Abstract:
A computer-implemented method of obfuscating communication traffic patterns occurring over a cloud-based communication infrastructure includes detecting first data communication sessions between a first communications device a second communications device via a first computer server using a network protocol. An information content threshold value associated with the first data communication sessions is accessed. A traffic pattern based on the first data communication sessions is also accessed, whereby the traffic pattern determines communication occurrences between the first and the second communication devices over a predefined time period. An information content value associated with the accessed traffic pattern is determined. Using the network protocol, the first data communication sessions via the first computer server is re-routed to a second data communication session via a second computer server based on a detection of the information content value associated with the accessed traffic pattern exceeding the information content threshold value.
Abstract:
One embodiment provides a method for ensuring device security via swipe pattern recognition, the method comprising: utilizing at least one processor to execute computer code that performs the steps of: receiving, using a touch device, at least one swipe input of a user; determining, using the at least one processor, if the at least one swipe input matches a known swipe pattern of the user, the match requiring exceeding a match confidence level; and responsive to said determining, executing an action associated with the touch device. Other aspects are described and claimed.
Abstract:
A computer-implemented method, system, and/or computer program product controls a driving mode of a self-driving vehicle (SDV). Sensor readings describe a current condition of a roadway, which is part of a planned route of a self-driving vehicle (SDV). One or more processors compare a control processor competence level of the on-board SDV control processor that autonomously controls the SDV to a human driver competence level of a human driver in controlling the SDV under the current condition of the roadway. One or more processors then selectively assign control of the SDV to the on-board SDV control processor or to the human driver based on which of the control processor competence level and the human driver competence level is relatively higher to the other.
Abstract:
A computer-implemented method, system, and/or computer program product controls a driving mode of a self-driving vehicle (SDV). Sensor readings describe a current condition of a roadway, which is part of a planned route of a self-driving vehicle (SDV). One or more processors compare a control processor competence level of the on-board SDV control processor that autonomously controls the SDV to a human driver competence level of a human driver in controlling the SDV under the current condition of the roadway. One or more processors then selectively assign control of the SDV to the on-board SDV control processor or to the human driver based on which of the control processor competence level and the human driver competence level is relatively higher to the other.
Abstract:
A computer-implemented method causes a self-driving vehicle (SDV) to avoid a physical encounter with an animal. One or more sensors on a self-driving vehicle (SDV) capture a description of an environment around an animal that the SDV is approaching. A camera captures an image of the animal that the SDV is approaching. An SDV on-board computer on the SDV determines an animal type of the animal based on the captured image of the animal, and then predicts a direction and speed of movement of the animal based on the animal type of the animal and the captured description of the environment of the animal. The SDV on-board computer then determines a probability of a physical encounter between the SDV and the animal, and adjusts the speed and direction of the SDV accordingly in order to reduce a likelihood of the SDV striking the animal.
Abstract:
Providing admission control for a request may comprise creating a process flow associated with the request, the process flow identifying a plurality of computer-implemented components and a flow of transactions occurring between the computer-implemented components; executing the flow of transactions on the plurality of computer-implemented components; monitoring the flow of transactions to detect a problem in the flow; responsive to not detecting a problem in the flow, allowing the request to proceed; and responsive to detecting a problem in the flow, not allowing the request to proceed.
Abstract:
A computer implemented method, computer system, and computer program product performs a query on a relational database. When a query is received, a corresponding complexity class is determined for the query. The query is routed to a corresponding query processor based on the corresponding complexity class determined for the submitted query. The query is executed on the corresponding query processor according to a determined execution plan.
Abstract:
Sanitizing a virtual machine image of sensitive data is provided. Labeling dependencies and sanitization dependencies between a plurality of software components in the virtual machine image are identified based on labeling execution policies located in a labeler module and sanitization execution policies located in a sanitizer module, respectively. The labeler module and the sanitizer module are inserted in the virtual machine image. A sensitivity level label of a plurality of sensitivity labels is attached to identified sensitive data from the sensitive data contained in the virtual machine image based on the identified labeling dependencies. In response to receiving an input to perform a sanitization of the identified sensitive data having attached sensitivity level labels contained in the virtual machine image, the sanitization of the identified sensitive data having the attached sensitivity level labels contained in the virtual machine image is performed based on the identified sanitization dependencies.
Abstract:
A method of automatic security parameter renewal includes determining if a security parameter satisfies a renewal condition, and automatically updating the security parameter when the renewal condition is satisfied. The automatically updating the security parameter includes modifying a certificate in dependent components of an application of the security parameter, by a central certification server, upon receipt of a new certificate.
Abstract:
Providing admission control for a request may comprise creating a process flow associated with the request, the process flow identifying a plurality of computer-implemented components and a flow of transactions occurring between the computer-implemented components; executing the flow of transactions on the plurality of computer-implemented components; logging the flow of transactions; monitoring the flow of transactions to detect a problem in the flow or one or more of the components, or combination thereof; responsive to not detecting a problem in the flow or one or more of the components, or combination thereof, allowing the request to proceed; and responsive to detecting a problem in the flow or one or more of the components, or combination thereof, not allowing the request to proceed.