摘要:
Systems and methods provide a selective instrumentation strategy for monitoring the progress of transactions in a distributed computing system. The monitoring of the transactive processing of jobs is considered through a collection of computer operating stages in a distributed system, using limited information. The monitoring is performed by observing log records (or footprints) produced during each stage of processing in the system. The footprints lack unique transaction identifiers resulting in uncertainties in monitoring transaction instances. The processing stages are selective instrumented to reduce monitoring uncertainty under the given constraints such as limited budget for instrumentation cost.
摘要:
A method for measuring trust in a transaction over a public key certificate network includes associating each edge KA→KB of an public key certificate network connecting two public keys KA and KB with a probability p that information about KB is reliable, and a confidence c that is a total dollar amount of transactions which have involved using edge KA→KB. One or more authentication paths are formed in the public key certificate network starting from public key KS and ending with a target public key KT. A limit l of an amount of insurance that an owner of KS is willing to provide to a user interested in a transaction with an owner of KT is calculated, and for each amount m
摘要:
A method for linking consumer preferences and purchase decisions with point-of-sale systems, wherein the method includes: defining consumer preferences in a third-party system; obtaining consumer preference identification at a point of purchase; providing information about purchase items and the consumer preference identification to the third-party validation system; validating that the items being purchased do not violate the consumer preferences; and wherein based on the validating providing notification to the point-of-sale system.
摘要:
Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported.
摘要:
Orthogonal Frequency Division Multiplexing (OFDM) is combined with a plurality of transmitting antennas to yield a system that provides space, frequency and time diversity. Specifically, an arrangement is created where a transmitter includes a plurality of antennas that are transmitting simultaneously over the same frequency subbands, and the symbols that are transmitted over each subband, in any given time slot, over the different antennas are encoded to provide diversity. The principles of trellis coding, space-time coding, or any other diversity-producing coding can be applied in this arrangement.
摘要:
An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data.
摘要:
Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet.
摘要:
Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero.
摘要:
A system and method for instantiation of a virtual machine (VM) in a datacenter includes providing a network appliance in a location for listening to management information traffic. Indices are created for data center images in the network appliance. VM instantiation requests are intercepted in the network appliance. Locations from which blocks for the VM should be fetched based upon network cost are determined. VM image blocks are populated from the locations.
摘要:
According to exemplary embodiments, a method for resource management of network systems includes sampling channel states of a first set of channels from at least one base station associated with a radio network controller providing an application and estimating channel states of a second set of channels from the at least one base station, wherein the estimated channel states are based on previously sampled channel states and currently sampled channel states. The method further includes adapting at least one runtime parameter of the application based on the sampled channel states of the first set of channels and the estimated channel states of the second set of channels.