摘要:
Systems and methods for providing e-business services based on security SLAs (service level agreements) in a hosted computing environment. More specifically, the systems and methods enable efficient enforcement of individualized security SLAs, wherein individualized SLA agreements are specified, mapped into security rules and continually monitored against system events via an efficient rule index to determine security violations and trigger proper actions.
摘要:
An arrangement for providing gracefully degraded services on the Internet under overloaded conditions, involving tagging user request to indicate the status of said request and providing appropriate level of degraded services gracefully responsive to said tagging information.
摘要:
A method and system for personalizing an interactive voice response (IVR) system to reduce a number of key sequences to reach a desired source of information, includes storing a caller profile, and retrieving the caller's profile to construct a personalized IVR dialogue menu and play out the personalized menu.
摘要:
A system and method for billing one or more participating parties for client access to the internet is disclosed including the steps of identifying at least one of the one or more participating parties as being responsible for the billing, allocating a share of the billing to each responsible participating party based on a predetermined function and computing a billing amount for each of the responsible participating parties based on a function of the share and a client bandwidth usage.
摘要:
A method for computing n-dimensional decomposable image transformation using the 1D approach with constrained transpose memory provides a minimized rounding/truncation error. The method minimizes transpose memory size required to fulfill a defined accuracy requirement for n-dimensional image transformation. A set of input data elements are stored. Then, a first transform, of the multiple dimension transform, is performed on the set of input data elements so as to form an array of transformed data elements, each of the transformed data elements having a larger number of bits than the input data elements. A common range of the transformed data elements is determined, and a minimum number of bits required to represent the common range without loss of information is then determined. The memory word size available for storage of the transformed data elements is compared with a minimum number of bits so as to determine an excess number of bits. Only the excess number of bits of the transformed data is truncated/rounded so as to form an output set of data elements. Finally, the output set of data elements is stored.
摘要:
A data communications network includes network servers, clusters of network servers, as well as content providers and service providers, such as ISPs and ASPs, and further includes at least one data processor that operates under control of a stored program resident on a memory media. The stored program directs operation of the data processor to provide users with differentiated services by defining, for individual ones of the plurality of content providers, a plurality of levels of services for users, and for responding to service level tables received from individual ones of the plurality of content providers, where individual ones of users are assigned to one of the plurality of levels of service. There is also at least one resource requirement table for defining at least a minimum set of resources required for realizing individual ones of said plurality of service levels. The program further directs operation of the at least one data processor to merge the plurality of resource requirement tables into a merged resource requirement table for use by a particular one of the network servers. The particular one of the network servers assigns differentiated service levels to incoming user requests in accordance with the service level tables, and in accordance with the merged resource requirement tables and currently available resources. The resources can include one of numbers of available servers, available memory capacity, and available bandwidth. The program further controls operation of the at least one data processor to redirect an incoming user request to a network server having sufficient available resources to provide a specified level of service for the user request.
摘要:
This invention introduces a new concept called virtual construct intervals (VCI), where each predicate interval is decomposed into one or more of these construct intervals. These VCIs strictly cover the predicate interval. Namely, every attribute value covered by the predicate interval is also covered by at least one of the decomposed VCIs, and vice versa. Each construct interval has a unique ID or interval coordinate and a set of endpoints. A construct interval is considered activated when a predicate interval using it in its decomposition is added to the system. The predicate ID is then inserted into the ID lists associated with the decomposed VCIs. To facilitate fast search, a bitmap vector is used to indicate the activation of VCIs that cover an event value. The challenge is to find an appropriate set of construct intervals to make predicate decomposition simple and, more importantly, to build efficient bitmap indexes. Because each construct interval covers only a small range of attribute values, the invention also uses bitmap clipping to cut unnecessary bitmap storage. To facilitate bitmap clipping, the invention introduce the covering segment concept. Bit positions outside a covering segment are pruned.