Abstract:
In various embodiments, streaming data records, files or file segments transmitted from multiple resources in a multi-threaded environment are sorted into one or more time windows via use of one or more execution threads; the records, files or file segments in each time window are displayed, analyzed or delivered to various applications or destinations.
Abstract:
In a method of loading checked luggage on unit load devices corresponding to an aircraft having a passenger compartment, each piece of checked luggage is associated with a unique identifier. Each piece of checked luggage is weighed and its weight is associated with its corresponding unique identifier. A best possible luggage placement is calculated considering a distribution of passenger weight, thereby allowing the passengers to sit at their preferred location rather than by pre-allocation. A desired placement of the checked luggage is calculated based on the weight of each piece of checked luggage, the acceptable distribution of weight in the passenger compartment and overall fuel state over mission profile. Loading personnel are allowed to place luggage in the unit load devices and are instructed to stop loading the selected ones of the unit load devices when a deciding point is dynamically achieved by a recalculation of center of gravity shift each time a bag is loaded onto one of the unit load devices so as to achieve the best possible placement of check luggage. The recalculation of the center of gravity shift is done based on placement of the unit load devices in the aircraft luggage compartments.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for using an intermediate database management layer to manage communications between an application layer and a database layer. The database management layer can receive an initial communication from the application layer and transmit a subsequent communication to a particular database based upon a rule. The rules can specify the particular database based upon the initial communication and an availability status of the database. The rules specify criteria by which the initial communication is identified and logic specifying the particular database to receive the subsequent communication based upon the identification of the initial communication. The rules can specify a plurality of potential particular databases to receive the subsequent communication and an order in which to select one of the databases to receive the subsequent communication based upon the determined availability status of each of the potential particular databases.
Abstract:
A catheter for use in continuous flow peritoneal dialysis comprising an inflow tube and an outflow tube, wherein both are connected on one end to a dialysis machine. The inflow tube is divided into a plurality of smaller inflow auxiliary tubes, and the outflow tube is divided into a plurality of smaller outflow auxiliary tubes. The auxiliary tubes each contain a plurality of apertures for the rapid and efficient movement of dialysis solution in and out of the peritoneal cavity. The auxiliary tubes are covered by a sheath prior to implantation, which is then removed, thereby deploying, preferably into an open-basket shape, the auxiliary tubes within the peritoneal cavity which separate to allow for the continuous flow of dialysis solution. This reduces the time required to complete the procedure and increases its efficiency by reaching a larger surface area of the peritoneal cavity, all without kinking or blocking.
Abstract:
The present disclosure involves ensuring that items sold by a merchant appear in certain network pages. A network page is automatically accessed in a computing device. The network page is generated by a referral network site that displays at least one offering of an item by at least one competitor merchant. A unique identifier associated with the item is identified from the network page in the computing device. The unique identifier is stored in association with the item in a data store accessible to the computing device. The item and the unique identifier are included in a feed sent from the computing device of a merchant to the referral network site. The feed includes a listing of the item and a plurality of other items, wherein the item and the other items are offered for sale by the merchant.
Abstract:
Depth values in a scene are measured by projecting sets of patterns on the scene, wherein each set of patterns is structured with different spatial frequency using different encoding functions. Sets of images of the scene is acquired, wherein there is one image for each pattern in each set. Depth values are determining for each pixel at corresponding locations in the sets of images. The depth values of each pixel are analyzed, and the depth value is returned if the depth values at the corresponding locations are similar. Otherwise, the depth value is marked as having an error.
Abstract:
This disclosure relates to determining whether to include items in a feed to a referral network site. A catalog is maintained of a plurality of items sold through an electronic commerce network site, wherein at least a portion of a plurality of sales of the items originate by virtue of a referral from a referral network site. A quantity of commercial data associated with the items is stored in a data store, and a predictive model is trained with the commercial data associated with the items. Each of the items is applied to the predictive model to determine whether such items are to be included in a feed to the referral network site. The feed that includes a subset of the items is sent to the referral network site.
Abstract:
Gap values for a collection of images are obtained; each gap value is a temporal difference between temporally adjacent images. A first grouping of the collection of images into one or more groups is determined based at least in part on the gap values. The first grouping is performed such that each group is temporally contiguous. The first grouping is presented and input from a user is received in response to the presented first grouping. A second grouping of the collection of images into two or more groups is determined based at least in part on the user input. The second grouping is presented.
Abstract:
An automated task centered collaboration technique is described that significantly lowers the technological entry barrier for the development and deployment of a broad class of collaborative applications, which are termed Task Centered Collaboration (TCC) applications. TCC applications facilitate the processing of a large number of work items, or tasks, by people working independently or in small, synchronously collaborating groups. The technique also provides a mechanism for the study of computer mediated communication and human-computer interactions for this class of applications. The technique creates an abstraction applicable to the broad class of TCC applications, which enables the factoring out of significant portions of the application into a common infrastructure. It provides a programming model that enables a developer to focus on the User Interface and logic associated with operations on a single task, without being exposed to issues such as security, authentication, binding users to activities, synchronization, concurrency and persisting data.
Abstract:
Architecture that facilitates the creation of a customized document with embedded or linked code that can be run on a client or a server without invoking the host application. A programming model makes it transparent to the code whether it is running on the client or the server. The programming model automatically “scales” to provide more features while running the document on the client and fewer features when running on the server. A transparent data island is automatically generated for the customized document that is embedded in the document and can be edited while requiring only a subset of all components of the host application to be running. A data binding mechanism is provided wherein changes that are made to the transparent data island while the host is not running can be moved back into the host document content when the document is reopened by the full host application.