Abstract:
Partitioning execution of a program between a client device and a cloud of network resources, exploits the asymmetry between the computational and storage resources of the cloud and the resources and proximity of the client access device to a user. Programs may be decomposed into work units. Those work units may be profiled to determine execution characteristics, modeled based on current state information and the profile, and a model performance metric (MPM) generated. Based on the MPM, work units may be partitioned between the client and the cloud.
Abstract:
An implementation of location estimation using image analysis is described. In this implementation, an image of a place is obtained and matched with previously stored images. The matching may be achieved by employing methods based on key feature extraction algorithm, color histogram analysis, pattern matching or other image comparison techniques. Upon determining a match, the location information associated with the image provides the location. The location information may be in the form of location tags or location keywords and the location information may be used by the user or other applications for the purposes of location determination. The technique allows for the user to enter location information. The location information may be assigned to the previously stored images residing in local and remote databases for users and applications to assign information or keywords to images.
Abstract:
A “Community-Based Mobile Search Cache” provides various techniques for maximizing the number of query results served from a local “query cache”, thereby significantly limiting the need to connect to the Internet or cloud using 3G or other wireless links to service search queries. The query cache is constructed remotely and downloaded to mobile devices. Contents of the query cache are determined by mining popular queries from mobile search logs, either globally or based on queries of one or more groups or subgroups of users. In various embodiments, searching and browsing behaviors of individual users are evaluated to customize the query cache for particular users or user groups. The content of web pages related to popular queries may also be included in the query cache. This allows cached web pages to be displayed without first displaying cached search results when a corresponding search result has a sufficiently high click-through probability.
Abstract:
A method disclosed herein includes the act of computing a value of information for obtaining data from a personal sensor of a user for utilization in a utilitarian computing application, wherein a mobile computing device comprises the personal sensor of the user. The method further includes the act of requesting that the mobile computing device transmit a data packet to the computing device based at least in part upon the value of information for obtaining data from the personal sensor of the user.
Abstract:
Some implementations provide techniques and arrangements for distance measurements between computing devices. Some examples determine a distance between devices based at least in part on a propagation time of audio tones between the devices. Further, some examples determine the arrival time of the audio tones by performing autocorrelation on streaming data corresponding to recorded sound to determine a timing of an autocorrelation peak indicative of a detection of an audio tone in the streaming data. In some cases, cross correlation may be performed on the streaming data in a search window to determine a timing of a cross correlation peak indicative of the detection of the audio tone in the streaming data. The location of the search window in time may be determined based at least in part on the timing of the detected autocorrelation peak.
Abstract:
A laptop computer includes a main body, a display, a component, and a frame. The main body includes a front end, a back end opposite to the front end, a left side surface and a right side surface connected between the front end and the back end, and a socket positioned at the back end. The display is pivoted to the front end of the main body. The component is detachably inserted into the socket. The frame is movably connected to the left side surface and the right side surface. The frame is able to rotate between a locked position and an unlocked position, when the frame is at the locked position, the frame keeps the component in the socket, and when the frame is at the unlocked position, the component is able to be pulled out from the socket.
Abstract:
A method parses the contents of an e-Form, where the contents of said e-Form have been divided into more than one section with a different content identification code assigned to each section of the e-Form. The method includes scanning an e-Form submitted for processing to determine, based on the content identification codes, which of the sections have a corresponding parsed result already in a cache system; parsing contents of the sections without a parsed result already in the cache system; and combining parsed results from the cache system with parsed results from the parsing of sections without a parsed result already in the cache system.
Abstract:
A synchronous control method for multi-computer is provided. The multi-computer is connected with each other through a network. The method includes the following steps: maintaining a running information list on each computer in the network, where the identifier information of all computers and the running state information of the corresponding computers are contained in the running information list; receiving a synchronous control instruction inputted by a user at any of the computers in the network; executing the synchronous control operation on the computers recorded in the running information list when the running state information of the computer receiving the instruction accords with a predetermined rule.
Abstract:
A method, system, and apparatus for improving security level of a terminal when it surfs the Internet. The method includes receiving, by a network side, network security information reported by a terminal, generating a network security policy according to the network security information reported by each terminal, and transmitting a security indication to the network security policy to the terminal; providing, by the terminal, a security prompt for network information to be obtained or having been obtained according to the security indication. Various embodiments can improve the security level of the terminal when it surfs the Internet and save resources of the terminal.