摘要:
The present invention relates to an ophthalmic diagnostic apparatus. The apparatus comprises: a display means (12) arranged to be worn in proximity to a user's eyes and arranged for displaying images relating to at least one visual function test to a user; a first user interface (14) for providing instructions to a user relating to said at least one visual function test and a second user interface (16) for receiving responses from said user in relation to said at least one visual function test; storage means (22) for storing data relating to said at least one visual function test; control means (18) for transferring said data relating to said at least one visual function test to said display means and said user interface; and output means for outputting a signal responsive to the user responses so as to assist with ophthalmic diagnosis.
摘要:
A method and apparatus in accordance with the present invention provides monitoring a self-adjusting multi-tier processing system. At least one computing resource of one of the tiers of the self-adjusting multi-tier processing system is dynamically bypassed based on at least one predetermined criterion, wherein dynamically bypassing energizes or de-energizes a bypass control switch that operates to route data between tiers of the system in a manner that excludes the at least one computing resource.
摘要:
A method for generating network traffic includes receiving packet header information and an optional packet payload. The received packet header information is arranged in accordance with a predetermined format. A packet of data including the packet payload and a packet header is formatted in accordance with the arranged header information. The predetermined format specifies a particular order in which packet headers are to be arranged.
摘要:
Systems and methods are provided for detecting malicious behavior in mobile ad-hoc wireless networks. The mobile ad-hoc network contains a plurality of actual nodes and a plurality of decoys that are derived from the actual nodes using duplicate instances of the operational software of the actual nodes in combination with a virtual interconnection topology created to make the decoys appear as actual nodes within the mobile ad-hoc network. The interconnection topology includes routing characteristics indicating that the most efficient path of communication to any given decoy is through at least one actual node in the network. The decoys are used to identify malicious behavior in the network and in particular to identify attempt to communicate directly with decoys in contradiction to the created interconnection topology. When the malicious behavior is associated with an identifiable node, corrective action is taken that includes quarantining that node from the other nodes in the network.
摘要:
In one embodiment, the invention is a method and apparatus for distributed policy evaluation. One embodiment of a method for evaluating a systems management policy, where the policy includes a condition and an action to be taken when the condition evaluates to TRUE, includes forwarding the policy, by a first autonomic manager, to at least a second autonomic manager and receiving at least partial evaluation results for the policy from at least the second autonomic manager.
摘要:
A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.
摘要:
There are provided a hardware accelerator and method for providing hardware acceleration for an application server and/or a layer 7 switch. The hardware accelerator includes a content access memory (CAM) configured to accelerate string comparison operations in the application server and/or layer 7 switch. The string comparison operations involve strings having varying key string positions.
摘要:
A method for estimating a response time by combining metrics from networking and application layers. This is achieved by placing correlation tags in data collected at these layers so that the data can later be identified as corresponding to a single web page download or a web session. Once data corresponding to a single web page download or a web session is identified, a splicing algorithm calculates client perceived response time by using analytical models of response time.