会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Propagation through perdurance
    • 通过遗传传播
    • US09075830B2
    • 2015-07-07
    • US13429168
    • 2012-03-23
    • James H. Stephens, Jr.
    • James H. Stephens, Jr.
    • G06F17/30
    • G06F17/30554G06F17/30286G06F17/30604
    • An event processor accepts event representations that comprise perdurance and epistemological relationships among entities or entity references, and the event processor stores information derived from event representations in a datastore. A search component searches entities based on local epistemological and perdurance properties, and a perdurance engine traverses the perdurance relationships obtained from the datastore. An epistemological propagator generates derived epistemological relationships using the perdurance engine and local epistemological data obtained from the datastore.
    • 事件处理器接受包括实体或实体引用之间的不完整性和认识论关系的事件表示,并且事件处理器存储从数据存储区中的事件表示导出的信息。 搜索组件基于本地认识论和遗传属性来搜索实体,并且遍历引擎遍历从数据存储区获得的持续关系。 一个认识论传播者使用耐久性引擎和从数据存储区获得的本地认识论数据来生成衍生的认识论关系。
    • 8. 发明申请
    • Automatic Annunciator Allocation
    • 自动报警器分配
    • US20120122428A1
    • 2012-05-17
    • US13122189
    • 2010-11-15
    • James H. Stephens, Jr.
    • James H. Stephens, Jr.
    • H04W4/00
    • H04W4/60H04W4/20
    • Technologies described herein generally relate to allocating annunciators to provide annunciations in response to annunciation requests in a computing device. The computing device may include a platform application, which may be configured to receive annunciation requests from applications for providing annunciations. The platform application may discover annunciators capable of providing the at least one annunciation. The platform application may schedule the annunciation request with one of the discovered annunciators and upon scheduling the annunciation request with one of the discovered annunciator, may cause the scheduled annunciator to provide the annunciation in response to the annunciation request. The technologies presented herein can allocate annunciators according to the demands of a user by determining a prioritization level of an annunciation request and an attention limit of the computing device such that the computing device can manage multiple annunciation requests without inundating a user with extraneous annunciations.
    • 本文描述的技术通常涉及分配报告器以响应于计算设备中的报告请求来提供通知。 计算设备可以包括平台应用,其可以被配置为从应用接收用于提供通知的通知请求。 平台应用可以发现能够提供至少一个通知的报警器。 平台应用程序可以使用所发现的通知器中的一个来安排通知请求,并且在与所发现的通知器之一调度通知请求时,可以使得所调度的指示符响应于通知请求来提供通知。 本文提供的技术可以通过确定通告请求的优先级水平和计算设备的注意限制来根据用户的需求分配报告器,使得计算设备可以管理多个通知请求,而不会使用户无关的报告。
    • 9. 发明授权
    • Verifying work performed by untrusted computing nodes
    • 验证不受信任的计算节点执行的工作
    • US08661537B2
    • 2014-02-25
    • US13054055
    • 2010-07-21
    • James H. Stephens, Jr.
    • James H. Stephens, Jr.
    • G06F11/00
    • H04L43/00H04L67/10
    • Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes.
    • 提供了用于验证由不可信计算节点执行的工作的技术。 中央计算系统至少部分地由第一不可信计算节点确定要执行的第一计算。 中央计算系统还确定应用于第一计算的变换函数,以产生至少部分由第二不可信计算节点执行的等效的第二计算。 中央计算系统将第一计算分配给第一不可信计算节点,并将第二计算分配给第二不可信计算节点,同时保持转换功能的秘密。 中央计算系统接收用于第一计算的第一结果和第二计算的第二结果。 中央计算系统分析第一和第二结果以验证由第一和第二不可信计算节点执行的工作。