摘要:
A method is disclosed for reducing memory consumption in a run time environment by reducing copies of code in memory, wherein the method limits, based on the delegation, identical resources in memory and reduces memory consumption by not creating class loaders to load resources that are already loaded by existing class loaders.
摘要:
A system and method are disclosed for decreasing the number of duplicate library copies loaded into memory without endangering the security of applications in a runtime environment. In a preferred embodiment, applications in the runtime environment may be provided with a delegation classloader that identifies any libraries referenced by the delegation classloader's respective application. The delegation classloaders then delegate the task of providing the referenced libraries to a distinct software component. In a preferred embodiment, the distinct software component may be another delegation classloader or other loader adapted to look at a single library or a small set of libraries. These “atomic” classloaders can be freely shared by multiple applications since they do not expose any application's internals. Each atomic classloader preferably loads one copy of its associated library or libraries into memory. This single instance of shared library code is made available to multiple applications without requiring explicit cooperation between applications or endangering their security.
摘要:
A method is described to allow a device to retrieve a message, that is separated into a plurality of fragments, from a data source, wherein the method involves: establishing a first network connection with the data source; receiving a subset of the plurality of fragments; determining the first network connection has ended before completion of said message; establishing one or more subsequent network connections with the data source; and receiving any of the plurality of fragments not within the subset. The characteristics (for example: application protocol, security, speed, reach, bandwidth capability, cost of usage, network type, physical layer type, data-link layer type, or IP address of one or both of the first and second devices) of the first network connection can be potentially different than the subsequent network connections.
摘要:
A remote mobile device periodically connects with a centralized data server to receive updated information. Because of the mobile nature of the remote device, a download of all available information may not be able to be completed during the initial network connection. When the mobile device can again reconnect to the centralized data server, the two machines are able to continue the exchange of information even if the new network connection uses different underlying technologies or different connection protocols. A fragmentation layer is used in the protocol stack above the transport layer to separate messages into chunks. By tracking which chunks are successfully sent between the two machines, the efficient exchange of messages can occur across multiple, different network connections.
摘要:
A seat back structure includes a web extending about a central opening, and an inner flange extending about an inner perimeter of the web adjacent to the central opening. The seat back structure also includes an outer flange extending about an outer perimeter of the web. The inner flange, the outer flange and the web form a channel extending about the seat back structure, and the seat back structure is formed from a single piece of material.
摘要:
A method for tracking objects in a way that, conserves power resources. The method can establish a designed range defining a safe area based upon the broadcast signal of an anchor beacon. When the tracking device is within the designed range, the tracking device can be placed in a mode of low power consumption. Should the tracking device move outside of the designated range, then the tracking device can be placed in mode for active tracking. The level of power consumption can he achieved by only enabling a WAN transceiver in the active tracking mode.
摘要:
The present invention discloses a method of tracking objects. In the method, an anchor beacon can emit a broadcast over a range that is detectable by an object tracking device. The object tracking device can automatically detect a presence or absence of the broadcast. When the broadcast is present; the object tracking device can take no action. When the broadcast is absent, the object tracking device can determine a current location for the object tracking device and can convey an OTA communication to a tracking server. The OTA communication can indicate the absence of the broadcast and can also including the current location. The tracking server can selectively send a notification to a previously designated communication device to notify a user that the object tracking device is outside the range.
摘要:
A method of prepaying for usage time for a communication device can include increasing an available balance of a prepaid account linked to a communication device of a first user by a designated amount responsive to a request from a second user (910) and allocating a portion of the available balance of the prepaid account that is attributable to the designated amount for communicating with a designated user (915). The method further can include paying charges resulting from communications between the communication device of the first user and the designated user from the allocated portion of the available balance of the prepaid account (925).
摘要:
A foam assembly for use as an interior component in an automobile includes a foam core having a hard foam portion and a soft foam portion. The hard foam has a first density to provide firmness and support to the foam core and the soft foam has a second density that is less than the first density, to provide comfort and feel to the foam core. The foam assembly may further including an impervious barrier that is disposed between the hard foam and the soft foam to maintain separation between the hard foam and the soft foam.
摘要:
A cellular mobile station including a modem processor and memory. The memory includes instructions for the modem processor to perform layer 1 processor operations, layer 2 processor operations, and layer 3 processor operations. The modem processor executes the instructions to perform processor operations for the cellular mobile station to communication data as per a cellular communications protocol. In one example, the mobile station includes different levels of memory to provide different deterministic access times