摘要:
An electronic chart system in which charts of the earth are stored in digital representation and communicated to the operator by a visual display. Through the use of a Loran-C receiver or the like, the system additionally plots the carrier's position on the visual representation of the chart. The visual display is a cathode ray tube on which the visual representation is compressed or expanded to meet the demands of the operator so that the appropriate resolution is thereby obtained. To minimize memory size an encoding format is used which provides a data word for indicating the first physical element of the run line, a data word for the number of runs per line and data words for the lengths of N-1 runs of up to two variables for each line of the chart.
摘要:
A method, system and process for providing an improved database blocking technique for updatable and scrollable cursors is disclosed. The invention is facilitated by the operation of a process in the memory of a processor. The processor, under the control of the process, builds a reserved area in the memory of the computer. The reserved area in the memory contains an image of a portion of the information residing on disk in the database. When an application opens a cursor to a database, the type of blocking is specified for that cursor. The application issues a fetch request, and if the row is not in the block in the reserved area in the memory, then a remote procedure call is performed to get the required next block of rows and return the block containing the rows back to the application. Various lock data structures are employed to manage and control the processing.
摘要:
A method and computer system are disclosed for determining the access privileges currently held by a database user with respect to objects in the database. The steps of the method are: (a) requesting a determination of those objects to which a given user has access privileges; (b) automatically determining those objects to which the user has direct access privileges; and (c) automatically determining those objects to which the user has indirect access privileges. This last step (c) is accomplished by (1) automatically determining all access groups to which the user belongs; and (2) automatically determining those objects to which those access groups, determined in step (1), have access privileges.