摘要:
An enterprise content management system such as an electronic contract system manages a large number of secure documents for many organizations. The search of these private documents for different organizational users with role-based access control is a challenging task. A content-based extensible mark-up language (XML)-annotated secure-index search mechanism is provided that provides an effective search and retrieval of private documents with document-level security. The search mechanism includes a document analysis framework for text analysis and annotation, a search indexer to build and incorporate document access control information directly into a search index, an XML-based search engine, and a compound query generation technique to join user role and organization information into search query. By incorporating document access information directly into the search index and combining user information in the search query, search and retrieval of private contract documents can be achieved very effectively and securely with high performance.
摘要:
A correlation-based service mediator consists of Semantic Query Generator, Service Query Manager, Service Invocation Flow Generator, Service Invocation Manager, Expression Interpreter and Service Invocation Result Cache. The Semantic Query Generator handles service requests. It generates Semantic Query statements. Basically, the generator converts service request to Semantic Query based on input/output parameters in the service request. The Service Query Manager interfaces with an Ontology Engine, in order to execute the semantic queries. It will pass the query results to Service Invocation Flow Generator. The Service Invocation Flow Generator creates service invocation flow definition based on query results passed from Service Query Manager. The Service Invocation Manager executes the flow definitions. It also manages a service invocation result cache, so that invocation results can be saved and reused for later service request. When the execution results are not available in cache, the Service Invocation Manager invokes service according to flow definition. It should be noted that when attribute dependent functions are invoked Expression Interpreter compute the execution results. The service mediator possesses two major functionalities: service matching and service invocation.
摘要:
A correlation-based service mediator consists of Semantic Query Generator, Service Query Manager, Service Invocation Flow Generator, Service Invocation Manager, Expression Interpreter and Service Invocation Result Cache. The Semantic Query Generator handles service requests. It generates Semantic Query statements. Basically, the generator converts service request to Semantic Query based on input/output parameters in the service request. The Service Query Manager interfaces with an Ontology Engine, in order to execute the semantic queries. It will pass the query results to Service Invocation Flow Generator. The Service Invocation Flow Generator creates service invocation flow definition based on query results passed from Service Query Manager. The Service Invocation Manager executes the flow definitions. It also manages a service invocation result cache, so that invocation results can be saved and reused for later service request. When the execution results are not available in cache, the Service Invocation Manager invokes service according to flow definition. It should be noted that when attribute dependent functions are invoked Expression Interpreter compute the execution results. The service mediator possesses two major functionalities: service matching and service invocation.
摘要:
Illustrative embodiments disclose a computer process controlling access to one or more documents by one or more parties, the parties organized over one or more organizations. In response to a party associated with a first organization attempting to access documents, determining an access level associated with the party as a first access level, a second access level, a third access level, or a fourth access level. The first, second, third and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. In response to determining the access level associated with the party, permitting the party to access the documents, or preventing the party from accessing the documents, according to the access level associated with the party.
摘要:
An RF/ID interrogator recovers a backscattered data signal from a moving RF/ID transponder by combining the received in-phase (I) and quadrature-phase (Q) components of the signal in a manner that cancels out the amplitude nulls and phase reversals caused by movement of the RF/ID transponder. More particularly, the RF/ID interrogator comprises a radio having a transmitter portion to provide an RF carrier signal and a receiver portion to receive the I and Q signals from the RF transponder. A bandpass filter is coupled to the radio to remove direct current (DC) components from the I and Q. A processor coupled to the radio and the filter executes stored instructions to combine the filtered I and Q signals and recover the original backscattered data signal therefrom. In an embodiment of the invention, the processor estimates a phase angle .beta.(t) between the I and Q signals and the RF carrier by calculating an arctangent of a ratio of the filtered Q and I signals. Thereafter, the processor recovers the backscattered data signal by summing a product of the filtered I signal and the cosine of the estimated phase angle .beta.(t) with a product of the filtered Q signal and the sine of the estimated phase angle .beta.(t).
摘要:
Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.
摘要:
A wireless key is signal, having a key-specific identifier, is received, the key-specific identifier detected, and the signal transmission location is calculated. The signal transmission location is stored based on the detected key-specific identifier. Another instance of the same wireless key signal is received, its key-specific identifier is detected, and the stored signal transmission location is retrieved based on the detected key-specific identifier. Optionally, a wireless key signal is received at a user and repeated at a plurality of locations in a parking facility. A vehicle response is detected, and associated with one of the repeatings of the wireless key signal. A location of the vehicle response is detected based on the repeating with which it is associated.
摘要:
A method, system and computer readable medium for maximizing the performance of a computer system that includes at least one computing unit. Temperature and location data for each computing unit is received by a server unit and the location of each computing unit within a given environment is reevaluated and revised to maximize the overall performance of the computer system.
摘要:
Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.
摘要:
A method for customizing virtual machines includes retrieving a virtual machine image file from a library of virtual machine image files. A target virtual machine image file is created by making a copy of the retrieved virtual machine image file. A file size of the target virtual machine image file is increased. A partition size of a primary partition of the target virtual machine image file is increases. The target virtual machine image file is booted after the partition size of the primary partition thereof has been increased.