Abstract:
PROBLEM TO BE SOLVED: To provide systems and methods for transporting physical objects from real physical life into virtual worlds. SOLUTION: The method includes receiving characteristic and structure data from an object constructed in the real world. The characteristic and structure data is obtained from the object using a plurality of sensors placed in the vicinity of the object to sense the characteristics and structure of the object. The characteristic and structure data of the object is used to produce a code necessary to create an equivalent representation of the object in a virtual world. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide systems and methods for transporting physical objects from real life into virtual worlds.SOLUTION: The method includes receiving characteristic and structure data from an object constructed in the real world. The characteristic and structure data is obtained from the object using a plurality of sensors placed in the vicinity of the object to sense the characteristic and structure of the object. The characteristic and structure data of the object is used to produce code necessary to create an equivalent representation of the object in a virtual world.
Abstract:
A method, apparatus and system enable a management virtual machine to act as a proxy for other virtual machines on a virtual machines host. In one embodiment, the management virtual machine may maintain a database of network management information pertaining to each virtual machine on the host. An enhanced virtual machine manager on the host may provide an interface to the management virtual machine to enable the management virtual machine to trap management messages destined for virtual machines on the host. The management virtual machine may respond to the messages based on information in the database and/or issue queries to the virtual machines to obtain the requisite information. In one embodiment, the management virtual machine may aggregate the information from various virtual machines prior to responding to the network management message.
Abstract:
A system implements dishonest policies for managing unauthorized access requests. The system includes memory management hardware to store a set of dishonest policy bits, each dishonest policy bit that is configured to a predetermined value indicating disallowed access for one of a set of memory ranges. When a processor receives an access request for a location in a memory range to which access is not allowed as indicated by a set dishonest policy bit, the processor returns a false indication according to a dishonest policy that the requested access has been performed.
Abstract:
Speech recognition in mobile processor-based devices may be improved by using location information. Location information may be derived from on-board hardware or from information provided remotely. The location information may assist in a variety of ways in improving speech recognition. For example, the ability to adapt to the local ambient conditions, including reverberation and noise characteristics, may be enhanced by location information. In some embodiments, pre-developed models or context information may be provided from a remote server for given locations.
Abstract:
A traditional registry, such as a global UDDI server, is not designed to accommodate transitory devices, e.g., devices that may frequently attach and detach from a network, often-times without warning, such as virtual machines offering or desiring services that are periodically instantiated and then suspended or destroyed. To accommodate such transitory devices, a dynamic resource/service registry may be implemented that leverages lower-level protocols or state to determine appropriate registry updates to keep the registry state consistent with currently-active virtual machines. For example, a virtual machine monitor (VMM) may track creation and suspension or deletion of a virtual machine (VM), and resources advertised by the VM, where the VMM appropriately adds or removes registry entries for the VM as the state of the VM changes or provides hooks (e.g. notifications) or other instrumentation based on said state or protocols to enable other associated modules or agents (e.g. management modules or the registry) to take appropriate actions.
Abstract:
A traditional registry, such as a global UDDI server, is not designed to accommodate transitory devices, e.g., devices that may frequently attach and detach from a network, often-times without warning, such as virtual machines offering or desiring services that are periodically instantiated and then suspended or destroyed. To accommodate such transitory devices, a dynamic resource/service registry may be implemented that leverages lower-level protocols or state to determine appropriate registry updates to keep the registry state consistent with currently-active virtual machines. For example, a virtual machine monitor (VMM) may track creation and suspension or deletion of a virtual machine (VM), and resources advertised by the VM, where the VMM appropriately adds or removes registry entries for the VM as the state of the VM changes or provides hooks (e.g. notifications) or other instrumentation based on said state or protocols to enable other associated modules or agents (e.g. management modules or the registry) to take appropriate actions.
Abstract:
According to the invention, the provision of information regarding transaction assistance availability in a transaction environment is disclosed. According to an embodiment, a method comprises determining the location of a mobile device; determining the availability of transaction assistance; and transmitting information regarding availability of transaction assistance to the mobile device.
Abstract:
Speech recognition in mobile processor-based devices may be improved by using location information. Location information may be derived from on-board hardware or from information provided remotely. The location information may assist in a variety of ways in improving speech recognition. For example, the ability to adapt to the local ambient conditions, including reverberation and noise characteristics, may be enhanced by location information. In some embodiments, pre-developed models or context information may be provided from a remote server for given locations.