摘要:
Under the present invention, a computer work gradient matrix (hereinafter “matrix”) is developed by applying a set of background loading levels and a set of elemental work increments to a computer system, and then measuring the resource consumption of the computer system based thereon. Task work path(s) are also constructed by applying specific tasks to the computer system at a certain background loading level, and measuring the resource consumption of the computer system over time. Once the matrix and task work path(s) have been provided, they can be used to approximate the resource consumption of the computer system in response to a task applied at any background loading level.
摘要:
Under the present invention, it is determined whether sufficient resources exist for deploying a platform dependent application on its specific “native” platform in a grid environment. If not, a platform dependent portion of the application is identified, and the application is split into the platform dependent portion and a platform independent portion. Thereafter, the platform dependent portion is deployed on its corresponding native platform, while the platform independent portion is deployed on another platform in the grid environment based on available resources. Interconnections between the two portions can then be automatically generated. This can include, for example, creating remote method invocation facade interfaces, creating remote method invocation-enabled facade classes, and building a remote method invocation server for the first platform.
摘要:
Under the present invention, a stability and updateability (SUP) ratio for a grid computing environment is generated. Thereafter, a size of a set (e.g., at least one) of scale free graphs for the grid computing environment is estimated. Then, based on at least one predetermined parameter such as a quantity of nodes in the grid computing environment, the set of scale free graphs is actually generated. Based on the set of scale free graphs a set of perturbed scale free graphs is generated. In one example, this may be accomplished using a preferential rewiring technique. This process is repeated for each of the monitoring and discovery services, which will yield at least two sets of perturbed scale free graphs. Using these sets of graphs, a set of monitoring and discovery service (MDS) topology graphs for the grid computing environment will be generated and deployed for optimization.
摘要:
Under the present invention, a computer work gradient matrix is built for each computer system that is interconnected in an environment. For each computer system for which resource consumption is desired to be predicted (e.g., “target” computer systems), a transition work cocycle is generated and provided to a master computer system. A set of task work paths will be constructed for the master computer system. Thereafter, an initial resource consumption value can be computed on the master computer system based on the computer work gradient matrix and the set of task work paths for the master computer system as well as a current background loading level that is being experienced by the target computer system. Then, using the initial resource consumption and the transition work cocycle for the target computer system(s), a resource consumption of the target computer system(s) can be predicted on the master computer system.
摘要:
Under the present invention, a best practice violation (BPV) engine resource is first built. This typically occurs by: receiving sets of source code from a plurality of sources; detecting a programming language of each of the sets of source code; extracting code patterns from the sets of source code; defining meta data for each code pattern that indicates a quality thereof; classifying each code pattern; and assigning a rank to each of the code pattern based on it's corresponding meta data as well as a skill level and an experience level of the developer thereof. Once the BPV engine resource is built, it will be used to detect best practice violations in other sets of source code.
摘要:
Under the present invention, when an application is deployed, certain information corresponding thereto will be stored in an Enterprise Application Directory (EAD). Thereafter, when an instance of the application is requested (e.g., by a requestor), the information is retrieved from the EAD. In addition, the instance is registered with an Application Access Registry (AAR). Registering the instance involves creating a record in the AAR, generating a unique application access key for the instance, and storing the access key with the information in the record. The access key (and optionally the information) is then returned to the requestor, which can then issue service requests to one or more grid services in the shared computer infrastructure. The service request will include the access key so that the grid service can identify the application by searching for the record in the registry using the access key.
摘要:
A method, system, and computer program product for associating events. A provided event dataset includes events occurring in each of N successive time intervals (N≧3). Association rules pertaining to successive events in the event dataset are deduced. Sequences of events are generated from the association rules. Clusters of the sequences of events are formed. Sequences of the clusters are created. The clusters of the sequences may be used: to identify at least one event occurring in a time interval of the N time intervals as being a probable cause of at least one event occurring in a later-occurring time interval of the N time intervals; or to predict an occurrence of at least one event in a time interval occurring after the N time intervals, wherein the at least one event had occurred within the N time intervals.
摘要:
Under the present invention source code can be shared among nodes in a peer-to-peer network. Specifically, source code to be shared will first be analyzed to identify a set of code patterns, assigned one or more predetermined categories based on the set of code patterns, and then selectively indexed. A developer desiring to use previously created source code when creating a new program can perform a context dependent search based on his/her working code to identify and retrieve relevant source code.
摘要:
A system and method of searching a database in which documents of different languages are included. The system includes a synonym or keyword dictionary which is bi-directional and allows for translation of keywords between a first language and other languages. The translated words keywords for the document are stored in an inverted index which is then used for searching, either in a selected language, a second language or in all languages, as determined by the user. This use of multiple searching and a translated synonym dictionary avoids the need for translation of the entire document and avoids inaccuracies which may result from translations.
摘要:
Electronic devices such as computers and handheld devices are provided. The electronic devices may have electrical components such as displays that are driven by driver circuitry. During operation, the driver circuitry may generate radio-frequency noise. Communications circuitry in the electronic devices may be shielded from the radio-frequency noise by radio-frequency shielding structures. The shielding structures may be mounted on portions of the display module, on a cover glass layer, or on other structures such as housing structures. The radio-frequency shielding structures may be formed from one or more metal segments. The metal segments may run along edges of the display. A device housing may have a ground formed from a conductive peripheral member that runs around peripheral edges of the housing and a conductive plate that is connected to the conductive peripheral member. The radio-frequency shielding structure may be connected to the ground using conductive structures.