Abstract:
Techniques for deriving a context for enforcing a data disclosure policy while accessing a database are provided. The techniques include receiving a request for database access with met a information, parsing the meta information to identify a context, receiving a user query, formulating a query equivalent to-the user query, wherein the equivalent query implements the identified context to enforce a data disclosure policy, and accessing the database with the equivalent query.
Abstract:
A computer implemented method, computer program product and a data processing system for managing electronic messages is disclosed. The contents of an electronic messages are segmented based on the recipients receiving the message and access control authorizing access to the segmented contents is provided to the segmented contents and transmitted to a list of recipients.
Abstract:
Triggers are dynamically created and destroyed on an application database. Rules are represented in active databases as ECA (event-condition-action) items, in which an action formulates a reaction to an event and is executed after the rule is triggered when the condition is evaluated to true. The event is defined as an instantaneous and atomic (that is, the event either happens completely, or not at all) point of occurrence within an application. Events can be classified as either database, temporal, or user-defined events, and their type can be either primitive or composite.
Abstract:
An iterative approach to detect outliers may automatically detect outliers in a data set. The iterative approach may include calculating a mean and an average deviation for a list. The iterative approach may further include calculating the deviations of values of a list if the average deviation is not zero. Any values where the calculated deviation of the point or value is greater than the mean may be selected. The selected points may be set as a second list. The second list may be used by the iterative approach until no points are selected for the second list. The previous list is the set of outliers from the data set.
Abstract:
A computer implemented method, computer program product and a data processing system for managing electronic messages is disclosed. The contents of an electronic messages are segmented based on the recipients receiving the message and access control authorizing access to the segmented contents is provided to the segmented contents and transmitted to a list of recipients.
Abstract:
Variations in dilution air leakage paths in a gas turbine combustion liner assembly are minimized or eliminated to reduce emissions and variations in emissions from combustor to combustor. Leakage paths between the liner sleeve and venturi outer liner are minimized by using additional rivets at that joint. The leakage paths between the outer and inner sleeves of the venturi are eliminated by applying a peripheral weld to the end edges of the flanges of the outer and inner sleeves. The leakage paths between the venturi and outer liner are minimized while simultaneously maintaining accurate venturi throat area relative to the cap centerbody by match drilling holes through the liner sleeve and the overlapped flanges of the venturi and followed by riveting the parts together.
Abstract:
The present invention relates to novel photoactivable rhodamine derivatives for enhancing high quantum-yield production and singlet oxygen generation upon irradiation with light while maintaining desirable differential retention of rhodamine between normal and cancer cells. Representative derivatives are 2-(4,5-dibromo-6-amino-3-imino-3H-xanthen-9-yl)-benzoic acid methyl ester hydrochloride; 2-(4, 5-dibromo-6-amino-3-imino-3H-xanthen-9-yl)-benzoic acid ethyl ester hydrochloride; 2-(4,5-dibromo-6-amino-3-imino-3H-xanthen-9-yl)-benzoic acid octyl ester hydrochloride; 2-(4,5-dibromo-6-amino-3-imino-3H-xanthen-9-yl)-benzoic acid n-butyl ester hydrochloride; 2-(6-ethyl amino-3-ethyl imino-3H-xanthen-9-yl)-benzoic acid n-butyl ester hydrochloride; and photoactivable derivatives thereof. These derivatives are utilized in an amount to achieve appropriate intracellular levels of the derivative when irradiation of a suitable wavelength and intensity is applied to photoactivate the derivative and thereby induce cell killing.