摘要:
A browser with a sound input receives a sound passage associated with a content site. The browser sends a representation of the sound passage to a service system where it is compared with stored representations of sound passages that each have an associated URI. On finding a match, the service system sends back the URI associated with the matched stored sound-passage representation. The browser uses this URI to access the content site.
摘要:
Location information about a communicating entity (41), in particular a mobile entity, is derived by identifying intermediate nodes (42) along the communication path being used by the entity, and then looking up, in a database (44), the geographic significance of at least one of these nodes when considered in a direction along the communication path towards the entity of interest. Preferably, account is taken of any identified downstream/upstream nodes to refine the geographic significance of a node. The geographic significance information can be compiled by taking location fixes at a plurality of endpoint locations and associating the location data thus obtained with the intermediate nodes traversed when communication is effected from the corresponding endpoint locations.
摘要:
Data are transmitted in blocks over a channel together with control signals for coordinating access to the channel. The control signals have the same values as some of the data blocks, these values being selected so that the control signals are spaced throughout the population of data block values and so that there is a greater Hamming distance between the control signal values than between the data signals. The control signals are transmitted between delimiter signals which differ from any of the data block signals, and are passed through a scrambling and encoding system in the same way as data signals, so that the spectrum of radiated electromagnetic emissions from the channel is not affected by the control signals.
摘要:
According to a first aspect of the present invention there is provided a method of modelling a network comprising operating the network as a neural network and executing a neural network modelling algorithm on the network, whereby the network models its own response to a requested action.
摘要:
A method for controlling a computer entity to participate in a peer to peer network of a plurality of computer entities comprises, for each computer entity, operating a peer to peer protocol for enabling the computer entity to utilise resources of at least one other computer entity of the network, and for enabling at least one other computer entity of the network to utilise resources of the computer entity. Each computer entity is arranged to automatically operate a process for managing at least one other computer entity in the network, whenever the computer entity takes part in the peer to peer network using the peer to peer protocol.
摘要:
Location data about a mobile entity (70) is periodically provided to a location-sensitive application, for example, a route-tracking application. The location data is updated at a frequency that is adaptively varied in dependence on the provision of location data about the mobile entity from other sources (45). The update frequency can also be made dependent on further factors such as: the motion of the mobile entity(“V”), the current environment of the mobile entity (“E”), and the progress of the location-sensitive application (“Z”).
摘要:
A data packet is transmitted by dividing it into sub-packets, for example by distributing successive bytes of the data packet to different sub-packets each containing at most p.sup.n -1 symbols, where p is a prime number, and transmitting the sub-packets along two or more respective paths. CRC checksums are added to the sub-packets, the checksum for each path being generated using a different and respective generator polynomial of degree b. These generator polynomials are selected so that, for arithmetic carried out modulo p, each polynomial has a respective factor of degree at least b-n+1, and the collection of polynomials which are each exactly divisible by all such factors constitutes a BCH code. As a result the system has advantageous properties in respect of error detection and implementation.