摘要:
A method for dynamically adding new functionality to a first set of instructions that processes Web documents. The invention includes the first step of the first set of instructions decoding a first statement of the Web document. The first statement includes a first command and at least one instruction provided as an argument to the first command. In response to executing the first command, the first set of instructions decodes the instruction provided as the argument to the first command and issues the instruction to be executed. Executing the instruction provided as an argument to the first command, results in new Web document processing functionality being added to the first set of instructions.
摘要:
A method for dynamically adding new functionality to a first set of instructions that processes Web documents. The invention includes the first step of the first set of instructions decoding a first statement of the Web document. The first statement includes a first command and at least one instruction provided as an argument to the first command. In response to executing the first command, the first set of instructions decodes the instruction provided as the argument to the first command and issues the instruction to be executed. Executing the instruction provided as an argument to the first command, results in new Web document processing functionality being added to the first set of instructions.
摘要:
A system is provided for servicing requests by a mobile controller to utilize stationary or mobile resources present within a partitioned communication cell such as an office or room in a building. The mobile controller has a control signal mechanism for generating control request signals to modify behavior of the stationary or mobile resource, with the range of the control request signals substantially limited to the partitioned communication cell. A room agent receives and acts upon the control request signals after dynamically determining availability of both mobile resources entering and exiting the partitioned communication cell and stationary resources already present in the partitioned communication cell. In operation, the room agent is configured to grant requests for utilization of mobile and stationary resources located within the partitioned communication cell when predetermined contextual attributes within the partitioned communication cell are consistent with previously specified interaction policies.
摘要:
Write operations for weakly consistent replicated database systems have embedded application-specific merge procedures that are invoked for resolving conflicts whenever it is found that the related write operation conflicts with the current state of a given instance of such a database. The effect of executing such a merge procedure is deterministic for any state of the given instance of the database happens to be in when the merge procedure is executed.
摘要:
Data storage systems and methods perform error correction on a single physical storage disk. The technique includes arranging a plurality of addressable blocks on the single physical storage disk into error correction groups, wherein each error correction group includes N data blocks and M coding blocks. M is determined in accordance with a desired failure tolerance of the error correction groups and an error-correcting code. For each error correction group, error-correcting code data is computed across the N data blocks in the error correction group. The computed error-correcting coding data is stored in the M coding blocks in the error correcting group. The arranging, computing and storing steps are performed by a hardware or software component external to the single physical storage disk.
摘要:
A write log that distinguishes between write operations that are known to be in a stable write order ("committed writes") and write operations that still are in a potentially unstable write order ("tentative writes") are maintained for each instance of a weakly consistent replicated database so that the stable and the potentially unstable data in any given instance of such a database can be explicitly identified.
摘要:
In a large area display system, multiple persons may work together with multiple input devices for supplying and receiving information in an interactive system with a single large area display. The large area display system comprises a screen wherein computer generated information is projected upon one side of the screen, and users interact with the computer from the opposite side of the the screen. Data coordinates for an input device corresponding to a pseudo image sensed by the receiving subsystem electronics are provided to the controlling computer. The input data coordinates from the pseudo image are normalized for variations due to frequency dependence and electronic drift. The normalized data coordinates are looked up in a calibration table to account for distortion in the pseudo image detection electronics. Screen coordinates corresponding to pixel locations on the large area screen are found by interpolation from the data From the calibration table. The calibration table is prepared off-line, based on a bicubic spline interpolating function which is then compressed using a delta compression scheme. During on-line operation of the system, screen coordinates are looked-up directly from the compressed table. The screen coordinates are then jitter smoothed to provide a smooth path of response closely conforming to original input locations. The jitter smoothing method uses an exponential function based on the magnitude of the change in the position of the input.
摘要:
Data storage systems and methods perform error correction on a single physical storage disk. The technique includes arranging a plurality of addressable blocks on the single physical storage disk into error correction groups, wherein each error correction group includes N data blocks and M coding blocks. M is determined in accordance with a desired failure tolerance of the error correction groups and an error-correcting code. For each error correction group, error-correcting code data is computed across the N data blocks in the error correction group. The computed error-correcting coding data is stored in the M coding blocks in the error correcting group. The arranging, computing and storing steps are performed by a hardware or software component external to the single physical storage disk.
摘要:
A data storage methodology wherein a data file is initially stored in a format consistent with RAID-1 and RAID-X and then migrated to a format consistent with RAID-X and inconsistent with RAID-1 when the data file grows in size beyond a certain threshold. Here, RAID-X refers to any non-mirrored storage scheme employing XOR-based error correction coding (e.g., a RAID-5 configuration). Each component object (including the data objects and the parity object) for the data file is configured to be stored in a different stripe unit per object-based secure disk. Each stripe unit may store, for example, 64 KB of data. So long as the data file does not grow beyond the size threshold of a stripe unit (e.g., 64 KB), the parity stripe unit contains a mirrored copy of the data stored in one of the data stripe units because of the exclusive-ORing of the input data with “all zeros” assumed to be contained in empty or partially-filled stripe units. When the file grows beyond the size threshold, the parity stripe unit starts storing parity information instead of a mirrored copy of the file data. Thus, the data file can be automatically migrated from a format consistent with RAID-1 and RAID-X to a format consistent with RAID-X and inconsistent with RAID-1 without the necessity to duplicate or rewrite the stored data.
摘要:
Write operations for weakly consistent replicated database systems have application-specific embedded dependency queries and related descriptions of the results that are expected to be returned when the respective dependency queries are run against the database. The dependency queries are arbitrary queries that are provided by the application to satisfy the requirements of the application. Write operations that conflict with the current state of any given instance of such a database are detected by comparing (a) the results that are returned when the dependency queries for those writes are run against the given instance of the database with (b) the results that are expected to be returned.