摘要:
List-based search results are generated. According to one technique, items are extracted from multiple resources deemed relevant to a user-submitted search query, and a comprehensive master list of those items is compiled and returned to the query-submitted user in response to his submission. According to another technique, lists of items are identified within such query-relevant resources. For each list-containing resource deemed to be relevant to the query terms, a list is extract from that resource and included within that resource's abstract on the search results page returned to the user in response to his submission. Additionally, the resources may be re-ranked for generation of the search results page based on the lists contained within those resources in addition to (or regardless of) occurrences of query terms within those resources.
摘要:
List-based search results are generated. According to one technique, items are extracted from multiple resources deemed relevant to a user-submitted search query, and a comprehensive master list of those items is compiled and returned to the query-submitted user in response to his submission. According to another technique, lists of items are identified within such query-relevant resources. For each list-containing resource deemed to be relevant to the query terms, a list is extract from that resource and included within that resource's abstract on the search results page returned to the user in response to his submission. Additionally, the resources may be re-ranked for generation of the search results page based on the lists contained within those resources in addition to (or regardless of) occurrences of query terms within those resources.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for monitoring capability to process web traffic. At various times, a web proxy announces a most specific route that is received by multiple clients configured to send web traffic for an address to a received most specific route to the address. The web proxy processes web traffic received from one of the clients as a result of announcing the route. When the web proxy determines a decrease in processing capability of the web proxy, the web proxy ceases to announce the most specific route such that one or more of the clients direct web traffic for the address to an alternative less specific route.
摘要:
Techniques for generating a data-based graphical representation include providing, to a user, a graphical user interface that comprises selectable attribute names; receiving a user selection of a first attribute name; in response to receiving the user selection, invoking a call to a back-end server that comprises a database, the database storing sets of attribute values, each set of attribute values associated with one of the selectable attribute names; receiving, from the back-end server, a response to the invoked call, the response comprising a particular set of attribute values that is associated with the user-selected first attribute name; generating the graphical representation of a relationship between the received attribute values associated with the user-selected first attribute name and a key figure of the attribute values; and preparing the graphical representation for display on the graphical user interface.
摘要:
A number of requests for an alternative network location are identified, where the requests for the alternative network location are generated after failure of one or more previous requests to reach a first, previous network location as a result of a network brownout. It is determined if the number of requests for the alternative network location exceed a threshold value for a period of time, and if so, an alarm is generated.
摘要:
A multiple degree of freedom actuator can have at least one first MEMS actuator configured to move a platform in translation and at least one second MEMS actuator configured to move the platform in a different direction, e.g., tangentially. The first MEMS actuator(s) can facilitate autofocus and/or zoom, for example. The second MEMS actuator(s) can facilitate optical image stabilization (OIS), for example.
摘要:
Methods and systems for segmenting printed media pages into individual articles quickly and efficiently. A printed media based image that may include a variety of columns, headlines, images, and text is input into the system which comprises a block segmenter and a article segmenter system. The block segmenter identifies and produces blocks of textual content from a printed media image while the article segmenter system determines which blocks of textual content belong to one or more articles in the printed media image based on a classifier algorithm. A method for segmenting printed media pages into individual articles is also presented.
摘要:
A device can have an outer frame and an actuator. The actuator can have a movable frame and a fixed frame. At least one torsional flexure and at least one hinge flexure can cooperate to provide comparatively high lateral stiffness between the outer frame and the movable frame and can cooperate to provide comparatively low rotational stiffness between the outer frame and the movable frame.
摘要:
A moving object is classified by transmitting, by a linear array of transmit antenna elements, a microwave into a surveillance area. A scattered microwave backprojected from a moving object is received by a linear array of receive antenna elements. Features are extracted from the scattered microwave related to a spiral evolution of the scattered microwave. The moving object is then classified as one of a set of possible classes according to the extracted features, and an alarm signal can be generated indicating the selected class.
摘要:
Disclosed are apparatus and methods for facilitating communication between two devices from two different VSANs by propagating each device's presence from a first VSAN to the other device's different VSAN using a network address translation (NAT) mechanism. For instance, a first device, such as a host H1, from VSAN_A is allowed to access data from a second device, such as disk D1, of VSAN_B by propagating D1's presence into VSAN_A and H1's presence into VSAN_B. This awareness is accomplished by propagating an identifier for each device into the edge VSAN of the other device, as well as into any transit VSAN. So as to not duplicate identifiers in any one of the VSANs, a device's presence is propagated into a particular VSAN by assigning an unused domain for use by such device in the particular VSAN.