摘要:
A method for implementing load migration in a pool area is disclosed. The method includes that: the destination CN node receives an identifier of a subscriber ready for migration; and the destination CN node migrates the subscriber ready for migration to the destination CN node, and allocates a local office identifier to the migrated subscriber. In addition, a system for implementing load migration in a pool area and a CN node are disclosed.
摘要:
A method is provided for “but reasoning” with an inconsistent knowledge base. The method not only gives an answer to a Boolean question but also additional and instructive information. The method first finds a bridge statement that explains a contradiction between the answer and the inconsistent knowledge base. The method then selects a but statement that causes the contradiction with the answer, and constructs and validates a but answer with the answer, the but statement, and optionally the bridge statement.
摘要:
The present invention extends to methods, systems, and computer program products for mirroring file data. Generally, high availability and disaster recovery (“HADRON”) is achieved within a database management system by detecting which parts of a file have changed and sending the changed parts to secondaries. Adjacent or partially overlapping parts of a file can coalesce to form larger chunks of changed data. Coalescing reduces the overall number of chunks that are tracked.
摘要:
A method for managing a binary object in a database system is provided. The method may include receiving a request to store the binary object and determining if a size of the binary object is above a first threshold. If the size is less than the first threshold, the method may include storing the binary object in a database of the database system using a database communication protocol. If the size is above the first threshold, the method may include determining if the size is above a second threshold. To this end, if the size is less than the second threshold, the method may include storing the binary object in a file system of the database system using the database communication protocol. Furthermore, if the size is above the second threshold, the method may include storing the binary object in the file system using a file system communication protocol.
摘要:
An application program interface (API) provides a set of functions for application developers who build Web applications on Microsoft Corporation's .NET™ platform.
摘要:
A database system and method allows a user to write program code in a high-level programming language that implements a class that defines the structure of a user-defined type and methods that can be invoked on instances of the type. The class is then registered with the database system, which enforces a specific contract for user-defined types against the class. The contract comprises the following requirements. First, the class must specify one of a plurality of different formats for persisting instances of the user-defined type in a database store. Second, the class must be capable of returning a null value for the user-defined type. Third, the class must provide a method for converting the user-defined type to another type. Once these requirements are satisfied, the database system enables instances of the user-defined type to be created. A user-defined type can be used in all contexts where any other built-in type can be used. This includes defining columns of tables, declaring variables and parameters to functions and stored procedures, and evaluating expressions of the user-defined type in SQL queries and updates. Preferably, the database system stores metadata about the user-defined type for subsequent use in creating instances of the type.
摘要:
In some examples, a mobile device includes a radiation sensor configured to measure an amount of radiation surrounding a corresponding device that is communicatively connected to a second device and/or a third device, a comparator configured to compare the measured amount of radiation to a predetermined radiation threshold, a wireless communication manager configured to report to the second device and/or the third device a result output from the comparison module, and a collaboration manager configured to collaborate with the second device.
摘要:
Techniques for searching large data sets. A semantically restricted relation graph is generated for an ontology. Queries to the ontology are resolved using the semantically restricted relation graph.
摘要:
Techniques are generally described related to tag refinement strategy. One example method for communicating between a first wireless system having a plurality of first antennas and a second wireless system having a plurality of second antennas may be presented. The method may include receiving configuration information associated with the plurality of first antennas and a plurality of modulation schemes which the first wireless system is configured to support; determining a plurality of configurations based on the configuration information, wherein each of the plurality of configurations defines a corresponding subset of first antennas selected from the plurality of first antennas and a corresponding modulation scheme selected from the plurality of modulation schemes; and selecting a first configuration from the plurality of configurations, wherein when operating under the first configuration, the first wireless system is configured to achieve one or more performance criteria.
摘要:
Modularization-based reasoning of reasoning tasks is provided. Performing a reasoning task includes receiving the reasoning task. Symbols in the reasoning task are interpreted to extract a module from the knowledge base. The reasoning task is them performed with the extracted module to obtain a result of the reasoning task.