scispace - formally typeset
Search or ask a question
Topic

Personal computer

About: Personal computer is a research topic. Over the lifetime, 58809 publications have been published within this topic receiving 800814 citations. The topic is also known as: PC.


Papers
More filters
Patent
15 Oct 1996
TL;DR: In this paper, a method and apparatus for closed loop, automatic processing a loan, including completion of the application, underwriting, and transferring funds, includes use of a programmed computer to interface with an applicant, obtain the information needed to process the loan, determine whether to approve the loan and effect electronic fund transfers to the applicant's deposit account and arrange for automatic withdrawals to repay the loan.
Abstract: A method and apparatus for closed loop, automatic processing a loan, including completion of the application, underwriting, and transferring funds, includes use of a programmed computer to interface with an applicant, obtain the information needed to process the loan, determine whether to approve the loan, and effect electronic fund transfers to the applicant's deposit account and arrange for automatic withdrawals to repay the loan. Information is received from the applicant preferably by using voice recognition technology but alternatively by entering the alpha-numeric information using a personal computer keyboard or using the buttons on a telephone. The loan approval determination is made using a neural network with input obtained in part from the applicant and in part from databases accessed by the computer, such as a credit bureau, to obtain a credit report. The loan agreement is transmitted by facsimile to and from the applicant when the applicant has access to a facsimile machine or datafile to be printed or to an agent who delivers the agreement to the applicant when the applicant does not have access. In a preferred embodiment, the applicant accesses the computer from a kiosk where the complete transaction can take place as the applicant waits.

665 citations

Journal ArticleDOI
TL;DR: In this paper, a new implementation of local second-order Mo/ller-Plesset perturbation theory (LMP2) is presented for which asymptotically all computational resources (CPU, memory, and disk) scale only linearly with the molecular size.
Abstract: A new implementation of local second-order Mo/ller-Plesset perturbation theory (LMP2) is presented for which asymptotically all computational resources (CPU, memory, and disk) scale only linearly with the molecular size. This is achieved by (i) using orbital domains for each electron pair that are independent of molecular size; (ii) classifying the pairs according to a distance criterion and neglecting very distant pairs; (iii) treating distant pairs by a multipole approximation, and (iv) using efficient prescreening algorithms in the integral transformation. The errors caused by the various approximations are negligible. LMP2 calculations on molecules including up to 500 correlated electrons and over 1500 basis functions in C1 symmetry are reported, all carried out on a single low-cost personal computer.

663 citations

Patent
10 Mar 1999
TL;DR: In this paper, a UET card is used as a remote terminal for a mainframe computer, and a method of conducting an electronic transaction is proposed for transferring transactional and account information between a UTE card and a personal computer or a main-frame computer.
Abstract: The invention also includes methods of issuing an account authorization to a UET card, a method of transferring transactional and account information between a UET card and a personal computer or a mainframe computer, a method of using the UET card as a remote terminal for a mainframe computer, and a method of conducting an electronic transaction.

655 citations

Patent
09 Jan 1998
TL;DR: In this paper, a method and apparatus for providing authenticated, secure, on-line communication between remote locations including a user terminal adapted to enable a player in one location to remotely communicate via a communications medium such as the Internet with a gaming host in another location.
Abstract: Method and apparatus for providing authenticated, secure, on-line communication between remote locations including a user terminal adapted to enable a player in one location to remotely communicate via a communications medium such as the Internet with a gaming host in another location. Location of the remote user terminal, the host server and universal time are determined using means for accessing signals generated by geostationary navigational transmitters, such as in the global positioning satellite (GPS) system. Player authentication (identity verification) is determined by use of a personal identification number (PIN) and an electronic signature verification service. Security of communication is accomplished through use of a public-key/private-key encryption system. The remote user terminal may be comprised of one or more discreet components adapted to be used with a laptop or desktop personal computer (PC), or may be embodied in a stand alone or self-contained single unit that is portable and communicates via radio waves, telephone lines or the Internet to a host server.

649 citations

Patent
05 Nov 1997
TL;DR: In this paper, the authors present a unified messaging system that provides a multimedia mailbox for a subscriber to access stored multimedia messages such as voicemail messages, facsimile messages, combined voice and facsimiles messages and video messages, not only through a public switched telephone network using a telephone but also over a data network, such as the Internet or an intranet, using a personal computer.
Abstract: A unified messaging system that provides a multimedia mailbox. The system allows a subscriber to access stored multimedia messages, such as voicemail messages, facsimile messages, combined voice and facsimile messages and video messages, not only through a public switched telephone network using a telephone but also over a data network, such as the Internet or an intranet, using a personal computer. The system provides voicemail access over the telephone network, indicating message number, etc. with the ability to play messages to the telephone user as desired. For text type messages, such as facsimile and e-mail, the system converts the text into speech and plays the speech to the telephone user. The system allows a personal computer user to obtain the data network access using an Internet browser. The browser is used to access a home page of the system and get information about the messages stored, and is used to download (get) and play the messages at the personal computer via data streaming in the case of a voice or video messages or view the messages in the case of text type messages, such as facsimile and e-mail. The user can also perform the other typical messaging functions over the data network connection that are provided for telephone access, such as viewing a message list, saving and deleting messages, group list administration and other administration tasks.

646 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Image processing
229.9K papers, 3.5M citations
79% related
Information system
107.5K papers, 1.8M citations
79% related
The Internet
213.2K papers, 3.8M citations
78% related
User interface
85.4K papers, 1.7M citations
77% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202310
202227
2021418
2020954
20191,407
20181,342