摘要:
The present invention provides an in-line wrapper sentry for a programming language to detect events and to transparently extend the behavior of the events.
摘要:
In execution of PROLOG-type programs, certain information is not saved at the time a procedure call is made. Such information is saved only if it becomes necessary, and at that time is saved in a known manner. If subsequent events make it unnecessary to save that certain information, the time required to do so has not been spent, thus improving system performance.
摘要:
In some implementations, a processor may retrieve predicted positioning data and predicted orbital data from global navigation satellite service (GNSS) positioning circuitry of a wireless device in response to a request for device time. The processor may retrieve long-term learning (LTL) data for a temperature sensing crystal (TSX) of the wireless device, the LTL data including S-curve characteristics of the TSX, and the time tracking uncertainty of the TSX. The processor may generate a GNSS-based device time estimate using the predicted positioning data and the predicted orbital data. The processor may perform TSX-based device time processing by updating the GNSS-based device time estimate using a clock signal of the TSX to generate a final device time estimate, the updating based on the retrieved LTL data for the TSX.
摘要:
Embodiments of the present invention are directed to methods and systems for utilizing the history of previous authentications and authorizations related to third party computers, as factors in determining whether a current request for accessing a resource should be authorized. A processor server computer, in determining whether to authorize access to the resource, may generate and send a query message to one or more of the third party computers to obtain authorization activity that the third party computers may have regarding a user and/or a device associated with the request. The processor server computer may use the authorization activity from the third party computers in determining whether the request is an authentic request and that the request should be authorized.
摘要:
Operations of a plasma etch reactor (10) are monitored to detect aberrations in etching operations. A reference end point trace is defined (62) for the etch process. Regions are defined in the reference end point trace (70) with aid of a dynamic time warping matching function (84) and characteristics and tolerances for each region are defined (72-80). The etcher is run and an actual end point trace is obtained (82) from the running of the etcher. A warping function is constructed (88) between the actual trace and the reference trace. In building the warping function, candidate path segments (100) are constructed according to a minimum cumulative cost function (96). Once the regions of the reference trace and the actual trace has been matched according to an optimum dynamic time warping function path (106), characteristics of the matched regions are compared (66) to determine whether aberrations have occurred during the etch process. In an alternative embodiment, the actual trace (164) is matched to each of a library of reference traces (162,182) by dynamic time warping (166). By determining the best match, a determination can be made whether the actual trace is abnormal (174) or normal (176), and the type of abnormality.
摘要:
The invention provides a method and system for verifying a data record. An unverified data record is read. A reference data file containing reference data records, the reference data records being associated with verified data records, is provided. The unverified data record is compared with the reference data records to identify a matching reference data record. The matching reference data record is read to identify a matching verified data record. The matching verified data record is outputted.
摘要:
A method of component assembly based on an engine inserted into code of an application that causes the application to be modified by tools while the application is running. The method can be used with a Java component where the applet byte-code contain a modifier engine and interfaces that launch tools to allow the modifications.
摘要:
The present invention includes a video encoder optimized so as to be implemented using general purpose DSPs or as software executable on a general purpose microprocessor. The present invention includes a modified motion detector module (50) which classifies blocks in the currently processing image as moving or stationary. Blocks classified as moving are then processed by an modified motion compensation module (52) which uses a center-biased orthogonal searching procedure to match the block with a previously processed image. A zero block detector module (54) determines whether the block will generate a zero-valued block after being processed by a transform module 18 and a quantization module 20. If a zero-valued block is predicted, the transformation module 18 and the quantization module 20 are bypassed.
摘要:
A video encoder optimized so as to be implemented using general purpose DSPs or as software executable on a general purpose microprocessor includes a modified motion detector module (50) which classifies blocks in the currently processing image as moving or stationary. Blocks classified as moving are then processed by an modified motion compensation module (52) which uses a center-biased orthogonal searching procedure to match the block with a previously processed image. A zero block detector module (54) determines whether the block will generate a zero-valued block after being processed by a transform module 18 and a quantization module 20. If a zero-valued block is predicted, the transformation module 18 and the quantization module 20 are bypassed.
摘要:
A computer system capable of compiling PROLOG programs appends to the compiled code information necessary to recreate the source which generated the compiled code. This allows program statements which use the original source code to be compiled. Each program statement is compiled into a separate block of code, with all statements in a procedure linked together in lists. Program statements can be compiled as they are created, and statements can be added or deleted by adding or deleting blocks of compiled code from the appropriate lists.