-
公开(公告)号:JP2000041108A
公开(公告)日:2000-02-08
申请号:JP14105699
申请日:1999-05-21
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , RENSHAW DAVID SEAGER , WONG YUK-LUN
Abstract: PROBLEM TO BE SOLVED: To obtain a voice processing system that supports voice processing application. SOLUTION: A voice processing composite has plural host computers, each of the host computers supports voice application, at least one host 10 in the composite includes telephone hardware 30 that maintains mapping of the voice application to a telephone line and prepares a call object in responses to an incoming call. The voice application in relation to the incoming call is decided based on the mapping and an identifier of the call object is delivered. The call object receives a medium object representing a desired output on a telephone line from the voice processing application in response to a request from the voice application. This medium object is processed for plural output components according to a presentation criterion and they are outputted via the telephone line.
-
公开(公告)号:AT148241T
公开(公告)日:1997-02-15
申请号:AT89305987
申请日:1989-06-13
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , TYRRELL ARTHUR JONATHAN
-
公开(公告)号:DE68927705T2
公开(公告)日:1997-07-17
申请号:DE68927705
申请日:1989-06-13
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , TYRRELL ARTHUR JONATHAN
-
公开(公告)号:GB2378778A
公开(公告)日:2003-02-19
申请号:GB0119684
申请日:2001-08-13
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , WHARMBY ANDREW DEAN
Abstract: A computer system has a heap for storing objects on, and a card table for tracking updates to objects on the heap, typically for garbage collection purposes. In particular, the heap is divided into segments, each corresponding to a card in the card table, at least one card has multiple memory segments assigned to it, and any update to a segment in the heap triggers a write barrier to mark the corresponding card in the card table. It is important that this write barrier is as efficient as possible to optimise system performance. In some circumstances an object update may be made to an address outside the heap. In order to ensure that this still properly maps to a card in the card table, the entire memory space is folded cyclically, so that any given memory address corresponds to one, and only one card, in the card table.
-
公开(公告)号:GB2342198A
公开(公告)日:2000-04-05
申请号:GB9821370
申请日:1998-10-02
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , CORRIGAN KEVIN PATRICK , HEWITT DALE ROBINSON
IPC: G06F9/46
Abstract: In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.
-
公开(公告)号:GB2338371A
公开(公告)日:1999-12-15
申请号:GB9812361
申请日:1998-06-09
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , RENSHAW DAVID SEAGER , WONG YUK-LUN
Abstract: A voice processing complex has a plurality of host machines, each host machine supporting one or more voice applications, at least one host in the complex including telephony hardware for providing access to a plurality of telephone lines. Such a host provides telephony functions to the complex. This is achieved by maintaining a mapping of voice applications to telephone lines, and creating a call object in response to an incoming call on one of the lines. It is then determined which voice application to associate with the incoming call on the basis of this mapping, and an identifier to the call object is then passed to the determined voice application. Thereafter the call object is responsive to requests from this voice application for providing telephony functions for the call. This includes receiving a media object from the voice processing application which represents desired output over a telephone line. This media object is then processed into a plurality of output components in accordance with one or more presentation criteria, and these components are then output over the telephone line. Typically the output component are voice segments, and the presentation criteria include locale information.
-
公开(公告)号:GB2378778B
公开(公告)日:2005-03-23
申请号:GB0119684
申请日:2001-08-13
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , WHARMBY ANDREW DEAN
Abstract: A computer system has a heap for storing objects and a card table for tracking updates to objects on the heap, typically for garbage collection purposes. In particular, the heap is divided into segments, each corresponding to a card in the card table, and any update to a segment in the heap triggers a write barrier to mark the corresponding card in the card table. It is important that this write barrier is as efficient as possible to optimize system performance. In some circumstances an object update may be made to an address outside the heap. To ensure that this still properly maps to a card in the card table, the entire memory space is folded cyclically, so that any given memory address corresponds to one, and only one card, in the card table.
-
公开(公告)号:GB2342198B
公开(公告)日:2003-10-22
申请号:GB9821370
申请日:1998-10-02
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , CORRIGAN KEVIN PATRICK , HEWITT DALE ROBINSON
IPC: G06F9/46
Abstract: In a multi-user environment, a method of controlling access to objects is required, such that updates performed by one user are not overwritten by simultaneous updates by another user. There is provided a method of controlling access to objects and containers, each representing a group of objects, in a multi-user environment whereby lock states of the objects and lock states of the containers are stored in a computer system, said method comprising the steps of: accepting a request for access to an object or a container; deciding access based on the lock state for that object or container, the lock state of a container if the request is for an object contained within that container, and the lock state of objects grouped within a container if the request is for a container object; and sending a message to the requester granting or denying access to said object or container object. Updates performed by one user on an object or a container are not overwritten by simultaneous updates by another user. The above supports units of work in a GUI session where a unit of work could be updating a single object, viewing a single object or copying or deleting a container of objects. This extends to manipulating entire voice applications which consist of many containers and other objects.
-
公开(公告)号:DE68927705D1
公开(公告)日:1997-03-06
申请号:DE68927705
申请日:1989-06-13
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , TYRRELL ARTHUR JONATHAN
-
公开(公告)号:BR9002804A
公开(公告)日:1991-08-20
申请号:BR9002804
申请日:1990-06-13
Applicant: IBM
Inventor: BORMAN SAMUEL DAVID , TYRRELL ARTHUR JONATHAN
-
-
-
-
-
-
-
-
-