摘要:
The present invention provides a method, system, and computer program product for transferring authorization rights to access a file. A method in accordance with an embodiment of the present invention includes: designating a location to store the file; creating a file-transfer-reference for the file based on the location; creating an authorization protocol for the file; selecting at least one recipient of the file-transfer-reference; and forwarding the file-transfer-reference to the at least one recipient according to the authorization protocol. The method may optionally include defining a validity period for which for access to the file.
摘要:
The present invention provides a method, system, and computer program product for transferring authorization rights to access a file. A method in accordance with an embodiment of the present invention includes: designating a location to store the file; creating a file-transfer-reference for the file based on the location; creating an authorization protocol for the file; selecting at least one recipient of the file-transfer-reference; and forwarding the file-transfer-reference to the at least one recipient according to the authorization protocol. The method may optionally include defining a validity period for which for access to the file.
摘要:
The present invention provides a method, system, and computer program product for improving scheduling of tasks in systems that accumulate execution time. An upper bound is computed on the amount of additional time each schedulable task in the system may continue to execute after exceeding its predetermined cost, without adversely affecting overall operation of the system (that is, ensuring that the continued execution will not cause invocations of subsequent tasks to fail to meet their execution deadlines). By allowing tasks to run longer, the potential that the task will successfully end is increased, thereby yielding a more efficient overall system. In the preferred embodiment, the extensions are iteratively computed as a fixed percentage of the cost of each task until reaching an amount of time where the system is no longer feasible. The extension values resulting from the iteration before the cost-extended system becomes infeasible are then used at run-time when a particular task encounters an overrun condition. This technique is advantageous in systems where execution of non-schedulable entities (such as occurrence of hardware interrupts) occurs during execution of one or more of the scheduled tasks.
摘要:
Techniques are described for managing access and synchronization of one or more files of a document management system stored locally at a client device. The techniques may include receiving, by a document management system executing on a server device, a file update notification message from a first client device to notify the document management system that a file was modified by the first client device. The file update notification message may include an indication of the modified file on the first client device without including the modified file. The document management system may receive a file editing request from a second client device to request the file. In response, the document management system may send a file upload request to the first client device, receive the modified file from the first client device, and send the modified file to the second client device.
摘要:
Memory pool management may be provided by allocating storage blocks and handles in different parts of a larger memory pool. Two variable size sub-pools may be provided within the memory pool: a storage block sub-pool and a handle sub-pool. Each sub-pool has a variable size and may be allowed to grow until their combined size reaches the size of the memory pool. Both sub-pools may be allowed to grow into the same unused memory space. When a memory request is received from a program, the storage block sub-pool and handle sub-pool may be enlarged to accommodate the request. A storage block and a handle may be allocated to the program from the storage block and handle sub-pools, respectively.
摘要:
A method and system for controlling use of a communication device in a vehicle is provided. The system includes a plurality of internal vehicle sensors, the vehicle sensors adapted to provide internal information. A receiver is provided adapted to receive external information from an external source and a controller is provided adapted to receive the internal information and the external information. The controller is adapted to assign a risk value to each of the internal and external information and compare the assigned risk values to a predetermined risk threshold and is adapted to disable the communication device when any of the risk values exceeds the predetermined risk threshold.
摘要:
Techniques are described for managing access and synchronization of one or more files of a document management system stored locally at a client device. The techniques may include receiving, by a document management system executing on a server device, a file update notification message from a first client device to notify the document management system that a file was modified by the first client device. The file update notification message may include an indication of the modified file on the first client device without including the modified file. The document management system may receive a file editing request from a second client device to request the file. In response, the document management system may send a file upload request to the first client device, receive the modified file from the first client device, and send the modified file to the second client device.
摘要:
A class loader locates, at run time, a requested code component. The code component is preferably stored on a database, rather than in a file system, to improve its accessibility in a network computing environment. Code components are preferably stored in the database using an organizational structure that reflects a code isolation structure. In this manner, different versions of a particular code component can be retrieved in a transparent, automated manner, depending on information associated with the invocation thereof.
摘要:
The present invention provides a method, system, and computer program product for encoding (and subsequently decoding) a sequence of periodic byte values that have a vertical correlation (e.g. so that they can be more efficiently stored and/or electronically transmitted for use in a real-time system or resource-constrained system). Redundant values are omitted through use of marker bytes and bits masks which indicate when a set of values is unchanged and which of the set have changed, respectively. In this manner, the resources required for transmitting, processing, and/or storing the values is reduced. In some systems, the reduction may enable shortening the periodic interval length, such that values of a finer granularity can be processed. An example scenario in which the present invention may be used advantageously is for transmitting periodic input data to a robot controller, in order to control movement of the robot.