摘要:
An approach is provided for providing single sign-on for computation closures. A single sign-on management platform determines to create a single sign-on computation closure in response to an initiation of a single sign-on authentication session. The single sign-on management platform also determines one or more computation entities that are to execute at least one other computation closure under the single sign-on authentication session. The single sign-on management platform further causes, at least in part, a transfer of the single sign-on computation closure to the one or more computation entities.
摘要:
An approach is provided for providing end-to-end security in multi-level distributed computations. A distributed computation security platform determines one or more signatures associated with one or more computation closures of at least one functional flow. The distributed computation security platform also processes and/or facilitates a processing of the one or more signatures to generate at least one supersignature. The distributed computation security platform further determines to associate the at least one supersignature with the at least one functional flow.
摘要:
An approach is provided for providing load balancing in multi-level distributed computations. A distributed computation control platform determines closure capability data associated with respective levels of a computational architecture, wherein the respective levels include, at least in part, a device level, an infrastructure level, and a cloud computing level. The distributed computation control platform also determines functional flow information of the respective levels, one or more nodes of the respective levels, or a combination thereof with respect to at least one set of one or more computation closures. The distributed computation control platform further determines to cause, at least in part, processing at least the closure capability data, the functional flow information, or a combination thereof to determine: (a) a distribution of the one or more computation closures among the respective levels, (b) the one or more nodes, or (c) a combination thereof.
摘要:
An approach is provided for providing input suggestions. An input generating platform causes, at least in part, presentation of a user interface element including at least one input field. The input generating platform also determines at least one field type associated with the at least one input field. The input generating platform further identifies at least one information store, context store, or a combination thereof based, at least in part, on the at least one field type. The input generating platform also determines to migrate one or more computations for generating one or more suggestions, one or more default values, or a combination thereof for populating the at least one input field, generating the user interface element, or a combination thereof to the at least one information store, context store, or a combination thereof.
摘要:
An approach is provided for ontology matching. An information space infrastructure determines a first ontology and a second ontology. The first ontology and the second ontology describe one or more information closures, one or more computation closures, or a combination thereof. The information space infrastructure then determines to apply a plurality of comparison models on the first ontology and the second ontology and to compute a degree of similarity of the first ontology and the second ontology based, at least in part, on the plurality of comparison models.
摘要:
A method comprises selecting at least a first data set and a second data set on which to apply a query. The method also comprises causing generating of a first cursor based and a second cursor based on a first application of the query on the first data set and a second cursor based on a second application of the query on the second data set. A third cursor based on a combination of a result set returned by the first cursor and second cursor is then generated in response to the query.
摘要:
An approach is presented for transferring data via radio frequency (RF) memory tags. The UE manager receives a request, at a device, to grant access for interaction between a first RF memory tag and a second RF memory tag, the first RF memory tag associated with one or more trusted storage. Further, the UE manager determines an accessibility state of the first RF memory tag, the one or more trusted storage, or a combination thereof. Then, the UE manager causes, at least in part, granting of the access based, at least in part, on the accessibility state. The access is via a connection between the first RF memory tag and the second RF memory tag
摘要:
An approach is provided for coordinating media presentation on devices via an information space. In response to a request for presentation of media content, a media provision coordinating application retrieves from an information space raw media content corresponding to the request. The media provision coordinating application determines one or more first devices for pre-processing the raw media content and one or more second devices for presenting pre-processed media content based upon respective technical capabilities and availabilities of the first devices, the second devices, or a combination thereof, the first and second devices are connected to the information space.
摘要:
An approach is presented for efficiently managing content, configuration and credentials among devices. A determination of information and related metadata associated with one or more devices available in an information space is made, wherein the information includes content, configuration, credentials, or a combination thereof of the one or more devices. The determined information and related metadata are aggregated and stored in a memory tag.
摘要:
An approach is provided for automatic controlled value expansion of information. A value expansion controller detects a request at a device to perform an information operation on a set of data elements of an information space, wherein the request identifies the set by a name and the information operation applies to each data element within the set. The value expansion controller intercepts the request based on the detection and determines the location of the data elements within a communication network based on the name. The value expansion controller retrieves the data elements from the location and populates an expansion table with the retrieved data elements, wherein the expansion table is correlated to the set. The value expansion controller performs the information operation on each data element in the expansion table and causes transmission of one or more results of the information operation to the device.