摘要:
A data transmitter divides incoming data for transmission into data blocks and passes them in frame transmission order to a radio link stage via a serial frame buffer. The buffer holds the data frames until the radio link stage is able to transmit them. The incoming data has associated with it various parameters. The radio link stage has allocated to it radio link resources. The parameters and resources, which change independently of each other from time to time, are supplied to a controller which calculates high and low buffer levels therefrom. The controller controls the passing of the data frames through the frame buffer to maintain the number of frames in the buffer at any instant of time at a level between the calculated high and low levels.
摘要:
A system and method to collaborate participants of different administrative domains in a workflow process is provided. The system includes a membership module for managing the participants, an event module for correlating activities of the workflow process, the membership module and the event module exchanging information relating to changes in the participants and the activities of the workflow process. The membership module for managing the participants includes registering, identifying, adding, querying and modifying the participants. On the other hand, the event module for correlating activities of the workflow process further includes specifying, executing and terminating the activities.
摘要:
A method and a system are described that involve autonomic provisioning of hosted applications with level of isolation terms. In one embodiment, the system includes an infrastructure registry to provide a set of heterogeneous infrastructure resources, an autonomic provisioning service unit to select a subset of the heterogeneous infrastructure resources, (the subset of resources to fulfill a service level agreement (SLA) with a corresponding level of isolation), and a monitoring unit to collect information about the subset of resources and send the collected information to the autonomic provisioning service unit.In another embodiment, the method includes providing a set of heterogeneous infrastructure resources, selecting a subset of the set of heterogeneous infrastructure resources, the subset of heterogeneous infrastructure resources is defined in a configuration template to fulfill a service level agreement (SLA) with a corresponding level of isolation, and allocating the subset of infrastructure resources in the registry.
摘要:
A system architecture and algorithm for automatically generating, installing and enforcing access control policies that correspond to an agreed specification of collaboration. A collaboration member enforces its access control policies using a dedicated access controller separate from a workflow engine. In one embodiment, each access control policy contains extensions which can direct an access controller to selectively enable or disable various access control policies upon authorization of an access request.
摘要:
The present invention relates to chalcone and chalcone derivatives and analogs which are useful as angiogenesis inhibitors. The present compounds, which are inexpensive to synthesize, exhibit unexpectedly good activity as angiogenesis inhibitors. The present invention also relates to the use of chalcone and its analogs as antitumor/anticancer agents and to treat a number of conditions or disease states in which angiogenesis is a factor, including angiogenic skin diseases such as psoriasis, acne, rosacea, warts, eczema, hemangiomas, lymphangiogenesis, among numerous others, as well as chronic inflammatory disease such as arthritis.
摘要:
Techniques for providing application layer security may be facilitated by an arbitrator. In general, in one implementation, an arbitrator may receive a security tender including security requirements for an application, search for security services to fulfill the security requirements, determine whether discovered security services can satisfy the security requirements, and, if security services that can satisfy the security requirements exist, generate a security contract for the application, the security contract specifying how the application is to communicate with the security services that can satisfy the security requirements.
摘要:
In one embodiment the fastening of a detachable panel can be seen in, an assembly comprising a fastener 28, a panel 10 and a supporting structure 12. The panel 10 and a flange 14 of the supporting structure 12 are formed with respective tapered holes 22,24 which receive the fastener 28, the taper of one hole being a continuation of the taper of the other. The fastener 28 is secured to the flange 12 and urges a tapered surface 32 of the fastener 28 into the tapered holes 22, 24 in a non-jamming manner thereby locating the panel 10 with respect to the flange 12 and hence with respect to the supporting structure 14.
摘要:
A trust look-up protocol is described that allows a meta-trusted third party, or trust directory, to mediate between parties of potential business collaborations and trusted third parties that are counted on to authorize or otherwise validate the business collaborations. The trust directory receives a trust request for a collaboration from one or more parties, and, based on the request, determines a specialty of a trusted third party that is suited to the request and the collaboration. The trust directory then obtains interface information for the trusted third party for forwarding to the requesting party. In this way, the trusted third party may make a determination as to whether the requesting party should proceed in the business collaboration. Afterwards, the trust directory may monitor communications that take place as part of the collaboration, for use in evaluating future requests and collaborations.
摘要:
Techniques are provided for object management. In certain implementations, object management includes determining whether a signal representing the presence of at least one object to be monitored has been received and determining whether a signal representing the state of at least one object to be monitored has been received. If a signal representing the presence of at least one object to be monitored has been received, a determination is made as to whether a predetermined quantity of objects is present. If a signal representing the state of at least one object to be monitored has been received, a determination is made as to whether at least one object has a predetermined state.
摘要:
A method and system for providing evolving, highly variable, long-term on-going cognitive stimulation over a broad spectrum of cognitive domains. The user is presented with a series of entertaining audio/visual activities customized for the user, based on the user's life experience and cognitive level, each activity providing stimulation in one or more cognitive domains. The activities themselves and their level of challenge may change, in real time, over both the short- and the long term, varying in relation to current and historical user response patterns, creating an experience that remains engaging, with on-going use, over a period of months or years.