Abstract:
A computer-implemented method, a computer system and a computer program product add a mapped holographic projection to a screen sharing session. The method includes transmitting a screen image from a presenter computing device to a participant computing device. The method also includes capturing a body movement image of the presenter using a camera. The method further includes identifying a gesture in the body movement image and mapping the gesture to the screen image. In addition, the method includes generating a holographic projection of a mapped gesture of the presenter. Lastly, the method includes displaying the holographic projection at the participant computing device in front of the screen image.
Abstract:
A method, computer program product, and system for providing cross-lingual search results that retain cultural context include a processor(s) monitoring (with user permission) computing activities performed by the user, via a client. The processor(s) analyzes the computing activities to identify data comprising elements relevant to the user and relationships between the elements and the user. The processor(s) generates a data structure comprising the data. The processor(s) generates a search interface for obtaining entries in a first language to perform a query; the entries are search parameters embedded with a portion of the elements. The processor(s) obtains an entry in the first language. The processor(s) extracts the portion of the elements from the entry (cultural context for the entry). The processor(s) determines target languages for data responsive to the query. The processor(s) translates the search parameters and the cultural context into the target languages and executes searches on databases.
Abstract:
Disclosed is a novel system, computer program product, and method to compute an air quality forecast. An air quality forecast model, air quality real-time monitoring data, and air quality forecast data is accessed. A deviation in air pollution emission is monitored by classifying a difference between the air quality monitoring data and the air quality forecast data. This monitoring includes classifying any weather differences which are caused by weather, classifying any terrain differences which are caused by a geographic terrain; and, filtering the difference caused by inaccurate pollution emission inventory. The monitoring may repeat in response to a given time period elapsing or a chance in air quality forecast data received.
Abstract:
Embodiments include techniques for channeling elements in an analytics engine environment, techniques include analyzing a current process, and identifying critical data element types associated with the current process. The techniques also include receiving a real-time data stream including a plurality of data elements, and pre-filtering the plurality of data elements, wherein the pre-filtering determines one or more of the plurality of data elements are associated with the critical data element type. The technique includes selecting a channel of a plurality of channels to fast-path the one or more of the plurality of data elements based at least in part on the pre-filtering, and increasing a confidence level corresponding to the current process and the critical data element type based on a state of the current process.
Abstract:
A data transform method and a data transformer. The method includes: importing a data transform rule; acquiring from the data transform rule a source data definition, a destination data definition and a data transform rule definition; predicting resource energy consumption parameters of a data transform node server according to the source data definition, the destination data definition and the data transform rule definition; and deploying a resource energy consumption optimization policy of the data transform node server according to the predicted resource energy consumption parameters of the data transform node server.
Abstract:
A data transform method and a data transformer. The method includes: importing a data transform rule; acquiring from the data transform rule a source data definition, a destination data definition and a data transform rule definition; predicting resource energy consumption parameters of a data transform node server according to the source data definition, the destination data definition and the data transform rule definition; and deploying a resource energy consumption optimization policy of the data transform node server according to the predicted resource energy consumption parameters of the data transform node server.
Abstract:
A method for assisting query comprises acquiring a record that includes a unique identification and at least one piece of dimension information associated with the unique identification, wherein each piece of dimension information includes a sequence of attributes, each attribute being ordered in the sequence in accordance with a hierarchically progressive relation; calculating a hash value for an attribute pair comprising attributes of every two neighboring levels; and storing, in association with the hash value, the unique identification in at least one storage device. A method for querying comprises receiving a query; calculating one or more hash values; in response to the one or more hash values matching stored hash values in at least one storage device; deriving an intersection of unique identifications that are stored in association with the matched stored hash values; and returning at least one unique identification included in the intersection as a query result.
Abstract:
In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.
Abstract:
A system and method for patching an application running in a computing system, the method comprising: in response to that there is a need to patch a first content and the first content has been in the memory, distinguishing between a new content and an old content, the new content being the patched first content, the old content being the first content that has been in the memory; and in response to that the new content is loaded to the memory, mapping to the new content a new process that needs to apply the first content, wherein the new process comprises a process that is started after loading the new content to the memory. An apparatus for patching an application is further disclosed. With the apparatus provided, it is possible to perform dynamic patching to a virtual machine or a physical machine without stopping a running process.
Abstract:
A method for patching an application running in a computing system , the method comprising: in response to that there is a need to patch a first content and the first content has been in the memory, distinguishing between a new content and an old content, the new content being the patched first content, the old content being the first content that has been in the memory; and in response to that the new content is loaded to the memory, mapping to the new content a new process that needs to apply the first content, wherein the new process comprises a process that is started after loading the new content to the memory. An apparatus for patching an application is further disclosed. With the technical solution provided by the present invention, it is possible to perform dynamic patching to a virtual machine or a physical machine without stopping a running process.