摘要:
Disclosed are various embodiments for adjusting prices of items in foreign marketplaces based on fluctuations in currency exchange rates. A deviation from a return sought by a merchant for an item offered in an electronic marketplace is determined. The deviation results from a change in an exchange rate between a first currency employed by the merchant and a second currency employed by the electronic marketplace. It is determined whether the deviation from the return meets a threshold. One or more actions in response to the deviation are implemented when the deviation from the return meets the threshold.
摘要:
Embodiments for implementing a buyer global search in electronic commerce include a method of detecting, by a computing device, that a search query for a product item within a first marketplace is unsuccessful and in response to the unsuccessful search query, executing the search query for the product item within a second marketplace. The method further includes detecting that the search query for the product item within the second marketplace is successful; and in response to the successful search query in the second marketplace, offering a user that submitted the search query in the first marketplace to purchase the product item being sold by a seller.
摘要:
Disclosed are various embodiments for determining inventory levels of a multi-channel seller. Order rates can be retrieved from various marketplaces in which a seller participates. An inventory depletion rate can also be determined. A period of uncertain inventory availability can be determined based at least upon an update interval with which order updates are retrieved. Inventory can be reported as unavailable based at least upon an initial quantity of the product, the inventory depletion rate, and whether the period of uncertain inventory availability is entered.
摘要:
Systems, methods, and other embodiments associated with resource description framework (RDF) security are described. One example method includes generating, based on sensitivity labels associated with the contents of a triple in an RDF record, a sensitivity label. The example method may also include comparing the sensitivity label to an access label associated with an entity requesting an action associated with the record to be performed. The example method may also include performing the action upon determining that the entity has sufficient permission to request the action.
摘要:
A method for maintaining a system for database management. The method includes recording the addresses of newly created leaf blocks during a split operation on a primary B+tree and maintaining the new addresses in a list as part of primary B+tree metadata.
摘要:
A system for organizing and accessing a database. The system includes a primary B+tree index, a secondary B+tree index, a plurality of mapping table row identifiers stored in the secondary B+tree index and a plurality of database addresses for leaf blocks of the primary B+tree index corresponding to mapping table rows.
摘要:
A method and apparatus for introducing domain-specific data types with associated semantics in an RDF database system using an extensibility framework mechanism. The extensibility framework mechanism allows users to map serialized instance data for a particular user-defined data type to properties of a base data structure associated with the domain-specific data and to map instance data in base data structures to the data's serialized form. The RDF database system may return inferred properties of RDF data stored in domain-specific data types in response to a query on the data. Further, the RDF database system may infer relationships between resources in stored data.
摘要:
Systems, methods, and other embodiments associated with access control for graph data at the instance-level are described. One example method includes accepting data access constraints that are expressed as match and apply pattern pairs to enforce security policies. A user query on graph data with a security policy restricts the returned data to data that the user is authorized to access. For this purpose, a user query that includes query selection criteria corresponding to one or more match pattern criteria based on the resource referenced in the query is rewritten to include security conditions specified in the associated apply pattern to restrict access to the graph data.
摘要:
In the scenario in which a rule set is defined for composite events, instances of the associated primitive events are added to a database-centric rules engine one at a time. Rules that rely on these events fire the corresponding actions when instances of all the corresponding primitive events are detected. Intermediate states of the rule evaluations are persistently stored in the database, thereby avoiding repeated evaluation of portions of rules and supporting efficient incremental evaluation of the rules. The rules defined within a rule set could vary significantly, using various rule condition language constructs such as “any” and negation constructs. The state information generated from evaluating the rules belonging to a single rule set is all stored in a single relational table and managed using direct SQL and DML commands.
摘要:
First data that represents a level associated with an element within an expression, such as an XPath expression, is generated from the expression, and stored in one or more columns of a table. Second data that represents a condition on an attribute of the element is generated from the expression, and stored in one or more columns of the same or a different table. A plurality of expressions can be processed as such, and a determination made whether any of the expressions match with a given hierarchical data item, such as an XML document, that includes a value that corresponds to an attribute that is associated with an element that resides at a particular level within the data item. Such determination is made based on whether the particular level matches the first data and the value satisfies the second data associated with a given expression.