摘要:
After receipt of a training and execution plan, a trainer operator is automatically trained based on specified training documents so as to generate a new trained operator for extracting information from documents. The new trained operator is a new version of the trainee operator. Both trainee operators are automatically retained for later use in extracting information from one or more unknown documents. After receipt of the training and execution plan, the new trained operator is automatically executed on one or more unknown documents so as to extract information from such one or more unknown documents.
摘要:
A method for recovering spin locks in a system having one or more processes capable of accessing a shared resource, the system providing a lock indicating exclusive access to the shared resource by a single process and enabling one or more processes to repeatedly attempt to gain access to the lock when ownership of the shared resource is desired. The method includes generating a linked list queue structure containing a first process currently having exclusive access to the lock and one or more processes added to the queue structure to spin on the lock, each process capable of modifying the queue structure by obtaining exclusive access of the lock from a process having exclusive access of the lock and releasing the lock to another process in the linked list queue structure; detecting when one or more processes having exclusive access to the lock terminates, and upon detection, removing the terminated process from the queue structure, and restoring consistency to said linked list queue structure.
摘要:
For use with an active database stored in volatile memory for direct revision thereof, the active database having multiple checkpoints and a stable log, having a tail stored in the volatile memory, for tracking revisions to the active database to allow corresponding revisions to be made to the multiple checkpoints, the active database subject to corruption, a system for, and method of, restoring the active database and a computer system containing the same. The system includes: (1) a checkpoint determination controller that determines which of the multiple checkpoints is a most recently completed checkpoint and copies the most recently completed checkpoint to the volatile memory to serve as an unrevised database for reconstructing the active database and (2) a revision application controller that retrieves selected ones of the revisions from the stable log and the tail and applies the revisions to the unrevised database thereby to restore the active database. In an advantageous embodiment, the applied revisions include log records at an operation level (lower level of abstration than transactions), and the revision application controller, using memory locks while restoring the active database, releases ones of the memory locks as a function of applying ones of the log records.
摘要:
Disclosed are methods and apparatus for extracting information from one or more documents. A training and execution plan is received, and such plan specifies invocation of a trainer operator for initiating training of a trainee operator based on a set of training documents so as to generate a new trained operator that is to then be invoked so as to extract information from one or more unknown documents. The trainee operator is configured to extract information from one or more unknown documents, and each training document is associated with classified information. After receipt of the training and execution plan, the trainer operator is automatically executed to train the trainee operator based on the specified training documents so as to generate a new trained operator for extracting information from documents. The new trained operator is a new version of the trainee operator. After receipt of the training and execution plan, both the trainee operator are automatically retained for later use in extracting information from one or more unknown documents and the new trained operator for later use in extracting information from one or more unknown documents. After receipt of the training and execution plan, the new trained operator is automatically executed on one or more unknown documents so as to extract information from such one or more unknown documents.