Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

39 results about "Object domain" patented technology

A domain object is an entity in the domain layer of your application, eg. an Address class. "Model" means the same thing - an entity in the "Domain Model". A POCO (plain old CLR object) is an object that has no behaviour (methods) defined, and only contains data (properties).

Method and system for implicitly resolving pointing ambiguities in human-computer interaction (HCI)

A method and system for implicitly resolving pointing ambiguities in human-computer interaction by implicitly analyzing user movements of a pointer toward a user targeted object located in an ambiguous multiple object domain and predicting the user targeted object, using different categories of heuristic (statically and / or dynamically learned) measures, such as (i) implicit user pointing gesture measures, (ii) application context, and (iii) number of computer suggestions of each predicted user targeted object. Featured are user pointing gesture measures of (1) speed-accuracy tradeoff, referred to as total movement time (TMT), and, amount of fine tuning (AFT) or tail-length (TL), and, (2) exact pointer position. A particular application context heuristic measure used is referred to as containment hierarchy. The invention is widely applicable to resolving a variety of different types of pointing ambiguities such as composite object types of pointing ambiguities, involving different types of pointing devices, and which are widely applicable to essentially any type of software and / or hardware methodology involving using a pointer, such as in computer aided design (CAD), object based graphical editing, and text editing.
Owner:RAMOT AT TEL AVIV UNIV LTD

Method and system for implicitly resolving pointing ambiguities in human-computer interaction (HCI)

A method and system for implicitly resolving pointing ambiguities in human-computer interaction by implicitly analyzing user movements of a pointer toward a user targeted object located in an ambiguous multiple object domain and predicting the user targeted object, using different categories of heuristic (statically and/or dynamically learned) measures, such as (i) implicit user pointing gesture measures, (ii) application context, and (iii) number of computer suggestions of each predicted user targeted object. Featured are user pointing gesture measures of (1) speed-accuracy tradeoff, referred to as total movement time (TMT), and, amount of fine tuning (AFT) or tail-length (TL), and, (2) exact pointer position. A particular application context heuristic measure used is referred to as containment hierarchy. The invention is widely applicable to resolving a variety of different types of pointing ambiguities such as composite object types of pointing ambiguities, involving different types of pointing devices, and which are widely applicable to essentially any type of software and/or hardware methodology involving using a pointer, such as in computer aided design (CAD), object based graphical editing, and text editing.
Owner:RAMOT AT TEL AVIV UNIV LTD

Domain-based access control method and system

The invention relates to a domain-based access control method and system. The domain-based access control method comprises the following steps of: setting a domain label of each application and establishing a domain-based access control policy library on subject and object of each application in a system through aiming at different application domains according to requirements of a user on protection of the system; capturing an access request of the subject on the object in the system; submitting the access request to the domain-based access control policy library to perform domain label detection; and judging whether a current operation is allowed or not, accepting the current access request if the current operation is allowed, and refusing the current access request if the current operation is not allowed. The domain-based access control system comprises a capturing filtering module, an access control judging module, a domain database module, a domain information managing module and a safety journal querying module, wherein the capturing filtering module is used for capturing and filtering data access requests of application programs in the system, the access control judging module is used for judging whether a subject domain label and an object domain label are same or not and determining whether an access action is allowed or not, the domain database module is used for saving information of the access control policy library, the domain information managing module is used for modifying the information of the access control policy library and querying safety journals, and the safety journal querying module is used for storing dangerous operation information disobeying an access control policy. According to the domain-based access control method and system, disclosed by the invention, the application program can be effectively protected, and the safety of the application program and an operating system can be improved.
Owner:BEIJING NASE HENGXIN TECH

Input verification method

The invention relates to an input verification method, which comprises the following steps: A, respectively setting corresponding Java annotations according to different verification types of verification fields in a Java system, and enabling the Java annotations to comprise field attributes and error information corresponding to the verification types; and B, creating a verification method, wherein the verification method comprises the following steps: acquiring a specific value input to a verification field by a user and a Java annotation of the verification field through a Java object domain mechanism; and verifying the specific value according to the Java annotation of the verification field, and if the specific value does not pass the verification, throwing out an exception, wherein corresponding error information in the Java annotation is contained in the exception. According to the input verification method, the development cost and the operation and maintenance cost are greatlyreduced; developers do not need to repeatedly compile tedious verification logic codes; the developers and the operation and maintenance personnel do not need to learn complex specifications; a unified verification mode for various verification fields is achieved; and unified specifications of the codes are guaranteed.
Owner:SICHUAN XW BANK CO LTD

Multi-view behavior identification method based on largest-interval meaning clustering

Each embodiment mode of the invention provides a multi-view behavior identification method based on largest-interval meaning clustering. The method comprises steps that: global profile flow characteristics of each frame of each motion video sample are firstly extracted, a words-bag model is utilized to acquire characteristic expression vectors of the corresponding motion video sample frames; dimensionality reduction for the characteristic expression vectors is carried out by utilizing multi-time random mapping; the characteristic expression vectors which are acquired through dimensionality reduction at each random mapping are clustered through a largest-interval meaning clustering method; source object samples of all the samples are determined by utilizing a trained model, and separation characteristics of the source samples are directly taken as separation characteristics of an object domain; the separation characteristics of an object domain are taken as input, and a classification model is trained by utilizing a support vector machine; separation characteristics of a test sample of the object domain are acquired by utilizing the classification model of the support vector machine, and classification is carried out by utilizing a nearest neighbor classifier.
Owner:康江科技(北京)有限责任公司

Adaptive extension method and device of data object, and storage medium

The invention provides an adaptive extension method and device of a data object, and a storage medium, and the method comprises the steps: a matching step: obtaining an adaptive data object through matching based on a current business scene of a user, and the data object comprises a key attribute and a description attribute; an extension step of performing adaptive extension on the key attributesand the description attributes from a public extension attribute component library based on the business scene and the category of the data object; and a display step: loading data contents from the object domain based on the description attributes after the adaptive expansion of the business scene and the data object pair, and assembling the complete data object based on the data contents loadedfrom the object domain, and selecting a corresponding template from a template library based on the business scene and the data object to display the data object loaded with the data content. According to the method, the expansibility of the data object is improved, the programming development difficulty is reduced, the utilization efficiency of the template is improved, the visibility of documentor report display is enhanced, and the user experience is improved.
Owner:CHANJET INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products