Abstract: A system and method is provided for determining a sequential access efficiency for a database table. A number of data block changes that occur during a sequential access of a plurality of rows in a database table may be determined. The sequential access efficiency may be determined based on the determined number of data block changes.
Abstract: An embodiment of providing a computer-executed method of subsequence matching is provided. The method comprises receiving a search string. A plurality of subsequences for the search string are stored in a tree structure. The tree structure comprise a plurality of nodes. Each of the plurality of nodes comprises a presence bit map, a sequence bit map, and a list of address pointers. The method further includes traversing the tree structure using the search string, the presence bit map, the sequence bit map, and the list of address pointers. Additionally, the method includes identifying, in linear time, the plurality of subsequences based on the search string, the presence bit map, the sequence bit map, and the list of address pointers.
Type:
Application
Filed:
August 27, 2010
Publication date:
March 1, 2012
Inventors:
Raj Narayan Marndi, Sachin Daniel Oommen
Abstract: Apparatus (1010) comprises a deduplication engine (1064) operable to select at least two chunks of data for deduplication and deduplicate the selected at least two chunks of data; a first store (1072) operable to store the deduplicated chunks of data in a sequential manner; and a second store (1074) operable to store at least a portion of at least one chunk of the deduplicated data in a manner to allow random access, wherein data is accessed via the first and/or second store (1072, 1074).
Type:
Application
Filed:
January 28, 2010
Publication date:
July 28, 2011
Inventors:
Alastair Slater, Simon Pelly, Garry Brady
Abstract: An approach is provided for condition monitoring from log messages and sensor trends based on time semi-intervals. The approach may be applied to machine condition monitoring. Patterns are mined from symbolic interval data that extends previous approaches by allowing semi-intervals and partially ordered patterns. The semi-interval patterns and semi-interval partial order patterns are less restrictive than patterns using Allen's relations. Combinations and adaptations of efficient algorithms from sequential pattern and itemset mining for discovery of semi-interval patterns are described.
Abstract: Sequence alignment techniques are disclosed. In one embodiment, a sparse data structure is constructed that represents respective character positions of matching character sets in input sequences. This sparse data structure may take a variety of forms, including a “tree of trees.” Once constructed, each match is linked to at most one other match using a local application of a predetermined algorithm (e.g., a Smith-Waterman-type scoring algorithm). The links between matches are analyzed and a possible alignment or set of alignments is produced.
Abstract: A method provides search results for a handheld electronic device including an input apparatus having a plurality of input members, each of at least a portion of which have a plurality of characters assigned thereto. A type of the input apparatus is sent from the device to a server. The device receives a number of activations of a number of the input members, and sends the received number of activations to the server. The server determines a number of possible combinations of the characters based upon the received input apparatus type and the received number of activations, searches for a number of search results as a function of the number of possible combinations of the characters, and sends the number of search results to the device. The device receives the number of search results, and displays at least a portion of the number of search results.
Abstract: Plagiarism of software source code is a serious problem in two distinct areas of endeavor—cheating by students at schools and intellectual property theft at corporations. A number of algorithms have been implemented to check source code files for plagiarism, each with their strengths and weaknesses. This invention detects plagiarism by comparing statements within source code of a first program to comments within source code of a second program.
Abstract: A computer-implemented system and method for storing custom metadata in a custom access control entry of a securable object. An exemplary method includes determining the custom metadata to be stored (e.g., information relating to the securable object that is inexpressible using a native file system application programming interface, information relating to remote domain permission data, information to support a custom feature of an application, etc.). The system may identify a custom access control entry (ACE) type corresponding to the custom metadata. In one embodiment, the custom ACE type is not a member of a set of ACE types directly interpretable by a native security subsystem to manage permissions for the securable object. The system may additionally store the custom ACE type and the custom metadata in a custom ACE, which may be added to the access control list of the securable object. The securable object may then be saved to the file system (e.g., to an NTFS file system).
Type:
Application
Filed:
August 15, 2007
Publication date:
February 19, 2009
Applicant:
Microsoft Corporation
Inventors:
Roopesh C. Battepati, Michael C. Johnson
Abstract: The present invention relates to a data buffering device (600) particularly suited for use in a data processing device (700), which sequentially provides a two-dimensional array of data structures in a meandering manner.
Type:
Application
Filed:
March 15, 2006
Publication date:
September 4, 2008
Applicant:
KONINKLIJKE PHILIPS ELECTRONICS, N.V.
Inventors:
Aleksandar Beric, Ramanathan Sethuraman
Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
Abstract: A content selection device 1 of the present invention is connected to an audio player storing a content list being a list of tune titles, and to a display displaying a portion of the content list on an OSD screen. A total number identifying section 13 of the content selection device 1 identifies the total number of tunes in the content list. A skip value setting section 15 determines a skip value obtained by multiplying the identified total number of tunes by a predetermined skip rate. In response to the activation of a scroll button 50 on a remote controller 5, a scrolling section 16 identifies a set of tune titles to be displayed on the OSD screen after scrolling the portion of the content list being displayed on the OSD screen by the skip value. An OSD instruction section 11 produces an OSD signal for displaying the identified tune titles on the OSD screen, and sends the produced OSD signal to the display.