摘要:
Disclosed are various embodiments for adjusting prices of items in foreign marketplaces based on fluctuations in currency exchange rates. A deviation from a return sought by a merchant for an item offered in an electronic marketplace is determined. The deviation results from a change in an exchange rate between a first currency employed by the merchant and a second currency employed by the electronic marketplace. It is determined whether the deviation from the return meets a threshold. One or more actions in response to the deviation are implemented when the deviation from the return meets the threshold.
摘要:
Systems, methods, and other embodiments associated with detecting and avoiding logical conflicts between long duration transactions are described. One example method includes generating conflict keys for long transactions using conflict queries that operate on data being manipulated to return a conflict key to be associated with the transaction. The conflict keys may be used to detect or avoid logical conflicts that occur in long duration transactions running concurrently.
摘要:
Systems, methods, and other embodiments associated with resource description framework (RDF) security are described. One example method includes generating, based on sensitivity labels associated with the contents of a triple in an RDF record, a sensitivity label. The example method may also include comparing the sensitivity label to an access label associated with an entity requesting an action associated with the record to be performed. The example method may also include performing the action upon determining that the entity has sufficient permission to request the action.
摘要:
Systems, methods, and other embodiments associated with complex event pattern building are described. One example method includes receiving, on a server-side, requests associated with user interactions with interactive menus. The method includes responding to the requests with commands that build a set of event-condition-action, data that describes an action to take in response to an occurrence of a complex event pattern. The example method may also include automatically converting the event-condition-action data into a programmatic construct that configures a complex event pattern engine to initiate the specified action in response to detecting an occurrence of the complex event pattern.
摘要:
A method for maintaining a system for database management. The method includes recording the addresses of newly created leaf blocks during a split operation on a primary B+tree and maintaining the new addresses in a list as part of primary B+tree metadata.
摘要:
A system for organizing and accessing a database. The system includes a primary B+tree index, a secondary B+tree index, a plurality of mapping table row identifiers stored in the secondary B+tree index and a plurality of database addresses for leaf blocks of the primary B+tree index corresponding to mapping table rows.
摘要:
Embodiments for implementing a buyer global search in electronic commerce include a method of detecting, by a computing device, that a search query for a product item within a first marketplace is unsuccessful and in response to the unsuccessful search query, executing the search query for the product item within a second marketplace. The method further includes detecting that the search query for the product item within the second marketplace is successful; and in response to the successful search query in the second marketplace, offering a user that submitted the search query in the first marketplace to purchase the product item being sold by a seller.
摘要:
A method and apparatus for introducing domain-specific data types with associated semantics in an RDF database system using an extensibility framework mechanism. The extensibility framework mechanism allows users to map serialized instance data for a particular user-defined data type to properties of a base data structure associated with the domain-specific data and to map instance data in base data structures to the data's serialized form. The RDF database system may return inferred properties of RDF data stored in domain-specific data types in response to a query on the data. Further, the RDF database system may infer relationships between resources in stored data.
摘要:
Systems, methods, and other embodiments associated with access control for graph data at the instance-level are described. One example method includes accepting data access constraints that are expressed as match and apply pattern pairs to enforce security policies. A user query on graph data with a security policy restricts the returned data to data that the user is authorized to access. For this purpose, a user query that includes query selection criteria corresponding to one or more match pattern criteria based on the resource referenced in the query is rewritten to include security conditions specified in the associated apply pattern to restrict access to the graph data.
摘要:
In the scenario in which a rule set is defined for composite events, instances of the associated primitive events are added to a database-centric rules engine one at a time. Rules that rely on these events fire the corresponding actions when instances of all the corresponding primitive events are detected. Intermediate states of the rule evaluations are persistently stored in the database, thereby avoiding repeated evaluation of portions of rules and supporting efficient incremental evaluation of the rules. The rules defined within a rule set could vary significantly, using various rule condition language constructs such as “any” and negation constructs. The state information generated from evaluating the rules belonging to a single rule set is all stored in a single relational table and managed using direct SQL and DML commands.