摘要:
Various methods for unwanted traffic control in a wireless network are provided. One example method may include detecting an occurrence of unwanted content as indicated by receipt of a complaint about a content item provided by a source device, wherein the complaint may be received from a remote mobile device or generated locally based on a local detection. The example method may further include determining a trust value for the source device based at least on the complaint, determining that the source device is a distrusted device based at least on a comparison between the trust value and a trust threshold value, and causing traffic from the source device to be controlled as unwanted traffic. Similar and related example methods, example apparatuses, and example computer program products are also provided.
摘要:
In some embodiments, the present invention provides methods of making graphene-carbon nanotube hybrid materials. In some embodiments, such methods generally include: (1) associating a graphene film with a substrate; (2) applying a catalyst and a carbon source to the graphene film; and (3) growing carbon nanotubes on the graphene film. In some embodiments, the grown carbon nanotubes become covalently linked to the graphene film through carbon-carbon bonds that are located at one or more junctions between the carbon nanotubes and the graphene film. In some embodiments, the grown carbon nanotubes are in ohmic contact with the graphene film through the carbon-carbon bonds at the one or more junctions. In some embodiments, the one or more junctions may include seven-membered carbon rings. Additional embodiments of the present invention pertain to graphene-carbon nanotube hybrid materials that are formed in accordance with the methods of the present invention.
摘要:
Provided are compounds of the formula (I): or a stereoisomer, tautomer, salt, hydrate or prodrug thereof that modulate tyrosine kinase activity, compositions comprising the compounds and methods of their use.
摘要:
Techniques for collaborative context recognition include determining a plurality of groups of user types. Each different group is associated with a corresponding different range of values for an attribute of a user. First data is received, which indicates context data for a device and a value of the attribute for a user of the device. A particular group of user types to which the user belongs is determined based on the value of the attribute for the user. A context label based on the context data and the particular group is determined to be sent. Some techniques include determining a value of an attribute and context data based on context measurements. First data that indicates the context data and the value of the attribute is determined to be sent. A context label based on the context data and the value of the attribute is received.
摘要:
An approach is provided for providing a list-based interface to key-value stores. The library interface platform determines one or more key-value pairs of at least one key-value store, the one or more key-value pairs comprising one or more data entries. Next, the library interface platform causes, at least in part, an association of at least one list object with the one or more key-value pairs, one or more sub-list objects, or a combination thereof. Then, the library interface platform provides at least one interface for performing one or more operations on the at least one list object to interact with the one or more data entries, the one or more key-value pairs, the one or more sub-list objects, or a combination thereof.
摘要:
An example apparatus is provided that includes a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least perform a number of operations. The operations include preparing for transmission a query for feedback data regarding a decision to select one of a set of actions in a given context. The query includes an indication of the given context and a decision metric reflecting historical decisions at the apparatus to select the respective action in each of a plurality of contexts. The operations also include receiving feedback data, and calculating a recommendation value as a function thereof. In this regard, the feedback data has been calculated by one or more nodes as a function of the decision metric and another decision metric reflecting historical decisions at the respective node(s).
摘要:
An approach for providing credibility information over an ad-hoc network is described. A trust manager receives content from a transmitting node over an ad-hoc network. The trust manager retrieves one or more trust values associated with the content, the transmitting node, or both, wherein the trust values are assigned by a trust server and further adjusted based on locally collected credibility information. The trust manager conducts a local evaluation of credibility information regarding the content, the transmitting node, or both. The trust manager then generates one or more combined trust values for the content, the transmitting node, or both from the trust values and the local evaluation.
摘要:
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
摘要:
A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
摘要:
A handheld device (100) is capable of communicating wirelessly with a ticket issuer (200) through a network (300) or by using a short-range link such as Bluetooth, IrDA, or the like. A ticket is purchased using a payment system (400). A user selects an image from a data store (120) and transmits it to the ticket issuer (200) along with data associated with the requested ticket. This data may comprise identification data of the user and/or the device (100), data concerning a requested validity of the ticket, data concerning the payment method and/or an optional reservation number. The ticket issuer (200) receives the request then transmits to the user a template, which the user then fills in before transmitting payment data, the completed template and the selected image from the user device (100) to the ticket issuer (200), as one or more SMS and/or MMS messages. If the data is verified as satisfactory, the ticket is then created by the ticket issuer (200) and visible and/or invisible watermarks are embedded into the image. The processed picture/image and the template are combined with additional data to generate a valid image digital ticket for the ticket user, which is then sent to the user or to an address or device which the user has given.