摘要:
Under the present invention, a computer work gradient matrix is built for each computer system that is interconnected in an environment. For each computer system for which resource consumption is desired to be predicted (e.g., “target” computer systems), a transition work cocycle is generated and provided to a master computer system. A set of task work paths will be constructed for the master computer system. Thereafter, an initial resource consumption value can be computed on the master computer system based on the computer work gradient matrix and the set of task work paths for the master computer system as well as a current background loading level that is being experienced by the target computer system. Then, using the initial resource consumption and the transition work cocycle for the target computer system(s), a resource consumption of the target computer system(s) can be predicted on the master computer system.
摘要:
Under the present invention, it is determined whether sufficient resources exist for deploying a platform dependent application on its specific “native” platform in a grid environment. If not, a platform dependent portion of the application is identified, and the application is split into the platform dependent portion and a platform independent portion. Thereafter, the platform dependent portion is deployed on its corresponding native platform, while the platform independent portion is deployed on another platform in the grid environment based on available resources. Interconnections between the two portions can then be automatically generated. This can include, for example, creating remote method invocation facade interfaces, creating remote method invocation-enabled facade classes, and building a remote method invocation server for the first platform.
摘要:
Under the present invention, a stability and updateability (SUP) ratio for a grid computing environment is generated. Thereafter, a size of a set (e.g., at least one) of scale free graphs for the grid computing environment is estimated. Then, based on at least one predetermined parameter such as a quantity of nodes in the grid computing environment, the set of scale free graphs is actually generated. Based on the set of scale free graphs a set of perturbed scale free graphs is generated. In one example, this may be accomplished using a preferential rewiring technique. This process is repeated for each of the monitoring and discovery services, which will yield at least two sets of perturbed scale free graphs. Using these sets of graphs, a set of monitoring and discovery service (MDS) topology graphs for the grid computing environment will be generated and deployed for optimization.
摘要:
A method for voice browsing an integrated voice response server is described. The method includes visually displaying a representation of a choice tree for a service, where the service includes an audio menu of available actions. A selection of an action displayed in the representation is received. The method also includes automatically navigating the audio menu in order to initiate the selected action. Apparatus and computer readable media are also described.
摘要:
Disclosed is a method, system and a computer program for correlating an incident service ticket with an incident resource ticket. The method includes, in response to a creation of an incident service ticket in a certain service category; searching with a data processor for open incident resource tickets of the same or similar category; searching with the data processor based on a set of similarity rules for corresponding critical configuration items defined in business service configuration items and, if both searches succeed, searching with the data processor found incident resource tickets ordered by time using found critical configuration items and, if a match is found, declaring the incident service ticket to be correlated with the matching incident resource ticket. The exemplary embodiments further provide that, if both searches do not succeed, or if a match is not found, obtaining input from a dependency tree for the business service configuration items and if no related service configuration items for the service category are identified then concluding the performance of the method, otherwise searching with the data processor found incident resource tickets ordered by time using found related service configuration items. If no associated resource tickets are available then the method performs constraint adaptive probing of resources determined from the dependency tree to attempt to generate at least one corresponding resource ticket, and to search on any corresponding resource tickets that are generated for related configuration items.
摘要:
Techniques are provided for globalizing handling of service management items. The techniques include obtaining a service management item in a language convenient to a first of two or more actors, translating the service management item into a language-neutral format to obtain a language-neutral service management item, applying one or more annotators to the service management item, translating the language-neutral service management item into a language convenient to a second of two or more actors acting on the service management item, and routing the translated service management item to the second of two or more actors. Techniques are also provided for generating a database of service management items in a language-neutral format.
摘要:
Test characteristics are determined at vertices of a rectangle defined on a sequential probability ratio test plot of a number of failures of a new physical system versus a number of failures of a baseline physical system. Based on the test characteristics, errors of first and second order are approximated as planes. Based on the approximating, intercepts of accept and reject boundaries are estimated. Based on slopes of the planes and actual values of the errors of the first and second orders, a starting point is determined on a graph of values of an intercept of the reject boundary and values of an intercept of the accept boundary. A minimum of an operating characteristic function is determined by alternative advances, commencing at the starting point, parallel to an axis representing the accept boundary intercept and an axis representing the reject boundary intercept.
摘要:
A system and method are provided for adaptive approximating of a user for role authorization in a hierarchical inter-organization model. The system includes an authorization redirector for receiving a request for an access control decision for a user. The system further includes an adaptive authorizer for dynamically determining, at run-time, a user role approximation for the user responsive to the request. The user role approximation is based on at least one of a system state and a system goal corresponding to a hierarchical inter-organizational model.
摘要:
A method for creating and using a short-hand interpretation dictionary in a collaboration environment includes creating or editing a document in a collaboration environment, said document comprising at least one short-hand notation; and replacing the at least one short-hand notation with an interpretation from at least one short-hand dictionary.
摘要:
The present invention is a method and apparatus for safe ontology reasoning. In one embodiment, a method for building safe sub-ontology that includes one or more elements of a given ontology includes designating at least one the elements as a sensitive element, where a sensitive element is an element not to be revealed. The method then designates a safe sub-ontology such that the safe sub-ontology does not include any elements that, alone or in combination, allow inference of a sensitive element, in accordance with one or more given inference rules. In another embodiment, a method for building a potential sub-ontology includes designating at least one of the elements as a sensitive element and including a maximal number of the elements in the potential sub-ontology, wherein the maximal number includes the greatest number of elements that can be revealed, cumulatively, without allowing inference of a sensitive element, in accordance with one or more given inference rules.