceiling directly to the hedge card holder.
Abstract:
Electronic content, for example, a web page, is configured for display by a web browser application to include content that is not included in or referenced by the web page. The web page includes a first locator for first content. A second locator for second content is associated with the first locator in a database or other memory structure. In response to a request for the web page, the second locator is obtained. Access to the second locator may be secured. The second locator may be swapped with the first locator to cause the web browser application to obtain the second content instead of the first content. In the alternative, the second content may be obtained and provided to the web browser instead of, or in addition to, the first content.