Abstract:
Systems and methods that analyze aggregated tagging behavior of users, and evaluate such tagging trends to identify criteria for taxonomy applications. Initially, existence of a possible trend of tagging data based on collective user behavior is determined. Subsequently, tagging trends can be examined to identify that a predetermined convergence criteria has in fact been met, and/or establish such criteria for taxonomy applications. Machine learning systems (implicitly as well as explicitly trained) can be supplied to facilitate determining the trends and the convergence criteria.
Abstract:
Systems and methods that recognize items based on aggregated tagging behavior of users regarding the items. Individual users can establish relationships among tagged items and the system analyzes aggregate of such established relationships, to recognize the item and/or infer additional information regarding the items (e.g., wisdom of crowd such as metadata annotations, relevance ranking, and the like). Subsequently, search engine crawlers can be supplied with such additional information (e.g., extra metadata for reverse link search tables) to facilitate enterprise management and search.
Abstract:
A system and method for constraining generic types is disclosed. In brief, the subject invention provides a pattern type for defining a set of one or more parameter constraints. Rather than being confined to a predetermined set of hard-coded constraints in an execution engine, a pattern type can be specified as an extensible constraint mechanism for generic type parameters. According to one aspect of the invention, the pattern type can manifest itself as a class including one or more properties and/or features. The shape of the pattern type can then be compared or matched to instantiated type parameters to determine constraint satisfaction.
Abstract:
Parse tables or like representations are augmented with extension points to enable call out to arbitrary code. Such parse tables can be automatically generated from a specification including fixed information along with information about extensibility points provided. The extensibility points enable incorporation of dynamic data into a fixed parse table. In one instance, this allows a parser to determine if a character is acceptable at the time of execution rather than when the parse table was defined.
Abstract:
A system is provided to facilitate service-oriented applications. The system includes one or more network accessible resources that are split into two or more application functions. A proxy component communicates over a network with the network accessible resources and executes a subset of the application functions during outages of the network.
Abstract:
A special syntax is developed to differentiate between accesses to a primary and one or more secondary object protocols in a programming language. The syntax allows the compiler to differentiate between the primary and secondary object model based on syntax, rather than type. The syntax is created in such a way as to approximate the syntax of the secondary object model, and allows the user to dynamically generate member names.
Abstract:
Various technologies and techniques are disclosed for enabling code to be executed on one or more execution contexts based upon declarative annotations contained in the code or other locations. An annotation associated with a region of code is located. The annotation specifies information about an execution context where the region of code should be executed. A caller proxy is generated that is responsible for calling a callee adapter to execute the region of code. The callee adapter is generated that is responsible for receiving a call from the caller proxy and for dispatching a call to the region of code at the execution context. At runtime, the caller proxy receives a request to call the region of code and sends an execution request to the callee adapter. The callee adapter receives the execution request and dispatches a call to an executable version of the region of code.
Abstract:
A first computing device receives (over a network) from at least a second computing device a container that includes information relating to types of software code that are potentially invoked by a program executing on the first computing device. A determination is made according to an on-demand basis, during execution of the program, whether a particular type of software code is to be loaded from the at least second computing device to the first computing device.
Abstract:
Client-side performance is optimized through server-side pushing of content. Portions of content are requested and retrieved as required by a client-side application. Moreover, content likely to be needed in the near future is pre-fetched and pushed to the client. This is beneficial from an overhead standpoint since all content need not be provided to the client at once. Rather, content provisioning is throttled based on need, and wait time is mitigated by pre-fetching.
Abstract:
A unique formatting scheme for object-relational mapping allows disparate applications that adopt the scheme to seamlessly access data in disparate relational databases. The formatting scheme contemplates a common format that conveys the mapping information through (i) attributes embedded with code objects, and (ii) an external mapping source. Adoption of the common format can result in several advantages for network-based client-server operations: (i) Software developers can continue programming in their existing languages. (ii) Data servers from various vendors can also continue to be developed and managed in the vendors' core programming languages. (iii) Vendors that employ client applications which have adopted the common format can consistently use various data warehouses without incurring customization costs.