摘要:
A method and system to selectively secure the display of advertisements on web browsers. A method in accordance with an embodiment includes: defining a particular displayed area of the interpreted markup file; obtaining the DOM tree of the interpreted markup file, the DOM tree comprising parent and child nodes, each node being associated with displayable elements; identifying in the DOM tree a set of child nodes whose displayable elements comprise the particular displayed area; identifying in the DOM tree a first parent node comprising the set of child nodes; converting displayable elements associated with the identified first parent node to an image; generating a second parent node comprising the image; and modifying the DOM tree into a modified DOM tree by deleting the identified set of child nodes and by replacing the identified first parent node by the second parent node.
摘要:
A method and system to secure the display of a particular element of a markup file, interpreting a markup file comprising displayable elements, converting the displayable elements of the markup file to at least one image and constructing a modified markup file including the at least one image and a scripting language code adapted to encode links and input fields associated to the image.
摘要:
A method and system to secure the display of advertisements on web browsers. A method according to an embodiment includes: interpreting a markup file in a virtual machine, converting displayable elements of the markup file to one or a plurality of images and constructing a modified markup file comprising the at least one image file and a scripting language code adapted to cause a user terminal upon which it is executed to transmit coordinate information defining the position of a user-controlled cursor and action information defining a clicking action.
摘要:
A method and system to selectively secure the display of advertisements on web browsers. A method in accordance with an embodiment includes: defining a particular displayed area of the interpreted markup file; obtaining the DOM tree of the interpreted markup file, the DOM tree comprising parent and child nodes, each node being associated with displayable elements; identifying in the DOM tree a set of child nodes whose displayable elements comprise the particular displayed area; identifying in the DOM tree a first parent node comprising the set of child nodes; converting displayable elements associated with the identified first parent node to an image; generating a second parent node comprising the image; and modifying the DOM tree into a modified DOM tree by deleting the identified set of child nodes and by replacing the identified first parent node by the second parent node.
摘要:
A method and system to secure the display of advertisements on web browsers. A method according to an embodiment includes: interpreting a markup file in a virtual machine, converting displayable elements of the markup file to one or a plurality of images and constructing a modified markup file comprising the at least one image file and a scripting language code adapted to cause a user terminal upon which it is executed to transmit coordinate information defining the position of a user-controlled cursor and action information defining a clicking action.
摘要:
A system and a method for loading a called class file table with data indicating a highest version of a class file of a software application are provided. The method includes retrieving a first class version dependency file associated with a first class file, having both a first class name and a first version number associated with a second class file that is called by the first class file. The method further includes adding a first record to the called class file table having both the first class name and the first version number associated with a second class file, and retrieving a second class version dependency file associated with a third class file. The second class version dependency file has both a second class name and a second version number associated with a fourth class file called by the third class file. The method further includes if the second class name is identical to the first class name in the called class file table and the second version number is higher than the first version number, then updating the first record in the called class file table with the second class name and the second version number.
摘要:
A masterless time slot allocation technique that collaboratively synchronizes, at a time slot level, devices communicating in an ad hoc network. Responsive to determining a current time slot allocated to a first device is occurring, the first device transmits a map to the other devices. The map includes an allocation of time slots to the devices, including indicators for whether each time slot is free, busy or overbooked, devices that own the time slots, and how recently information associated with each time slot was updated. After receiving the map, a second device determines a conflict in which the same time slot is allocated to the second device and to another device. The conflict is resolved by allocating another time slot to the second device and the result of resolving the conflict is each slot is allocated to no more than one device.
摘要:
The present invention is directed to reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: receiving, by a plurality of first RFID tags, a signal broadcast by an RFID reader, the signal initiating a reading sequence of the plurality of first RFID tags, wherein each first RFID taq is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag, wherein the IDs emitted by the first RFID tags are not captured by the RFID reader; the RFID reader interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs.
摘要:
A transponder, a method for powering the transponder, and a system relating to the method. The transponder includes at least two electrical coils, a dipole antenna, and a chip electrically connected to the dipole antenna and the electrical coils, wherein the electrical coils surround the dipole antenna and the chip. The transponder is surrounded with a wiring loop. An alternating current is generated in the wiring loop. The alternating current generates a magnetic field at the electrical coils. The electrical coils receive energy from the magnetic field and transfer the received energy to the chip for powering the transponder. The dipole antenna is configured to transmit an output signal to a reader and to receive an input signal from the reader.
摘要:
A method and system for dividing a set of tagged items into subsets. Each tagged item is tagged with a passive RFID tag. A RFID reader is instructed to poll the RFID tags of all tagged items in a specified region having fixed boundaries to generate information including, for each tagged item, a spatial location of each tagged item and a list of all other tagged items in the region which are adjacent to each tagged item. The region is split into a plurality of subregions. For each subregion, a central tagged item having more adjacent tagged items in each subregion than any other tagged item in each subregion is determined, utilizing the generated information. A virtual boundary is outlined around the central tagged item to enclose the central tagged item and a portion of the tagged items in each subregion which are adjacent to the central tagged item.