序号 | 专利名 | 申请号 | 申请日 | 公开(公告)号 | 公开(公告)日 | 发明人 |
---|---|---|---|---|---|---|
161 | ADDRESSING REMOTE DATA OBJECTS VIA A COMPUTER NETWORK | PCT/GB0102269 | 2001-05-22 | WO0190936A2 | 2001-11-29 | ANDERSON RAYMOND; MALHOTRA ANIL; ASSHETON ROBERT JOHN; BONDI JOHNATHAN RICHARD |
A system is described for mapping a secondary address to a primary address. The secondary address is used as an alias for the primary address and the primary address references a remote data object, such as an internet web page. The secondary address has a prefix portion that is used to direct a mapping request to a remote database storing mapping data and then a suffix portion of the secondary address is used to index within that remote database to identify the primary address. The primary address and the secondary address may be internet URL addresses. A local cache within a user device may be provided, such as in the form of a browser plug-in. Once the mapping has taken place to establish the link between a secondary address and a primary address, thereafter communication can take place directly between the user device and the target without requiring further mapping. | ||||||
162 | A METHOD AND APPARATUS FOR EXECUTING FLOATING POINT AND PACKED DATA INSTRUCTIONS USING A SINGLE REGISTER FILE | PCT/US1996020522 | 1996-12-17 | WO1997022921A1 | 1997-06-26 | INTEL CORPORATION |
A method and apparatus for executing floating point and packed data instructions using a single physical register file that is aliased. According to one aspect of the invention, processor is provided that includes a decode unit (1002), a mapping unit (1004), and a storage unit (1006). The decode unit (1002) is configured to decode instructions and their operands from at least one instruction set including at least a first and second set of instructions. The storage unit (1006) includes a physical register file (1020). The mapping unit (1004) is configured to map operands used by the first set of instructions to the physical register file in a stock referenced manner. In addition, the mapping unit (1004) is configured to map operands used by the second set of instructions to the same physical register file in a non-stack reference manner. | ||||||
163 | System, method, and computer program for fetching data from a physical memory queue utilizing an alias queue name | US14555495 | 2014-11-26 | US09501228B1 | 2016-11-22 | Sourav Chaterjee |
A system, method, and computer program product are provided for fetching data from a physical memory queue utilizing an alias queue name. In use, a physical queue associated with at least a portion of memory is identified. Additionally, a first alias queue name is mapped to the physical queue. Further, data is fetched utilizing the first alias queue name in response to a request to fetch the data from the physical queue. | ||||||
164 | MODULE FOR BUILDING DATABASE QUERIES | US12274059 | 2008-11-19 | US20090138455A1 | 2009-05-28 | Paolo Copello |
A module for building a database query has a client-side module part and a server-side module part, creating an abstract query object given user-defined query criteria. The user-defined query criteria has alias names for elements of data tables in the database. An abstract query object is sent to a parse and validate entity. The server-side module part extracts mapping information between the alias names and real names of the elements of the data tables from a private configuration table, which stores the mapping information according to a valid internal structure of the database at the time of extraction. A query on the database is created by extracting a query configuration from the abstract query object and resolving the alias names contained in the query configuration by searching the mapping information of the private configuration table. The query is performed on the data tables, the query results are adapted to changes made in the internal structure of the database, a list of available alias names is extracted from the mapping information, the list of the available alias names is forwarded to the client-side module part. The query results are then forwarded to the client-side module part. | ||||||
165 | SIGNALANALYSATOR UND VERFAHREN ZUM ANZEIGEN VON LEISTUNGEN VON CODEKANÄLEN | PCT/EP2003/004465 | 2003-04-29 | WO2003107566A1 | 2003-12-24 | FRANKE, Jens; NITSCH, Bernhard; HELLER, Klaus |
Die Erfindung betrifft einen Signalanalysator sowie ein Verfahren zum Anzeigen von Leistungen von Code-Kanälen eines CDMA (Code Division Multiple Access)-Signals, das Code-Kanäle mit verschiedenen Spreizfaktoren enthält. Aus einem empfangenen Signal wird die Leistung der einzelnen Code-Kanäle ermittelt. Die gemessenen Leistungen der einzelnen Code-Kanäle für einen bestimmten Basis-Spreizfaktor werden in einem Diagramm (1) dargestellt, wobei diejenigen Code-Kanäle (5, 6), die eine Alias-Leistung aufweisen, gekennzeichnet werden, wobei ein Code-Kanal bezüglich des bestimmten Basis-Spreizfaktors dann eine Alias-Leistung aufweist, wenn der Code-Kanal mit dem Basis-Spreizfaktor (SF64, SF 128) inaktiv ist und ein ihm entsprechender Code-Kanal (C68, C144) eines höheren Spreizfaktors (SF128, SF256) aktiv ist oder bei orthogonaler Transmit Diversity die Leistung eines Code-Kanals auf den Code-Kanal des Basis-Spreizfaktors abgebildet wird. |
||||||
166 | Alias address support | US554186 | 1990-07-16 | US5119290A | 1992-06-02 | William V. Loo; John Watkins; Joseph Moran; William Shannon; Ray Cheng |
Improvements in workstations which utilizes virtual addressing in multi-user operating systems with write back caches, including operating systems which allow each user to have multiple active processes directed to the support of alias addresses, i.e., two or more virtual addresses which map to the same physical address in real memory Specifically, alias addresses are created so that their low order address bits are identical, modulo the size of the cache (as a minimum) for user programs which use alias addresses generated by the kernel, or wholely within the kernel. For alias addresses in the operating system, rather than user programs, which cannot be made to match in their low order address bits, their pages are assigned as "Don't Cache" pages in the memory management unit (MMU) employed by workstations which utilize virtual addressing. | ||||||
167 | Edge detection method detecting pixel with alias eliminated therefrom and device for detecting pixel on border line including the pixel | JP7842599 | 1999-03-23 | JPH11331607A | 1999-11-30 | LOCE ROBERT P; IEKIN ZUAN; MICHAEL BRANSIFORT |
PROBLEM TO BE SOLVED: To provide the method that detects an image area with alias eliminated therefrom and generates a rendering tag in a text from which alias is eliminated or in an architecture designed for rendering a line area. SOLUTION: A histogramer 204 decides a threshold level for one area of an image in the logical base execution of the edge detection method. In a 1st channel (C1) of the image, a threshold level used to apply binary processing to an image area and decided as a function of a 1st image reference is set, a vector with an existing set of pixels in the binary-processed image area is extracted and applied to a logical arithmetic operation, and suggesting the presence of an existing pattern as output when the existing pattern is present. In a 2nd channel (C2), the similar steps to the channel 1 are conducted. A tag map 216 combines logically the 1st and 2nd channels and generates a tag suggesting the presence or absence of pixels on a gray border line in the image area. | ||||||
168 | Cache memory | JP28722892 | 1992-10-26 | JPH06139146A | 1994-05-20 | IZUMIKAWA MASANORI |
PURPOSE: To detect the occurrence of a problem (alias) that data on a physical place simultaneously exist on two or more places in a direct map type cache memory having capacity larger than page size by means of hardware. CONSTITUTION: The cache memory is provided with tag memories 2, 3 each of which is divided by a bit of a virtual page number in an index, comparators 5, 6 for inputting data read out from the tag memories 2, 3 and physical addresses to be address conversion results, a selection circuit 7 for selecting either one of outputs from the comparators 5, 6 in accordance with the bit of the virtual page number in the index and outputting a cache hit HIT and a selection circuit 8 for outputting the existnce/absence of alias based upon the OR of the output from the non-selected comparator. COPYRIGHT: (C)1994,JPO&Japio | ||||||
169 | Hardware security agent for network communications | US14194329 | 2014-02-28 | US09225689B2 | 2015-12-29 | Robert Lorch |
A hardware security agent may include a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer, and a mapper configured to map the alias to corresponding protected data stored within the hardware security agent. The hardware security agent may further include a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site. | ||||||
170 | HARDWARE SECURITY AGENT FOR NETWORK COMMUNICATIONS | US14194329 | 2014-02-28 | US20150249646A1 | 2015-09-03 | Robert Lorch |
A hardware security agent may include a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer, and a mapper configured to map the alias to corresponding protected data stored within the hardware security agent. The hardware security agent may further include a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site. | ||||||
171 | METHOD AND APPARATUS FOR PERFORMING PATH STROKING | US15260684 | 2016-09-09 | US20170076470A1 | 2017-03-16 | Jeongjoon YOO; Sundeep KRISHNADASAN; Jaedon LEE; Sangoak WOO |
A method of performing path stroking includes determining whether or not aliasing based on a primitive included in a path will occur using data about the path, generating a texture to be used for performing path stroking based on a result of the determining, and mapping the texture along an edge of the primitive. | ||||||
172 | 曖昧感応自然言語処理システムにおける同一指示解決 | JP2014156393 | 2014-07-31 | JP2014238865A | 2014-12-18 | MARTIN VAN DEN BERG; RICHARD CROUCH; FRANCO SALVETTI; GIOVANNI LORENZO THIONE; DAVID AHN |
【課題】曖昧感応自然言語処理システムにおける同一指示解決のための技術を提供する。【解決手段】情報検索および取り出しシステム内においてインデックス化されている文書を処理し、曖昧承知機構、および曖昧さ解決機能が、同一指示解決と調和して動作する。同一指示存在の注釈、および曖昧な解釈は、テキスト・コンテンツ内における同一行上マークアップによって、または外部存在マップによってサポートする。文書内部で表現されている情報は、事実、またはテキスト内における存在間の関係に関して、規則的に編成する。拡張は、複数の別名、または曖昧さを、インデックス化された存在に適用することをサポートする。【選択図】図3 | ||||||
173 | Multimedia network transposition | US13793661 | 2013-03-11 | US09025755B1 | 2015-05-05 | Vijay Jayapalan; Susan Blake; Frederick Eugene Diehl, Jr.; Jerry Scott Beene; Michael Sjolander |
Methods and systems for routing multimedia traffic are described. A method may include receiving a communication originating from a user, transposing an alias transport network over one or more existing networks to route the communication, and routing the communication based on mapping rules. | ||||||
174 | Flexible Memory Addressing For Data Security | US14042290 | 2013-09-30 | US20150095661A1 | 2015-04-02 | John V. Sell; Ling Tony Chen; Paul Paternoster |
Regions of system memory in a computer system are managed to maintain privacy and integrity of data. A system address space for memory is divided into a plurality of aliased addressed spaces. Each of the aliased address spaces is associated with its own unique encryption key. The system address space is managed using the aliased address spaces to provide data isolation and privacy for different system processes. One or more aliased address spaces can be provided with additional data integrity capabilities. Data associated with an integrity-checked aliased address space is subjected to data integrity checking, using authentication-based techniques such as hashing, for example. Additionally, a set of contiguous addresses in the aliased address space is defined, while being mapped to a set of non-contiguous addresses in the corresponding physical address space for additional data security. | ||||||
175 | Electronic document mapping | US09835856 | 2001-04-17 | US20020013810A1 | 2002-01-31 | Pang Hwee Hwa |
A method of mapping the identity of at least one electronic document, the at least one electronic document having a resource locator, the method including the steps of: (a) receiving a request for an alias of the resource locator from a client; (b) recovering the resource locator from the alias resource locator, (c) retrieving the at least one electronic document at the resource locator; (d) creating a new alias resource locator; and (e) returning the electronic document under the new alias resource locator to the client. | ||||||
176 | 아이피망을 이용한 일반전화기에서 호출 가능한 인터넷전화번호 부여방법 | KR1020010005990 | 2001-02-07 | KR100398350B1 | 2003-09-19 | 송용호 |
PURPOSE: A method for granting an Internet phone number, which a generic phone can call, using an IP network is provided to make a gateway connected with an Internet phone through a gatekeeper using an Internet phone number and to enable a generic phone user to make a telephone call to an Internet phone if he takes an authentication procedure that a main server provides. CONSTITUTION: An Internet phone number mapping table format is composed of an IP address field(61), an alias name field(62), an e-mail number field(63), a phone number(E.164) field(64), and a status field(65). A supplemental part(130) for Internet phone recognition is added to each field, except the IP address field(61) and the status field(65). Each supplemental part(130) is composed of an Internet phone number service provider identification number(110) and an Internet phone number identification number(120). | ||||||
177 | Dynamic associative storage security for long-term memory storage devices | US10983320 | 2004-11-06 | US07814554B1 | 2010-10-12 | Gary Dean Ragner |
A hierarchical folder security system for mapping files into and out of alias directories and/or real directories depending on: 1) the directory of the specific file being accessed, 2) the program thread requesting access to a memory storage device (114), and 3) the type of access request being made (i.e. load, save, run, etc.). For write access requests (i.e. save, modify, paste, delete, cut, move, rename, etc.), security controller (180) determines if the requested folder access address (150a) is associated with the requesting program's folder address (168). If it is, the file is written at absolute address (156b) on disk platter (160) through real folder map (152). If requested address (150a) is not associated with program folder address (168), then an alias directory address is created and the file is written at alias address (156a) through alias folder address map (154). | ||||||
178 | 아이피망을 이용한 일반전화기에서 호출 가능한 인터넷전화번호 부여방법 | KR1020010005990 | 2001-02-07 | KR1020020065803A | 2002-08-14 | 송용호 |
PURPOSE: A method for granting an Internet phone number, which a generic phone can call, using an IP network is provided to make a gateway connected with an Internet phone through a gatekeeper using an Internet phone number and to enable a generic phone user to make a telephone call to an Internet phone if he takes an authentication procedure that a main server provides. CONSTITUTION: An Internet phone number mapping table format is composed of an IP address field(61), an alias name field(62), an e-mail number field(63), a phone number(E.164) field(64), and a status field(65). A supplemental part(130) for Internet phone recognition is added to each field, except the IP address field(61) and the status field(65). Each supplemental part(130) is composed of an Internet phone number service provider identification number(110) and an Internet phone number identification number(120). | ||||||
179 | ALIASED KEYS FOR FEDERATED DATABASE QUERIES | US11930937 | 2007-10-31 | US20090112794A1 | 2009-04-30 | Richard Dean Dettinger; Jan Theresa Karels; Richard Joseph Stevens |
Embodiments of the invention provide techniques for performing federated queries of data records stored in multiple data sources. In one embodiment, an aliased key table may be configured to store relationships between key fields of multiple data sources. The aliased key table may specify a mapping function to translate a value of one key field to an equivalent value of a second key field. The mapping function may be used with a mapping table storing sets of key values of different data sources, with each set corresponding to a given entity. In another embodiment, the mapping function may call a web service configured to translate key values. In yet another embodiment, federated queries may be specified in terms of attributes, which may be matched to key values. | ||||||
180 | METHOD FOR EXECUTING FEDERATED DATABASE QUERIES USING ALIASED KEYS | US11936868 | 2007-11-08 | US20090125540A1 | 2009-05-14 | Richard Dean Dettinger; Jan Theresa Karels; Richard Joseph Stevens |
Embodiments of the invention provide techniques for performing federated queries of data records stored in multiple data sources. In one embodiment, an aliased key table may be configured to store relationships between key fields of multiple data sources. The aliased key table may specify a mapping function to translate a value of one key field to an equivalent value of a second key field. The mapping function may be used with a mapping table storing sets of key values of different data sources, with each set corresponding to a given entity. In another embodiment, the mapping function may call a web service configured to translate key values. In yet another embodiment, federated queries may be specified in terms of attributes, which may be matched to key values. |