摘要:
Efficient reconciliation of different versions of a target file or dataset can be facilitated using a hash hierarchy of a master version of the dataset. Each level of the hash hierarchy has hashes of blocks of the master version that may be sub-blocks of the hashes in the level above. The top level of the hash hierarchy, having the hashes of the largest blocks of the master, may be transmitted on a first communication channel, possibly a one-way or broadcast communication channel. Streams of encodings of each lower level of the hash hierarchy may be transmitted on respective communication channels. The encodings for a level of the hierarchy may be combinations, such as random linear combinations, of the hashes of that level. A receiver with a target dataset can receive the top level hashes from the first channel and use them to determine which lower hashes are needed to identify parts of the master missing from the target. The encodings can be used to help obtain needed lower level hashes that can be used to more finely identify missing parts. Different receivers may not have to wait for a particular piece of information about the master. Rather, any received information (e.g. encoding) about the master will most likely allow any receiver to advance its understanding of the master dataset. Receivers will usually not have to wait for delivery of a particular hash in the hierarchy.
摘要:
Efficient reconciliation of different versions of a target file or dataset can be facilitated using a hash hierarchy of a master version of the dataset. Each level of the hash hierarchy has hashes of blocks of the master version that may be sub-blocks of the hashes in the level above. The top level of the hash hierarchy, having the hashes of the largest blocks of the master, may be transmitted on a first communication channel, possibly a one-way or broadcast communication channel. Streams of encodings of each lower level of the hash hierarchy may be transmitted on respective communication channels. The encodings for a level of the hierarchy may be combinations, such as random linear combinations, of the hashes of that level. A receiver with a target dataset can receive the top level hashes from the first channel and use them to determine which lower hashes are needed to identify parts of the master missing from the target. The encodings can be used to help obtain needed lower level hashes that can be used to more finely identify missing parts. Different receivers may not have to wait for a particular piece of information about the master. Rather, any received information (e.g. encoding) about the master will most likely allow any receiver to advance its understanding of the master dataset. Receivers will usually not have to wait for delivery of a particular hash in the hierarchy.
摘要:
Efficient reconciliation of different versions of a target file or dataset can be facilitated using a hash hierarchy of a master version of the dataset. Each level of the hash hierarchy has hashes of blocks of the master version that may be sub-blocks of the hashes in the level above. The top level of the hash hierarchy, having the hashes of the largest blocks of the master, may be transmitted on a first communication channel, possibly a one-way or broadcast communication channel. Streams of encodings of each lower level of the hash hierarchy may be transmitted on respective communication channels. The encodings for a level of the hierarchy may be combinations, such as random linear combinations, of the hashes of that level. A receiver with a target dataset can receive the top level hashes from the first channel and use them to determine which lower hashes are needed to identify parts of the master missing from the target. The encodings can be used to help obtain needed lower level hashes that can be used to more finely identify missing parts. Different receivers may not have to wait for a particular piece of information about the master. Rather, any received information (e.g. encoding) about the master will most likely allow any receiver to advance its understanding of the master dataset. Receivers will usually not have to wait for delivery of a particular hash in the hierarchy.
摘要:
Efficient reconciliation of different versions of a target file or dataset can be facilitated using a hash hierarchy of a master version of the dataset. Each level of the hash hierarchy has hashes of blocks of the master version that may be sub-blocks of the hashes in the level above. The top level of the hash hierarchy, having the hashes of the largest blocks of the master, may be transmitted on a first communication channel, possibly a one-way or broadcast communication channel. Streams of encodings of each lower level of the hash hierarchy may be transmitted on respective communication channels. The encodings for a level of the hierarchy may be combinations, such as random linear combinations, of the hashes of that level. A receiver with a target dataset can receive the top level hashes from the first channel and use them to determine which lower hashes are needed to identify parts of the master missing from the target. The encodings can be used to help obtain needed lower level hashes that can be used to more finely identify missing parts. Different receivers may not have to wait for a particular piece of information about the master. Rather, any received information (e.g. encoding) about the master will most likely allow any receiver to advance its understanding of the master dataset. Receivers will usually not have to wait for delivery of a particular hash in the hierarchy.
摘要:
The method comprises modelling a delay-tolerant dynamic network comprising time-varying links transforming it into a static time-expanded network graph, and managing bulk data transfer on the basis of said static time-expanded network graph.The device comprises a scheduler unit with processing capabilities implementing an algorithm which processes arc costs (cijt) and storage costs (pit) as per the method of the first aspect of the invention.
摘要:
Method for downloading segments of a video file in a peer to peer network which comprises requesting to create new neighbourhood lists according to a health parameter which indicates availability of video segments among neighbors. Scheduling methods for the upload and download schedulers which work in synergy with the aforementioned features are also disclosed.
摘要:
Power converters such as power modules configured as inverters employ modularized approaches. In some aspects, semiconductor devices are thermally coupled directly to thermally conductive substrates without intervening dielectric or insulative structures. Additionally, or alternatively, semiconductor devices are thermally coupled to thermally conductive substrates with relatively large surface areas before heat transferred from the semiconductor devices encounters a dielectric or electrically insulating structure with correspondingly high thermal impedance.
摘要:
The Translucent Proxying of TCP (TPOT) device and methods use TCP-OPTIONS and IP tunneling to guarantee that all IP packets belonging to a specific TCP connection will traverse the proxy which intercepts the first packet of data. This guarantee allows the ad-hoc deployment of TPOT devices anywhere within the communication network, and does not restrict the placement of proxy devices at the edge of the network. Furthermore, no extra signaling support is required for the TPOT device to properly function while the addition of TPOT devices to communication networks significantly improves the throughput of intercepted TCP packets of data.
摘要:
A method and apparatus for providing user specific request redirection in a content delivery network includes parsing a page having embedded objects intended for redirection to at least one cache server, and transforming the embedded objects into relative uniform resource locators (URLs). A content-base token is inserted into an HTTP response header in response to a user request for the page. In an instance where the content-base token is not supported by the server and/or client devices, a base token is inserted into the page in response to a user request for the page. The content-base token and base token provide identification of a server or URL prefix where the embedded objects in the page are to be retrieved. The requested page is then sent to the user's browser. The browser constructs absolute URLs from the embedded URLs using either the received content-base token or base token, to retrieve embedded objects from the server.
摘要:
The invention provides a pharmaceutical formulation comprising: (1) THAM, which is tris(hydroxymethyl)aminomethane, as a selective absorbefacient to enhance through the nasal mucosa-lined epithelium the absorption of substances of peptide nature; and (2) a therapeutically effective amount of active nasal peptide, its pharmaceutically acceptable salt or its peptidic fragment; in a pharmaceutically acceptable, aqueous liquid diluent or carrier, said formulation being in a form suitable for nasal administration.