VOICE PROCESSING SYSTEM, OPERATING METHOD AND VOICE PROCESSING COMPOSITE

    公开(公告)号:JP2000041108A

    公开(公告)日:2000-02-08

    申请号:JP14105699

    申请日:1999-05-21

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To obtain a voice processing system that supports voice processing application. SOLUTION: A voice processing composite has plural host computers, each of the host computers supports voice application, at least one host 10 in the composite includes telephone hardware 30 that maintains mapping of the voice application to a telephone line and prepares a call object in responses to an incoming call. The voice application in relation to the incoming call is decided based on the mapping and an identifier of the call object is delivered. The call object receives a medium object representing a desired output on a telephone line from the voice processing application in response to a request from the voice application. This medium object is processed for plural output components according to a presentation criterion and they are outputted via the telephone line.

    Computer system with heap and card table

    公开(公告)号:GB2378778A

    公开(公告)日:2003-02-19

    申请号:GB0119684

    申请日:2001-08-13

    Applicant: IBM

    Abstract: A computer system has a heap for storing objects on, and a card table for tracking updates to objects on the heap, typically for garbage collection purposes. In particular, the heap is divided into segments, each corresponding to a card in the card table, at least one card has multiple memory segments assigned to it, and any update to a segment in the heap triggers a write barrier to mark the corresponding card in the card table. It is important that this write barrier is as efficient as possible to optimise system performance. In some circumstances an object update may be made to an address outside the heap. In order to ensure that this still properly maps to a card in the card table, the entire memory space is folded cyclically, so that any given memory address corresponds to one, and only one card, in the card table.

    Composite locking of objects in a database

    公开(公告)号:GB2342198A

    公开(公告)日:2000-04-05

    申请号:GB9821370

    申请日:1998-10-02

    Applicant: IBM

    Abstract: In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.

    Voice processing system
    6.
    发明专利

    公开(公告)号:GB2338371A

    公开(公告)日:1999-12-15

    申请号:GB9812361

    申请日:1998-06-09

    Applicant: IBM

    Abstract: A voice processing complex has a plurality of host machines, each host machine supporting one or more voice applications, at least one host in the complex including telephony hardware for providing access to a plurality of telephone lines. Such a host provides telephony functions to the complex. This is achieved by maintaining a mapping of voice applications to telephone lines, and creating a call object in response to an incoming call on one of the lines. It is then determined which voice application to associate with the incoming call on the basis of this mapping, and an identifier to the call object is then passed to the determined voice application. Thereafter the call object is responsive to requests from this voice application for providing telephony functions for the call. This includes receiving a media object from the voice processing application which represents desired output over a telephone line. This media object is then processed into a plurality of output components in accordance with one or more presentation criteria, and these components are then output over the telephone line. Typically the output component are voice segments, and the presentation criteria include locale information.

    Computer system with heap and card table

    公开(公告)号:GB2378778B

    公开(公告)日:2005-03-23

    申请号:GB0119684

    申请日:2001-08-13

    Applicant: IBM

    Abstract: A computer system has a heap for storing objects and a card table for tracking updates to objects on the heap, typically for garbage collection purposes. In particular, the heap is divided into segments, each corresponding to a card in the card table, and any update to a segment in the heap triggers a write barrier to mark the corresponding card in the card table. It is important that this write barrier is as efficient as possible to optimize system performance. In some circumstances an object update may be made to an address outside the heap. To ensure that this still properly maps to a card in the card table, the entire memory space is folded cyclically, so that any given memory address corresponds to one, and only one card, in the card table.

    Composite locking of objects in a database

    公开(公告)号:GB2342198B

    公开(公告)日:2003-10-22

    申请号:GB9821370

    申请日:1998-10-02

    Applicant: IBM

    Abstract: In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.

Patent Agency Ranking