摘要:
A method determining distribution of a shared resource among nodes in a network includes: identifying each node according to a function performed by the node as one of a first node-type, second node-type, or third node type. A target service level is identified for each node. A first parameter representing the at least one respective target service level is communicated for each respective second node with a communicatively coupled first node. A second parameter representing the at least one respective target service level is communicated for each respective third node with a communicatively coupled first node. Each respective first node coordinates communication to cooperatively apply an optimizing algorithm to allocate the shared resource among the first nodes.
摘要:
A computing device (102) includes an interface (108) configured to communicate with a second computing device (152), a memory (106) configured to store a first copy (107) of a file that is synchronized with a second copy (157) of the file stored at the second computing device (152), and a processor (103). The processor (103) is configured, in response to receiving an update (115) to the file while the interface (108) is unable to communicate with the second computing device (152), to access versioning management data (117) indicating synchronization settings (121) associated with each of a plurality of files that includes the file. The processor (103) is configured to, conditioned on determining that the versioning management data (117) indicates a first synchronization setting associated with the file, write the update (115) to the first copy (107), and conditioned on determining that the versioning management data (117) indicates a second synchronization setting associated with the file, refrain from writing the update (115) to the first copy (107).
摘要:
A wireless device detection computer device for determining the location of wireless device is provided. The WDD computer device includes a processor in communication with a memory. The processor is configured to receive a plurality of status messages from a plurality of anchor points. Each status message of the plurality of status messages includes a received signal strength associated with a first wireless signal received at the corresponding anchor point from a first wireless device. The processor is also configured to determine a plurality of subsets of the plurality of anchor points, determine a potential location of the first wireless device for each of the plurality of subsets, generate a clustering of the plurality of potential locations, select a first group of the plurality of subsets based on the clustering, and calculate a final location of the first wireless device.
摘要:
A wireless device detection computer device for determining the location of wireless device is provided. The WDD computer device includes a processor in communication with a memory. The processor is configured to receive a plurality of status messages from a plurality of anchor points. Each status message of the plurality of status messages includes a received signal strength associated with a first wireless signal received at the corresponding anchor point from a first wireless device. The processor is also configured to determine a plurality of subsets of the plurality of anchor points, determine a potential location of the first wireless device for each of the plurality of subsets, generate a clustering of the plurality of potential locations, select a first group of the plurality of subsets based on the clustering, and calculate a final location of the first wireless device.
摘要:
A method for administering object-based multi-level security in a service oriented architecture includes defining a plurality of multi-level security attributes for each of selected respective life-cycle states of a plurality of life-cycle states of a service object, receiving a request from a requestor for the service object, determining permitted actions for the service object based upon at least one selected multi-level security attribute of the plurality of multi-level security attributes, and based upon at least one life-cycle state of the plurality of life-cycle states of the service object, and generating a quality of service security contract based upon the determination of permitted actions.