摘要:
An approach is provided for updating, managing, and searching one or more databases. The approach involves processing and/or facilitating a processing of a reception of an instruction. The approach also involves processing and/or facilitating a processing of a determination of available data based, at least in part, on data present in one or more databases. The approach further involves causing, at least in part, a decomposition of the instruction into one or more partial instructions that are specific to the determined available data in the one or more databases.
摘要:
An approach is provided for providing end-to-end privacy in multi-level distributed computations. A distributed computation privacy platform determines one or more privacy policies associated with at least one level of a computational environment. The distributed computation privacy platform also determines one or more computation closures associated with the at least one level of the computational environment. The distributed computation privacy platform further processes and/or facilitates a processing of the one or more privacy policies and the one or more computation closures to cause, at least in part, an enforcement of the one or more privacy policies.
摘要:
An approach for enabling advertising content to be processed for use in connection with an application based on one or more policies is described. An advertising component determines one or more user interface state changes associated with one or more applications executing at a device. The advertising component then determines one or more policies for presenting advertisement information at the one or more applications, the device, or a combination thereof. Processing of the one or more policies is then performed to determine advertisement information for presentation at the one or more applications, the device, or a combination thereof based, at least in part, on the one or more user interface state changes.
摘要:
An approach is provided for providing persistent computations. A persistent computation manager determines at least one non-volatile memory space of a device. The persistent computation manager also determines at least one other non-volatile memory space of at least one other device. The persistent computation manager further determines to form a persistent memory address space based, at least in part, on the at least one non-volatile memory space and the at least one other non-volatile memory space.
摘要:
An approach is provided for applying privacy policies to structured data. A privacy policy management infrastructure receives a request for an exchange of structured data among a plurality of devices. The privacy policy management infrastructure determines one or more elements of the structured data. The privacy policy management infrastructure also determines one or more privacy policies corresponding to the structured data, respective ones of the one or more elements, or a combination thereof. The privacy policy management infrastructure further determines to apply the one or more privacy policies to the structured data, respective ones of the one or more elements, or a combination thereof when initiating the exchange.
摘要:
An approach is provided for determining results based on filtered information. A context request is detected from one or more programs. Another program determines to filter the content request, the one or more programs, or a combination thereof. One or more results of the content request are determined based, at least in part, on the filtered content request, the filtered one or more programs, or a combination thereof
摘要:
An approach is provided for construction and aggregation of distributed computations. A distributed computation construction infrastructure identifies an execution context bound to a user context at a device, the execution context corresponding to one or more processes executing at the device. The distributed computation construction infrastructure further causes, at least in part, decomposition of the execution context into one or more closure primitives and respective process states, wherein the one or more closure primitives represent computation closures of the one or more processes. The distributed computation construction infrastructure also causes, at least in part, serialization of the one or more closure primitives, the process states, or a combination thereof. The distributed computation construction infrastructure further causes, at least in part, aggregation of the one or more primitives and the respective process states to reconstruct at least a portion of the execution context based, at least in part, on consistency determination.
摘要:
An approach is provided for determining device compatibility using alerts and information spaces. A link redirector receives a request from a device for a required type of service. The link redirector alerts the device compatibility service and the export control interface about the potential request or stores the request information in an information space while searching for a suitable service for the device. Therefore, the device compatibility service and the export control interface can start preparing information about device compatibility and export control before the information is requested by the service determined.
摘要:
An approach is provided for retrieving ordered content via a service endpoint. A radio frequency memory tag is preloaded with content managed by a service platform. A request is generated for content stored on the radio frequency memory tag of an endpoint associated with the service platform. Transmission of the request to the endpoint is initiated. The request for the content is received from a user equipment. Transmission of the content is initiated from the memory tag to the user equipment. The user equipment receives the content from the memory tag in response to the request.
摘要:
An approach is provided for dynamic modification of inference rules and deduction engines in an information base. Authorized agents are allowed to insert, delete or modify inference rules and deduction engines dynamically by signing their input using an authorized signature. Additionally, the functionalities of dynamic modification of inference rules and deduction engines can be provided through a direct application programming interface (API).