Abstract:
A method and apparatus are provided for adjusting a content of an oral presentation provided by an agent of an organization and perceived by a human target of the organization based upon an objective of the organization. The method includes the steps of detecting a content of the oral presentation provided by the agent and modifying the oral presentation provided by the agent to produce the oral presentation perceived by the human target based upon the detected content and the organizational objective.
Abstract:
Featured is a method for reducing the contention of the highly contended global lock(s) of an operating system, hereinafter dispatcher lock(s) that protects all dispatching structures. Such a method reduces the need for acquiring the global lock for many event notification tasks by introducing local locks for event notifications that occur frequently among well defined, or consistent dispatcher objects. For these frequently occurring event notifications a subset of the dispatching structure is locked thereby providing mutual exclusivity for the subset and allowing concurrent dispatching for one or more of other data structure subsets. The method also includes acquiring one or more local locks where the level of protection of the data structure requires locking of a plurality or more of data structures to provide mutual exclusivity. The method further includes acquiring all local locks and/or acquiring a global lock of the system wide dispatcher data structures wherever a system wide lock is required to provide mutual exclusivity.
Abstract:
Featured is a method or process for reducing contention of a highly contended software lock(s) that is protecting multiple data items, where the software has a plurality of code paths accessing the data items. The method includes creating additional partition locks to protect subsets of the data items protected by the existing global lock. Such a method further includes acquiring all partition locks and the global lock, wherever a global lock would have been acquired to protect data. The method also includes identifying one or more heavily used code paths and determining which data items are touched by the identified one or more heavily used code paths. These data items are then moved into a partition, if they were not partitioned earlier. The locking requirements for each of the identified one or more heavily used code paths are optimized to match the reduced locking requirements because of the partitioned data items. In other words the locking requirements are reduced so only the locks for the partitions including the data items that touch the code path are acquired. In more specific embodiments, the so-modified software is evaluated to determine if there is an acceptable increase in overall system performance resulting from the optimization of the locking requirements. If the modified system's performance is not acceptable, then the next most heavily used code path is identified and the locking requirements for this code path are optimized. Such optimization is continued until the system exhibits an acceptable overall system performance or all code paths are optimized.
Abstract:
Computer software for and a method of determining location of a target image within a two-dimensional input image by employing a three-dimensional reference image comprising determining object edge points in the input image; given estimated seeker line-of-sight orientation and range data, computing a two-dimensional reference image from the three-dimensional reference image; applying a weighted-direction-cross-product Hough Transform to the object edge points and points of the two-dimensional reference image; classifying the input image as containing a target image or not; if the image contains a target image, identifying a location of the target image within the two-dimensional input image; computing confidence measure as to the selected location of the target image; and in the case of sequential decision, also performing confidence accumulation through multi-frames or multi-looks.
Abstract:
A ladder includes a hook segment having an outboard end including a receiver. A first cable segment is secured to said hook segment and a second cable segment is secured to the hook segment. A plurality of elongated rungs includes a bottom rung and at least an uppermost intermediate rung. Each of the rungs includes a first end section including a receiver and an opposed second end section including an extension adapted to releasably engage the receiver of an adjacent rung. The uppermost rung includes an extension adapted to releasably engage the receiver of the hook segment. Each of the first end sections of the rungs is secured to the first cable segment and each of the second end sections is secured to the second cable segment.
Abstract:
A method and system is provided to demographically represent and implement one or more projects associated with an entity such as a corporation in a database so that the views into the database reflect a defined hierarchy of the demographics of the project or entity. The views may be created to reflect various aspects such as technological components, physical attributes of the entity, processes, or other attributes. The processes reflected by the views may also provide action based data elements for supporting the activities necessary to accomplish the processes over time. The project and associate views may also be organized by language or geographic requirements. In use, the invention may provide for management and control for large scale projects such as a migration from one organizational state to another.
Abstract:
A method and system for synchronizing M application documentations across N database instances. Each database instance has a same structural design. N and M are each at least 2. A documentation synchronization agent is executed which updates N1 database instances with the M application documentations and does not update a remaining N-N1 database instances with the M application documentations if N1 is equal to N. N1 is at least 1. If N1 is less than N, then each of the remaining N-N1 database instances include a first and/or second characteristic. The first characteristic is that the remaining database instances include the M application documentations upon initiation of the executing. The second characteristic is that the agent is unable to access the remaining database instance during the executing.
Abstract:
A method and related apparatus are described for generating acoustic signals for use in a vibratory seismic survey, including the step of combining into a drive signal a high frequency sweep signal, which sweeps upwardly through a high frequency band during a first time interval, and a low frequency sweep signal which is of lower amplitude than the high frequency sweep signal and which sweeps upwardly through a low frequency band during a second time interval, wherein the second time interval starts during the first time interval but after the beginning thereof; and applying the drive signal to a mechanical drive system for a vibratable element. The method improves the utilization of a single vibratory source.
Abstract:
A method and computer system for transforming a portion (e.g., a view) of a database into a custom spreadsheet. The transforming includes determining whether to omit in the custom spreadsheet a column that is in the view, determining whether to add to the custom spreadsheet a column that is not in the view, or both. The transforming may also include implementation of rules that control how various portions of the custom spreadsheet are configured.
Abstract:
An improved easy open closure for a container that is particularly adapted for use by the disabled includes a plunger member having a passage defined therein that is constructed and arranged to be depressed with respect to a main body portion of the closure in order to breach a seal in order to place the passage in communication with the contents of the container. Structure may be provided for preventing access to or movement of the plunger member until opening of the closure is desired. A method of using an easy open closure is also disclosed.