Abstract:
Systems and methods are provided for detecting malicious behavior in mobile ad-hoc wireless networks. The mobile ad-hoc network contains a plurality of actual nodes and a plurality of decoys that are derived from the actual nodes using duplicate instances of the operational software of the actual nodes in combination with a virtual interconnection topology created to make the decoys appear as actual nodes within the mobile ad-hoc network. The interconnection topology includes routing characteristics indicating that the most efficient path of communication to any given decoy is through at least one actual node in the network. The decoys are used to identify malicious behavior in the network and in particular to identify attempt to communicate directly with decoys in contradiction to the created interconnection topology. When the malicious behavior is associated with an identifiable node, corrective action is taken that includes quarantining that node from the other nodes in the network.
Abstract:
The invention is directed to user-friendly multi-lingual text entry using a dynamically reconfigurable keyboard. A method for dynamically reconfiguring a keyboard according to an embodiment of the invention includes: displaying a first set of characters on the keyboard; providing language settings to an upper level system manager of a keyboard driver; communicating reconfiguration information corresponding to the language settings from the upper level system manager of the keyboard driver to a lower level device driver of the keyboard driver; and dynamically reconfiguring the keyboard to display a second set of characters.
Abstract:
A method, system and computer program product for generating documentation of a customized execution of a task of a process are disclosed. A documentation program is associated with the task. When the task is executed, an execution time of the task execution is detected, which triggers an execution of the documentation program. In the case that a process includes multiple tasks, documentation of the multiple tasks is generated in an order based on the detected execution times of the multiple tasks within the process.
Abstract:
An adaptive data replication and caching system configured to enforce service terms at the network edge. Service terms can include, but are not limited to established quality of service (QoS) terms, as well as the terms of a service level agreement (SLA). This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system based upon the service terms.
Abstract:
A computer-implemented method, system, and program product for optimizing a distributed (software) application are provided. Specifically, a configuration of a target computing environment, in which the distributed application is deployed, is discovered upon deployment of the distributed application. Thereafter, based on a set of rules and the discovered configuration, one or more optimization techniques are applied to optimize the distributed application. In a typical embodiment, the set of rules can be embedded in the distributed application, or they can be accessed from an external source such as a repository. Regardless, the optimization techniques applied can include at least one of the following: (1) identification and replacement of an underperforming component of the distributed application with a new component; (2) generation of interface layers (to allow selection of optimal bindings) between distributed objects of the distributed application; and/or (3) execution of code transformation of the distributed application using program analysis techniques.
Abstract:
The present invention provides a method and system for disseminating urgent public announcements over an IP-based network. One or a plurality of Internet- or Intranet-connected servers receive and store data identifying particular geographic locations to current announcements. The servers identify IP addresses of users making URL requests or requests for target applications (an access point by which a network-connectable mobile device is connected to an Internet- or Intranet-connected server), determine a location for each user from the user's IP address (or access point), and determine whether an IP address (or access point) of a user corresponds to a location for which an announcement has been posted. If the user is identified to a location for which a current announcement is available, the announcement is displayed to the user. The announcement may be displayed by redirecting the user to a web page containing the announcement. Alternatively, the announcement may be displayed in a pop-up window or in a banner on a web page requested by said user. A banner displaying such an announcement may incorporate a link to permit the user to click through to a web page containing a more detailed version of the announcement.
Abstract:
Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported.
Abstract:
A method for reducing bandwidth used in multiple transmissions on a cellular network includes mapping at least one request of at least one end-device to a unicast channel between server and an intermediary in the network, creating a correlated multicast communication channel between the intermediary and the at least one end-device, and transferring data from the unicast channel to a multicast channel at the intermediary.
Abstract:
Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.
Abstract:
A method for scheduling a sequential transmission of a plurality of packets includes estimating a time when each of the plurality of packets waiting to be transmitted will be used by a device targeted to receive the plurality of packets, and mapping the time of each of the plurality of packets to a prioritization among the plurality of packets.