摘要:
A method, system and computer program and method for delivering a streaming data to a remote device from a wireless transmitter. In one embodiment, a transmitter is configured to send units of the streaming data to the remote device. A receiver is configured to receive usage data about the streaming data from the remote device. An adjusting module is configured to automatically adjust a transmission strategy of unsent units of the streaming data based, at least in part, on the usage data as a function of time according to a transmission policy. The usage data may include at least location information about the remote device or time of day information at the remote device. A user interface at the remote device may be configured to adjust the predefined transmission policy.
摘要:
An embodiment of the invention is a method of accurately determining the spatial location of an RFID tag in two-dimensions or three-dimensions. The method utilizes a plurality of RFID readers to make a plurality of distance, direction, and or time-of-flight determinations. Such determinations are made by sending a request signal from one of the plurality of RFID readers and listening for a response signal from an RFID tag received at each of the plurality of RFID readers. Correction factors are then determined and the time-of-flight factors adjusted. The adjusted time-of-flight factors are then used to determine more accurately the distances between the RFID tag and each of the plurality of RFID readers. These more accurate distance measurements are then used to determine the spatial location of the RFID tag.
摘要:
The present invention is an application-aware method for allocating resources to applications based on a set of predefined policies comprising a Resource Allocation Program (RAP). The RAP is application-aware in that the RAP does not arbitrarily allocate resources to requesting applications. Instead, the RAP allocates resources to requesting applications based on predefined policies. The RAP allows a user to define the resource allocation for each policy in a Resource Allocation Table and associate the applications with the policies in a Policy Application Table. When an application requests resources, the RAP looks to the Policy Allocation Table to determine the policy associated with the application and looks to the Resource Allocation Table to determine the permissible amount of resources to allocate to the application associated with the policy. The RAP then allocates the resources to the requesting application.
摘要:
An embodiment of the invention is a method of accurately determining the spatial location of an RFID tag in two-dimensions or three-dimensions. The method utilizes a plurality of RFID readers to make a plurality of distance, direction, and or time-of-flight determinations. Such determinations are made by sending a request signal from one of the plurality of RFID readers and listening for a response signal from an RFID tag received at each of the plurality of RFID readers. Correction factors are then determined and the time-of-flight factors adjusted. The adjusted time-of-flight factors are then used to determine more accurately the distances between the RFID tag and each of the plurality of RFID readers. These more accurate distance measurements are then used to determine the spatial location of the RFID tag.
摘要:
Disclosed is a technique for result set management. One or more result sets are stored. Each result set was generated by executing a query. When at least one of a number of result sets that may be stored and a number of bucket tables that may hold result sets is modified, it is determined whether any of the one or more result sets are to be removed. When it is determined that one or more of the result sets are to be removed, those result sets are removed.
摘要:
Disclosed is a technique for result set management. One or more result sets are stored. Each result set was generated by executing a query. When at least one of a number of result sets that may be stored and a number of bucket tables that may hold result sets is modified, it is determined whether any of the one or more result sets are to be removed. When it is determined that one or more of the result sets are to be removed, those result sets are removed.
摘要:
An improved solution for managing video data is provided. In particular, for each instance of a tracking object in video, an encapsulation asset is generated. The encapsulation asset includes a set of tracking object metadata, a set of background images from the video, a set of object images for the tracking object, and a set of reconstruction data that can be used to approximate the video using the sets of background images and object images. The encapsulation assets and/or video can be stored in a computer architecture, such as an enterprise information system, and searches can be performed on the encapsulation assets.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to server provisioning in a heterogeneous computing environment and provide a method, system and computer program product for secure and verified distributed orchestration and provisioning. In one embodiment of the invention, a server provisioning method can be provided. The server provisioning method can include establishing grouping criteria, grouping different target computing nodes into different groups of target computing nodes according to the established grouping criteria, server provisioning a root node in each of the different groups of target computing nodes, and relying upon the root node in each of the different groups to peer-to-peer server provision remaining nodes in each of the different groups.
摘要:
A software program (12) is configured to initiate, process, and terminate user sessions (22, 26). A resource deallocation module (50) is linked to the software program (12) to deallocate allocated external resources of each object of a user session responsive to an impending termination of said user session. An automatic memory management module (40) is invoked by the software program with respect to said user session subsequent to the deallocation performed by the resource deallocation module (50) and prior to the termination of said user session.
摘要:
Disclosed is a technique for result set management. One or more result sets are stored. Each result set was generated by executing a query. When at least one of a number of result sets that may be stored and a number of bucket tables that may hold result sets is modified, it is determined whether any of the one or more result sets are to be removed. When it is determined that one or more of the result sets are to be removed, those result sets are removed.