Abstract:
A system, method and program product for siting charging stations. A mobility detection module collects traffic data from vehicle sensors distributed in an area. A map matching module maps detected traffic in the area. A vehicle flow module temporally characterizes mapped traffic flow. An electric vehicle (EV) requirements (EVR) evaluator determines an optimal number of charging stations and respective locations for siting the charging stations.
Abstract:
Access is obtained to call data records (or other data) for a plurality of mobile telephony users. The call data records (or other data) include location-time sequences. For each of the mobile telephony users, corresponding ones of the location-time sequences are segmented into trips; a home-work-school classification model is used to determine a home location and a work-school location, based on the trips; and a trip purpose classification model is used to assign each of the trips a purpose label, based at least on comparing at least one of a start location and an end location for each one of the trips to at least one of the home location and the work-school location determined using the home-work-school classification model. The trips are aggregated into purpose based origin-destination categories based at least on the purpose labels, time ranges of the location-time sequences, and the start and end locations.
Abstract:
In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
Abstract:
A GPS-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the GPS-enabled cellular electronic device. Responsive at least to the increase in cellular signal strength, the GPS-enabled cellular electronic device is transitioned to an outdoor testing mode. Detecting is carried out to determine whether movement of the GPS-enabled cellular electronic device occurs during the outdoor testing mode. If so, the GPS-enabled cellular electronic device is transitioned to an outdoor mode.
Abstract:
A method (and system) which provides virtual machine migration with filtered network connectivity and control of network security of a virtual machine by enforcing network security and routing at a hypervisor layer at which the virtual machine partition is executed, and which is independent of guest operating systems.
Abstract:
A method of generating analytics to provide an analysis of data from distinct data domains includes collecting sensor data from at least two distinct data domains, deriving parameters from the collected data, wherein at least one of the parameters is a first domain parameter derived from one of the data domains and at least another one of the parameters is a second domain parameter derived from the other data domain, providing a data model that enables a user to specify at least one of the first parameters and at least one of the second domain parameters and generate at least one rule based on the selected parameters, and generating analytics that analyze the collected data against the rules to determinate whether the rules have been satisfied and provide results of the analysis to a user of the analytics.
Abstract:
A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective.
Abstract:
A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services.
Abstract:
In one embodiment, a method and an apparatus for failure-resilient forwarding of data over a computer network include introducing a marker into the data stream, e.g., at the sending node, and allowing, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker.
Abstract:
Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n2)amount of traffic to victimize a CDN-hosted site when the site content is served from n CDN caches. Without these modifications, the attacker must generate only O(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN.