Abstract:
A method for profiling performance of a system includes steps of: monitoring execution of the system at multiple points during the system's operation; analyzing results derived from the monitoring in order to provide analyzed results; reconfiguring the monitoring non-uniformly according to the analyzed results; and repeatedly performing iterations of the above steps until a particular event occurs. The iterations may be terminated upon: reaching a specified level of analysis precision, determining a source of one or more performance bottlenecks, determining a source of unexpectedly high output or low completion time, completing a predefined number of iterations, reaching an endpoint of an application, or having performed iterations for a specified period of time.
Abstract:
A system for optimizing at least one of a design, production, or testing process of a product in a mass manufacturing process includes: a central processing unit; a network interface operatively connected to the central processing unit; a storage device; a memory including logic for execution by the central processing unit, wherein the logic includes: a server handler made up of a client applet and a client interface servlet which are configured for enabling authorized end-user communication; an error data collection handler configured for gathering error data; an error data classification handler; an analysis handler; a suggested actions report handler; and the system further includes a server database configured for storing, modifying, and deleting data.
Abstract:
A system and method for processing a request by a first control service using a first control specification language, and a second control service using a second control specification language includes steps of: receiving the request from a requestor; providing the request to the first and second control services; receiving a decision on the request from each of the first and second control services; and comparing the decisions. The first control specification language is an access control policy.
Abstract:
A method to create an instance of a defect-based production and testing process analysis machine (DPTPAM) provides continual process improvement based on foundational questions and classified defect data. The method includes the following steps: obtaining domain specific questions; developing a domain specific classification scheme that supports the answering of the foundational and domain specific questions; determining a method of using the domain specific classification scheme to answer both the foundational and domain specific questions; and creating a domain specific DPTPAM instance embodying the domain specific classification scheme and the method of answering the foundational and domain specific questions. The method can be implemented with a machine and a computer readable medium comprising logic for performing the method.
Abstract:
A system and method for correcting mispositioning of an aiming device including extracting features from an information stream which includes position information for an aiming device and comparing the features with feature profiles to determine modifications to remediate mispositioning actions. The information stream with the modifications is provided as a basis for actions of the aiming device.
Abstract:
A method and system provides collaborative caching of transformed Web objects in a proxy network. The proxies collaboratively provide a set of object transformations by partitioning the different types of object transformations, and caching the transformed Web objects among proxies in order to reduce duplicate object transformation and caching effort. The transformations may include language translations, currency conversions, units of measure conversions, shipping cost calculations and sales taxes calculations. Other transformations are also possible.
Abstract:
A multimedia stream is multicasted. A request to perform the multicast is received. A plurality of distribution nodes are assigned to provide the multicast to a plurality of receivers. The assignment of a node is based on the transformation capabilities of that node. The multicast is then performed and the assigned node performs its transformation. The transformed multicast is distributed to a receiver which is suitable for receiving the transformed multicast.
Abstract:
A method and system of collaboratively caching information to allow improved caching decisions by a lower level or sibling node. In a caching hierarchy, the client and/or servers may factor in the caching status at the higher level in deciding whether to cache an object and which objects are to be replaced. The PICS protocol may be used to pass the caching information of some or all the upper hierarchy down the hierarchy. Furthermore, the caching status information can also be used to direct the object request to the closest higher level proxy which has potentially cached the object, instead of blindly requesting it from the next immediate higher level proxy. A selection policy used to select objects for replacement in the cache may be prioritized not only on the size and the frequency of access of the object, but also on the access time required to get the object if it is not cached. The selection policy may also include a selection weight factor wherein each object is assigned a selection weight based on its replacement cost, the object size and how frequently it is modified. Non-uniform size objects may be classified in ranges of selection weights having geometrically increasing intervals. Multiple LRU stacks may be independently maintained wherein each stack contains objects in a certain range of selection weights. In order to choose candidates for replacement, only the least recently used objects in each group need be considered.
Abstract:
Methods of detecting, and providing a notification of, the existence of misinformation using usage patterns of a network service enable an organization to respond to the misinformation. The method includes establishing common usage patterns of the network service, identifying an irregular usage pattern, determining that the irregular usage pattern was caused by misinformation, and responding to the misinformation.
Abstract:
A system and method for processing a request by a first control service using a first control specification language, and a second control service using a second control specification language includes steps of: receiving the request from a requestor; providing the request to the first and second control services; receiving a decision on the request from each of the first and second control services; and comparing the decisions. The first control specification language is an access control policy.