RussianPatents.com
|
Invention relates to means of controlling software loading. A reading/recording device and a mobile telephone terminal which is accessed by the reading/recording device through communication in proximity. In the mobile telephone terminal, the software module transmits instructions to modules and software. The software module controls states of the modules and the software. If during booting of the software module, processing of the software module begins and ends, the software module resumes booting of the software module. |
|
Extensibility for web-based diagram visualisation Group of inventions relates to an extensible architecture and data flow which enable a diagram update engine to launch custom code modules. A method to be executed at least in part in a computing device for extensible web-based diagram visualisation services comprises steps where, in response to receiving a request for a diagram including references to external data sources, providing the request to an update engine for determination of supported data sources and custom data modules for retrieving data from non-supported data sources which implement a predefined abstract class. Further, the method includes receiving a custom data module identifier from the update engine. The custom data module indicated by the identifier is also activated through said predefined abstract class and either data or an exception is received from the custom data module. If data are received, said data are redirected to the update engine. |
|
Electronic control unit having real-time core managing partitioning Group of inventions relates to electronic control units. Disclosed is an electronic control unit including a microcontroller provided with RAM containing variable data, and ROM, associated with the code of an operating software system having a built-in real-time core for executing computer tasks, the RAM and ROM comprising areas corresponding to partitions, one of which is allocated to the real-time core and each of the other partitions is allocated for at least one of the tasks, the ROM and RAM are linked by an address bus which is physically programmed to prevent writing in the other of the RAM areas and prevent execution of the other of the ROM areas, wherein the real-time core is linked to a timer allocating an execution time for each partition, wherein the electronic control unit is designed such that only two partitions can be executed at a given moment in time, and the microcontroller is designed to control only four buffers for said two partitions: a buffer for the code and a buffer for data of the partition allocated to the real-time core; a buffer for the code and a buffer for data of the partition allocated to a task which is active at said moment in time. |
|
Invention relates to applications in mobile terminals. The technical result is facilitating inter-process interaction between different applications in a mobile terminal. The method includes the following steps: creating, in a mobile terminal, a server for inter-process interaction; establishing, by the server, communication with a sender application process via an interface; receiving, by the server, data sent by the sender application process using an interaction protocol between the sender application process and the server; and establishing, by the server, communication with a recipient application process via the interface; and sending, by the server, data to the recipient application process using an interaction protocol between the recipient application process and the server. |
|
Invention relates to add-ons for digital products. Add-ons for digital products can be managed and made available for online purchase and distribution at the product distribution site. An add-on for a digital product can subsequently be offered to and acquired by an interested person that previously purchased the associated digital product through use of the digital product itself, which can interact with a product distribution site. The product distribution site can also be referred to as an online product hosting site. In one version, the digital products are computer programme products (e.g., computer software programmes). |
|
System and method for target installation of configured software Method for target installation of configured software includes steps of: loading, from a computer network attribute storage means, object attributes corresponding to a user account and object attributes corresponding to a first user-controlled device on which the software is to be installed; configuring the software installation package; determining configuration parameters from the loaded attributes in accordance with the security policy installed for said user and for the first device; loading the configured software installation package on the second device, installing the software on the second user-controlled device; checking compliance of the first and second devices and continuing installation if compliance is established; conducting authorisation of the user controlling the second device, and continuing installation if authorisation is successful. |
|
Data unit storage/storage instructions for communication with adapters Invention relates to processing input/output operations in a computing environment. Disclosed are instructions that are expressly addressed to adapters. Information contained in the instruction is used to guide the instruction to a corresponding location in the adapter. |
|
Virtual optional board to be used for performance of measurement operations Group of inventions relates to devices for improvement of functionality of a measurement device. Devices for improvement of functionality of the measurement device are proposed. The measurement device can contain a microcontroller (MC) including individual memory units for storage of different types of data. MC can store the main programme code in the form of a built-in programme in one flash memory unit, as well as it can store a virtual optional board in the form of a built-in programme in an individual flash memory unit. The main programme code can be used by a measurement device to provide a basic level of functionality of the measurement device. The virtual optional board can be used by the measurement device to implement additional functionality. Functionality added by means of the virtual optional board can contain measurement operations for a certain user and/or measurement operations for a certain market. |
|
Method of using mobile telephones Group of inventions relates to a method and a system for distributing applications to network mobile devices. The system comprises an application operating on a network mobile device, a database storing a contact list on the network mobile device, means of sending an invitation to install an application to some network mobile devices from the contact list and to install an application after accepting the invitation to install an application, means of repeating previous steps for each contact on each network mobile device, as well as a server for providing an application which operates on a network mobile device through an application database, a client database and an application distribution unit, wherein the client database is divided into a sub-database of registered clients and a sub-database of unregistered clients, and the application database includes all applications required for installation on mobile network devices of clients, wherein the application distribution unit is adapted for contact with unregistered users from the sub-database of unregistered clients to invite some of said unregistered users to install said application. |
|
Invention relates to a data processing apparatus and a method of switching a workload between first and second processing circuitry. The data processing apparatus has first processing circuitry which is architecturally compatible with second processing circuitry, but with the first processing circuitry being micro-architecturally different from the second processing circuitry. During handover operation, the switch controller is enables to cause the source processing circuitry to make its current architectural state available to the destination processing circuitry, the current architectural state being that state which is not available from shared memory at a time the handover operation is initiated, and which is necessary for the destination processing circuitry to successfully take over performance of the workload from the source processing circuitry. |
|
Method and system for updating network device Invention relates to the technology of updating a network device in the field of communication. The method of updating a network device involves a network management server establishing a Transmission Control Protocol (TCP) connection with the network device (101); during the update process, the network management server transmitting a private protocol, created at the TCP, to the network device to notify the network device on the update, the network device subsequently performing the respective update operation after obtaining the notification and returning an update result to the network management server via the private protocol created at the TCP (102). |
|
Caching runtime generated code Invention relates to runtime generated code. A program entity that generates code but does not alter global state is identified. Code produced by the identified program entity can be assigned an identifier and cached the first time it is executed. Subsequent executions of the program entity can allow generation of the code and/or translation of the generated code into native binary code. The runtime generated code and native binary code can be cached in a machine-wide cache, or can be added to the metadata of the assembly generated from the source code of the program entity. |
|
Method and apparatus for supporting alternative computations in reconfigurable system-on-chip Group of inventions relates to microelectronics and computer engineering and can be used to design high-performance computer systems for processing data streams in real time. The apparatus has pairs of external single-bit inputs and outputs, a setting code register, an input switch, a data processing unit and an output switch, controlled by corresponding setting code fields, wherein the input and output switches and the data processing unit are controlled by pairs of alternative setting code fields, one of which is selected by a corresponding multi-bit multiplexer, controlled by a single-bit condition variable signal. |
|
Method and system for active publication of messages in im group with application of chat-robot Invention relates to means of active message publication in the IM group with application of chat-robot. Client adds chat-robot in IM group satisfying the preset terms. Chat-robot receives the message and publishes received message in IM group. Chat-robot receives the second condition of message receipt and receives the message in compliance with second condition. Note here that said second condition involves receipt of the message from at least one particular message source at particular time in compliance with particular requirements. Chat-robot receives the patter and publishes the received message in IM group in compliance with said pattern. Note here that said pattern contains the preset of publication time and publication objects in IM group. Statistics on the number of replies to published message from IM group participants is accumulated. Second condition is corrected in compliance with the number of replies to published message from IM group participants. |
|
Implementation of parallel rehashing of hash-tables for multithreaded applications Invention relates to processing of hash-tables. It covers the process for selection of the second number of segments for hash-tables used simultaneously by multiple flows whereat second quantity of segments is logically displayed at appropriate parental segment of the first quantity of segments. Updated capacity of hash-table is published for termination of isolation without execution of whatever rehashing so that rehashing can be performed to request for every segment. |
|
Hardware and software debugging simulation system Hardware and software debugging simulation system, having a simulation computer which is connected to input information simulators which are connected by outputs to the debugged on-board computer system, a control panel which is connected to a control computer, a device for displaying information of the simulation computer, a controlled power supply, a satellite navigation subsystem simulator, an inertial navigation subsystem simulator, an image processing subsystem simulator, a timer simulator, a clock unit and a recorder, the clock input of which is connected to the output of the clock unit, and the inputs are connected to process buses of the debugged on-board computer system and output buses of the simulators, and the control input is connected to the stop output of the control panel, which is also connected to the stop input of the debugged on-board computer system, the interrupt input of the general-purpose simulation computer and the stop input of the timer simulator. |
|
Invention relates to systems for providing information based on reasoned reality techniques. The device for providing information includes a storage means, a recognition means and a communication means. The storage means stores login information associated with a category. The recognition means recognises the category of information obtained from a terminal device. The communication means transmits login information corresponding to the category of the recognised information to the terminal device. The communication means is configured to transmit login information to a second terminal device if the second category further recognised by the recognition means corresponds to the given category. |
|
Method for parsing programming language with extensible grammar Programming language parsing method is based on table LR parsing. Canonical LR tables of a parser are dynamically rearranged during compilation using grammar extension directives given separately for each hierarchy level of nesting grammatical rules of the programming language, said directives being intended for inputting new grammatical structures. The compiler continues parsing of the program using the rearranged LR tables. |
|
Code optimisation by compiler with two byte-orderings Set of inventions relates to code optimisers. Proposed code optimiser comprises machine readable carrier for data storage including the instructions. Said instructions if executed allow the computer receiving of static data on code execution by computer system processor, wherein static data is stored in static storage of computer system. It allows dividing the data in compiler executed by processor and operated by said code into multiple data sets. Note here that data in every said set features single byte-ordering for appropriate code execution. Besides, it allows determining in compiler if programmer discerns date set byte-ordering for every data set of the group. In case data set wherein byte-ordering is not discernible it allows definition in compiler if change in byte-ordering can ensure gain in efficiency. For every set wherein change in byte-ordering can ensure gain in efficiency, it allows said change in appropriate set to obtain modified set. Besides, it allows storing every modified set on data storage carrier of computer system. |
|
Register mapping techniques for efficient dynamic binary translation Present invention relates to dynamic binary translation. Generally, the present disclosure provides a system and method for mapping registers from a system with more registers to a system with fewer registers. Regions may be formed that include one or more blocks of code with relatively frequent register accesses. The most frequently accessed source registers may be mapped to target registers. Each block in the region may be bound by a prologue and at least one epilogue. The prologue may be configured to implement register mapping and the epilogue(s) may be configured to manage program flow from a block in the region to another block in that region or to a block not in that region. |
|
Method for enhancement of operational efficiency of hardware acceleration of application emulation According to one implementation version one proposes a method for acceleration of emulation of the process launched from the executive file; the method involves the following stages: file execution emulation is performed according to the instructions; the emulator hardware accelerator launch condition met, the file execution emulation process is transferred into the hardware accelerator; the file execution is performed according to the instructions with the help of the hardware accelerator until an exclusion call or API-function call; the file execution emulation process is transferred back into the emulator; the file execution efficiency is assessed according to the instructions with the help of the hardware accelerator; the hardware accelerator launch conditions are modified depending on the obtained efficiency value; the presented stages are repeated no less than 2 times. |
|
Restricting memory areas for instruction reading depending on hardware mode and security flag Invention relates to data processing systems, having a plurality of operating hardware modes, and managing memory access depending on the current hardware mode. An apparatus for processing data (2) includes a processor (8), a memory (6) and memory control circuit (12). The processor (8) operates in a plurality of hardware modes including a privileged mode and a user mode. When operating in the privileged mode, the processor (8) is blocked by the memory control circuit (12) from fetching instructions from memory address regions (34, 38, 42) within the memory (6) which are writeable within the user mode if a security flag within register (46) is set to indicate that this blocking mechanism is active. |
|
Multi-owner deployment of firmware images Invention relates to deployment of a basic input/output system (BIOS) and other firmware code in computer systems. The computer-implemented method of deploying a signed root firmware image involves obtaining a signed firmware image which contains a first code module signed by a first code owner and an access control list which authorises the first code owner to update the first code module. The method also includes a step of obtaining an updated first code module which contains an updated code for the first code module, and an updated access control list delegating authority for updating the first code module from the first code owner to a second code owner. The method further involves confirming that the updated first code module is signed by the second code owner and that the second code owner is authorised for updating based on part of the access control list. |
|
Scheduling collections in scheduler Method involves, in response to one of a first plurality of processing resources in a first scheduling node becoming available, searching for a first task to execute in a first scheduling collection corresponding to the first scheduling node; in response to finding no first task to execute in the first schedule collection, executing, with the one of the first plurality of processing resources, a second task from a second scheduling collection corresponding to a second scheduling node that includes a second plurality of processing resources. The first and second scheduling nodes are detected for the scheduler based on one or more execution indicators for corresponding sets of computer system components. The first and second collections of the scheduled tasks are transformed into a queue of at least partial search by comparing execution costs between at least the first and second scheduling nodes. |
|
Perimetre security system and central controller therefor In the perimetre security system, an active central controller and a backup central controller are connected to each other in series through RS-485 ports (the second port of the active central controller is connected to the first port of the backup central controller) and RS-232 ports. The active and backup central controllers are completely identical and their operating modes (active/backup) are set by programming. The active central controller is capable of querying the state of perimeter alarm modules through their first or second RS-485 port. The backup central controller is capable of transmitting data between their first and second RS-485 ports. The active and backup central controllers are capable of transmitting through RS-232 ports data for synchronising the event log of the backup central controller and its current state which, after synchronisation, completely matches the current state of the active central controller. |
|
Method of coordinating multiple sensors Disclosed is a method of coordinating multiple sensors, wherein multiple networked computers control the sensors for the purpose of executing one or more services requested through the network. In order to coordinate with one another, the computers exchange information over the network in a manner such that each networked computer knows the characteristics of and the services executed by the other computers. Subsequently, the computers providing the same service execute the same configuration algorithm that defines the tasks to be carried out by each computer as a function of the characteristics of the computers providing said same service. Thus, the computers get to the same conclusions with respect to the tasks to be carried out, and control the sensors based on the tasks defined by the configuration algorithm. |
|
Type descriptor management for frozen objects Frozen object might actually include several type descriptors: a primary type descriptor that is canonical according to a set of canonicalisation rules, and an auxiliary type descriptor that is not identical to the primary type descriptor. The auxiliary type descriptor may be used to access the canonical type descriptor. When performing an operation, if the auxiliary type descriptor can be used to perform the operation, then that auxiliary type descriptor is used. If the canonical type descriptor is to be used to perform the operation, the auxiliary type descriptor is used to gain access to the canonical primary type descriptor. The primary type descriptor is then used to perform the operation. |
|
Method and apparatus for classifying content Method of classifying content involves deciding to receive, along with first content to be displayed on user equipment, a vector having one or more values for one or more corresponding scales. Further, the method involves determining the relationship between the first content and second content based on said vector. Said vector is a position on corresponding one or more scales between the minimum mark and the maximum mark of the scale. Said position on corresponding one or more scales between the minimum and maximum marks of the scale depends on the result of operation of the logic of reading context which monitors and processes information from a sensor. |
|
Method of monitoring dead-end situations in an information and communication system involves determining the values: λ r i t - mathematical expectation of failure rate of the i-th critical technical resource rit, where i=1, 2, 3, …, h r j p - mathematical expectation of failure rate of the j-th critical software resource rjp, where j=1, 2, 3,…, of the size q of the buffer memory zone of a unit of the information and communication system; setting ttis - the time interval for scheduled execution of processes and calculating the value of the readiness factor Krr using the formula: K r r = ∏ i = 1 r i t e × − λ r i t t t i s ∏ j = 1 r j p e − h r j p t t i s × ∏ n = 1 N e − k @ e q n ∑ i = 1 k − 1 ( k @ e q n ) i i ! , where: i=1, 2, 3, …, is the number of critical resources rit; j=1, 2, 3,…, is the number of critical software resources ijp; λ r i t mathematical expectation of failure rate of the 1-th critical technical resource rit; ttis is the time interval for scheduled execution of processes; h r j p is the mathematical expectation of failure rate of the j-th critical software resource rjp; k is the order of the approximating Erlang distribution with parameter @e - Poisson intensity in the unit for an integer value of the size q of the buffer memory zone of the unit of the information and communication system; N is the total number of buffer memory zones in the information and communication system; q is the size of the buffer memory zone of the unit of the information and communication system; comparing the determined readiness factor Krr with a threshold level Krr (0) and if the condition Krr < Krr (0) is satisfied, there are dead-end situations in the information and communication system. |
|
Method of simulating two-level control processes and system for realising said method (versions) System comprises interconnected models of control stations, communication lines, database storage devices, data transmission devices, units for collecting and analysing data on working objects, selecting objects according to characteristics, identifying and classifying working objects, estimating efficiency, allocating objects to equipment, generating targets for equipment, control panels, information display devices and equipment control devices. The method describes operation of the system. |
|
Method involves receiving a control word for an input/output operation. The control word includes an indirect address for data associated with the input/output operation. The indirect data address includes a starting address of a list of storage addresses that collectively describe the data, the list containing two or more discontiguous storage addresses. Data is gathered in accordance with the list. The gathered data are transmitted to a control device in an input/output processing system. |
|
Disclosed is a method of managing processor cores in a portable computing device (PCD), having at least three processor cores, the method comprising steps of: determining whether the PCD is docked to a PCD docking station when the PCD is powered on; energising a first processor core when the PCD is not docked to the PCD docking station; and energising the first processor core, the second processor core and third processor core when the PCD is docked to the PCD docking station. |
|
Hosting and broadcasting virtual events using streaming interactive video Method involves broadcasting a live twitch video game tournament in the form of one or more real-time compressed digital video streams from a hosting service centre to viewers over the Internet, and receiving an input control signal over the Internet from live twitch video game tournament players, each player interacting through a client device which does not run the actual twitch video game tournament and is located at a distance away from the hosting service centre. |
|
Configurable partitioning for parallel data Data partitioning interface provides procedure headings to create data partitions for processing data in parallel, and for obtaining data elements to process, without specifying the organisational structure of a data partition. A data partitioning implementation associated with the data partitioning interface provides operations to implement the interface procedures, and may also provide dynamic partitioning to facilitate load balancing. |
|
Apparatus for dynamic prediction of microprocessor conditional jump commands Apparatus consists of a global jump history shift register, a program counter register, a processor operating mode register, an XOR logic element, global prediction memory, two-bit prediction memory, a final prediction selection multiplexer, a process address space identifier register, process jump history memory, an XOR logic element, process local prediction memory, a process prediction control memory address register, process prediction control memory and an intermediate process prediction selection multiplexer. |
|
System and method for describing applications for manageability and efficient scalable deployment Service description describing a requested service is received. Upon receiving the service description a determination of the required resources and the available resources is made. An instance description is produced. Resources required to sustain the deployment of the service are mapped to the available resources of the computing platform so the service may be deployed. The instance description is amended with each deployment of the service to allow for sustained deployment of the service. |
|
Apparatus has a point for installing an information and communication system, consisting of an information transmission line, a testing mode control unit, a unit for testing failure rate of the i-th critical process resource, a unit for testing failure rate of the j-th critical program resource, a unit for testing the size of buffer memory of the information and communication system unit, switches and units for turning on a self-contained testing mode, a control station consisting of an information transmission line, a control station control signal former, a testing mode selection unit, a control signal parameter control unit, an availability factor calculating unit, a unit for setting the time period for scheduled execution of processes, a comparator unit and a threshold setting unit. |
|
Cost of performing complex analyses of financial trends using software is considerably reduced by distributing computational power needed for carrying out analysis and a computing task between a large number of separate or grouped network computational nodes. To this end, the computing task is split into a plurality of subtasks. Each subtask is carried out by one information processing device to obtain a plurality of solutions. The solutions are then merged to obtain a solution of the computing task. Entities controlling the information processing devices are rewarded for using information processing devices associated with them. Algorithms can be altered over time. One or more altered algorithms are then selected in accordance with a given condition. |
|
Self-controlled automatic machine Apparatus has an operational device, four memory registers, three combinational circuits, an OR circuit unit, a decision unit, a synchronisation unit, first, second and third flip-flops, a parallel paraphrase result transmission circuit unit, first and second counters, an encoding unit, an AND element, second, third and fourth units of AND circuits, a comparator unit, wherein the synchronisation unit has synchronisation microcommand outputs B1B2…Bp connected to all control inputs of the self-controlled automatic machine, wherein unit outputs of the first (α) and second (β) flip-flops are connected to control inputs of the third combinational circuit. |
|
Caching and providing pre-send data relating to sender or recipient of electronic mail message Method for caching pre-send data relating to the sender or recipient of an e-mail message is disclosed. The method involves receiving one or more recipient mail tips during composition of an e-mail message, the recipient mail tips including either an indication that the mailbox of the recipient is full or an indication relating to the size of the mail list to which the e-mail message is addressed. The method also involves receiving from a web service one or more configuration mail tips including data relating to the sender of the e-mail message. Further, the method involves caching the recipient mail tips and configuration mail tips with a time stamp indicating time at which the recipient mail tips and configuration mail tips are cached. |
|
Late lock acquire mechanism for hardware lock elision (hle) Late-lock acquire apparatus, having a logic decoding unit configured to identify lock instructions at the beginning of a critical section to acquire a lock for the critical section; a logic execution unit configured for elision of at least part of the lock instruction to acquire a lock for the critical section, store an address and lock value referred to by the lock instruction in the lock entry, and executing the critical section without a lock for the critical section; and a logic late-lock acquire unit connected to the logic execution unit. The logic late-lock acquire unit is configured to instruct the logic execution unit to attempt to execute at last part of the lock instructions to acquire a lock for the critical section after the beginning of the critical section and without re-launching the critical section in response to detection of a late-lock acquire event when expecting critical section processing. |
|
Multimedia data mixture switching protocol for managing multimedia data Protocol enables to provide a basic mixing algorithm for modification in order to mix multimedia data irrespective of functionality of the mixer itself (e.g., ports and IP attributes). The protocol enables to switch input multimedia data streams into output multimedia data streams by changing the mixing mode through changes in mixing algorithms using the protocol. The protocol performs the operation on a basis which includes control elements associated with a route, switching and a filter for mixer input and mixer output. |
|
Asynchronous multi-level undo support in javascript grid Architecture is a control driven cascading changes system where change tracking works seamlessly in asynchronous (and synchronous) scenarios. A client application is associated with a grid object and processes and configures the grid object. The application can initiate a change to data in the grid and/or the user can edit the data in the grid directly. A result of the change is a notification to the application, the notification including an order key. The application consumes the notification and can then append new changes based on synchronous or asynchronous computations by calling an update function using the order key. The application uses the key to attach further updates which are properly collected together for undo/redo. |
|
Synchronisation of life cycles of virtual machine and application Virtual environment may be configured to coordinate life cycles of virtual machines and applied software executed on it. In one realisation the virtual environment includes a level of applications and a level of virtual machines. The level of applications interacts with the level of virtual machines to coordinate and manage creation and removal of the virtual machine in a coordinating manner with applied software. For instance, the level of applications accepts a request for initiation of applied software. The level of applications determines the type and/or number of virtual machines to be created from associated properties of the application. The level of applications then manages creation of suitable virtual machines (by means of the level of virtual machines) and additionally manages installation of applied software on it. When removal of applied software from created virtual machines is detected, the level of applications may automatically manage removal or disconnection of the appropriate virtual machine. |
|
Device (D), intended for building applications from specifications (AS) and software components, comprises: i) a storing means (SM) for storing semantic software components, made of a software component associated to a semantic description comprising at least one pertinent term for defining each public operation that software component is able to perform, ii) an analysis means (AM) configured, each time it receives a specification (AS) describing an application to be built, for performing a semantic analysis of that specification (AS) to extract elementary requirements from the specification text, and links between these elementary requirements, and iii) a processing means (PM) for assembling the determined software components according to the overall structure of the specification in order to build said application (AP). |
|
Targeted queries using oma dm protocol Disclosed are various technologies and techniques for extending the functionality of the open mobile alliance (OMA) device management (DM) protocol. An addition is made to the OMA DM protocol that enables the server to specify node filtering criteria as part of a query to a target node on a mobile device to indicate a sub-set of the device management data for the target node that should be returned. As another variation, a modification is made to the OMA DM protocol that enables the server to specify what attributes should be selected on the mobile device in one parameter of a target URI of the Get command, and what format the device management data should be returned in as another parameter of the target URI of the Get command. |
|
Secure medication transport and administration system Portable medication dispensing system comprising: a portable medication container, configured to be carried by a user, comprising at least one secure compartment configured to hold medication; a controller, responsive to access information, configured to assign a patient to the at least one secure compartment such that medications for the patient are authorised for placement into the at least one secure compartment; selectively permit the user access to the medications for the patient in the at least one secure compartment when the access information indicates that the user has access to the at least one secure compartment; and restrict access to retrieval of the medications for the patient in the at least one secure compartment when the access information indicates that the user does not have access to the at least one secure compartment; and an information output module configured to: output usage information regarding access to the at least one secure compartment. |
|
Recovery of control of processing resource, which performs external context of execution Planner in a process of a computer system provides for the possibility of execution of an external content of realisation in a processing resource provided to the planner. The planner provides control of processing resource to the external context of execution. The planner is registered for receiving of a notice on a completion event associated with the external context of execution. In response to reception of a notice about a completion event, the planner recovers control of the processing resource and provides for execution of a task associated with the context of execution controlled by the planner with the help of the processing resource. |
|
Machine-executable method of integrating linear content with interactive features includes delivering linear video content from hosting service centres by client devices associated with users located at a distance from the hosting service centres. Further, the method includes delivering interactive content through the Internet from hosting service centres to client devices located at a distance from the hosting service centres through compressed streaming interactive video. Interactive content is generated in real-time through servers executing a video game or an application in hosting service centres. Compressed streaming interactive video is compressed with sufficiently short waiting time such that at least one user interacting with the video game or application perceives that the responses are so instant as if the video game or application is executed on the client device locally for at least one user. |
|
Video compression system and method for reducing effect of packet loss in communication channel Method provides interactive audio/video streaming hosting based on receiving packet streams and routing them to one or more applications with the possibility of calculating data in response to control signal input, as well as parallel compression of parts of the data using a plurality of processing units. The method also provides logically subdividing each of a sequence of images of a video stream into a plurality of fragments, each having a defined position within each of the sequence of images; and packing the fragments into a plurality of data packets to maximise the number of fragments which are aligned with boundaries of each of the data packets. |
Another patent 2513136.
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |