Abstract:
Simulation techniques for measuring the performance of J2EE applications are described. Simulation models for J2EE systems are generated which utilize one or more simulation components comprising queuing centers. The queuing centers employ logic to emulate J2EE thread models by locking on threads when messages are received by simulation components and waiting to unlock until a response is received from every subsequent component in the system. Additionally, simulation components which correspond to J2EE system components running on java virtual machines employ logic which emulates overhead introduced during memory allocation and garbage collection. The simulation models are also utilized during software development in a continuous performance evaluation process which gives feedback at each software development stage based on simulations run using the models described.
Abstract:
A method of storing semantically similar documents on proximally located peers in a structured peer to peer overlay network, where each peer is assigned a unique identifier and each document includes one or more words belonging to at least one hierarchical structured collection of words. A method of searching and retrieving documents, corresponding to a search query, from a structured peer to peer overlay network is also provided.
Abstract:
A system and method for providing data transfer from a source node to a destination node in a network using variance based messaging is provided. The method comprises the steps of receiving one or more messages by the source node; selecting a plurality of messages to be grouped from the one or more messages, wherein the plurality of messages comprise data with minimum deviation in content; creating an integrated message from the plurality of messages; sending the integrated message from the source node to the destination node; and recreating each message of the plurality of messages at the destination node.
Abstract:
A system, method, and computer program product for dynamically managing packet delay of a received packet of data between multiple endpoints, including a delay estimator module adapted to calculate packet delay of the received packet of data. The system further includes a predictor module adapted for predicting a playout time for each received packet of data indicative of the calculated packet delay of the at least one received packet of data. Furthermore, the system includes a buffer module adapted for buffering the received packet of data for a variable amount of time and a player module adapted for playing only the received packet of data and to discard packets of data received after the predicted playout time. The delay estimator is adapted to calculate maximum delay of all the packets of data received in an interval within a predetermined threshold indicative of the calculated packet delay.
Abstract:
A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises.
Abstract:
A system, method and computer program product for providing a procurement solution, including determining a maturity level of a strategic direction, procurement processes, and procurement information technology (IT) landscape of a client; identifying a prescription to a spend management solution product, based on the determined maturity level, procurement processes, and procurement IT landscape of the client; and deploying the spend management solution product for the client based on the identified prescription to the spend management solution product.
Abstract:
A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.
Abstract:
Methods and systems for secure conferencing over an IMS network or other networks include sending request by at least one user to access to an application server. The user is validated using a validation coupon provided by the user equipment followed by identifying and allowing the user equipment to download a valid media client. Conference data is encrypted and transmitted to the user equipment, and processed by the media client. Typically, the encrypted conference data is decrypted by the media client and communicated to a user interface presentation to the user. In some examples, the conference data is validated prior to downloading to the user equipment.
Abstract:
A dynamic and extensible architecture allows the selection and delivery of content in light of current context, including shopper in-store location information. Both static and real-time operation are supported. Business events can be generated based on information derived from sensors, from other business events, or both. A rich context supporting a wide variety of conditions can be supported, including shopper in-store location, shopper history, shopper in-store shopping path, and the like. Content can be delivered in a personalized, shopper-specific manner, according to any condition indicated in the current context. Content directed to store operational staff, such as out-of-stock notifications, can also be supported. New devices or applications can easily be added to the system. Context relevant content can be delivered via a variety of mechanisms, including the shopper's own cell phone to enable a cost effective delivery channel.
Abstract:
Product availability can be determined using radio frequency identification (RFID) by determining whether a RFID tag is detectable by a RFID reader and setting a product availability condition, where the RFID tag is not attached to the product, and where distance between the RFID tag and the RFID reader changes as quantity of the product changes. A system for determining availability of products using RFID can comprise a product display unit, a RFID reader, a RFID tag associated with the product display unit, and a computing device configured to set product availability conditions. In the system, distance between the RFID tag and the RFID reader changes as quantity of the product changes.