摘要:
A method of enhancing a display of performance data in a hierarchical state diagram includes measuring a processing time P(t) for each transition action code T(t) of each hierarchical level of the hierarchical state diagram, measuring a processing time P(t) for each state of each hierarchical level of the hierarchical state diagram, and modifying the hierarchical state diagram to enlarge or decrease a width W(t) of transition lines in accordance with a ratio of processing times of all transition action codes in a same hierarchical level. The method also includes modifying the hierarchical state diagram to enlarge or decrease an area size S(x) of a state P(x) to a ratio of processing times of all states in a same hierarchical level, to enlarge or decrease a width W′(t) of an arrow representative of an EntryAction and ExitAction of a state in proportion to processing time and displaying the modified hierarchical state diagram to enhance visualization of the modified transition line width W(t), the modified area size S(x) and the modified EntryAction/ExitAction width W′(t).
摘要:
A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation.
摘要:
Mechanisms for managing a first unit and one or more other units connected to the first unit over a network are provided. The mechanisms detect, by a management unit, an operating state of the other units positioned within a specific range from the first unit on the basis of a location of each of the first and other units over the network. The operating state includes at least an operating state at which a service request is capable of being transmitted to the first unit. The mechanisms further transmit, by the management unit, to the first unit, an instruction to change an operating state of the first unit depending on a number of the other units being in the detected operating state at which the service request is capable of being transmitted.
摘要:
Provided are a computer readable storage medium, computer apparatus, and method for securely managing the execution of screen rendering instructions in a host operating system and virtual machine. A first rendering instruction hooking section is set to a first mode to hook a screen rendering instruction issued by a virtual machine application in a virtual machine. A second rendering instruction hooking section is set to a second mode to hook instructions issued by the virtual machine application. The hooked screen rendering instruction issued by the virtual machine application are encrypted in response to the setting of the first mode to produce illegible output. The hooked screen rendering instruction issued by the virtual machine application are encrypted in response to the setting of the second mode. The encrypted hooked screen rendering instruction encrypted in the second mode are issued to a host operating system to decrypt.
摘要:
Exemplary embodiments include a method and system having resistance to a forced termination attack on a monitoring program for monitoring a predetermined resource. Aspects of the exemplary embodiment include a device that executes a predetermined process including a monitoring program that monitors a predetermined resource, wherein the predetermined process is a process for which the predetermined resource becomes unavailable in response to termination of the predetermined process; a program starting unit for starting the monitoring program in response to an execution of the predetermined process; and a terminator for terminating the predetermined process in the case where the monitoring program is forcibly terminated from the outside.
摘要:
Managing printer and copier server units connected to a network by enabling the user of a personal computer connected to the network to know print costs depending on the environmental load. Server units provide document print and copy services to each network connected client unit, typically personal computers. The server units can operate in any of several operational states, including for example, a standby state, a sleep state and a run state. Upon receiving a service request from the client unit, a management unit estimates the change in operational state for each connected server unit, assigns a priority to the various server units based on the estimated operational state changes, and provides the information for selection by the user requesting the print or copy service.
摘要:
Granular policy management is provided based upon an active status of a process and the display status of an associated visual display. A policy is constructed and applied to a process by a combination of individual control policy parameters associated with the status of a process or a graphical user interface. Each active policy is dynamically adjusted in response to a change in at least one policy condition.
摘要:
To enable a user to perform, by using an ontology, an information search utilizing a meaning given to information on a network by Semantic Web without being required to perform complicated operations for forming an inquiry sentence in conformity with the ontology.In a stage before a search engine for performing an information search by using an ontology is provided an information search supporting system having a morpheme analysis section, a syntactic and semantic analysis section, and a conversion execution section which converts a natural language sentence on which syntactic analysis and semantic analysis have been performed into an inquiry sentence described in an ontology description language by referring to a case frame ontology dictionary in which are stored information indicating to which property in an ontology does the relationship among a predicate, a subject and an object in the natural language sentence correspond and the case frame of the natural language sentence in the property. A natural language sentence is input and an inquiry sentence described in the ontology language is formed on the basis of the results of syntactic analysis and semantic analysis on the natural language sentence and is provided to the search engine.
摘要:
A conversion function for a large Kana-Kanji conversion dictionary. According to the present invention, a Kana-Kanji conversion dictionary is prepared together as a program that includes a search function. Especially in an operating system that supports a dynamic link library routine (DLL), a Kana-Kanji conversion dictionary program is compiled as a DLL, and the dictionary search function is exported so that it can be employed by another program to be usable.
摘要:
An external storage device connectable to an information processing apparatus is provided. The storage device includes: an input/output interface via which data is exchanged with an information processing apparatus; a first storage region where data associated with first and second validity periods is stored; and a second storage region where a control program is stored. While the first validity period is used when the external storage device is connected to one information processing apparatus, the second validity period is used when the external storage device is connected to another information processing apparatus. The control program causes a processor to execute the steps of: establishing connection of the external storage device to an information processing apparatus; identifying any one of the validity periods as a validity period to be used for the data; and executing predetermined security protection processing on the data in accordance with the identified validity period.