摘要:
A method of negotiating an electronic commerce (e-commerce) transaction for the sale of a selected good can include identifying an asking price for the selected good and retrieving from memory merchant business objectives (MBOs) and consumer privacy rules (CPRs). The MBOs can specify incentive information corresponding to a proposed exchange of consumer information and the CPRs can specify asking prices corresponding to the proposed exchange of consumer information. The MBOs can be compared to the CPRs to determine if an agreement can be reached for the sale of the selected good with an incentive based upon the proposed exchange of consumer information. The e-commerce transaction for the sale of the selected good with the incentive can be consummated if in the comparing step it is determined that an agreement can be reached.
摘要:
A master entity is capable of broadcasting commands to slaves which move to another state when they satisfy a primitive condition specified in the command. By moving slaves among three sets, a desired subset of slaves can be isolated in one of the sets. This desired subset of slaves ten can be moved to one of the states that is unaffected by commands that cause the selection of other desirable subsets of slaves. In the incorporated U.S. Pat. Nos. 5,550,547 and 5,673,037, certain subgroups of radio frequency tags are selected for querying, communicating, and/or identifying by commands from a base station.
摘要:
A multiprocessing system is presented having a plurality of processing nodes interconnected together by a communication network, each processing node including a processor, responsive to user software running on the system, and an associated memory module, and capable under user control of dynamically partitioning each memory module into a global storage efficiently accessible by a number of processors connected to the network, and local storage efficiently accessible by its associated processor.
摘要:
A multiprocessing system is presented for dynamically partitioning a storage module into a global storage efficiently accessible by a number of processors connected to a network, and local storage efficiently accessible by individual processors, including the interleaving of storage references output by a processor, under the control of that processor, and dynamically directing the storage references to first or second portions of the storage module.
摘要:
A method and system for quantifying risk by composing a heterogeneous risk model are provided. The method comprises providing risk input data associated with one or more risk nodes to a processor, running one or more risk models to output individual risk quantifications for each risk node, and aggregating the individual risk quantifications into a single output. The system comprises a processor operable to provide risk input data associated with one or more risk nodes to a processor, run one or more risk models to output individual risk quantifications for each risk node and aggregate the individual risk quantifications into a single output.
摘要:
A method of negotiating an electronic commerce (e-commerce) transaction for the sale of a selected good can include identifying an asking price for the selected good and retrieving from memory merchant business objectives (MBOs) and consumer privacy rules (CPRs). The MBOs can specify incentive information corresponding to a proposed exchange of consumer information and the CPRs can specify asking prices corresponding to the proposed exchange of consumer information. The MBOs can be compared to the CPRs to determine if an agreement can be reached for the sale of the selected good with an incentive based upon the proposed exchange of consumer information. The e-commerce transaction for the sale of the selected good with the incentive can be consummated if in the comparing step it is determined that an agreement can be reached.
摘要:
A method and system for collaboratively managing risk is presented. In one embodiment the method comprises analyzing a node in a risk network when an output of said node violates a control limit, identifying a cause of said violation of said control limit, creating a mitigation action in response to said node violating said control limit, performing said mitigation action, said mitigation action having an influence on said output of said node, and measuring said output of said node to determine effectiveness of said mitigation action on said node, wherein a program using a processor unit executes one or more of said analyzing, identifying, creating, performing and measuring steps.
摘要:
A method and system for quantifying risk by composing a heterogeneous risk model are provided. The method comprises providing risk input data associated with one or more risk nodes to a processor, running one or more risk models to output individual risk quantifications for each risk node, and aggregating the individual risk quantifications into a single output. The system comprises a processor operable to provide risk input data associated with one or more risk nodes to a processor, run one or more risk models to output individual risk quantifications for each risk node and aggregate the individual risk quantifications into a single output.
摘要:
A performance bookmark of a dashboard view is created, e.g., in response to a triggering event. The performance bookmark includes a name, a timestamp, a reference to the visual properties of the dashboard view at the time that the performance bookmark is created and a reference to relationships of information displayed by the dashboard view at the time the performance bookmark is created. When a performance bookmark is recalled, the dashboard view is configured to correspond with the visual properties and relationships of information recorded at the time the select performance bookmark was created. Performance bookmarks are instances and relationships, and are not limited to snap shots captured of a static visual image of a dashboard screen from a corresponding dashboard user interface. As such, a retrieved dashboard view of a performance bookmark that is recalled from the bookmark system is live and supports user interaction.
摘要:
Method and apparatus for use in a digital data processing system that evaluates functional networks. A method operates to assign a unique signature to each input constant of the network, assign a unique signature to each output of a network Function, and to store each of the constants and function outputs along with their assigned signatures. The signatures operate as an access key to the associated stored constants and function outputs, thereby eliminating a requirement to reevaluate a Function if its outputs already exist. A storage element, or Dictionary (20), stores data units, such as input data, intermediate values, and/or pointers to same, each with a unique signature. The storage element, in concert with a Dictionary Controller (18), provides for the deletion of a stored data unit that is associated with a specified signature and the retrieval of a stored data unit that is associated with a specified signature. Preferably, the signatures are generated from a combination of constant and Function attributes and values and are each uniquely encoded by a CRC generator (14).