{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"http:\/\/media.usc.edu.tw","title":"Lock Manager Part-2","description":"","author_name":null,"author_url":"http:\/\/media.usc.edu.tw\/user\/","thumbnail_url":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/8\/883b2efb49acf09c\/thumb_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='405' id='ccShare3047' frameborder='0'  src='http:\/\/media.usc.edu.tw\/media\/e\/3047' allowfullscreen><\/iframe>","type":"video","width":720,"height":405,"duration":"20:13","index":{"item_1":{"title":"Definition of Granted Requests onto shared Item","time":"0","indent":"0","sn":"1"},"item_2":{"title":"Definition of Denied Request with Conflict","time":"233771","indent":"0","sn":"2"},"item_3":{"title":"Definition of Ignored Requests onto Denied Transactions","time":"427436","indent":"0","sn":"3"},"item_4":{"title":"Sample Input and Sample Output","time":"541935","indent":"0","sn":"4"}},"resolution":{"playtype":"fs","subtype":"","src":"1280x720","mp4":"720x404","mp4_hd":"1280x720","mp4_4k":"","mp4_1920":"","mp4_src":"","mp4_base":""},"base_image":{"thumb":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/8\/883b2efb49acf09c\/thumb.jpg","cover":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/8\/883b2efb49acf09c\/cover.jpg","storyboard":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/8\/883b2efb49acf09c\/video\/thumbs\/storyboard.jpg"},"srcFrom":"","base_url":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/8\/883b2efb49acf09c","status":true}