Abstract:
A method, system, and/or computer program product stores and retrieves payload data using a ternary content addressed memory (TCAM) hybrid memory. TCAM data is transmitted to a context masking device. The TCAM data identifies a type of payload data, and the context masking device masks the TCAM data with a context mask to create a masked TCAM data. One or more processors append the masked TCAM to payload data to create multiple stored units of TCAM-identified payload data in a location addressable store (LAS). The processor(s) receive a request for data. The request includes a masked request TCAM data that identifies a content and context of requested data. An exclusive OR (XOR) chip identifies relevant payload data within the LAS that are within a predefined Hamming distance of the masked request TCAM data. The processor(s) return the relevant payload data within the LAS to the requester.
Abstract:
A processor-implemented method, system, and/or computer program product mitigate subjectively disturbing content. A context-based data gravity wells membrane supports one or more gravity wells, which hold subjectively disturbing synthetic context-based objects made up of a non-contextual data object, a first context object, and a second context object. The first context object defines the non-contextual data object, and the second context object describes how subjectively disturbing content generated by combining the non-contextual data object and the first context object is according to predefined parameters described by the second context object. New content is passed across the context-based data gravity wells membrane. Subjectively disturbing content from the new content is trapped by the context-based data gravity well in response to a non-contextual data object and context objects from the new content matching those of the context-based data gravity well, thereby reducing a level of subjective discomfort imposed by the new content.
Abstract:
A method, system, and/or computer program product allocates computer processing work. One or more processors identify: an input data that is stored in a first computer for processing by a computer program; a virtual machine, stored in a second computer, that is capable of executing the computer program; a first set of constraint rules against moving the input data from the first computer; and a second set of constraint rules against moving the virtual machine from the second computer. The one or more processors assign a weight to each constraint rule, and sum the weight of all constraint rules that are applicable. In response to the first total constraint rule weight exceeding the second total constraint rule weight, movement of the input data from the first computer to the second computer is prohibited and the virtual machine is moved from the second computer to the first computer.
Abstract:
A scoped search engine is disclosed. The scoped search engine includes a memory unit storing reference data records. The scoped search engine also includes a data comparison unit that searches the reference data records using different searches. The scoped search engine further includes a match analysis unit that combines result data from the different searches and determines a scope for a subsequent search based on the combined result data.
Abstract:
A method, system, and computer program product for minimizing surprisal context data. The method comprising the steps of: identifying characteristics of a data event; receiving an input of rank of at least two identified characteristics of the data event; the computer generating a hierarchy of ranked, identified characteristics based on the rank of the at least two identified characteristics of the data event; and comparing the hierarchy of ranked, identified characteristics to a repository of reference artifacts arranged in characteristic context patterns. If at least one reference artifact arranged in characteristic context patterns from the repository matches the hierarchy of ranked, identified characteristics, the characteristic context pattern is stored as a surprisal context filter and compared to a data input of data events to detect anomalous events.
Abstract:
A processor-implemented method, system, and/or computer program product defines multiple security-enabled context-based data gravity wells on a security-enabled context-based data gravity wells membrane. Non-contextual data objects are associated with context objects to define synthetic context-based objects. The synthetic context-based objects are associated with one or more security objects to generate security-enabled synthetic context-based objects, which are parsed into an n-tuple that includes a pointer to one of the non-contextual data objects, a probability that a non-contextual data object has been associated with a correct context object, probability that the security object has been associated with a correct synthetic context-based object, and a weighting factor of importance of the security-enabled synthetic context-based object. A virtual mass of each parsed security-enabled synthetic context-based object is calculated, in order to define a shape of multiple security-enabled context-based data gravity wells that are created when security-enabled synthetic context-based objects are pulled in.
Abstract:
A sensor system comprises: an energy storage device electrically coupled to an intermittent energy release device that causes the energy storage device to release stored energy intermittently; a sensor electrically coupled to the energy storage device, where the sensor detects physical events occurring at a physical device and is intermittently powered by electrical energy received from the energy storage device; a synaptic neural network core electrically coupled to the sensor, where the synaptic neural network core converts sensor readings into an object that describes the physical events occurring at the physical device; a transponder electrically coupled to the synaptic neural network core; and a storage buffer within the transponder, where the storage buffer stores the object for transmission from the transponder to a monitoring system, where the intermittent energy release device provides power to the sensor in response to the transponder transmitting the object to the monitoring system.
Abstract:
A system is provided for inferring sensor topology in a structure. The system includes a receiver, a server communicatively coupled to the receiver and a sensor topology engine communicatively coupled to the receiver and the server. The receiver is configured to receive identification information that sensors have been and deployed throughout the structure to sense a presence of an operator and to receive sensor readings from the sensors and couple the sensor readings to the sensor topology engine. The sensor topology engine is further configured analyze the identification information and the sensor readings to infer zones of the multiple spaces in which the presence of the operator is sensed by at least one of the sensors, borders of each of the zones, and dead zones adjacent to one or more of the zones in which the presence of the operator is not sensed and build a topological graph.
Abstract:
A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to how many parsed synthetic context-based objects are pulled into the particular context-based conformed dimensional data gravity well.
Abstract:
A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document, which contains multiple instances of the non-contextual data object, according to a profile of a particular user. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with a data store in a data structure that contains heterogeneous data stores having different formats. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is then constructed for handling requests for data stores from the particular user.