摘要:
A method is provided and includes generating a first simulated device at a device simulator. The first simulated device corresponding to a first physical device. Also, a second simulated device is generated at the device simulator. The second simulated device corresponds to a second physical device. At least one behavior extension file is loaded at the device simulator. Further, the behavior extension file is applied to the first simulated device or to the second simulated device. The method further includes selectively loading an application to the device simulator. The application can be selectively executed with respect to the first simulated device, the second simulated device, or to the first simulated device and the second simulated device. Also, the application can be modified at least partially in response to the execution of the application at the device simulator to produce a modified application.
摘要:
Methods, systems, devices and computer program products are provided for locating, tracking and/or recovering a wireless communication device that has been misplaced, lost or stolen. In addition, the aspects provide for tracking or surveillance of the location or user in instances in which the wireless device has been loaned or is being used for covert surveillance. The aspects include communicating a locating state code to the targeted device, which detects the code and executes one or more routines that are associated with the respective code. In this regard, the targeted device is capable of carrying out different routines or sequences of actions depending on the state of the device, such as a misplaced state, a lost state, a stolen state or the like, which is based on the respective code.
摘要:
A sensor interface is provided with a number of sensor inputs and a number of client inputs. The client inputs are configured to receive a number of data requests from a number of clients. The number of data requests include at least one data request that specifies a particular type of data to be returned, without identifying a particular physical sensor to be used in acquiring the particular type of data. A processor is configured to i) determine what sensor data can be used to satisfy the number of data requests, ii) configure ones of the sensor inputs to receive sensor data from a number of physical sensors, and iii) if possible, satisfy the number of data requests using the received sensor data. Methods and apparatus pertaining to such a sensor interface are also disclosed.
摘要:
A sensor interface is provided with a number of sensor inputs and a number of client inputs. The client inputs are configured to receive a number of data requests from a number of clients. The number of data requests include at least one data request that specifies a particular type of data to be returned, without identifying a particular physical sensor to be used in acquiring the particular type of data. A processor is configured to i) determine what sensor data can be used to satisfy the number of data requests, ii) configure ones of the sensor inputs to receive sensor data from a number of physical sensors, and iii) if possible, satisfy the number of data requests using the received sensor data. Methods and apparatus pertaining to such a sensor interface are also disclosed.
摘要:
Methods, systems, devices and computer program products are provided for locating, tracking and/or recovering a wireless communication device that has been misplaced, lost or stolen. In addition, the aspects provide for tracking or surveillance of the location or user in instances in which the wireless device has been loaned or is being used for covert surveillance. The aspects include communicating a locating state code to the targeted device, which detects the code and executes one or more routines that are associated with the respective code. In this regard, the targeted device is capable of carrying out different routines or sequences of actions depending on the state of the device, such as a misplaced state, a lost state, a stolen state or the like, which is based on the respective code.
摘要:
A method is provided and includes generating a first simulated device at a device simulator. The first simulated device corresponding to a first physical device. Also, a second simulated device is generated at the device simulator. The second simulated device corresponds to a second physical device. At least one behavior extension file is loaded at the device simulator. Further, the behavior extension file is applied to the first simulated device or to the second simulated device. The method further includes selectively loading an application to the device simulator. The application can be selectively executed with respect to the first simulated device, the second simulated device, or to the first simulated device and the second simulated device. Also, the application can be modified at least partially in response to the execution of the application at the device simulator to produce a modified application.
摘要:
System for dynamic arbitration of a shared resource on a device. A method is provided for arbitrating the allocation of a device resource on a device. The method comprises receiving a request from a requesting application that requests allocation of the device resource, and determining that the device resource is owned by an owning application. The method also comprises associating owner information with requester information to form an arbitration request, wherein the owner information comprises information about the owning application and the requester information comprises information about the requesting application. The method also comprises arbitrating the arbitration request to produce an arbitration decision that indicates whether or not the device resource should be allocated to the requesting application, and allocating the device resource based on the arbitration decision.
摘要:
System for dynamic arbitration of a shared resource on a device. A method is provided for arbitrating the allocation of a device resource on a device. The method comprises receiving a request from a requesting application that requests allocation of the device resource, and determining that the device resource is owned by an owning application. The method also comprises associating owner information with requester information to form an arbitration request, wherein the owner information comprises information about the owning application and the requester information comprises information about the requesting application. The method also comprises arbitrating the arbitration request to produce an arbitration decision that indicates whether or not the device resource should be allocated to the requesting application, and allocating the device resource based on the arbitration decision.