Abstract:
Indexing methods are described that may be used by databases, search engines, query and retrieval systems, context sensitive data mining, context mapping, language identification, image recognition, and robotic systems. Raw baseline features from an input signal are aggregated, abstracted and indexed for later retrieval or manipulation. The feature index is the quantization number for the underlying features that are represented by an abstraction. Trajectories are used to signify how the features evolve over time. Features indexes are linked in an ordered sequence indicative of time quanta, where the sequence represents the underlying input signal. An example indexing system based on the described processes is an inverted index that creates a mapping from features or atoms to the underlying documents, files, or data. A highly optimized set of operations can be used to manipulate the quantized feature indexes, where the operations can be fine tuned independent from the base feature set.
Abstract:
Indexing methods are described that may be used by databases, search engines, query and retrieval systems, context sensitive data mining, context mapping, language identification, image recognition, and robotic systems. Raw baseline features from an input signal are aggregated, abstracted and indexed for later retrieval or manipulation. The feature index is the quantization number for the underlying features that are represented by an abstraction. Trajectories are used to signify how the features evolve over time. Features indexes are linked in an ordered sequence indicative of time quanta, where the sequence represents the underlying input signal. An example indexing system based on the described processes is an inverted index that creates a mapping from features or atoms to the underlying documents, files, or data. A highly optimized set of operations can be used to manipulate the quantized feature indexes, where the operations can be fine tuned independent from the base feature set.
Abstract:
A wearable electronic device is configured to control and command a variety of wireless devices within its proximity. The wearable device dynamically generates a user interface corresponding to the services of a particular wireless device. Through the user interface, the wireless device surface content to a user and allows a user select interactions with the wireless devices using the wearable device.
Abstract:
A wireless authentication system for authenticating a user before allowing access to a protected resource is described herein. An authentication device receives an indication of an intent to access a protected resource. The authentication device sends a request for a key. The wireless user device and the authentication device may engage in a key exchange. The authentication device determines whether the one or more keys obtained via the key exchange are valid and may allow access to the protected resource if the one or more keys are valid. The authentication device may request further verification of the identity of the user, such as a keyholder verification. The authentication device may allow access to the protected resource if the key and the keyholder verification are valid.
Abstract:
The present invention provides a highly reliable and scalable architecture for data centers. Work to be performed is divided into discrete work units. The work units are maintained in a pool of work units that may be processed by any number of different servers. A server may extract an eligible work unit and attempt to process it. If the processing of the work unit succeeds, the work unit is tagged as executed and becomes ineligible for other servers. If the server fails to execute the work unit for some reason, the work unit becomes eligible again and another server may extract and execute it. A server extracts and executes work units when they have available resources. This leads to the automatic load balancing of the data center.
Abstract:
A system and method for transferring multiple portions of data utilizing a distributed cache are disclosed. A content server obtains a request for content data and associates an identifier with the request. The content server returns a first portion of the data with the request and stores a second portion of the data in a cache according to the first identifier. Thereafter, the content server receives a request for the remaining portion of the provider data and associates a second identifier with the second request. If the second identifier matches the first identifier, the content server returns the data stored according to the first identifier. Additionally, the content server implements and utilizes a click server having multiple cache servers in which multi-cache replication is utilized to store identical contents in each cache server.
Abstract:
The present invention provides a highly reliable and scalable architecture for data centers. Work to be performed is divided into discrete work units. The work units are maintained in a pool of work units that may be processed by any number of different servers. A server may extract an eligible work unit and attempt to process it. If the processing of the work unit succeeds, the work unit is tagged as executed and becomes ineligible for other servers. If the server fails to execute the work unit for some reason, the work unit becomes eligible again and another server may extract and execute it. A server extracts and executes work units when they have available resources. This leads to the automatic load balancing of the data center.
Abstract:
A system and method for implementing a conditional payload server are provided. A request for a payload corresponding to a subset of client attributes is obtained. Additionally, one or more payloads are obtained in which each payload defines criteria for delivering the payload. The criteria for delivering each payload is then embodied into an expression tree, which is scored and optimized for traversal. The expression tree is converted into an evaluation tree data structure in which the conjunctive and disjunctive operators are the tree nodes and attribute evaluator value expressions are the leaf nodes. The expression tree is merged into a catalog data structure having a master attribute list, an evaluator list, a value list, a payload list, and a conjunction list. The catalog is then evaluated according to the subset of client attributes corresponding to the payload request and a payload is delivered.
Abstract:
The present invention provides a highly reliable and scalable architecture for data centers. Work to be performed is divided into discrete work units. The work units are maintained in a pool of work units that may be processed by any number of different servers. A server may extract an eligible work unit and attempt to process it. If the processing of the work unit succeeds, the work unit is tagged as executed and becomes ineligible for other servers. If the server fails to execute the work unit for some reason, the work unit becomes eligible again and another server may extract and execute it. A server extracts and executes work units when they have available resources. This leads to the automatic load balancing of the data center.
Abstract:
A system and method for employing slot level cache locking are disclosed. When a rich media file request occurs, a general lock is put on the cache to determine whether the file has already been allocated a location in the cache. If a location has been previously allocated, an attempt is made to lock the specific slot in the cache where the file is stored, and if successful, the general cache lock is released. In the event a slot has not been previously allocated, a next available slot is obtained and the cache slot is locked. The general lock on the cache is released. In either scenario, once the cache slot lock is achieved, the processing of the file request continues such as by requesting the file from a third party server. Additionally, upon release of the general cache lock, additional media file requests can be processed concurrently without having to wait for the continued processing of the file request.