摘要:
Embodiments of a system and method for secure clock management in a mobile device, or user equipment, are generally described herein. A timer offset may be calculated between a first secure clock time and a first network time. A reset delta based on at least the timer offset may be obtained and a recovered secure clock time based on at least the reset delta may be generated. A one-time password may be generated based on at least the recovered secure clock time.
摘要:
This document discusses, among other things, detection of a sudden onset of a tachyarrhythmia. A sudden onset of tachyarrhythmia is determined by monitoring changes in intrinsic ventricular rate, such as by using one or more sensing channels in the ICD. A lowest tachyarrhythmia rate threshold is accompanied by a slightly lower “hysteresis tachyarrhythmia rate threshold.” If a sudden onset of tachyarrhythmia is declared, the sudden onset status is not reset by the ventricular rate falling below the lowest tachyarrhythmia rate threshold, but is instead reset by the ventricular rate falling below the slightly lower hysteresis tachyarrhythmia rate threshold.
摘要:
A garment and portions of a garment presently disclosed contains a body having a front portion and a back portion, and a plurality of weighted inserts coupled with an elastic material, wherein the plurality of inserts are separated by a first distance when the garment is not being worn by a user, wherein the plurality of inserts are separated by a second distance when the garment is being worn by the user, wherein the second distance is greater than the first distance. Alternatively, the weights ma be fixed to the elastic.
摘要:
A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations).
摘要:
Methods and systems for backing up and restoring different point in time versions of a virtual machine, an application, a database, or an electronic file using independently managed snapshot chains are described. In some cases, different point in time versions of a virtual machine may be captured and stored using one or more snapshot chains. Each snapshot chain may correspond with a base image (e.g., a full image snapshot) and one or more incremental files (e.g., two forward incremental files) that derive from the base image. A snapshot chain may be split into a plurality of shards or sub-chains such that the width of each shard or the maximum data size of the files in each shard is less than a threshold data size (e.g., is less than 1 TB). Data operations (e.g., consolidation and reverse operations) may be performed on the individual shards or sub-chains in parallel.
摘要:
Disclosed in some examples are methods, systems, devices, and machine-readable mediums which optimize one or more metrics of a communication system by intentionally changing symbols in a bitstream after encoding by an error correction coder, but prior to transmission. The symbols may be changed to meet a communication metric optimization goal, such as decreasing a high PAPR, reducing an error rate, reducing an average power level (to save battery), or altering some other communication metric. The symbol that is intentionally changed is then detected by the receiver as an error and corrected by the receiver utilizing the error correction coding.
摘要:
A system and method for processing a database query is described. In response to detection that a database query involves a star or snowflake join operation, a join operator in a preliminary query plan can be split into a build operator and a probe operator. The probe operator can be placed in a final query plan in the same place as the join operator in the preliminary query plan, while the build operator can be placed beneath the probe operator in the final query plan, between an exchange operator and the exchange operator's child from the preliminary query plan.
摘要:
A method may include receiving a request to transfer a personal virtual assistant to a computing device, the personal virtual assistant including response preferences of a user; accessing a virtual assistant transfer protocol associated with the user; the virtual assistant transfer protocol including a sensitivity preference; applying the sensitivity preference to data associated with the personal virtual assistant to generate a virtual assistant transfer package; and transmitting the virtual assistant transfer package to the computing device.
摘要:
A computer implemented method includes receiving ephemeral digital information from a source user, providing access to the ephemeral digital information to one or more recipient users in accordance with a time decay value associated with the ephemeral digital information, obtaining recipient status data corresponding to one or more of the recipient users, and modifying the time decay value of the ephemeral data to provide a personalized time decay value for at least one of the one or more recipient users based on the recipient status data such that at least one recipient user is able to obtain access to the ephemeral digital information based on their personalized time decay value.
摘要:
In a subcutaneous implantable cardioverter/defibrillator, cardiac arrhythmias are detected to determine necessary therapeutic action. Cardiac signal information is sensed from far field electrodes implanted in a patient. The sensed cardiac signal information is then amplified and filtered. Parameters such as rate, QRS pulse width, cardiac QRS slew rate, amplitude and stability measures of these parameters from the filtered cardiac signal information are measured, processed and integrated to determine if the cardioverter/defibrillator needs to initiate therapeutic action.