System for real-time detection and resolution of conflicts in shared resources
阅读说明:本技术 实时检测和解决共享资源的冲突的系统 (System for real-time detection and resolution of conflicts in shared resources ) 是由 葛文豪 于 2018-12-29 设计创作,主要内容包括:一种管理共享资源的方法,包括:在接收到用于延长对共享资源的当前使用的请求时,检测当前使用的所请求的结束时间与后续使用的较早的开始时间之间的资源数据的冲突。在一个示例中,共享资源可以是会议室,使用是相邻地安排的会议。该方法还包括:响应于检测到冲突,(1)接收关于请求的准许指示,以及(2)响应于标识对请求的接受的准许指示,(a)计算当前使用的许可的延长时间,以及(b)更新资源数据,以将许可的延长时间加到当前使用的安排的结束时间和后续使用的安排的开始时间,以便能够在不冲突的情况下使用共享资源。(A method of managing shared resources, comprising: upon receiving a request to extend a current use of a shared resource, a conflict of resource data between a requested end time of the current use and an earlier start time of a subsequent use is detected. In one example, the shared resource may be a conference room, and the usage is a adjacently arranged conference. The method further comprises the following steps: in response to detecting a conflict, (1) receiving a grant indication for the request, and (2) in response to the grant indication identifying acceptance of the request, (a) calculating a permitted extension time for the current use, and (b) updating the resource data to add the permitted extension time to a scheduled end time for the current use and a scheduled start time for a subsequent use to enable use of the shared resource without conflict.)
1. A method of managing shared resources, comprising:
in response to receiving a request to extend a current use of a shared resource, detecting a conflict of resource data between a requested end time of the current use and a start time of a subsequent use of the shared resource, the requested end time being later than a scheduled start time of the subsequent use; and
in response to detecting a conflict, (1) receiving a grant indication with respect to the request, and (2) in response to the grant indication identifying acceptance of the request, (a) calculating a permitted extension time for the current use, and (b) updating the resource data to add the permitted extension time to a scheduled end time for the current use and a scheduled start time for the subsequent use, so that the shared resource can be used without conflict.
2. The method of claim 1, wherein the shared resource is a shared conference resource and the resource data is conference data.
3. The method of claim 2, wherein the shared conference resource is a conference room.
4. The method of claim 3, wherein (1) the current usage and the subsequent usage are respective conferences scheduled by respective conference owners, (2) the request is received from a first client device associated with a current conference owner of a current conference, and (3) the permission indication is received from a second client device associated with a next conference owner of a subsequent conference.
5. The method of claim 1, wherein updating the resource data comprises updating data stored at a resource client device, and further comprising: generating, at the resource client device, a local notification to a respective resource user based on the updated data, the local notification notifying the resource user of the adjusted time of the current usage and the adjusted start time of the subsequent usage.
6. The method of claim 1, wherein calculating the permitted extension time comprises a calculation based on historical resource data related to past time extensions.
7. The method of claim 6, wherein the calculation based on historical resource data includes use of a penalty factor for reducing the permitted extension time based on a past occurrence of a prolonged request for the shared resource and a reward factor for countering the penalty factor to increase permitted extension time based on a past occurrence of an early completion of use of the shared resource.
8. The method of claim 7, wherein the calculating further comprises a weighting factor representing a number of users affected by a past occurrence of a prolonged request and an early completion of use.
9. The method of claim 6, wherein the calculation based on historical resource data is further based on policy data explicitly describing an associated policy for permission extension.
10. The method of claim 1, further comprising: based on an occurrence of a trigger, sending a query message to a device of a current user of the shared resource, and wherein the request is received as a response to the query message.
11. A resource management system having one or more computerized devices collectively configured and operable for managing shared resources, the computerized devices including respective processors and memories storing computer program instructions for resource management applications, the computer program instructions being executable by the processors to cause the resource management system to perform management of shared resources, comprising:
in response to receiving a request to extend a current use of a shared resource, detecting a conflict of resource data between a requested end time of the current use and a start time of a subsequent use of the shared resource, the requested end time being later than a scheduled start time of the subsequent use; and
in response to detecting a conflict, (1) receiving a grant indication with respect to the request, and (2) in response to the grant indication identifying acceptance of the request, (a) calculating a permitted extension time for the current use, and (b) updating the resource data to add the permitted extension time to a scheduled end time for the current use and a scheduled start time for the subsequent use, so that the shared resource can be used without conflict.
12. The system of claim 11, wherein the shared resource is a shared conference resource and the resource data is conference data.
13. The system of claim 12, wherein the shared conference resource is a conference room.
14. The system of claim 13, wherein (1) the current usage and the subsequent usage are respective conferences scheduled by respective conference owners, (2) the request is received from a first client device associated with a current conference owner of a current conference, and (3) the permission indication is received from a second client device associated with a next conference owner of a subsequent conference.
15. The system of claim 11, wherein updating the resource data comprises updating data stored at a resource client device configured to operate to generate a local notification to a respective resource user based on the updated data, the local notification notifying the resource user of the adjusted time of the current usage and the adjusted start time of the subsequent usage.
16. The system of claim 11, wherein calculating the permitted extension time comprises a calculation based on historical resource data related to past time extensions.
17. The system of claim 16, wherein the calculation based on historical resource data includes use of a penalty factor for reducing the permitted extension time based on a past occurrence of a prolonged request for the shared resource and a reward factor for offsetting the penalty factor to increase permitted extension time based on a past occurrence of an early completion of use of the shared resource.
18. The system of claim 17, wherein the calculation further includes a weighting factor that represents a number of users affected by a past occurrence of a prolonged request and an early completion of use.
19. The system of claim 16, wherein the calculation based on historical resource data is further based on policy data explicitly describing an associated policy for permission extension.
20. A non-transitory computer-readable medium storing computer program instructions executable by a set of one or more computers to cause the computers to perform a method of managing shared resources, the method comprising:
in response to receiving a request to extend a current use of a shared resource, detecting a conflict of resource data between a requested end time of the current use and a start time of a subsequent use of the shared resource, the requested end time being later than a scheduled start time of the subsequent use; and
in response to detecting a conflict, (1) receiving a grant indication with respect to the request, and (2) in response to the grant indication identifying acceptance of the request, (a) calculating a permitted extension time for the current use, and (b) updating the resource data to add the permitted extension time to a scheduled end time for the current use and a scheduled start time for the subsequent use, so that the shared resource can be used without conflict.
Technical Field
The present disclosure relates to the field of resource management, for example in a calendar application that provides scheduling of shared resources such as meeting rooms, also referred to herein as "meeting halls".
Disclosure of Invention
The present disclosure relates generally to techniques for managing shared resources to avoid conflicts in their use. In one example, the present disclosure includes an intelligent notification and workflow mechanism that enables better collaboration and efficient resource utilization. This general aspect is described with reference to a specific application example based on conference data that describes the use of shared conference resources (e.g., conference rooms). Those skilled in the art will appreciate that the disclosed techniques can be utilized in a variety of other ways.
With respect to the example of sharing conference resources, in today's enterprises, through the use of client collaboration applications (e.g.,
) A specific conference room is reserved to arrange the conference. Based on the schedule, start and end times are assigned for the meeting and meeting room. The application may then send reminders to the conference owner and meeting participants to attend the upcoming conference before the conference begins (e.g., 15 minutes in advance).In some cases, when a participant arrives for an upcoming conference, the conference room may still be occupied by the previous conference and the previous conference continues (with or without permission) beyond the scheduled start time of the upcoming conference. The start of an upcoming meeting is delayed and thus production time may be wasted. Such scenarios represent reduced organizational efficiency. It arises, in part, from the limitations of existing resource scheduling techniques that do not recognize these types of conflicts, nor provide any support for resolving these conflicts. Allowing the meeting participants to identify and resolve conflicts themselves, wherein the participation is inefficient.
In the disclosed technology, intelligent notifications and workflows are provided in a resource arrangement to reduce the occurrence of such inefficient interactions with shared resources such as conference rooms. The disclosed technique uses a new decision-making method to send a notification to the resource owner to confirm the current usage of the shared resource by the extension and to update the resource data to reflect the extension, thereby proactively notifying the resource user of changes in scheduled usage, thereby eliminating the need for the user to self-learn about and resolve conflicts. Resource data is data representing scheduled use of a shared resource, such as an electronic calendar or similar scheduling data. Additionally, the disclosed techniques may use context information (e.g., historical credits for meeting room/user behavior, etc.) and allocation policies when granting extended use of resources.
More specifically, a method of managing shared resources is disclosed. The method generally includes: in response to receiving a request to extend a current use of a shared resource, a conflict of resource data between an end time of the request for the current use and a start time of a subsequent use of the shared resource is detected. In this case, the end time of the request is later than the scheduled start time of the subsequent use. In one example, the shared resource is a conference room, and conflicts arise due to the scheduled adjacency of conferences in the conference room.
The disclosed method further comprises: in response to detecting a conflict, (1) receiving a grant indication for the request, and (2) in response to the grant indication identifying acceptance of the request, (a) calculating a permitted extension time for the current use, and (b) updating the resource data to add the permitted extension time to a scheduled end time for the current use and a scheduled start time for a subsequent use to enable use of the shared resource without conflict.
Drawings
The foregoing and other objects, features and advantages will be apparent from the following description of particular embodiments as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views.
FIG. 1 is a block diagram of a system that provides management of shared resources;
FIG. 2 is a flow chart of certain operations of the system of FIG. 1;
FIG. 3 is a block diagram of a distributed calendar system as a specific example of the general system of FIG. 1;
FIG. 4 is a block diagram of a calendar server device in the system of FIG. 3;
FIG. 5 is a block diagram of a calendar client device in the system of FIG. 3; and
fig. 6 is a message diagram of some operations of the system of fig. 3.
Detailed Description
FIG. 1 shows a system including a resource manager 10, the resource manager 10 being coupled to a set of
In another more specific example, the system of FIG. 1 may be implemented in the form of a distributed calendar function of a distributed calendar application or related applications, for example
The calendar function of (1). In this case, theFig. 2 illustrates some operations of the system of fig. 1 at a high level. These functions are described as being performed by the resource manager 10 in connection with data and communications involving the
At 20, in response to receiving a request to extend a current use of a shared resource, a resource manager detects a conflict of resource data between an end time of the request to extend the current use of the shared resource and a start time of a subsequent use, wherein the end time of the request is later than a scheduled start time for the subsequent use. For example, the request may be received from a
At 22, in response to detecting the conflict, the resource manager (1) receives a grant indication for the request, and (2) in response to the grant indication identifying acceptance of the request, (a) calculates an extension time for the grant for the current use, (b) updates the resource data to add the extension time of the grant to a scheduled end time of the current use and a scheduled start time of a subsequent use, so that the shared resource can be used without conflict. Continuing with the above example, the resource manager 10 may receive the permission indication by first sending a notification message to the
The calculation of the allowed extension time at 22 enables the resource manager 10 to exert some independent control over resource usage, particularly for usage under conflicting conditions. For example, the current user may request an additional half hour, but only some short extension may be possible or desirable for any of a variety of reasons, including input from subsequent users. Examples are discussed below. Thus, the calculation may take various inputs including historical usage data, policies, etc., and generate a permitted extension time therefrom.
Updates to the resource data are typically visible to the current and subsequent resource users in some manner to achieve a conflict-free transition between current use and subsequent use at a later time, in accordance with the extension of the license. For example, in a calendar application, the schedules of both the current meeting and the subsequent meeting are adjusted to reflect the deferred end time of the current meeting and the deferred start time of the next meeting. The
Fig. 3 shows a specific application of the general arrangement of fig. 1, namely a distributed calendar system with a
Fig. 4 illustrates
Calendar server function components 40 are typically those routines, linked libraries, etc. that implement the functionality of a calendar program, i.e., the ability to schedule meetings (i.e., create corresponding entries in calendar server database 42), monitor conflicts, participate in communications, etc. For purposes of this description, they are divided into a meeting control (Cntl)
Calendar server database 42
The communication component 44 performs details of message exchanges and/or notifications with the
Fig. 5 shows a
The following table provides a simplified example of the content and organization of
TABLE 1 conference
ID
Owner of the system
Themes
Starting time
End time
Room
Participants
…
N
User N
Topic N
12:00
1:00
X
{ List N }
M
User M
Theme M
1:00
2:00
X
{ List M }
TABLE 2 Room usage
Time slot
Conference
…
12:00-1:00
N
1:00-2:00
M
…
In operation, the
Fig. 6 is a message diagram illustrating operation of the system of fig. 3 in one example. The participants are shown as calendar server (Cal Svr)30,
The operation starts by the occurrence of a Trigger (Trigger) at the
The
Next, the
As an alternative to the above method, an extension calculation may be performed prior to notifying the NMO device 32-N and communicating with it for permission to notify the NMO user of the actual extension time to be permitted, rather than the requested extension time.
It should be appreciated that there is a possibility that recursion occurs, i.e., the process of fig. 6 may be performed a second or more times for the same current meeting if a new trigger may occur based on the adjusted meeting end time. This iteration does not result in an infinite extension of the current conference, as permission from the NMO user is required. However, it may even be desirable to avoid repeating the initial messaging (notification, Permission Indication) of the process of FIG. 6, in which case the
The following is a description of the elongation calculation in one embodiment. It is assumed that various data are stored in
a. Room id (roomid): in particular meeting room i.
b. Start time (StartTime): normal start time of a meeting in meeting room i;
c. end time (EndTime): normal end time of a meeting in meeting room i;
d. reminder time (TimeForReminder): reminding the time of the next conference owner to start the conference in the conference room i in advance;
e. advance frequency (PriorFrequency): historical accumulated time for an owner to complete a meeting in advance in a meeting room i is identified by a variable n;
f. deferral frequency (delayfequency): the historical cumulative number of times the owner has deferred the meeting (extended it beyond the scheduled end time) in meeting room i, identified by variable m;
g. advanced completion time (PriorCompleteTime): the duration of the earlier completion of the conference compared to the end time (EndTime) in room i is identified as PriorTimek. Here, k is equal to 1, 2,. and n, where n is the PriorFrequency described above.
h. Late completion time (delaycompletimei): the duration of the conference being deferred compared to EndTime in room i is identified as DelayTimej. Here, j is equal to 1, 2,. and m, where m is the delayfequency described above.
i. Maximum advance time (MaxPriorTime): the maximum remaining duration when the owner ends the meeting in the meeting room earlier than EndTime, for a particular room i, is identified as TPMAXi. Typically, for a particular room, this may be a constant greater than PriorCompleteTime. Thus, in some slot request scenarios, PriorTimekNot exceeding TPMAX all the timej。
j. Maximum delay time (MaxDelayTime): the maximum duration that the owner can request compared to EndTime in conference room i is identified as TDMAX for a particular room ii. Typically for a particular room, this may be a constant greater than delaycompletimem. Thus, in some slot request scenarios, DelayTimejDoes not exceed TDMAX all the timei。
k. Number of participants in advance (priority) (numberofattendes): in the Prior scenario, the number of participants in the next meeting in room i, identified in the history as PNumk。
i. Number of participants (numberofattendes) at deferral (Delay): in the Delay scene, the roomThe number of participants in the next meeting in i, identified in the history as DNumj。
Penalty factor (PunishmentFactor): a normalized weighting factor (between 0.0-1.0) is used to calculate the allowed extension time and represents the impact of the previous Delay event.
It can be calculated by the following formula:
reward factor (RewardFactor): similar to PuniscementFactor, but represents the effect of a previous Prior event. It can be calculated by the following formula:
mean factor (MeanFactor): this is an averaging factor used to calculate the allowed extended time GrantedDelayTime, as described below. In one embodiment, a "credit" type of method is used for licensing time extensions. For a MeanFactor for a given conference room, the conference owner may be given an initial credit value, e.g., 1.0. According to the above definitions and formulas, the more Delay the owner has, the larger the publishing factor, with respect to conference hall i. With respect to RewardFactor, the more the owner completes the Prior event (completes the meeting early), the larger the RewardFactor. The MeanFactor can then be calculated as follows:
MeanFactori=1.0-PunishmentFactori+RewardFactori
how to determine the actual permitted extended time GrantedDelayTime using the above values is explained below.
1. RewardFactor is calculated based on historical data of meeting owners stored in
2. MeanFactor for computing conference hall ii;
3. The GrantedDelayTime is calculated as follows:
a) if MeanFactori(ii) 0, then GrantedDelayTime is set to 0.0;
a) if MeanFactori1, set GrantedDelayTime to expectedddelaytime (the amount requested by the current conference owner);
c) otherwise, the GrantedDelayTime is calculated as follows, which means that the expectedddelaytime is scaled with the MeanFactor:
GrantedDelayTime=ExpectedDelayTime*MeanFact0ri
alternative solution
In addition to the above functionality, other methods may be introduced to judiciously decide when to prompt the owner if additional time needs to be reserved and allow the appropriate amount of additional time based on configured policies other than context information. For example, such a method may include deep learning techniques for detecting the behavior of voice and video information of the participants.
The technology can be combined with internet of things (IoT) hardware or provisions for conference rooms to establish intelligent workspaces. For example, if the current conference owner excessively defers the conference and does not respond to the notification appropriately, the conference controller may automatically disable use of the conference room (e.g., turn off the display/disable the cable).
In addition to managing conflicts at a conference hall, the disclosed techniques may also be used in other ways generally. In one example, it can be used in conjunction with other conference related shared resources (e.g., conference services) or devices (e.g., conference audio/video devices, conference phone lines, etc.). More generally, it may be used in connection with other types of shared resources that are not necessarily related to a meeting. These may include high demand equipment in an office environment, such as copiers or scanners; test equipment or other specialized tools in a factory or store environment, and the like.
While various embodiments have been particularly shown and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.
- 上一篇:一种医用注射器针头装配设备
- 下一篇:用于第三方购买的方法及系统