摘要:
A technique, system, and computer program for collecting information about user behavior in the presence of dynamic page content. Regular expressions are used to describe dynamic page content and classify pages into equivalence classes. A Web site monitoring tool using this collection technique to create user profiles can then contend with a range of dynamic page content.
摘要:
A matrix is created for storing the various verified methods of communication that are available between a plurality of hosts. Each host pair has two or three values stored in the matrix to indicate the known methods of communications between each other. A first value indicates whether unreliable multicast communications are possible, not possible or not yet determined. A second value indicates whether unreliable unicast communications are possible, not possible, or not yet determined. A third optional value may indicate whether reliable unicast communications are possible, not possible, or not yet determined. The mode of communications between each pair of hosts is then selected in the order of unreliable multicast, unreliable unicast, and, finally, reliable unicast.
摘要:
Collaboration capabilities (both "push" and "pull" of information) are portably added to World-Wide Web content. In particular, a persistent connection is maintained to a shared state server for retrieving data via a "push" mechanism which maintains the freedom to access arbitrary Web content via the "pull" mechanism. Moreover, the collaboration is provided in a portable manner, in the same way that all other Web content is portable both across hardware platforms and across browser implementations.
摘要:
Disclosed is a method and system for collecting profile information about users accessing dynamically generated content from one or more servers. In a specific embodiment, a server dynamically generates a web page in response to a user request. The server customizes the web page content based on the requested universal resource identifier (URI) and one or more of: the user's identity, access permissions, demographic information, and previous behavior at the site. The web server then passes the URI, user identity, and dynamically generated web page to an access information collector. The access information collector generates document comparators from the current web page content and compares them to document comparators associated with previously retrieved web pages. If the current web page is sufficiently similar to some previously retrieved web page, the access information collector logs the URI, user identity, and a document key associated with the matching previously retrieved page. Otherwise, the access information collector generates a new key; stores the new key and the document comparators in a database; and logs the URI, user identity, and the newly generated document key.
摘要:
An application is enabled to allow any one of a variety of locking behaviors including different locking behaviors for different elements of shared text. For example, whereas one string may be associated with an implicit lock (granted when the user gives that string focus), another string may have an explicit lock (granted when the user takes some particular action such as clicking on a “lock” button), while yet another string may have a deferred lock (granted only when the user attempts to update the string). A similar range of possibilities is available for string update events and for unlocking the string.
摘要:
A software communication system is configured with a base connection point with a plug-in type architecture. A plurality of classes is used that implements a specified interface, the interface including a method for receiving packet data. Each one of the plurality of classes is assigned to a component identifier. The plurality of classes are registered using a corresponding component identifier, and information in a packet is used to select an appropriate one of the classes to receive the packet data.
摘要:
Content retrieval techniques are described. In an implementation, a determination is made as to whether a client is permitted to receive content requested by the client. When the client is permitted to receive the content, a communication is formed to be communicated via a wide area network that includes a hash list having a hash of each of a plurality of blocks of the content, each hash being configured to enable the client to locate a corresponding one of the blocks of the content via a local area network.
摘要:
A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings displayed in a meeting management window and send requested showing the selected meaning. Credentials, such as a password, may be supplied with the request. When the request is validated, information is sent to the requester for use in joining the meeting. When an ad hoc wireless session is used to hold a meeting the discovery process may further include analyzing data traffic to determine which wireless sessions are meetings.
摘要:
A mesh is joined by a node, wherein the mesh includes a Distributed Routing Table (DRT) for determining addresses of nodes in the mesh. A DRT message is processed in accordance with a security mode of the DRT.
摘要:
The invention is a method and apparatus for automatically opening files of particular types in a computer application program using certain attributes, such as window size and position, as dictated by user preferences based on the user's previous habits in opening files of the same type in that particular computer application program or based on properties of the file itself.