摘要:
A data communications network includes network servers, clusters of network servers, as well as content providers and service providers, such as ISPs and ASPs, and further includes at least one data processor that operates under control of a stored program resident on a memory media. The stored program directs operation of the data processor to provide users with differentiated services by defining, for individual ones of the plurality of content providers, a plurality of levels of services for users, and for responding to service level tables received from individual ones of the plurality of content providers, where individual ones of users are assigned to one of the plurality of levels of service. There is also at least one resource requirement table for defining at least a minimum set of resources required for realizing individual ones of said plurality of service levels. The program further directs operation of the at least one data processor to merge the plurality of resource requirement tables into a merged resource requirement table for use by a particular one of the network servers. The particular one of the network servers assigns differentiated service levels to incoming user requests in accordance with the service level tables, and in accordance with the merged resource requirement tables and currently available resources. The resources can include one of numbers of available servers, available memory capacity, and available bandwidth. The program further controls operation of the at least one data processor to redirect an incoming user request to a network server having sufficient available resources to provide a specified level of service for the user request.
摘要:
Systems and methods for providing e-business services based on security SLAs (service level agreements) in a hosted computing environment. More specifically, the systems and methods enable efficient enforcement of individualized security SLAs, wherein individualized SLA agreements are specified, mapped into security rules and continually monitored against system events via an efficient rule index to determine security violations and trigger proper actions.
摘要:
A method and system for personalizing an interactive voice response (IVR) system to reduce a number of key sequences to reach a desired source of information, includes storing a caller profile, and retrieving the caller's profile to construct a personalized IVR dialogue menu and play out the personalized menu.
摘要:
A method for computing n-dimensional decomposable image transformation using the 1D approach with constrained transpose memory provides a minimized rounding/truncation error. The method minimizes transpose memory size required to fulfill a defined accuracy requirement for n-dimensional image transformation. A set of input data elements are stored. Then, a first transform, of the multiple dimension transform, is performed on the set of input data elements so as to form an array of transformed data elements, each of the transformed data elements having a larger number of bits than the input data elements. A common range of the transformed data elements is determined, and a minimum number of bits required to represent the common range without loss of information is then determined. The memory word size available for storage of the transformed data elements is compared with a minimum number of bits so as to determine an excess number of bits. Only the excess number of bits of the transformed data is truncated/rounded so as to form an output set of data elements. Finally, the output set of data elements is stored.