摘要:
A method and related CAD system and computer readable medium. A method includes loading an object model in a CAD system, the object model including a plurality of parts each of which may contain one or more shapes which in turn are composed of multiple polygons. The method includes adding the shapes to a spatial tree, the shapes each corresponding to at least one cell, each cell corresponding to a spatial region of the object model. The method also includes, for each cell that is too complex to process within a memory space of the CAD system, subdividing the cell into a plurality of subcells using a first subdivision process. The method also includes subdividing each cell into a plurality of subcells using a multi-threaded subdivision process, and combining the subcells into the spatial tree.
摘要:
The invention relates to a method and device for buffering data for multiplexing. The invention also relates to a method of multiplexing and to a multiplexer arrangement using the method and device for buffering data for multiplexing. In one embodiment the invention can be applied to the buffering of non-traffic data, such as firmware updates or other supplementary information, before multiplexing the non-traffic data with traffic data, such as television data of television channels, to form a satellite broadcast channel. In embodiments of the invention, non-traffic data for multiplexing is buffered and then read out again for multiplexing at a rate which is a function of buffer fullness. The non-traffic data may be multiplexed with at least one traffic data channel. A multiplexer can view the non-traffic data channel as another multiplexing input and can allocate the available bit rate between the traffic data channels and the non-traffic data accordingly.
摘要:
Network evasion and misinformation detection are disclosed. Techniques are provided for network security, including determining whether a particular packet, segment, frame, or other data encapsulation has been retransmitted. By detecting and tracking retransmits, the packet may be compared to the original packet to determine whether an attack exists. By evaluating the original data stream and a copy of the original data stream modified with the retransmitted packet, an evasion or misinformation attempt may be detected, invoking pattern or signature matching to determine whether an attack is attempted against a target host.
摘要:
Detecting network threats through dynamic depth inspection is disclosed. A mandatory threat detection procedure is performed on data received via a network. It is determined probabilistically whether to perform an optional threat detection procedure on at least a portion of the data. The optional threat detection procedure is then performed if it is determined that it should be performed.
摘要:
An apparatus for automatically detecting and selecting between progressively scanned and interlaced signals has an input video signal 11 applied to a progressive frame detector 12, a de-interlacer 14 and a compensating delay 13 which has the same latency as the de-interlacer 14. The progressive frame detector determines if the input video signal is an interlaced signal or a progressively scanned signal. If it is determined that the applied signal is interlaced, then output from the de-interlacer 14 is selected. If, on the other hand, it is determined that the applied signal is progressively scanned, then the input video signal is selected after passing through the compensating delay. In both instances, the selected output is a progressive video signal 19 which may be transmitted if the device is used in an encoder or applied to a display device if the apparatus is used in a decoder.
摘要:
A system and method are disclosed for analyzing security risks in a computer network. The system constructs asset relationships among a plurality of objects in the computer network and receives an event associated with a selected object, where the event has an event risk level. The system also propagates the event to objects related to the selected object if the event risk level exceeds a propagation threshold.
摘要:
Methods and apparatus for efficient execution of modules are disclosed. An example method includes generating, by a first module, a first module identifier, the first module having been instantiated by an advertisement on a webpage, loading, by the first module, a component, communicating the module identifier to the component, determining that a second module having a second module identifier has been loaded, and, in response to determining that the second module has been loaded, communicating, by the first module, the second module identifier to the component to instruct the component to communicate with the second module.
摘要:
A system, method, and computer program for producing a visualization format from CAD data comprising producing a BREP model for visualization, wherein said BREP model has a topology component and a geometry component; removing a plurality of redundant control points from said geometry component; normalizing a plurality of knot vectors and a plurality of weight components from said geometry component; recognizing an analytic geometry from said geometry component; recognizing a plurality of equivalents from said geometry component; and converting said analytic geometry to said light model representation, and appropriate means and computer-readable instructions.
摘要:
Analyzing security risk in a computer network includes receiving an event associated with a selected object in the computer network, and determining an object risk level for the selected object based at least in part on an event risk level of the event received, wherein the event risk level accounts for intrinsic risk that depends at least in part on the event that is received and source risk that depends at least in part on a source from which the event originated.
摘要:
Detecting a network worm is disclosed. Network traffic between a plurality of network nodes is monitored to determine if the traffic exhibits a characteristic associated with worm propagation. Responsive action is taken if it is determined that a portion of the network traffic does exhibit the characteristic associated with worm propagation. The characteristic associated with worm propagation comprises a data communication or a variant thereof arriving at a first node and propagating from the first node to a second node within a prescribed interval after arriving at the first node.