摘要:
A model-driven and QoS-aware infrastructure facilitates the scalable composition of Web services in highly dynamic environments. An exception management framework supports two modes of exception management for business processes, providing a novel policy-driven approach to exception management implemented in the system infrastructure. Exception management is implemented in the system infrastructure, with exception handling policies supplied by individual business processes. Using the exception management framework, developers define exception policies in a declarative manner. Before a business process is executed, the service composition middleware integrates the exception policies with normal business logic to generate a complete process schema. This policy driven-approach can significantly reduce the development time of business processes through its separation of the development of the business logic and the exception handling policies.
摘要:
A Web browser is augmented with collaborative features to support community aware browsing sessions. The augmentation provided includes a data mining plug-in for the browser to establish collaborative context based on Uniform Resource Locator (URL) meta data keywords, or mined topics, and a collaboration co-browser (explorer bar) which displays a collaboration space, called CollabSpace, corresponding to the document that is displayed in the main browser. With this augmented browser, a user can perform various collaboration functions from the collaboration explorer bar, including viewing the online status of members of the CollabSpace, communicate with members of the CollabSpace via electronic mail (e-mail), instant messaging or discussion threads, and register as a member of the CollabSpace. CollabSpaces can be established and associated with one or more Web documents, meta data keywords or topics.
摘要:
Methods, systems and computer program products for providing mutual authentication for radio frequency identification (RFID) security. Methods include receiving an authentication request at a RFID tag from a requester, where the request includes an encrypted access role. An encrypted secret message is transmitted to the requestor in response to receiving the authentication request. The encrypted secret message is based on the encrypted access role received from the requester. An access request specifying a work area and including a random number that is encrypted is received from the requester at the RFID tag. The access request was generated by the requester in response to the RFID tag being successfully authenticated by the requestor using the encrypted secret message. The requester is authenticated at the RFID tag. The authenticating includes determining the value of the random number sent by the requester and verifying that the work area is valid for the encrypted access role. If the authenticating is successful, the RFID tag responds to the access request using the value of the random number as an encryption key.
摘要:
A coating composition is provided comprising: (i) a fluorinated polymer comprising (a) structural units having the formula (I): —CR1R2—CFX— (I) wherein R1 and R2 are each independently an alkyl group, a fluorine atom, a chlorine atom, a hydrogen atom or a trifluoromethyl group, and X is a fluorine atom, a chlorine atom, a hydrogen atom or a trifluoromethyl group, and (b) structural units comprising at least one type of crosslinkable functional group; (ii) a crosslinking agent; and (iii) a plurality of particles functionalized with a functional group, wherein the functional group on the particles is essentially non-reactive with the fluorinated polymer and with the crosslinking agent. Articles comprising a coating composition described in embodiments of the invention are also provided.
摘要:
The present invention provides in one aspect a composition having at least one croconine derivative. This composition may be disposed on a semiconductor layer which is further disposed on an electrically conductive surface to provide a dye-sensitized electrode. The dye-sensitized electrode can be assembled together with a counter electrode and a redox electrolyte to provide a photovoltaic cell. The photovoltaic cell may be used as a single cell or in tandem with other cells.
摘要:
Standardized support for management of contextual relationships, which includes specification of the context hierarchy, association of relationships with a particular context, and derivation of transitive dependencies, is provided with a Context Manager service. The Context Manager provides a programmatic interface for defining contexts and the relationships therein. The Context Manager saves the relationship facts in one or more context stores, which are organized by contexts. The Context Manager interfaces with the Ontology Manager that processes queries on relationships with respect to a given set of contexts. The Context Manager provides a high-level abstraction for relationship management in a context. Developers of business solutions can then focus on the core business logic, without worrying about the details of storing and inferencing relationships.
摘要:
A method for providing a cloud environment for provisioning a guest virtual machine instance. The method includes selecting at least one machine from a collection of machines as a management node, wherein the at least one machine includes a hypervisor enabled with nested virtualization capability, deploying a plurality of cloud managers on each management node, selecting at least one machine from the collection of machines as a host node, deploying a plurality of level two hypervisors on each host node, forming a plurality of virtual clouds, wherein each virtual cloud contains at least one of the plurality of cloud managers and one of the plurality of level two hypervisors, and provisioning, via the at least one cloud manager, at least one guest virtual machine instance on top of the at least one level two hypervisors.
摘要:
A system and an article of manufacture for de-duplicating virtual machine image accesses include identifying one or more identical blocks in two or more images in a virtual machine image repository, generating a block map for mapping different blocks with identical content into a same block, deploying a virtual machine image by reconstituting an image from the block map and fetching any unique blocks remotely on-demand, and de-duplicating virtual machine image accesses by storing the deployed virtual machine image in a local disk cache.
摘要:
A system to monitor an overlay network may include a plurality of publishers, a plurality of subscribers, and a plurality of brokers. The system may also include an overlay network linking the publishers, the subscribers, and the brokers. The overlay network includes a first computer network having a first network protocol carried by a second computer network having a second network protocol. The system may further include an inspection unit to monitor message topics sent over the overlay network amongst the publishers, the subscribers, and the brokers.
摘要:
Mechanisms are provided for pre-fetching content data and storing the content data in a mobile device. An identifier of a mobile device and a location of the mobile device are received. Demographic information about a user of the mobile device is obtained based on the identifier of the mobile device. The demographic information of the user is compared with demographic information of other users to identify one or more similar users having similar demographic information to the demographic information of the user of the mobile device. Content data to transmit to the mobile device is identified based on the location of the mobile device and the identification of the one or more similar users. The content data is transmitted to the mobile device for storage in the mobile device.