摘要:
A method for implementing an electronically-based negotiation session between users within an ESN. The method includes sending a message including a request portion and a response portion from a first user to a second user in a round of successive rounds, and in response to receiving the message from the first user, sending a message from the second user to the first user in a subsequent round, the message from the second user including a response portion responsive to the request portion of the message from the first user and a request portion. When a new round is performed, evaluating whether an agreement exists by checking messages previously exchanged, and exchanging subsequent messages, when any rounds remain and the session has not been terminated, and granting access and exchanging data between the users, executing actions, and setting policies as negotiated, when the session has been terminated and an agreement exists.
摘要:
A method for implementing an electronically-based negotiation session between users within an ESN. The method includes sending a message including a request portion and a response portion from a first user to a second user in a round of successive rounds, and in response to receiving the message from the first user, sending a message from the second user to the first user in a subsequent round, the message from the second user including a response portion responsive to the request portion of the message from the first user and a request portion. When a new round is performed, evaluating whether an agreement exists by checking messages previously exchanged, and exchanging subsequent messages, when any rounds remain and the session has not been terminated, and granting access and exchanging data between the users, executing actions, and setting policies as negotiated, when the session has been terminated and an agreement exists.
摘要:
A method for implementing an electronically-based negotiation session between users within an ESN. The method includes sending a message including a request portion and a response portion from a first user to a second user in a round of successive rounds, and in response to receiving the message from the first user, sending a message from the second user to the first user in a subsequent round, the message from the second user including a response portion responsive to the request portion of the message from the first user and a request portion. When a new round is performed, evaluating whether an agreement exists by checking messages previously exchanged, and exchanging subsequent messages, when any rounds remain and the session has not been terminated, and granting access and exchanging data between the users, executing actions, and setting policies as negotiated, when the session has been terminated and an agreement exists.
摘要:
A computer-implemented method for performing context-aware social networking within an electronic social network is provided. The method includes dynamically obtaining context information corresponding to at least one of past, present and future events associated with each user of a plurality of users within the electronic social network, storing the obtained context information, defining one or more context patterns of interest using the stored context information, and detecting a context pattern of interest from the one or more context patterns of interest for a first user of the plurality of users and formulating one or more recommendations or executing user-defined actions or predefined actions by the electronic social network for the first user using the detected context pattern of interest and the context information of at least a second user of the plurality of users.
摘要:
A specification of a set of objects associated with at least one virtual world is obtained. The objects are laid out in a three-dimensional virtual representation. An on-the-fly virtual place is created in the virtual world, based on the layout. The virtual place depicts the set of objects in the three-dimensional virtual representation and enables navigation and interaction therewith
摘要:
In the context of electronic social networking platforms, ‘hybrid profile’ management allows a user u to create and locally manage ‘pseudo-profiles’ reflecting the profile information of real-world contacts who are not actual members of the networking platform. The first-degree electronic social network of a given user u thus includes both the profiles of other regular network users who have agreed to be direct contacts to u as well as these pseudo-profiles.
摘要:
A compact and highly mobile fire-fighting vehicle is disclosed which is capable of entering buildings through doorways and being maneuvered through corridors to the location of the fire. The vehicle carries fire extinguishing materials thereon and a spray device for spraying such materials. The vehicle can be battery operated directly by an operator or by an electronic remote control device provided on the chassis. A plurality of vehicles of the present invention can be effectively utilized to surround and isolate a fire.
摘要:
A method of assessing operational risk includes defining a participant set. The participant set includes a plurality of members. The method also includes identifying a set of initial risk sources, assigning risk certificates for each of the initial risk sources to each of the plurality of members of the set of participants, and trading the risk certificates among the plurality of members of the set of participants to establish market prices that correspond to a level of risk associated with each of the initial risk sources.
摘要:
A method comprising, defining a social network U={u, u′, . . . }, defining a set of relationships between users O⊂U×U, defining a set of attributes of the social network A={a1, a2, . . . }, defining a set of contacts of the user u, defining a user profile of the user u Iu=Au∪Uu, defining a metric M={m1, m2, . . . }, receiving a rating of a metric of user u′ from the user u, defining a condition cεC, defining a set of elements Z={z1, z2, . . . }, receiving a request for access to Iu from user u′, determining authorization for user u′ to access a subset of Iu by an access control function U×U×Pow(R)×C→Pow(Iu×Z), and outputting a subset of Iu to user u′ as determined by the access control function.
摘要:
A method of assessing operational risk includes defining a participant set. The participant set includes a plurality of members. The method also includes identifying a set of initial risk sources, assigning risk certificates for each of the initial risk sources to each of the plurality of members of the set of participants, and trading the risk certificates among the plurality of members of the set of participants to establish market prices that correspond to a level of risk associated with each of the initial risk sources.