摘要:
Provided is a waterproof connector, including an inner insulating housing, a plurality of electrical contacts, an inner metal shell, a sealing plate, an outer insulating housing, an outer metal shell and a waterproof rubber ring. The inner metal shell is pressed to form a plurality of holding blocks and two holes. The sealing plate includes a connecting plate and two closing plates for covering the corresponding hole. The outer insulating housing is integrally formed with the inner insulating housing, the electrical contacts, the inner metal shell and the sealing plate by insert molding. The waterproof rubber ring encompasses a front end of the inner metal shell. The outer insulating housing can seal off the gaps between the sealing plate and the inner metal shell, and between the inner insulating housing and the inner metal shell. The present waterproof connector can satisfy the waterproof demand by the waterproof rubber ring.
摘要:
Apparatus, a method and a computer program are provided. The apparatus includes: at least one processor; and at least one memory storing computer program instructions, the at least one processor being configured to execute the computer program instructions to cause the apparatus at least to perform: controlling a touch sensitive display to display a first graphical item at a first position and a second graphical item at a second position, the second graphical item being separated from the first graphical item by a first distance; detecting a first user digit at the first position and a second user digit at the second position; reducing the first distance by moving at least one of the first and second graphical items across the touch sensitive display, in response to detecting movement, across the touch sensitive display, of at least one of the first and second user digits; and controlling the touch sensitive display to display a third graphical item, after determining the first distance has been reduced such that the first graphical item is proximate the second graphical item.
摘要:
A method for service composition whereby a tag query is received and a processing graph is composed in accordance with the tag query. The processing graph is composed by using annotated primal data and services. The processing graph includes at least one of the services. The service included in the processing graph is deployed in an execution environment.
摘要:
A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
摘要:
A method for service composition whereby a tag query is received and a processing graph is composed in accordance with the tag query. The processing graph is composed by using annotated primal data and services. The processing graph includes at least one of the services. The service included in the processing graph is deployed in an execution environment.
摘要:
A method for constructing an overlay multicast tree to deliver data from a source to an identified group of nodes is provided in which a plurality of nodes are identified and mapped into multidimensional Euclidean space. A geometric region is constructing having a size that is the minimum size necessary to contain the source and all the nodes. Once constructed, a tree is created beginning at the source and including all of the nodes within the geometric region.
摘要:
Methods and apparatus operating in a stream processing network perform load shedding and dynamic resource allocation so as to meet a pre-determined utility criterion. Load shedding is envisioned as an admission control problem encompassing source nodes admitting workflows into the stream processing network. A primal-dual approach is used to decompose the admission control and resource allocation problems. The admission control operates as a push-and-pull process with sources pushing workflows into the stream processing network and sinks pulling processed workflows from the network. A virtual queue is maintained at each node to account for both queue backlogs and credits from sinks. Nodes of the stream processing network maintain shadow prices for each of the workflows and share congestion information with neighbor nodes. At each node, resources are devoted to the workflow with the maximum product of downstream pressure and processing rate, where the downstream pressure is defined as the backlog difference between neighbor nodes. The primal-dual controller iteratively adjusts the admission rates and resource allocation using local congestion feedback. The iterative controlling procedure further uses an interior-point method to improve the speed of convergence towards optimal admission and allocation decisions.
摘要:
A method, computer readable media, and apparatus of hierarchical-based communication session and data distribution management that indexes client's communication preferences and network attribute information. Indexing is used to generate dynamic group membership lists that map into communication groups. Indexing is replicated at control nodes in the network overlay to allow distributed management of group membership. Send/receive operations are decoupled through data distribution and the indexing structure. Senders and receivers register their group communication interests to a parent node in the hierarchy. The session control structure aggregates client interest and dynamically updates replicas at control nodes which are selected according to the changes in registered client interest. The indexing structure has self-managing properties for automatic clustering based on client session and data interests, and dynamic partitioning of the session/data interest attribute space. Group membership is managed by querying the indexed session/data distribution management structure and mapping output to communication groups.
摘要:
A method for modeling a component of an information processing application, includes: defining an applicability condition of a component, wherein the applicability conditions includes variables representing objects that must be included in a pre-inclusion state and a graph pattern that semantically describes the objects that must be included in the pre-inclusion state, wherein the pre-inclusion state is a state against which the applicability of the component for inclusion in a processing graph is evaluated; and defining an inclusion effect of the component, wherein the inclusion effect includes variables representing objects that must be included in a post-inclusion state and a graph pattern that semantically describes the objects that must be in the post-inclusion state, wherein the post-inclusion state is a state resulting from inclusion of the component in the processing graph.
摘要:
Disclosed is a method and mechanism for processing expressions and operator trees. An approach is particularly useful to optimize processing of XML statements with respect to SQL operators. A top-down processing approach can be taken to directly output data from operators to a data stream. In addition, multiple processing approaches can be taken within a single expression tree, with some operators processed using the top-down approach and other operators processed with the bottom-up approach. Even data that can not be streamed is copied fewer times using this approach, intermediate values from bottom-up processing may still be streamed if it is used by an operator that is eligible for top-down processing.