摘要:
An approach is provided for providing quality of service reservations in a packet-based radio communication network is disclosed. Connection information including connection rate is extracted from a dataflow from an application requesting connection-oriented service. A request message is sent to a proxy for establishing a connection based on the connection information over the network, wherein the proxy configures a classification rule based on flow criteria from the request message and accordingly initiates establishment of the connection over the network to a destination terminal. A confirmation that the connection can be established is selectively received according to the connection information, wherein the dataflow satisfying the flow criteria from the application is transported over the established connection to the destination terminal. This approach as particular applicability to shared capacity systems, such as a satellite communication system.
摘要:
An approach is provided for providing quality of service reservations in a packet-based radio communication network is disclosed. Connection information including connection rate is extracted from a dataflow from an application requesting connection-oriented service. A request message is sent to a proxy for establishing a connection based on the connection information over the network, wherein the proxy configures a classification rule based on flow criteria from the request message and accordingly initiates establishment of the connection over the network to a destination terminal. A confirmation that the connection can be established is selectively received according to the connection information, wherein the dataflow satisfying the flow criteria from the application is transported over the established connection to the destination terminal. This approach as particular applicability to shared capacity systems, such as a satellite communication system.
摘要:
A computer-implemented system and method are described for integrating a series of auxiliary spam detection models with a base spam detection model, thereby improving the accuracy and efficiency of the overall spam detection engine. For example, a system according to one embodiment of the invention comprises: a base spam filter feature extractor to detect a first set of features from incoming email messages; one or more auxiliary model feature extractors, each of the auxiliary model feature extractors to detect a different set of features from the incoming email messages; one or more auxiliary detection modules, each of the auxiliary detection modules to receive an indication of the different sets of features detected by a corresponding one of the auxiliary model feature extractor modules and to apply weights to the detected features; and a base spam filter module to receive an indication of the first set of features from the base spam filter feature extractor and the weights generated by the auxiliary detection modules, the base spam filter module to assign base spam filter weights to the first set of features and to determine whether an email message is spam based on the weights of the first set of features and the weights of the different set of features identified by the auxiliary model feature extractors.
摘要:
Methods for managing a virtual machine wherein an administration console (AC) (1104) transmits a query to a virtualization server (1116). The virtualization server 1116 includes at least one virtual machine (VM) (1124). AC (1104) receives, in response to the query, identification of a VM (1124) and establishes an authenticated communications link with a proxy machine (1108) adapted for communicating with the VM (1124). AC (1104) transmits over the authenticated communications link to proxy machine (1108) the identification of the VM (1124) and performs a management function with respect to the VM (1124).
摘要:
Systems, methods and computer program product embodiments for providing table parameterized function (TPF) functionality in a database are disclosed herein. An embodiment includes defining a TPF in a database, wherein the definition of the TPF defines one or more parameters of the TPF, at least one of the parameters being a table parameter. A query is received that operates to call the TPF, wherein the query defines one or more input parameters, the input parameters comprising at least one table input parameter to be used as input for calling the TPF. The query is processed to produce a result, and the result of the query is returned.
摘要:
In one embodiment, a method includes accessing a graph structure comprising a plurality of nodes and edges connecting the nodes, determining a similarity score for each node with respect to a first node, ranking each of the nodes based on their respective similarity score, selecting a set of nodes based on the ranking of each node, and identifying one or more event associated with the selected set of nodes.
摘要:
A method and system provide security for a communication network and for one or more nodes within the network. Software can be distributed throughout the network from a centralized location or administrative console. The software can be made resident in the kernel of the operating system of a receiving node. The software can provide an observation functionality, an analysis functionality, a reporting functionality and a remediation functionality or some subset of those functionalities.
摘要:
A method and system provide information by which a host machine on which a virtual machine is running can be determined via a messaging channel between the virtual machines running on the host machine and the host machine. The virtual machine can then determine whether or not it should be executing. In order for the virtual machine to determine whether it can execute, it will need to know information about the host machine on which it will be running. Similarly, a virtual machine can determine whether it has been exposed to any viruses or whether a particular update has been run by knowing the host machines on which it has been run.
摘要:
A method and system provide tracking of a virtual machine by compiling information on the virtual machines in a network and sending the information to an administrative console. The administrative console can then determine the status of the virtual machines in the network. The administrative console can also establish a lineage of a virtual machine and the migration of a virtual machine from one host machine to another host machine. A virtual machine unique identifier assigned to each virtual machine by the system can be modified and used to track each virtual machine and associated host machine. A status can then be determined of the virtual machines, where the status can be a new virtual machine, a previously discovered virtual machine, a duplicated virtual machine, or a cloned virtual machine.
摘要:
A system and method for removing ineffective features from a spam feature set. In particular, in one embodiment of the invention, the an entropy value is calculated for the feature set based on the effectiveness of the feature set at differentiating between ham and spam. Features are then removed one at a time and the entropy is recalculated. Features which increase the overall entropy are removed and features which decrease the overall entropy are retained. In another embodiment of the invention, the value of certain type of time consuming features (e.g., rules) is determined based on both the information gain associated with the features and the time consumed implementing the features. Those features which have relatively low information gain and which consume a significant amount of time to implement are removed from the feature set.