Abstract:
A method prevents a cascading failure in a complex stream computer system. The method includes receiving binary data that identifies multiple subcomponents in a complex stream computer system. These identified multiple subcomponents include upstream subcomponents that generate multiple outputs and a downstream subcomponent that executes a downstream computational process that uses the multiple outputs. The method dynamically adjusts which of multiple inputs are used by the downstream subcomponent in an attempt to generate an output from the downstream subcomponent that meets a predefined trustworthiness level for making a first type of prediction. If no variations of execution of one or more functions used by the downstream subcomponent ever produce an output that meets the predefined trustworthiness level for making a first type of prediction, then computer hardware executes a new downstream computational process that produces a different second type of prediction.
Abstract:
A processor-implemented method, system, and computer program product guides mobility-impaired pedestrians. A processor receives mobile tracking readings from each of multiple mobility assistance devices, and identifies pedestrian routes taken by the mobility assistance devices to a desired destination. The processor identifies multiple routes, each of which has more mobile tracking readings than other pedestrian routes. The processor associates a recurring public event to times during which mobile tracking readings were taken to a first pedestrian route, and associates a lack of the recurring public event to times during which mobile tracking readings were taken to a second pedestrian route. If the recurring public event is currently in progress along the first pedestrian route, then the processor transmits directions that describe the second pedestrian route at which the public event is not occurring.
Abstract:
A smart card comprises: a processing circuit; a memory that contains a protected object; an activity detector that receives a signal that describes a planned activity of a person who is in physical possession of the smart card; and an activity analyzer that evaluates features of the planned activity. In response to the activity analyzer determining that a predefined risk associated with the planned activity exceeds a predetermined value, the activity analyzer: issues an instruction to the person who is in physical possession of the smart card to provide a biomarker to a biosensor that is physically contained within the smart card; and receives, from the biosensor, real-time biometric data for the person who is in physical possession of the smart card.
Abstract:
A method, system, and/or computer program product allocates computer processing work. One or more processors identify: an input data that is stored in a first computer for processing by a computer program; a virtual machine, stored in a second computer, that is capable of executing the computer program; a first set of constraint rules against moving the input data from the first computer; and a second set of constraint rules against moving the virtual machine from the second computer. The one or more processors assign a weight to each constraint rule, and sum the weight of all constraint rules that are applicable. In response to the first total constraint rule weight exceeding the second total constraint rule weight, movement of the input data from the first computer to the second computer is prohibited and the virtual machine is moved from the second computer to the first computer.
Abstract:
A processor-implemented method, system, and/or computer program product generates and utilizes a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects. A non-contextual data object is associated with a context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is associated with at least one specific data store, which includes data that is associated with data contained in the non-contextual data object and the context object. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is constructed for handling requests for data stores. Synthetic context-based objects within a same dimension of the object library share data from a same context object and disparate data from different non-contextual data objects.
Abstract:
A method, system, and/or computer program product securely generates and/or manages a virtual card on a mobile device. The mobile device receives a protected application, which initially cannot be accessed by an operating system for execution by a processor. The mobile device also receives a security object, which is used to convert the received protected application into an executable application that can be utilized by the operating system for execution by the processor. The executable application is then executed by the processor to act as a virtual card, which provides a functionality of a predefined physical electronic or magnetic-stripe card.
Abstract:
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data, including a time window for receipt and security level of the requester, is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object, the first synthetic context-based object, and the security level of the requester, then the data is returned to the requester.
Abstract:
A processor-implemented method, system, and/or computer program product defines multiple context-based data gravity wells on a context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-based objects are parsed into an n-tuple that includes a pointer to one of the non-contextual data objects, a probability that a non-contextual data object has been associated with a correct context object, and a weighting factor of importance of the synthetic context-based object. A virtual mass of each parsed synthetic context-based object is calculated, in order to define a shape of multiple context-based data gravity wells that are created when synthetic context-based objects are pulled into each of the context-based data gravity well frameworks on a context-based data gravity wells membrane.
Abstract:
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object and the first synthetic context-based object, then the data is returned to the requester.
Abstract:
A method, system, and/or computer program product evaluates a real-time condition of a construct of a roadway. A processor receives a set of roadway acoustic sound patterns from a mobile microphone that is mounted on a terrestrial vehicle as it travels along a roadway. This set of roadway acoustic sound patterns is created by a physical contact between a roadway surface of the roadway and a tire on the terrestrial vehicle. The processor also receives a set of transient data from a probe on the terrestrial vehicle. This transient data describes a real-time transient environmental condition at the roadway. The set of roadway acoustic sound patterns and the set of transient data are input into an analysis algorithm to determine a real-time physical condition of a construct of the roadway. Data describing the real-time physical condition of the construct of the roadway is then transmitted to a remote computer.