摘要:
A system for presenting a virtual advertisement or other virtual content in a sequences of frames of a video presentation utilizes data identifying a candidate region in the sequence of frames, a pixel signature for the region, the signature comprising a range of R, G, B values for pixels based on a standard deviation from an average value, and stored virtual content, such as an advertisement, to be implanted in the candidate region or regions. In operation, as frames having the candidate region are processed by an integration system, the alternative virtual content is substituted by default for the candidate region, except if a pixel value in the region falls outside the pixel signature range. The result is an ad that appears to be on a surface in the video presentation, as images that come between the ad and the viewer occlude the advertisement. Apparatus and methods for providing the video presentation and data sets for regions and advertisements are disclosed as well. Methods are provided for selecting candidate regions and for implanting virtual content in various embodiments.
摘要:
A system for presenting a virtual advertisement or other virtual content in a sequences of frames of a video presentation utilizes data identifying a candidate region in the sequence of frames, a pixel signature for the region, the signature comprising a range of R, G, B values for pixels based on a standard deviation from an average value, and stored virtual content, such as an advertisement, to be implanted in the candidate region or regions. In operation, as frames having the candidate region are processed by an integration system, the alternative virtual content is substituted by default for the candidate region, except if a pixel value in the region falls outside the pixel signature range. The result is an ad that appears to be on a surface in the video presentation, as images that come between the ad and the viewer occlude the advertisement. Apparatus and methods for providing the video presentation and data sets for regions and advertisements are disclosed as well. Methods are provided for selecting candidate regions and for implanting virtual content in various embodiments.
摘要:
There are disclosed processes and systems for establishing secure, communication channels between computing devices. The computing devices include respective agents which verify the relative identity of one another and thereby authenticate the communication channel. The agents continue to play a role in the communications to ensure that the communication channel is secure.
摘要:
There are disclosed processes and systems for establishing secure, communication channels between computing devices. The computing devices include respective agents which verify the relative identity of one another and thereby authenticate the communication channel. The agents continue to play a role in the communications to ensure that the communication channel is secure.
摘要:
Complex on-chip interconnect fabrics, particularly those that include point-to-point interconnects and coherent routing networks, can present significant challenges for conventional trace techniques that may be applied in an effort to efficiently provide an external debugger with visibility into on-chip interconnect transactions. Embodiments described herein generate and supply separate in-circuit-trace messages including address messages and data messages, which are sent out (i.e., off-chip) to external debug tools generally without delay and coincident with the distinct, but related, trace events within address and data paths of the interconnect fabric. These separate message instances embed appropriate tag and mark values to allow the message instances to be post-processed and correlated by the external debug tools so as to reconstruct the transaction information for operations performed in the on-chip interconnect.
摘要:
Access management techniques have been developed to specify and facilitate mappings between I/O and host domains in ways that provide flexibility in the form, granularity and/or extent of mappings, attributes and access controls coded relative to a particular I/O domain. In some embodiments of the present invention, operation translations coded relative to a particular logical I/O device, domain or sub-window seek to optimize functionality, isolation or some other figure of merit without regard to needs or limitations of another. In this way, operation translations need not be uniform and need not reduce supported operation semantics to correspond to that of a lowest common denominator I/O device. In some embodiments, the form of mappings (e.g., of operation translations) may be specialized on a per-logical-device basis (or even a per-sub-window basis), thereby offering individual logical I/O devices (or sub-windows thereof) immediate, indexed, and/or untranslated operation mapping frameworks appropriate to their individual requirements or needs. In general, flexibilities and efficiencies afforded in some embodiments of the present invention can be desirable, particularly as the diversity of I/O device types and richness of transaction semantics supported in interconnect fabrics increase. Some embodiments may be leveraged in support of sophisticated system partitions or I/O virtualizations.
摘要:
There are disclosed a method, computing device, and storage medium for establishing relative identity between a first agent on a first computing device and a second agent on a second computing device. An absolute key and a partial relative key may be generated for the first agent, wherein the absolute key and the partial relative key define a relative identity of the first agent, wherein the relative identity is unique for a relationship between the first agent and the second agent.
摘要:
Flow control mechanisms avoid or eliminate retries of transactions in a coherency interconnect. A class of transaction (CoT) framework is defined whereby individual transactions are associated with CoT labels consistent with chains of dependencies that exist between transactions initiated by any of the cooperating devices that participate in a given operation. In general, coherency protocols create dependencies that, when mapped to physical resources, can result in cycles in a graph of dependencies and deadlock. To support architectural mechanisms for deadlock avoidance, CoT labels are applied to individual transactions consistent with a precedence order of those transactions both (i) with respect to the operations of which such transactions are constituent parts and (ii) as amongst the set of such operations supported in the coherency interconnect. CoT labels applied to respective transactions constitute a CoT framework that may be used by coherency managers to efficiently support concurrent in-flight transactions without retry.
摘要:
There are disclosed methods, computer-readable media, and apparatus for authenticating a target website. A repository that stores data on a plurality of known authentic websites may be provided. The stored data for each of the plurality of known websites may include identifying labels and a signature content set. A target website may be authenticated by comparing the identifying labels and a signature content set of the target website to corresponding data stored in the repository.
摘要:
Flow control mechanisms avoid or eliminate retries of transactions in a coherency interconnect. A class of transaction (CoT) framework is defined whereby individual transactions are associated with CoT labels consistent with chains of dependencies that exist between transactions initiated by any of the cooperating devices that participate in a given operation. In general, coherency protocols create dependencies that, when mapped to physical resources, can result in cycles in a graph of dependencies and deadlock. To support architectural mechanisms for deadlock avoidance, CoT labels are applied to individual transactions consistent with a precedence order of those transactions both (i) with respect to the operations of which such transactions are constituent parts and (ii) as amongst the set of such operations supported in the coherency interconnect. CoT labels applied to respective transactions constitute a CoT framework that may be used by coherency managers to efficiently support concurrent in-flight transactions without retry.