摘要:
A method of configuring a logging utility includes generating, by a computer system, at least one message based on a model of logs from at least two software components of a multi-component application and sending, by the computer system, the message to at least one of the two software components for configuring a logging utility of the corresponding software component.
摘要:
A method includes performing, on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model.
摘要:
A system includes a storage medium. The storage medium includes a model generation module that generates a candidate model based on a discrepancy and a model template. The storage medium also includes a model evaluation module that selectively updates a system model based on the candidate model.
摘要:
Techniques for annotating data packets with time and/or location information in wireless networks are provided. In one aspect, a method for processing information streams produced by end-computing devices that are transmitted over a wireless network having at least one network element is provided. The method includes the following steps. Data packets which originate from the end-computing devices and are received by the network element are inspected for spatiotemporal metadata. Spatiotemporal metadata is inserted into the data packets and the data packets are transmitted if the step of inspecting the data packets reveals that the data packets are missing spatiotemporal metadata. Otherwise the data packets are transmitted if the step of inspecting the data packets reveals that spatiotemporal metadata is already present in the data packets.
摘要:
A system, method and computer program product for determining at least one association between at least one business process and at least one network entity. The system maps at least one user to the business process. The system maps the user to at least one network end-point. The system maps the network end-point to at least one application. The system maps the network entity to the application. The system identifies the association among the business process, the user, the network end-point, the application and the network entity based on one or more of the mappings.
摘要:
A method comprising: performing on a processor, evaluating log data; determining at least one discrepancy between the log data and a system model; generating a candidate model based on the discrepancy and a model template; and updating the system model based on the candidate model.
摘要:
Techniques are provided for providing automated configuration of computing devices. More particularly, principles of the invention may use anticipated context to precondition a device whose operational mode is alterable via computer controllable operations. Anticipated context may be affected by any number of parameters including, but not limited to, current location, time of day, destination end-point, e.g., phone number to be called, past history, subscription rate plans, power requirements of device, application demands with respect to quality-of-service (QoS), security, calendar information, and so on. Further, principles of the invention may use locally derived knowledge about the intended use of a device and dynamically enable it in a desirable mode of operation using locally reachable configuration parameters stored in advance based on the anticipated context for the operation of the device. Still further, principles of the invention may dynamically locate necessary configuration parameters via a service discovery process.
摘要:
A method, system, and computer program for dynamically adjusting the workload of an active resource associated with at least one parent workload group. The parent workload group includes a collection of workload units, with each associated to a key identifier such that workload units belonging to the parent workload group share an identical sequence of values at a specified depth value of the key identifier. The active resource independently determines whether an overload condition exists. If an overload condition exists, the depth value of the parent workload group is increased. The active resource may also consolidate a workload group if an under-load condition exists. Dynamically adjusting the workload of an active resource can be used as part of a method or system to dynamically adjust the workload of a distributed computing application across a dynamically varying set of active resources, and subsequently redirecting entities to the dynamically changing target resource.
摘要:
The present invention relates to a communication system where tree-search or stack contention-resolution algorithms in hybrid MAC protocols are used by CaTV stations to resolve message transmission collisions. The stations, which are computer communicating devices, communicate by message transmissions over a communications channel where message contents of some of these transmissions are destroyed by collision of those messages sent from different stations. To resolve message transmission collisions, non-overlapping transmission time intervals of variable durations are generated and grouped into clusters of varying number of time intervals and varying time distances between them. Sequences of clusters are formed in which any station transmitting in a particular cluster will learn of the status of its message transmissions before commencement of the next cluster. Collision resolution is performed collectively on all message transmissions in a cluster and along the successive clusters of the same sequence.
摘要:
Quality of information (QoI) assessment in dynamic sensor networks that includes evaluating, by a computer, a first value reflective of available reports from sensors that are dynamically associated with the computer. A second value reflective of reports expected to have been available for evaluation about the observed phenomena is estimated. A QoI of the available reports is assessed. The assessing is based on the first value reflective of the available reports and the second value reflective of reports expected to have been available for evaluation. A third value, based on the assessing is output.