Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70 results about "Descendent" patented technology

Someone deriving or descending from an ancestor.

Method for presenting hierarchical data

Methods, programs (120) and apparatus (100) are disclosed for accessing and heterogenous data sources (150-153) and presenting information obtained therefrom. Specifically, the data sources may have hierarchical data, which may be presented by identifying a context data node from the data, the context data node having one or more descendent data nodes. At least one data pattern is determined in the descendent data nodes. At least one display type is assigned to the current context data node on the basis of the at least one data pattern. Thereafter, the method presents at least a subset of the descendent data nodes according to one of the assigned display types. Also disclosed is a method of browsing an hierarchically-represented data source. A user operation is interpreted to identify a context data node from the data source, the context data node having one or more descendent data nodes. At least one data pattern in the descendent data nodes is then determined and at least one display type is assigned to the current context data node on the basis of the at least one data pattern. A subset of the descendent data nodes is then presented according to one of the assigned display types, the subset including at least one hyperlink (3401,3402) having as its target a descendant data node of the current context data node. A further user operation is then interpreted to select the at least one hyperlink, the selection resulting in the current context data node being replaced with the data node corresponding to the target of the selected hyperlink. These steps may be repeated until no further hyperlinks to descendent data nodes are included in the subset. Other methods associated with access and presentation are also disclosed.
Owner:CANON KK

Complex path-based query execution

Systems, methods, computer program product embodiments are provided for executing a function in a path-based query when extracting data from a markup language document for return as a relational table, the markup language document organized hierarchically into nodes. An embodiment includes receiving a path-based query including a complex row pattern and column definition, forming multiple sets of nodes based on a simplified row pattern and column definition, determining ancestor-descendent pairings for the nodes in the column definition set, and utilizing the ancestor-descendent pairings with the simplified row pattern to return a relational table satisfying the complex path-based query. An embodiment further includes extensible markup language (XML) as the markup language, and an XPath query expression as the complex path-based query.
Owner:SYBASE INC

Interference cancellation in variable codelength systems for multi-access communication

A receiver employs low-rate processing to synthesize the effect of high-rate interference in a received multi-rate signal. Each high-rate subchannel is analyzed on its low-rate descendents to produce symbol estimates for each low-rate symbol interval. The symbol estimates are applied to low-rate descendent subchannels, which are then combined to synthesize the effects of the high-rate interference. An interference canceller processes the synthesized interference with the received signal for producing an interference-cancelled signal. Alternatively, analogous steps may be applied at high-rate to analyze, synthesize, and cancel the effects of low-rate interference in a multi-rate signal.
Owner:III HLDG 1

Tree-based compositing system

A method of rendering a graphical image described by an expression tree is disclosed. The expression tree has one or more parent nodes and one or more leaf nodes, each parent node representing a graphical operator and having branches to respective descendent nodes. Each of the leaf node represents a graphic object. The method determines regions of one or more pixel locations in an output space of the image, with each region corresponding to a combination in the image of one or more the graphical objects. Next, for each said region, an activity state of corresponding parent nodes is determined using a predefined function for each corresponding operator. The method then generates, in parallel (1098), for each active one of the operators, compositing instructions and pixel generation instructions. The compositing instructions are stored in an operator queue and pixel colors are generated using the pixel generation instructions, the pixel colors being buffered in an operand queue (1300). Lastly, the generated pixel colors are composited (1400), for each pixel in the region, using the operators defined in the operator queue, to output (800) a composited pixel value for each pixel in the region. Other processing operations including operator reduction, flat color bypass, and operand comparison are also discussed.
Owner:CANON KK

Adaptive topology discovery in communication networks

A topology discovery process is used to discover all of the links in an ad hoc network and thereby ascertain the topology of the entire network. One of the nodes of the network, referred to as the coordinator, receives the topology information which can then be used to, for example, distribute a routing table to each other node of the network. The process has a Diffusion phase in which a k-resilient mesh, k>1, is created by propagating a topology request message through the network. Through this process, the nodes obtain information from which they are able to discern their local neighbor information. In a subsequent, Gathering phase, the local neighbor information is reported upstream from a node to its parents in the mesh and thence to the parents' parents and so forth back to the coordinator. The robustness of the Diffusion phase is enhanced by allowing a node to have more than one parent as well as by a number of techniques, including use of a so-called diffusion acknowledgement message. The robustness of the Gathering phase is enhanced by a number of techniques including the use of timeouts that ensure that a node will report its neighbor information upstream even if it never receives neighbor information from one or more downstream neighbors and the use of a panic mode that enhances the probability that a node will get its neighbor information, and its descendents' neighbor information, reported upstream even if that node has lost connectivity with all of its parents.
Owner:AT&T INTPROP II L P

Malware Discovery Method and System

A process for identifying potentially harmful malware, comprises the steps of: a) identifying an executable that is about to run; b) providing a monitoring agent that monitors all threads that are descendent of a thread initiated by the process of said executable; and c) configuring said monitoring agent to conclude that a high probability of malware presence exists, if one of said descendent threads reaches a target process in which suspicious patches are created.
Owner:CROWDSTRIKE

System of bath, shower, drying, massage and sauna for people

A system for bathing, showering, drying, massaging and sauna, which includes a container having a vertical arrangement, a main body, a bottom surface, a water-drainage orifice and a door for allowing entrance of a user in a wheelchair. The bottom surface is at the same level as the door in an open position. The bottom surface has a small descendent inclination towards the water-drainage orifice. The door has an edge acting as slight connecting ramp with a floor of a room in which the system is placed. The door has pawls or iron straps, which lodge and are retained in recesses formed the main body for fastening the door, and the door has magnets for maintaining the door in a closed position.
Owner:SAIZ MANUEL +1

Persistent Object Linkage Using Ghosting

A system that persistently maintains and exposes one or more previous object hierarchies to which an object belonged across one or more hierarchy destroying operations, such as operations that delete parent objects, add parent objects subsequent to addition of their descendent objects, forward objects to or from the hierarchy, and / or modify hierarchy determining rules. A user interface object allows user access to one or more persistent hierarchies for the corresponding object. A hierarchy list or the like allows a user to select a desired one of the persistent hierarchies. A persistent hierarchy can be accessed in the disclosed system through a display object associated with any object within the hierarchy, including the root, leaves, and any intervening objects. When objects are deleted, “ghost” objects are maintained and displayed to the user in the hierarchical positions of the deleted objects when a persistent hierarchy is displayed.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products