摘要:
A method, apparatus, and article of manufacture for performing data mining applications in a relational database management system. At least one analytic algorithm (110) is performed by a computer directly against a relational database (116), wherein the analytic algorithm includes SQL statements performed by the relational database management system (114) and optional programmatic iteration, and the analytic algorithm creates at least one analytic model within an analytic logical data model from data residing in the relational database.
摘要:
In a data processing system (100), a mechanism identifies data items by substantially unique identifiers (138, 140, 142, 144, 146, 148, 150) which depend on all of the data in the data items and only on the data in the data items. Existence means determine whether a particular data item is present in the system, by examining the identifiers of the plurality of data items.
摘要:
In a data processing system (100), a mechanism identifies data items by substantially unique identifiers (138, 140, 142, 144, 146, 148, 150) which depend on all of the data in the data items and only on the data in the data items. Existence means determine whether a particular data item is present in the system, by examining the identifiers of the plurality of data items.
摘要:
A system and method is disclosed for enabling a plurality of computers and associated computer resources, some or all of which may be of heterogeneous configuration, to cooperatively process a variety of applications such that the execution is transparent to the user regardless of where the application is actually executing. This distributed applications architecture performs an information distribution service between multiple transaction processing systems by working with a transaction processor via communication channels to other hosts within the network and a dialog manager (26) which uses a transaction processor interface (78) to communicate with the transaction processor. Additionally, the architecture employs a map service (36,40) to provide an editor to allow application programmers to create the maps (40) for the application panels, a compiler to generate the maps into linkable form, and a linkable interpreter which translates the linkable form into the screen presentation format for that platform. Furthermore, to distribute an application, the source code for the procedures (32), views (38) and panels are moved as a block to the new system. This is possible because once the application source code is complete, all of the application logic, user interface control tables, view definitions. and other application-specific tables for one transaction definition are packaged by the present invention in a single load module on the system where the application will reside. The load module is then compiled using the target system's compiler, link editor, and bind process. Thus, all environment-dependent variations of import export. including network protocol, operating systems, processor types, etc., are automatically integrated with the application at load module bind time. Therefore, no source code changes are necessary.
摘要:
A method, apparatus, and article of manufacture for performing data mining applications (110) in a relational database management system (114). A relational database management system, executed by the computer, manages a relational database stored on data storage devices of the computer. At least one analytic algorithm (206) is performed by the computer, wherein the analytic algorithm includes SQL statements performed by the relational database management system directly against the relational database and optional programmatic iteration, and the analytic algorithm creates at least one analytic model within an analytic logical data model from the data residing in the relational database. A parallel deployer is executed by the computer for managing parallel invocations of the analytic models.
摘要:
The technology includes the steps of: associating material-object identification code identifying each individual material object with material-object information representing information about material object and storing the material-object identification code and material-object information in a database in each of business categories; integrating items of material-object information having same material-object identification code with each other among material-object identification codes and items of material-object information received the database in each business category to generate integrated material-object information, associating the material-object identification code with integrated material-object information identified by material-object identification code and storing material-object identification code and integrated material-object information in integrated database; requesting to send integrated material-object information associated with given material-object identification code; reading requested integrated material-object information from integrated database and sending integrated material-object information to the requester and receiving and outputting said sent integrated material-object information.
摘要:
A method of consolidating genealogy records includes partitioning the records using at least one index file to form one or more partitions, sorting the records in a partition based on a data element in the records, comparing records within a sort range, based on the comparison, identifying same person records, consolidating information in the same person records, receiving a request from a user to view at least a portion of the consolidated information for a particular group of same person records, and sending a file that includes the portion to the user.
摘要:
A method of performing a sliding window search includes the steps of : creating an associative database of a plurality of data strings (42), receiving a first window of a data block (44), iconizing the first window of the data block to form a first icon (46), determining if the first icon has a match in the associative database (48), determining a first byte icon of a first byte of data in the first window (50), executing an icon shift function to form a shifted first byte icon, (52) exclusive ORing the shifted first byte icon with the first icon to form a seed icon (54), determining a second icon for a second window using the seed icon and transforming a new byte of data onto the seed icon (56), and determining if the second icon has a match in the associative database (58).
摘要:
The disclosed methodology permits an insecure computing system to safely perform high security electronic financial transactions. The present invention permits the hash of a file to be taken on an incremental basis. It permits any part of the file to be changed while allowing a new aggregate hash to be computed based on the revised file portion and the prior total hash. The aggregate hash is readily updatable with each record revision without having to recompute the hash of the entire file in accordance with conventional techniques. These objectives using two functions. The first function is an effective one-way hash function "H" for which it is computationally impossible to find two data values that hash to the same result. The second function is a commutative and associative function "F" (and inverse "Finv") and provides a mechanism for combining the aggregate hash and the hash of updated records. Examples of these latter functions include exclusive OR ("XOR"), and arithmetic addition. The methodology involves combining the hash of each file record and the hash of an identification of the record (i.e., a record number or key). These hashes are combined using a function ("F") whereby individual records may be extracted using the inverse of that function (Finv). In this fashion, an individual record may be extracted from the aggregate hash and updated. With each update, the file hash as computed according to this invention is preferably also written after being encrypted under a key known only to the valid user, or if it is digitally signed by the valid user or if it is held in a tamper resistant storage. Each record is represented by its identification hashed together with its data content. All such record are added together to provide a highly secure integrity check. This aggregate hash reflects the entire database such that the tampering (or rearranging) of any data record is revealed by the use of the record identifier (i.e., record number) in the hash calculation due to its impact on the aggregate hash (e.g., the sum).