摘要:
In a network of sensor nodes, operational efficiency may be increased by configuring the sensor nodes so that sensor agents may be transferred to alternative sensor nodes to process sensor node data, such as when the host sensor node is in a low-power mode. A processing node of the network may be configured to retrieve real-time data from a sensor node, but if real-time data is not available, the processing node may perform calculations on cached data retrieved from a processor node cache or data of a nearby sensor node.
摘要:
In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the application's security permissions, e.g. by decoding a security token. The class is then retrieved from a repository that stores class variants matching the required security level. The retrieved class variant, which may have a full or a reduced functionality as appropriate for the security permission may then by loaded.
摘要:
The functionality of smartphone applications may be extended to a basic phone, i.e., a phone lacking a particular smartphone capability, by providing a data synthesizer in the basic phone that synthesizers required data points. The data synthesizer may communicate with nearby smartphones to collect relevant data points such as location or motion data. Data points for the basic phone may be calculated from the collected data points. When an application on the basic phone requests data, a data provider proxy may retrieve a synthesized data point from the data synthesizer. In one example, a basic phone without a GPS or similar location module may execute a mapping application by averaging location data from nearby smartphones.
摘要:
The functionality of smartphone applications may be extended to a basic phone, i.e., a phone lacking a particular smartphone capability, by providing a data synthesizer in the basic phone that synthesizers required data points. The data synthesizer may communicate with nearby smartphones to collect relevant data points such as location or motion data. Data points for the basic phone may be calculated from the collected data points. When an application on the basic phone requests data, a data provider proxy may retrieve a synthesized data point from the data synthesizer. In one example, a basic phone without a GPS or similar location module may execute a mapping application by averaging location data from nearby smartphones.
摘要:
A method and apparatus are disclosed that calculate an area-of-interest based on a user request for location specific data. The operations may include transmitting initial location data of the mobile terminal and user initiated gesture data to a server. The server may then perform initiating a request to receive the requested location data, and calculating a geographical area-of-interest based on the initial location data and the user initiated gesture data. The location specific data related to the area-of-interest may then be retrieved and transmitted to the mobile terminal. The area-of-interest may be defined based on the initial position of the mobile terminal and information provided by a gesture made by the user of the mobile terminal.
摘要:
The present application is directed to a method, apparatus a computer program product configured to perform certain operations of dynamic serialization. In one example, a message is received which includes at least one message element requiring serialization. A first message element of the message is examined. A serialization scheme from a serialization scheme library is selected based on the at least one examined attribute of the first message element. Then, at least the first message element is encoded using the serialization scheme selected.
摘要:
Mobile agents can be deployed to location aware mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. When a device hosting the agent exits the region of interest, the agent is terminated, thereby freeing device resources.
摘要:
In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the application's security permissions, e.g. by decoding a security token. The class is then retrieved from a repository that stores class variants matching the required security level. The retrieved class variant, which may have a full or a reduced functionality as appropriate for the security permission may then by loaded.
摘要:
In a network of sensor nodes, operational efficiency may be increased by configuring the sensor nodes so that sensor agents may be transferred to alternative sensor nodes to process sensor node data, such as when the host sensor node is in a low-power mode. A processing node of the network may be configured to retrieve real-time data from a sensor node, but if real-time data is not available, the processing node may perform calculations on cached data retrieved from a processor node cache or data of a nearby sensor node.
摘要:
Mobile agents can be deployed to location aware mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. When a device hosting the agent exits the region of interest, the agent is terminated, thereby freeing device resources.