摘要:
A content item recommendation device includes; a storage which stores information of a plurality of content items describing identifiers and usage characteristics of the resources used in the content items; a first specifying unit which specifies first content items which use at least S number of resources in common with a specified content item; a second specifying unit which specifies second content items which use at least K number of resources in common with each of the first content items; a calculator which calculates relationship levels between the specified content item and each of the second content items; a selector which selects recommended content items from the second content items based on the relationship levels.
摘要:
Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.
摘要:
A first acquisition unit acquires each of the resources defined by the scenario, from locations depending on identifiers of the resources. A judging unit judge, when a resource having same identifier and structure as the resource acquired is existent in the cache storage, erases the resource, the identifier thereof, and the receipt time information from the cache storage, and when not existent, stores the acquired resource in association with the identifier thereof and the receipt time information of the bookmark instruction, in the cache storage. A second acquisition, when the identifiers of the resources specified by a first scenario are existent in the cache storage, acquires the resources from the cache storage according to the receipt time information corresponding to the first scenario and identifiers of the resources, and when not existent, acquires the resources from a location depending on the identifiers.
摘要:
The program synthesizing device according to the embodiment of the present invention includes: a coupling unit configured to couple an information acquiring plug-in module, an information processing plug-in module, and a presentation plug-in module through their input interfaces and output interfaces based on a mashup scenario; a plug-in module driving unit configured to sequentially drive the coupled plug-in modules; an information acquiring unit configured to acquire information when the information acquiring plug-in module is driven; an information processing unit configured to perform a predetermined process on the information when the information processing plug-in module is driven; an object resolving unit configured to determine a value of object presented by a specified presentation scenario when the presentation plug-in module is driven; and a program output unit configured to output a program being a presentation scenario in which the object value is resolved.
摘要:
Under a multi-task environment, a tamper resistant microprocessor saves a context information for one program whose execution is to be interrupted, where the context information contains information indicating an execution state of that one program and the execution code encryption key of that one program. An execution of that one program can be restarted by recovering the execution state of that one program from the saved context information. The context information can be encrypted by using the public key of the microprocessor, and then decrypted by using the secret key of the microprocessor.
摘要:
A radio terminal or gateway capable of executing the AV/C protocol on the datalink protocol which starts communications after setting up a logical channel on a radio network is disclosed. The radio terminal or gateway transfers data packets according to the stored correspondence information among the protocol identifier, the channel identifier that is set up for the radio terminal or gateway, and the channel identifier that is set up for a correspondent radio terminal or gateway, where the correspondence information is obtained through an exchange of signaling packets containing the channel identifier indicating a logical channel that is set up for transferring the data packets and the protocol identifier indicating the AV control protocol.
摘要:
Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.
摘要:
Systems and methods are described for secure and seamless roaming between internal and external networks. Double and triple tunnels may be used to connect a mobile node to a correspondent host. A mobile node may include the ability to connect to two networks simultaneously to enable seamless roaming between networks.
摘要:
According to one embodiment, a content playback apparatus includes a playback module, a decision module, and a management module. The playback module is configured to play back a content includes components selected from moving picture data, image data, sound data and text data, thereby to produce video data and audio data. The decision module is configured to determine, based on a state of the content playback apparatus, whether the components of the content can be viewed and listened to. The management module is configured to manage video-audio management data includes data items based on a decision result of the decision module, each data item representing whether a video or audio data item has been viewed or listened to.
摘要:
According to some embodiments, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA Authentication Agent) and a DHCP (Dynamic Host Configuration Protocol) server, such as, e.g., for synchronization between the PANA SA state and the DHCP SA state, such as, e.g., maintaining synchronization when a connection is lost. In some embodiments, systems and methods for binding network bridge and network access authentication are also provided related to, inter alia, interactions between a PAA and a layer-2 switch, such as, e.g., for avoiding service thefts and the like (such as, e.g., MAC address and/or IP address spoofing) in the context of, e.g., the above. In some other embodiments, systems and methods for bootstrapping multicast security from network access authentication protocol are also provided related to, inter alia, key management for protected IP multicast streams, such as, e.g., to avoid IP multicast streams unnecessarily received and/or processed by unauthorized receivers connected to the same layer 2 segment as authorized receivers in the context of, e.g., the above.