摘要:
A certain process included in a first execution space requests a local resource manager to allocate a resource. The local resource manager obtains the authentication ID of the process issuing the request and determines whether or not the resource can be allocated. If the resource can be allocated and the resource previously secured in the execution space can suffice the request, the local resource manager allocates the resource to the process. If the resource is insufficient, the local resource manager requests a global resource manager to allocate the resource. The global resource manager obtains the authentication ID of the first execution space issuing the request and determines whether or not the resource can be allocated. If it is determined that the resource can be allocated, the resource is allocated to the first execution space.
摘要:
A certain process included in a first execution space requests a local resource manager to allocate a resource. The local resource manager obtains the authentication ID of the process issuing the request and determines whether or not the resource can be allocated. If the resource can be allocated and the resource previously secured in the execution space can suffice the request, the local resource manager allocates the resource to the process. If the resource is insufficient, the local resource manager requests a global resource manager to allocate the resource. The global resource manager obtains the authentication ID of the first execution space issuing the request and determines whether or not the resource can be allocated. If it is determined that the resource can be allocated, the resource is allocated to the first execution space.
摘要:
In FIG. 2, a process (32) included in a first execution space (20a) issue a request of resource assignment to a local resource management part (46), which then acquires an authentication ID of the requesting process (32) and determines whether the resource assignment can be performed. If the resource assignment can be performed and resources held beforehand in the first execution space (20a) can fulfill the request, then the local resource management part (46) performs the resource assignment to the process (32). If the resources cannot fulfill the request, the local resource management part (46) issues the request of resource assignment to a global resource management part (56), which then acquires the authentication ID of the requesting first execution space (20a) and determines whether the resource assignment can be performed. If determining that the resource assignment can be performed, the global resource management part (56) performs the resource assignment to the first execution space (20a).
摘要:
A device control apparatus, comprising a processor for storing first key information, a memory section for storing encrypted second key information which is obtained by encrypting second key information such that the second key information is able to be restored through decryption using the first key information, and an interface section for carrying out authentication using the second key information when an access instruction requiring access to a device is given by the processor, and for controlling the access to the device based on the access instruction when the authentication is established.
摘要:
A device control apparatus, comprising a processor for storing first key information, a memory section for storing encrypted second key information which is obtained by encrypting second key information such that the second key information is able to be restored through decryption using the first key information, and an interface section for carrying out authentication using the second key information when an access instruction requiring access to a device is given by the processor, and for controlling the access to the device based on the access instruction when the authentication is established.
摘要:
A program capable of protecting private data with a small processing amount appropriately with high reliability, by which a server apparatus transmits hash data of an booted program to a client apparatus, the client apparatus transmits the hash data and encoded private data to the server apparatus after negotiation, and the server apparatus performs matching of the hash data to use the private data.
摘要:
A method and composition for increasing body weight and stimulating the immune systems of domestic animals, poultry and fish are disclosed. In the method of the present invention, bacterial and yeast cells from which capsules have been removed are given to the domestic animals, poultry or fish.
摘要:
A method of enhancing the ability of cattle and swine to resist diseases caused by microorganisms which comprises the steps of adding an antimicrobial effective amount in a range of 0.01 to 0.2% by weight of bile powder to a livestock feed and administering the livestock feed prepared to the cattle and swine. The method may also comprise adding a pharmaceutical effective amount of one of the following: licorice, garlic or quillaja powders or extracts thereof to the livestock feed.