Abstract:
Coding quantized transform coefficients as occur in image compression includes, for a subset of coefficient amplitude values coding by a first method corresponding to each amplitude of the subset, events of a run of zero or more zero-valued coefficients ending in the single non-zero amplitude, coding by a second method events of a run of zero or more zero-valued coefficients ending in any single non-zero amplitude not in the subset, and coding by a third method the amplitude values of the concatenation of the non-zero amplitude not in the subset. The coding methods produce variable length codewords. The method is suitable for series that have scattered non-zero-valued coefficients.
Abstract:
Data is stored using multiple selected network nodes in a network based on encoding of the data info multiple distinct encoded data units according to a prescribed encoding operation. The secure encoding operation generates a first prescribed number of encoded data units, whereas merely a second prescribed number of the encoded data units are necessary for recovery of the original data, the second prescribed number being less than the first prescribed number. The encoded data units are distributed among selected network nodes in a network, where any one network node receives less than the second prescribed number to ensure security. A requesting node recovers the original data by requesting the second prescribed number of encoded data units from among the network nodes having stored the respective encoded data units.
Abstract:
A system and method for providing interactive communications includes receiving a communication from an originator destined for a persona. An identity of the persona is determined and one or more rules associated with the identity of the persona is determined. Presence information of the persona is obtained. The communication is sent to the persona in accordance with the determination of the identity of the persona, the one or more rules associated with the identity, and the presence information of the persona.
Abstract:
Data is stored using multiple selected network nodes in a network based on encoding of the data info multiple distinct encoded data units according to a prescribed encoding operation. The secure encoding operation generates a first prescribed number of encoded data units, whereas merely a second prescribed number of the encoded data units are necessary for recovery of the original data, the second prescribed number being less than the first prescribed number. The encoded data units are distributed among selected network nodes in a network, where any one network node receives less than the second prescribed number to ensure security. A requesting node recovers the original data by requesting the second prescribed number of encoded data units from among the network nodes having stored the respective encoded data units.
Abstract:
In one embodiment, a method comprises generating and displaying to a user a user selection interface, the user selection interface representing a plurality of content selection vectors extending from its origin and mapped to respectively distinct media attributes within a prescribed attribute type; detecting a user input that extends from the origin toward at least one of the content selection vectors and that identifies a selected position within the user selection interface; displaying to the user an updated user selection interface representing a corresponding updated origin at the selected position and representing a plurality of updated content selection vectors having a determined relation to the at least one content selection vector; and selecting and displaying at least one identifier for a corresponding video content element having the corresponding media attribute having a highest correlation with the at least one content selection vector relative to the selected position from the origin.
Abstract:
A network (10) has network nodes (14a, 14b, 14c, 14d, 14e) for storage of respective copies of a data file (12). One of the network nodes (14a) has a corresponding unique locality control object (16) for the copies of the data file (12). The locality control object (16) provides authority for the one network node to control storing and modifying any of the copies of the data file (12). The other network nodes (14n) lacking the locality control object (16) must obtain permission from the one network node before modifying any one of the copies of the data file. The network nodes also can negotiate for passing the locality control object from the one network node to another one of the network nodes based on determined locality attributes associated with the copies of the data file.
Abstract:
The present embodiments relates to wireless adaptors, in one embodiment, a method is provided. The method may include obtaining an adaptor-device identification that identifies both a wireless adaptor anά a wired device coupled with the wireless adaptor; and communicating with a network device via a wireless network using the adaptor-device identification, the wired device being distinguishable from other wired devices using the adaptor-device identification.
Abstract:
In one embodiment, a method includes recording a sequence of online activities of a first user. The online activities include online consumption of online content by the first user. The method includes constructing a path based on the sequence of online activities of the first user. The path includes a sequence of online activity points that each correspond to one of the online activities in the sequence of online activities of the first user, and the path enables a second user to experience personally for themselves at least an approximation of the sequence of online activities of the first user. The method includes communicating the path for traversal of a portion of the path by the second user.
Abstract:
In particular embodiments, a method for editing a web page includes identifying a plurality of components that collectively form a programmatic representation of a first web page. At least one of the components has content that dynamically changes in response to data retrieved externally from the content. A second web page is generated. The second web page includes a plurality of parameters. Each parameter of the second web page corresponds to a respective one of the identified plurality of components. One or more modifications made to the plurality of parameters are interpreted. A programmatic representation of a third web page is generated, the generation based at least in part on the interpretation.
Abstract:
A search system generates an ordered list of destination targets including identified individuals and data objects, based on applying a user context to an information context and to a connection context. The user context identifies a search context (i.e., the information the user is seeking) relative to an identity of the user, and the information context identifies destinations accessible by the user, including data objects and communications-based actions (e.g., voice over IP telephony calls, instant messaging session transcripts, etc.). The connection context identifies relationships between chosen destinations throughout the system, and the strength of those relationships determined from artifacts of the chosen destinations: the connection context is updated based on artifact detection. The portion of the connection context that is relevant to the user context is used to order the portion of the information context that is relevant to the user context, resulting in the ordered list of destination targets.