摘要:
An automatic planning system is provided for stream processing workflow composition. End users provide requests to the automatic planning system. The requests are goal-based problems to be solved by the automatic planning system, which then generates plan graphs to form stream processing applications. A scheduler deploys and schedules the stream processing applications for execution within an operating environment. The operating environment then returns the results to the end users.
摘要:
The architecture utilizes the network effects of patents, journals, authors, institutions, and funding entities, for example, to establish an objective reputation factor. The reputation factor contributes to a higher perceived relevance as well as provides interesting new services that could be built on top. The algorithm takes into account not only the number of cited-by references for a certain paper, author, or institution, but can also generate a higher ranking for cross-disciplinary citations, citations establishing a new area of science, acknowledgement citations, and constantly-updated reputation factors of different important entities, such as co-authorship, institutional affiliation, and journal impact factor. Impact factors can be fed back into the system for consideration in generating the reputation factor.
摘要:
Underfill compositions comprise a quinolinol or a quinolinol derivative as a fluxing agent, as an accelerating agent, or as both. The compositions are sufficiently acidic to perform well as fluxes, but not so acidic as to cause premature gelation or corrosion. The compositions also demonstrate higher Tg values than similar compositions that do not contain quinolinol or a quinolinol derivative
摘要:
One embodiment of the present method and apparatus for synthesizing a data stream includes retrieving meta data from at least one decision tree, the decision tree comprising a plurality of interconnected nodes, and generating the data stream in accordance with the meta data.
摘要:
A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
摘要:
Efficiently replicating XML data among databases includes techniques for (a) replicating XML data involved with an insert operation; (b) replicating XML data involved with an update operation; (c) leveraging existing relational replication techniques for XML data stored in shredded form using object-relational constructs; and (d) replicating XQuery Data Model sequences. Each technique reduces the amount of information that would otherwise need to be transmitted over a network for XML data replication purposes.
摘要:
There is provided a method and system for replicating data at another location. The system includes a source node that contains data in a data storage area. The source node is coupled to a network of potential replication nodes. The processor determines at least two eligible nodes in the network of nodes and determines the communication cost associated with a each of the eligible nodes. The processor also determines a probability of a concurrent failure of the source node and each of eligible nodes, and selects at least one of the eligible nodes for replication of the data located on the source node. The selection is based on an the determined communication costs and probability of concurrent failure.
摘要:
An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
摘要:
Underfill compositions comprise a quinolinol or a quinolinol derivative as a fluxing agent, as an accelerating agent, or as both. The compositions are sufficiently acidic to perform well as fluxes, but not so acidic as to cause premature gelation or corrosion. The compositions also demonstrate higher Tg values than similar compositions that do not contain quinolinol or a quinolinol derivative.
摘要:
Optimization is provided for database statements involving XML data, e.g., XPath and XQuery, which operate over views that use aggregate set operators, e.g., UNION ALL. As part of a “view merge” stage of query transformation, the query that operates over the view is merged with a query that defines the view. One or more expressions (e.g., operators, predicates, virtual table constructs) from the query that operates over the view are then “pushed down” to operate on the individual underlying XML data constructs. “Branch elimination” is performed based on the structure of the view and the query acting over the view, based on which it is possible to determine whether any of the sub-queries, if executed, would result in the return of zero rows. If so, then such branches are eliminated from the transformed query, leaving a reduced set of data containers on which to execute the query.