摘要:
The first data flow is buffered at a receiver, and the buffer contents are scanned for metadata. Where metadata are found indicating a second data flow which has not yet arrived, the system enters a stalling phase during which the length of any silent periods in the first data flow are stretched. As the point in the first data flow at which the second data flow is necessary gets closer, the factor by which silent periods are stretched increases exponentially. Once the expected second data flow in fact arrives, playback of two data flows is accelerated by compressing silent periods so as to clear the backlog of additional data that built up in the buffer during the stalling phase.
摘要:
A method of controlling the storage of web objects in a storage media, the web objects forming a closed web site and being adapted for delivery to a user, the web objects being stored on the basis of predictive determinations of which web object has the highest probability of being selected from the closed web site by the user.
摘要:
A method of controlling the storage of web objects in a storage media, the web objects forming a closed web site and being adapted for delivery to a user, the web objects being stored on the basis of predictive determinations of which web object has the highest probability of being selected from the closed web site by the user.
摘要:
A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask.
摘要:
There is disclosed a method and system for resizing a digital image wherein a RGB image is converted into an YCbCr image (Y, Cb, Cr planes). Thereafter, a discrete cosine transform (DCT), followed by a specific inverse cosine transform (IDCT) is performed on each row/column of the Y, Cb, Cr planes. The mentioned specific operation corresponds to a type of homothetic matrix, which dimensions are defined by a scaling factor. In order to produce a scaled image, the scaled Y, Cb, Cr images are transformed to an RGB image for display.
摘要:
The invention provides a retransmission manager for use in a digital content delivery system, wherein the delivery system comprises a plurality of user devices, a set of content providers for delivering digital content to the user devices in the form of bursts of content through a source unit. The retransmission manager is connected to the user devices to receive notifications therefrom, each notification received from a given user device identifying a burst received by the given user device which is candidate for retransmission. The retransmission manager selects a set of bursts among the bursts identified by the notifications based on the amount of available bandwidth at the source unit and on negotiation messages received from at least one of the plurality of content providers, the negotiation message being related to at least one burst identified in the notifications and including, for each burst, a negotiation parameter. The retransmission manager then sends a request for retransmission of the selected bursts to the source unit.
摘要:
A system and a method for loading a called class file table with data indicating a highest version of a class file of a software application are provided. The method includes retrieving a first class version dependency file associated with a first class file, having both a first class name and a first version number associated with a second class file that is called by the first class file. The method further includes adding a first record to the called class file table having both the first class name and the first version number associated with a second class file, and retrieving a second class version dependency file associated with a third class file. The second class version dependency file has both a second class name and a second version number associated with a fourth class file called by the third class file. The method further includes if the second class name is identical to the first class name in the called class file table and the second version number is higher than the first version number, then updating the first record in the called class file table with the second class name and the second version number.
摘要:
There is disclosed a method and system for resizing a digital image wherein a RGB image is converted into an YCbCr image (Y, Cb, Cr planes). Thereafter, a discrete cosine transform (DCT), followed by a specific inverse cosine transform (IDCT) is performed on each row/column of the Y, Cb, Cr planes. The mentioned specific operation corresponds to a type of homothetic matrix, which dimensions are defined by a scaling factor. In order to produce a scaled image, the scaled Y, Cb, Cr images are transformed to an RGB image for display.
摘要:
A masterless time slot allocation technique that collaboratively synchronizes, at a time slot level, devices communicating in an ad hoc network. Responsive to determining a current time slot allocated to a first device is occurring, the first device transmits a map to the other devices. The map includes an allocation of time slots to the devices, including indicators for whether each time slot is free, busy or overbooked, devices that own the time slots, and how recently information associated with each time slot was updated. After receiving the map, a second device determines a conflict in which the same time slot is allocated to the second device and to another device. The conflict is resolved by allocating another time slot to the second device and the result of resolving the conflict is each slot is allocated to no more than one device.
摘要:
The present invention is directed to reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: receiving, by a plurality of first RFID tags, a signal broadcast by an RFID reader, the signal initiating a reading sequence of the plurality of first RFID tags, wherein each first RFID taq is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag, wherein the IDs emitted by the first RFID tags are not captured by the RFID reader; the RFID reader interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs.