03rd week of 2013 patent applcation highlights part 46 |
Patent application number | Title | Published |
20130018816 | INDEX FOR A PORTFOLIO AND RELATED METHOD AND APPARATUSAANM RATTRAY; Sandy CampbellAACI LondonAACO GBAAGP RATTRAY; Sandy Campbell London GBAANM MOHAMMED; KhalilAACI LondonAACO GBAAGP MOHAMMED; Khalil London GBAANM STANZYS; GediminasAACI LondonAACO GBAAGP STANZYS; Gediminas London GBAANM RADNOR; Samuel Benjamin PhilipAACI LondonAACO GBAAGP RADNOR; Samuel Benjamin Philip London GB - The present invention relates to an index for a portfolio, wherein the index value of the portfolio is determined in dependence on the value of the assets comprising the portfolio. The assets comprising the portfolio include cash. The invention also relates to a method of characterising a portfolio, and correctly managing transaction costs. Said method determines an index value of the portfolio in dependence on the value of the assets comprising the portfolio, wherein the value of the assets comprising the portfolio is divided by a constant number. The invention further relates to an apparatus for calculating an index for a portfolio. | 2013-01-17 |
20130018817 | METHOD AND SYSTEM FOR ONLINE AUTOMATED ASSOCIATION OF INDIVIDUAL RISK TOLERANCE AND RETIREMENT PLAN INVESTMENTSAANM Newman; GregoryAACI Aliso ViejoAAST CAAACO USAAGP Newman; Gregory Aliso Viejo CA USAANM Gorsline; DavidAACI Aliso ViejoAAST CAAACO USAAGP Gorsline; David Aliso Viejo CA US - An inventive system and method for online automated association of individual risk tolerance and retirement plan investments is presented. The invention comprises a secure online administrative interface that allows a plan administrator to select the available risk profile descriptions from a pre-determined list. The system automatically divides the available scores of any conforming and available risk tolerance questionnaire that includes multiple-choice questions and a scoring algorithm, into equal parts, based on the number of risk profile descriptions selected. A dual-column layout displays selected risk profile descriptions next to a list of plan investments derived from the plan database, and allows a plan administrator to associate each by clicking on investment titles and dragging and dropping them into bordered areas on screen designated for each risk profile description. The system allows multiple investments to be associated with each risk profile description, while restricting the use of each investment to one risk profile, and automatically adjusts the score associated with each investment, based on its placement within a particular risk profile, without increasing or decreasing the overall score range associated with that particular risk profile. | 2013-01-17 |
20130018818 | Systems And Methods For Investment Portfolio Management - Systems and methods for creating and managing investment portfolios are disclosed, These are useful to an individual investor, to investment advisors, as well as to professionally managed fund portfolios such as exchange traded funds, closed end funds, mutual funds, hedge funds, endowment funds, pension funds, wealth management funds, Other applications of taught methods and systems include product portfolio synthesis, process synthesis, and optimal internal allocation of capital in organizations. | 2013-01-17 |
20130018819 | SYSTEMS AND METHODS FOR OPTIMIZING AN INVESTMENT PORTFOLIO - Systems and methods for determining an optimal allocation of assets in an investment portfolio according to various aspects of the present invention may comprise a graphical user interface, database, asset allocation engine, and a display. The graphical user interface may be configured to receive identifying information about the assets and a financial risk tolerance profile of the asset owner. The database may be configured to store and/or retrieve information associated with the assets. The asset allocation engine may be configured to identify a deficiency between an existing allocation of assets in the portfolio and a target asset allocation model. The display may be configured to present the target asset allocation model and identified deficiencies. | 2013-01-17 |
20130018820 | Fare Invalidation Auditing SystemAANM LANDRA; CorinneAACI Le RouretAACO FRAAGP LANDRA; Corinne Le Rouret FRAANM DOURTHE; CedricAACI NiceAACO FRAAGP DOURTHE; Cedric Nice FRAANM CAMBERBEC; AurelieAACI GrasseAACO FRAAGP CAMBERBEC; Aurelie Grasse FR - Disclosed is a method to operate a pricing engine in response to a request to price a travel product. The method includes processing fare-related data and, in response to the pricing engine invalidating a fare in the fare-related data, automatically invoking an invalidation handler for storing information in an invalidation log associated with the invalidated fare, including a reason for the fare being invalidated. The method further includes processing the information stored in the invalidation log in conjunction with other information and storing in a data repository at least one consolidated view configured to display to a user information descriptive of at least one reason why the fare was invalidated. | 2013-01-17 |
20130018821 | REAL-TIME PEAK UTILITY USAGE CHARGE ASSESSMENT METHODS - Some embodiments are systems which calculate the amount of electric power that a peak mitigation system provides in real time and translate that information into a real-time estimate of a peak utility usage charge that appears on the utility bill of the customer. These systems may facilitate a determination of the monetary value of demand charges saved by peak mitigation and load leveling and a notification to a customer of the savings realized. Some systems described herein provide a method of billing a customer based on the electricity usage savings accumulated through demand charge reduction procedures. One embodiment monitors the mitigation of peak loads as they occur, detects and measures incremental changes in demand charge-producing peaks and updates a projection when incremental demand charge changes occur. The demand charge projection may be presented to the customer, aggregated with demand charge projections of other sites, and displayed to increase awareness. | 2013-01-17 |
20130018822 | PLUSH ANIMAL MEMORIALIZATION KIT - A plush animal memorialization kit includes a plush animal having wings, a certificate, a collar, and a tag. The certificate may be personalized according to information pertaining to a deceased pet. A method of marketing a plush animal includes providing a plurality of plush animal memorialization kits, each containing a plush animal resembling one of various pet types, assigning a unique identifier to each plush animal, and marketing the plush animals to pet owners as a way to memorialize or honor pets belonging to the pet owners. | 2013-01-17 |
20130018823 | Detecting undesirable content on a social networkAANM Masood; Syed GhouseAACI Kuala LumpurAACO MYAAGP Masood; Syed Ghouse Kuala Lumpur MY - A method of detecting undesirable content on a social networking website. The method includes retrieving or accessing a post from a user's social networking page, identifying the content of a pre-defined set of features of the post, comparing the identified feature content with a database of known undesirable post feature content, and using the results of the comparison to determine whether the post is undesirable. | 2013-01-17 |
20130018824 | SENTIMENT CLASSIFIERS BASED ON FEATURE EXTRACTIONAANM Ghani; RayidAACI ChicagoAAST ILAACO USAAGP Ghani; Rayid Chicago IL USAANM Krema; MarkoAACI EvanstonAAST ILAACO USAAGP Krema; Marko Evanston IL US - Method and apparatus are provided for providing one or more sentiment classifiers from training data using supervised classification techniques based on features extracted from the training data. Training data includes a plurality of units such as, but not limited to, documents, paragraphs, sentences, and clauses. A feature extraction component extracts a plurality of features from the training data, and a feature value determination component determines a value for each extracted feature based on a frequency at which each feature occurs in the training data. On the other hand, a class labeling component labels each unit of the training data according to a plurality of sentiment classes to provide labeled training data. Thereafter, a sentiment classifier generation component provides a least one sentiment classifier based on the value of each extracted feature and the labeled training data using a supervised classification technique. | 2013-01-17 |
20130018825 | DETERMINATION OF A BASIS FOR A NEW DOMAIN MODEL BASED ON A PLURALITY OF LEARNED MODELSAANM GHANI; RayidAACI ChicagoAAST ILAACO USAAGP GHANI; Rayid Chicago IL USAANM Krema; MarkoAACI EvanstonAAST ILAACO USAAGP Krema; Marko Evanston IL US - In a machine learning system in which a plurality of learned models, each corresponding to a unique domain, already exist, new domain input for training a new domain model may be provided. Statistical characteristics of features in the new domain input are first determined. The resulting new domain statistical characteristics are then compared with statistical characteristics of features in prior input previously provided for training at least some of the plurality of learned models. Thereafter, at least one learned model of the plurality of learned models is identified as the basis for the new domain model when the new domain input statistical characteristics compare favorably with the statistical characteristics of the features in the prior input corresponding to the at least one learned model. | 2013-01-17 |
20130018826 | LOCATION DETERMINATION USING GENERALIZED FINGERPRINTINGAANM Sundararajan; ArjunAACI RedmondAAST WAAACO USAAGP Sundararajan; Arjun Redmond WA USAANM Lin; Jyh-HanAACI Mercer IslandAAST WAAACO USAAGP Lin; Jyh-Han Mercer Island WA US - An RF fingerprinting methodology is generalized to include non-RF related factors. For each fingerprinted tile, there is an associated distance function between two fingerprints (the training fingerprint and the test fingerprint) from within that tile which may be a linear or non-linear combination of the deltas between multiple factors of the two fingerprints. The distance function for each tile is derived from a training dataset corresponding to that specific tile, and optimized to minimize the total difference between real distances and predicted distances. Upon receipt of an inference request, a result is derived from a combination of the fingerprints from the training dataset having the least distance per application of the distance function. Likely error for the tile is also determined to ascertain whether to rely on other location methods. | 2013-01-17 |
20130018827 | SYSTEM AND METHOD FOR AUTOMATED LABELING OF TEXT DOCUMENTS USING ONTOLOGIESAANM He; JingruiAACI OssiningAAST NYAACO USAAGP He; Jingrui Ossining NY USAANM Lawrence; Richard D.AACI RidgefieldAAST CTAACO USAAGP Lawrence; Richard D. Ridgefield CT USAANM Melville; PremAACI White PlainsAAST NYAACO USAAGP Melville; Prem White Plains NY USAANM Sindhwani; VikasAACI HawthorneAAST NYAACO USAAGP Sindhwani; Vikas Hawthorne NY USAANM Chenthamarakshan; Vijil E.AACI OssiningAAST NYAACO USAAGP Chenthamarakshan; Vijil E. Ossining NY US - A first mapping function automatically maps a plurality of documents each with a concept of ontology to create a documents-to-ontology distribution. An ontology-to-class distribution that maps concepts in the ontology to class labels, respectively, is received, and a classifier is generated that labels a selected document with an associated class identified based on the documents-to-ontology distribution and the ontology-to-class distribution. | 2013-01-17 |
20130018828 | SYSTEM AND METHOD FOR AUTOMATED LABELING OF TEXT DOCUMENTS USING ONTOLOGIES - A first mapping function automatically maps a plurality of documents each with a concept of ontology to create a documents-to-ontology distribution. An ontology-to-class distribution that maps concepts in the ontology to class labels, respectively, is received, and a classifier is generated that labels a selected document with an associated class identified based on the documents-to-ontology distribution and the ontology-to-class distribution. | 2013-01-17 |
20130018829 | MANAGING CAPACITIES AND STRUCTURES IN STOCHASTIC NETWORKSAANM Dieker; Antonius B.AACI AtlantaAAST GAAACO USAAGP Dieker; Antonius B. Atlanta GA USAANM Ghosh; SoumyadipAACI PeekskillAAST NYAACO USAAGP Ghosh; Soumyadip Peekskill NY USAANM Squillante; Mark S.AACI Pound RidgeAAST NYAACO USAAGP Squillante; Mark S. Pound Ridge NY US - A system, method and computer program product for managing capacities and structures in a stochastic network. The method includes mapping the stochastic network to a general analytic model, e.g., a Brownian model, decomposing the general analytic model of the stochastic network into a set of smaller general analytic models, determining the capacities/structures for the set of analytic models as an intermediate solution for the capacities/structures of the stochastic network; and, determining the capacities/structures for the stochastic network starting at the intermediate solution for the capacities/structures using simulation-based methods. | 2013-01-17 |
20130018830 | PREDICTIONS USING AGGREGATE INFORMATIONAANM Dhurandhar; AmitAACI Yorktown HeightsAAST NYAACO USAAGP Dhurandhar; Amit Yorktown Heights NY US - Predictions of a given predictive model may be improved using aggregate information. A plurality of targets to predict in a given domain may be identified, and may be predicted based on raw data set. Aggregate information associated with the plurality of targets is received, the aggregate information including estimated or actual values at a coarser level of the plurality of targets, and based on the aggregate information, the predicted target values may be improved in prediction accuracy. | 2013-01-17 |
20130018831 | SOOTBLOWING OPTIMIZATION FOR IMPROVED BOILER PERFORMANCE - A sootblowing control system that uses predictive models to bridge the gap between sootblower operation and boiler performance goals. The system uses predictive modeling and heuristics (rules) associated with different zones in a boiler to determine an optimal sequence of sootblower operations and achieve boiler performance targets. The system performs the sootblower optimization while observing any operational constraints placed on the sootblowers. | 2013-01-17 |
20130018832 | DATA STRUCTURE AND A METHOD FOR USING THE DATA STRUCTUREAANM Ramanathan; KiruthikaAACI SingaporeAACO SGAAGP Ramanathan; Kiruthika Singapore SGAANM Sadeghi; SepidehAACI SingaporeAACO SGAAGP Sadeghi; Sepideh Singapore SG - A method is proposed of generating a data structure that comprises a plurality of modules containing neurons. Each module performs a function defined by the neurons. The modules are structured hierarchically in layers, in a bottom-up manner. Competitive ciustering is used to generate the neurons. In the bottom layer, the neurons are associated with data clusters in training data, and in higher layers the neurons are associated with clusters in the output of the next lower layer. Hebbian Association is used to generate “connectivity” data, by which is meant data for pairs of the neurons (in the same layer or in different layer) indicative of the correlation between the output of the pair of neurons. | 2013-01-17 |
20130018833 | NEURAL NETWORK SYSTEM AND METHOD FOR CONTROLLING OUTPUT BASED ON USER FEEDBACK - For various information sources, information output based on user feedback about information from the sources is controlled. A neural network module selects object(s) to receive information from the information sources based on inputs and weight values during that epoch. A server, associated with the neural network module, provides the object(s) to recipients. The object(s) may comprise electronic mail messages, chat participants viewers, or slots within a link directory page. The recipients provide feedback about the information during an epoch. At the conclusion of an epoch, the neural network takes the feedback provided by the recipients and generates a rating value for the object(s). Based on the rating value and the selections made, the neural network re-determines the weight values within the network. The neural network then selects the object(s) to receive information during a subsequent epoch using the re-determined weight values and the inputs for that subsequent epoch. | 2013-01-17 |
20130018834 | STATE MACHINE RESPONSIVE TO MEDIA SOURCESAANM Dal Lin Junior; Reynaldo AmadeuAACI CuritibaAACO BRAAGP Dal Lin Junior; Reynaldo Amadeu Curitiba BR - A state machine includes inputs configured to receive media signals from multiple media sources; state logic configured to respond to receipt of media signals by the inputs; and outputs configured to output logical states where each of the logical states calls for rendering of media from one of the multiple media sources. Various other examples of devices, assemblies, systems, methods, etc., are also disclosed. | 2013-01-17 |
20130018835 | 100GBPS SECURITY AND SEARCH ARCHITECTURE USING PROGRAMMABLE INTELLIGENT SEARCH MEMORY - Programmable Intelligent Search Memory (PRISM) architecture provides capabilities for high performance content search. This architecture creates an innovative memory that can be programmed with content search rules which are used by the memory to evaluate presented content for matching with the programmed rules. When the content being searched matches any of the rules in the PRISM, action(s) associated with the matched rule(s) are taken. Content search rules comprise regular expressions which are converted to finite state automata and then programmed in PRISM for evaluating content with the search rules. PRISM architecture comprises of a plurality of PRISM clusters (PMC) which comprise a plurality of PRISM Search Engines. Groups of PMCs can be programmed with the same rules and used in parallel to apply these rules to multiple data streams simultaneously to achieve increased performance. PMC groups provide 10 Gbps performance with 10 PMC groups enabling 100 Gbps content search and security performance. | 2013-01-17 |
20130018836 | PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS - Artificial intelligence engine that receives data related to at least one of at least one available network of a mobile communication environment and system data of a mobile device in the mobile communication environment. The artificial intelligence engine includes a rules engine that receives a currently configured set including at least one rule, the at least one rule includes at least one condition and at least one action. The at least one condition includes at least one predicate and at least one condition state, and the rules engine is structured to evaluate the at least one condition and the at least one predicate. Further, a triggering device triggers the at least one action in accordance with the evaluation of the at least one condition and the at least one predicate. | 2013-01-17 |
20130018837 | EMOTION RECOGNITION APPARATUS AND METHODAANM Lee; Ho-SubAACI SeoulAACO KRAAGP Lee; Ho-Sub Seoul KR - An emotion recognition apparatus and method are provided. The emotion recognition apparatus acquires a first emotion factor and a second emotion factor of an emotion model. An emotional state of a user is estimated based on the first emotion factor and the second emotion factor. The emotion recognition apparatus may also acquire a third emotion factor of the emotion model. | 2013-01-17 |
20130018838 | System and Method for Social Influence Credentialing within a Sentiment Sharing Community - The present invention provides a structured sentiment expression and management system and method. The present invention can receive sentiment content from at least two contributing users, wherein the received content is structured according to a specific human emotion, gesture or feeling and a level of intensity of the specific human emotion, gesture or feeling. The present invention further displays the received content in a pre-defined and use-selected sentiment category related to the specific human emotion, gesture or feeling. In one embodiment, the present invention can calculate a series of statistical measurements associated with the user-structured sentiment content, apply each measurement of the series of measurements to a respective scale to obtain a scaled score for each measurement and determine a social influence score based upon the scaled scores. | 2013-01-17 |
20130018839 | ENABLING COMPUTATIONAL PROCESS AS A DYNAMIC DATA SOURCE FOR BI REPORTING SYSTEMS - There is provided a system, method and computer program product for integrating at least one analytical or modeling driver into an existing business analytic environment. The system comprises a BAMS (Business Analytics and Mathematical Sciences) driver, implemented on the memory device and run by the processor, loads a real database driver and redirects a request from a client application to the real database driver. An extension driver, invoked by the BAMS driver, provides an interface to a data modeling or processing software and converts the interface from a software environment compiled by a programming language to another software environment targeted to another programming language. The extension driver extends or overrides functionalities of the BAMS driver. Implementing the BAMS driver and the extension driver in the existing business analytic environment do not require any change made on the existing business analytic environment. | 2013-01-17 |
20130018840 | Enhanced usage of business intelligence systemsAANM Averbuch; JakobAACI NetanyaAACO ILAAGP Averbuch; Jakob Netanya IL - A collaborative Business Intelligence (BI) system comprising pages based on said BI system data, comprising a collaboration platform having means for selecting most relevant users and most relevant pages and means for enabling collaboration between users, | 2013-01-17 |
20130018841 | ENABLING COMPUTATIONAL PROCESS AS A DYNAMIC DATA SOURCE FOR BI REPORTING SYSTEMS - A system, method and computer program product for integrating at least one analytical or modeling driver into an existing business analytic environment. The system comprises a BAMS (Business Analytics and Mathematical Sciences) driver, implemented on the memory device and run by the processor, loads a real database driver and redirects a request from a client application to the real database driver. An extension driver, invoked by the BAMS driver, provides an interface to a data modeling or processing software and converts the interface from a software environment compiled by a programming language to another software environment targeted to another programming language. The extension driver extends or overrides functionalities of the BAMS driver. Implementing the BAMS driver and the extension driver in the existing business analytic environment do not require any change made on the existing business analytic environment. | 2013-01-17 |
20130018842 | SYSTEM AND METHOD FOR CACHING MOBILE SERVICES DATABASE OBJECTSAANM Calippe; Joel RAACI San JoseAAST CAAACO USAAGP Calippe; Joel R San Jose CA USAANM Ortega; Claudio A.AACI Redwood CityAAST CAAACO USAAGP Ortega; Claudio A. Redwood City CA US - A method and system for updating a mobile services database by caching some or all of relevant portions thereof, identifying and optionally prioritize those data objects that need updating, and periodically update only those data objects in response to a triggering event. | 2013-01-17 |
20130018843 | STORING DATA FOLLOWING A POWER OUTAGE AND WITHOUT A PROPER TIME SOURCEAANM Bultman; Robert MartenAACI LouisvilleAAST KYAACO USAAGP Bultman; Robert Marten Louisville KY USAANM McDowell; Irena JozicAACI LouisvilleAAST KYAACO USAAGP McDowell; Irena Jozic Louisville KY USAANM Huff; Joshua BlakeAACI LouisvilleAAST KYAACO USAAGP Huff; Joshua Blake Louisville KY US - A system associated with a home energy gateway (HEG) is provided. The system includes a database having a plurality of data entry blocks, each block corresponding to a time interval and an internal database timing device configured to sync with an external real-time time server and maintain accurate time in the database. The home energy gateway is configured to add time-stamped data entries to the database. A homeowner may select a time period for a power outage so that the system sends an alert if the time period power outage is exceeded. | 2013-01-17 |
20130018844 | SYSTEMS AND METHODS FOR THE ORGANIZED DISTRIBUTION OF RELATED DATA - Embodiments relate to methods and systems for building representations of related subjects. The representations may include a plurality of nodes, each being associated with a subject. Users may be able to access records and/or source documents related to a plurality of subjects and add or modify node characteristics based thereon. Users may be able to perform an interaction and/or modification related to a record page. Other users (e.g., users connected to the record page) may be notified of such interaction and/or modification. | 2013-01-17 |
20130018845 | SYSTEM AND METHOD FOR MANAGING DUPLICATE FILE UPLOADSAANM Macaskill; DonAACI Los AltosAAST CAAACO USAAGP Macaskill; Don Los Altos CA USAANM Nichols; SamuelAACI Mountain ViewAAST CAAACO USAAGP Nichols; Samuel Mountain View CA US - A method for managing uploads of duplicate files. The method includes receiving a request from a user or an uploader client to upload a first file to an online album, and determining whether the first file is a duplicate of a second file included in the online album based on one or more attributes shared between the first file and the second file. Based on upload preferences associated with the user, the first file is caused to be not uploaded to the online album, the first file is caused to be uploaded as a new file to the online album, or the first file is caused to be uploaded as a replacement for the second file. | 2013-01-17 |
20130018846 | DATA BACKUP METHOD AND DEVICE FOR MOBILE TERMINALAANM Zhou; BaozhongAACI HuizhouAACO CNAAGP Zhou; Baozhong Huizhou CNAANM Zheng; YuAACI HuizhouAACO CNAAGP Zheng; Yu Huizhou CNAANM Ding; YangAACI HuizhouAACO CNAAGP Ding; Yang Huizhou CN - The present invention relates to a mobile terminal technology. The present invention discloses a data back method and device for a mobile terminal. Since the data backup method and device of the mobile terminal provided in the present invention encodes a data in the mobile terminal into UTF-8 and stores it in the xml file, it is quite convenient to back up the data in the mobile terminal to the xml file. It is also beneficial for a user to manage the data in the mobile terminal. The present invention provides convenience for the user, the operation is simple, and the backup is easy to be done. | 2013-01-17 |
20130018847 | DATABASE ARCHIVING PERFORMANCE BENEFIT DETERMINATIONAANM Gong; YuAACI Half Moon BayAAST CAAACO USAAGP Gong; Yu Half Moon Bay CA US - A database archiving performance benefit determination system may include a data reduction module to ascertain a reduction value of data stored on a database, and a database setup module to ascertain a setup of the database. A performance modeling module may calculate a performance increase for a database application using the database based on the reduction value, the setup of the database, and at least one parameter representing the database application. | 2013-01-17 |
20130018848 | DETERMINING AND PRESENTING PROVENANCE AND LINEAGE FOR CONTENT IN A CONTENT MANAGEMENT SYSTEMAANM Velasco; Marc B.AACI OrangeAAST CAAACO USAAGP Velasco; Marc B. Orange CA US - Methods and apparatus, including computer program products, implementing and using techniques for determining provenance and lineage for content elements in a content management system. An option to track provenance and lineage data for the content element is provided in response to a content element being entered into a content management system. A provenance metadata attribute and a lineage metadata attribute are associated with the content element in response to selecting the option to track provenance and lineage data. An extent of difference is determined between the original content element and the changed content element in response to a change of content being made to the content element. The provenance metadata attribute is updated to reflect the determined extent of difference. It is determined what user changed the content element, and the lineage metadata attribute is updated to reflect the user's involvement in changing the content element. | 2013-01-17 |
20130018849 | MANAGEMENT OF TEMPORAL DATA BY MEANS OF A CANONICAL SCHEMA - Computer programs embodied in computer-readable media that can use canonical schemas to persist data from non-temporal tables, effective-time tables, assertion-time tables, and bitemporal tables, and that can enforce temporal integrity constraints on those tables, are provided. In one embodiment, the canonical schemas are used by database tables. In another embodiment, they are used by the physical files which persist data from those tables. Temporal metadata is used to express temporal requirements. Thus, uni-temporal, bitemporal, and temporally-enabled non-temporal tables can be generated without altering existing data models or designing temporal features into new data models. Support is also provided for managing temporal data that exists in future assertion time, and for using episodes to enforce temporal referential integrity. | 2013-01-17 |
20130018850 | System And Method For Product Customization Synchronization - A computer implemented method for configuring multiple products within a defined grouping of user-configurable products including providing a computer-implemented database of user-configurable products at a first computer, each user-configurable product including design parameters distinguishing the user-configurable product from other user-configurable products, each design parameter including a range of values, providing a listing of user-configurable products based on one or, more product configuration selections provided by a user, receiving a selection of a plurality of user-configurable products from the listing of user-configurable products, the selection including identifying a grouping to be associated with the each user-configurable product to create at least two virtual product groups. Each grouping includes at least two user-configurable products. The method further includes receiving a user change at least one design parameter for user-configurable products of a selected grouping and modifying the configuration of all user-configurable products within the selected grouping to modify the design parameters. | 2013-01-17 |
20130018851 | INTELLIGENT DEDUPLICATION DATA PREFETCHINGAANM Jayaraman; VinodAACI San FranciscoAAST CAAACO USAAGP Jayaraman; Vinod San Francisco CA USAANM Bolla; Ratna ManojAACI HyderabadAACO INAAGP Bolla; Ratna Manoj Hyderabad IN - Deduplication dictionaries are used to maintain data chunk identifier and location pairings in a deduplication system. When access to a particular data chunk is requested, a deduplication dictionary is accessed to determine the location of the data chunk and a datastore is accessed to retrieve the data chunk. However, deduplication dictionaries are large and typically maintained on disk, so dictionary access is expensive. Techniques and mechanisms of the present invention allow prefetches or read aheads of datastore (DS) headers. For example, if a dictionary hit results in datastore DS(X), then headers for DS (X+1), DS (X+2), DS(X+read-ahead-window) are prefetched ahead of time. These datastore headers are cached in memory, and indexed by datastore identifier. Before going to the dictionary, a lookup is first performed in the cached headers to reduce deduplication data access request latency. | 2013-01-17 |
20130018852 | DELETED DATA RECOVERY IN DATA STORAGE SYSTEMSAANM Barton; Leslie A.AACI San JoseAAST CAAACO USAAGP Barton; Leslie A. San Jose CA USAANM Johnson; Gavin S.AACI San JoseAAST CAAACO USAAGP Johnson; Gavin S. San Jose CA USAANM Koester; Michael J.AACI HollisterAAST CAAACO USAAGP Koester; Michael J. Hollister CA USAANM Van Noorden; Carrie J.AACI SaratogaAAST CAAACO USAAGP Van Noorden; Carrie J. Saratoga CA US - In one embodiment, a system includes a data storage device for storing one or more storage volumes, logic adapted for associating an indicator with a data set on the one or more storage volumes, wherein the indicator is in a first state indicating that the data set is accessible, logic adapted for storing the indicator associated with the data set in a data set descriptor record, wherein the record is stored in at least one mapping of the one or more storage volumes, logic adapted for receiving a request to delete the data set, logic adapted for changing the indicator to a second state indicating that the data set is inaccessible in response to the request to delete the data set, with the proviso that the data set is unchanged, logic adapted for receiving a request to restore the deleted data set, and logic adapted for restoring the indicator from the second state to the first state in response to the request to restore the deleted data set. | 2013-01-17 |
20130018853 | ACCELERATED DEDUPLICATION - Mechanisms are provided for accelerated data deduplication. A data stream is received an input interface and maintained in memory. Chunk boundaries are detected and chunk fingerprints are calculated using a deduplication accelerator while a processor maintains a state machine. A deduplication dictionary is accessed using a chunk fingerprint to determine if the associated data chunk has previously been written to persistent memory. If the data chunk has previously been written, reference counts may be updated but the data chunk need not be stored again. Otherwise, datastore suitcases, filemaps, and the deduplication dictionary may be updated to reflect storage of the data chunk. Direct memory access (DMA) addresses are provided to directly transfer a chunk to an output interface as needed. | 2013-01-17 |
20130018854 | USE OF SIMILARITY HASH TO ROUTE DATA FOR IMPROVED DEDUPLICATION IN A STORAGE SERVER CLUSTER - A technique for routing data for improved deduplication in a storage server cluster includes computing, for each node in the cluster, a value collectively representative of the data stored on the node, such as a “geometric center” of the node. New or modified data is routed to the node which has stored data identical or most similar to the new or modified data, as determined based on those values. Each node stores a plurality of chunks of data, where each chunk includes multiple deduplication segments. A content hash is computed for each deduplication segment in each node, and a similarity hash is computed for each chunk from the content hashes of all segments in the chunk. A geometric center of a node is computed from the similarity hashes of the chunks stored in the node. | 2013-01-17 |
20130018855 | DATA DEDUPLICATION - A method for data deduplication includes receiving a set of hashes derived from a data chunk of a set of input data chunks | 2013-01-17 |
20130018856 | COMPRESSION OF BITMAPS AND VALUES - The present invention relates to compression of values and bitmaps, and methods thereof. Such methods are configured for operating on a computer system having a word length architecture of length WL and are based on the observation that not all the bits used for the run-length counter—i.e., the fill length field (FL) inhere—are often used, since runs are seldom so long. Contrarily to other compression schemes (e.g., WAH), said methods may assign the unused bits to one or more position list fields (PL, PL | 2013-01-17 |
20130018857 | SYSTEM AND METHOD FOR FILE SYSTEM LEVEL COMPRESSION USING COMPRESSION GROUP DESCRIPTORS - A system and method for transparently compressing file system data using compression group descriptors is provided. When data contained within a compression group be compressed beyond a predefined threshold value, a compression group descriptor is included in the compression group that signifies that the data for the group of level 0 blocks is compressed into a lesser number of physical data blocks. When performing a read operation, the file system first determines the appropriate compression group that contains the desired data and determines whether the compression group has been compressed. If so, the file system decompresses the data in the compression group before returning the decompressed data. If the magic value is not the first pointer position, then the data within the compression group was previously stored in an uncompressed format, and the data may be returned without performing a decompression operation. | 2013-01-17 |
20130018858 | USE AND ENFORCEMENT OF PROVENANCE AND LINEAGE CONSTRAINTSAANM Velasco; Marc B.AACI OrangeAAST CAAACO USAAGP Velasco; Marc B. Orange CA US - Provided are techniques for managing constraints. Content data and content metadata that is associated with the content data is stored. In response to receiving a change to one of the content data and the content metadata, a provenance value is calculated based on the change, wherein the provenance value represents a change in content between the changed content data or the content metadata and an original version of the content data or the content metadata, and a lineage value is calculated based on the change, wherein the lineage value represents a change in authorship between the changed content data or the content metadata and the original version of the content data or the content metadata. It is determined whether the calculated provenance value violates at least one constraint. It is determined whether the calculated lineage value violates at least one constraint. In response to determining that the calculated provenance value or the calculated lineage value violates at least one constraint, one or more actions associated with the violated constraint are performed, wherein the one or more actions include allowing the change and preventing the change. | 2013-01-17 |
20130018859 | Contact Management System and Method - A computer-implemented contact management method includes creating a contact record in a contact management system, generating a unique serial number corresponding to the contact record, conveying the serial number to a recipient, entering, by the recipient, the serial number into an internet-enabled computer application, requesting, by the application, the record from the contact management system corresponding to the serial number, and receiving data associated with the contact record. The received contact data may be automatically updated through an update function. A contact management system includes a data storage and a contact management server. A plurality of interne-enabled computer applications associated to the same user account may receive the same information using a synchronization function without further user input. | 2013-01-17 |
20130018860 | PARALLEL NESTED TRANSACTIONS IN TRANSACTIONAL MEMORY - Various technologies and techniques are disclosed for supporting parallel nested transactions in a transactional memory system. Multiple closed nested transactions are created for a single parent transaction, and the closed nested transactions are executed concurrently as parallel nested transactions. Various techniques are used to ensure effects of the parallel nested transactions are hidden from other transactions outside the parent transaction until the parent transaction commits. For example, retry is allowed to work correctly with parallel nested transactions. When a transaction that is a parallel nested transaction or a child transaction of the parallel nested transaction executes a retry, a read set of the transaction is registered for the retry. When a decision is made to propagate the retry past a parallel nested transaction parent of the transaction, keeping the read set registered and making the read set part of a parent read set. | 2013-01-17 |
20130018861 | DUAL LOCKING MECHANISM FOR A DOMAIN - One embodiment is directed to a method for controlling access to a domain. The method includes receiving a request from a workbook process for a shared lock on a primary lock file and a secondary lock file controlling access to the domain, and providing the shared lock(s) when there is not an exclusive lock. While the workbook process is still in progress, the method may further include receiving a request from a batch process for an exclusive lock on the primary lock file, immediately providing an exclusive lock on the primary lock file the batch process, receiving a request from the batch process for an exclusive lock on the secondary lock file, and providing the exclusive lock on the secondary lock file to the batch process when there is not a shared lock on the secondary lock file. | 2013-01-17 |
20130018862 | Human Filtered Community Based Search and Discovery EngineAANM Munemann; Jean AlexanderaAACI LondonAACO GBAAGP Munemann; Jean Alexandera London GB - It is a search process, which combines human inputted filters, emotional ratings and tags, select criteria and selection, identified and unidentified sources, and negative filters, for a community based Intranet and Internet combined search and discovery engine, and database management system. It works though set user generated communities [families, clubs, organizations etc.] individually, or joining together to identify, rate, and trust their own Intranet information, and then the external Internet content. Through human participation content is catalogued, and prioritized according to group needs. This brings the emphasis on to human judgement for the end search results. | 2013-01-17 |
20130018863 | METHODS AND APPARATUS FOR IDENTIFYING AND PROVIDING INFORMATION SOUGHT BY A USERAANM Regan; Marc W.AACI CambridgeAAST MAAACO USAAGP Regan; Marc W. Cambridge MA USAANM Sejnoha; ValdimirAACI LexingtonAAST MAAACO USAAGP Sejnoha; Valdimir Lexington MA USAANM Evermann; GunnarAACI BostonAAST MAAACO USAAGP Evermann; Gunnar Boston MA USAANM Laverty; Stephen W.AACI SomervilleAAST MAAACO USAAGP Laverty; Stephen W. Somerville MA USAANM Slater; Jeremy A.AACI GrotonAAST MAAACO USAAGP Slater; Jeremy A. Groton MA USAANM Watson; John R.AACI BostonAAST MAAACO USAAGP Watson; John R. Boston MA USAANM Lyons; Peter K.AACI ChelmsfordAAST MAAACO USAAGP Lyons; Peter K. Chelmsford MA USAANM LaSante; Ryan S.AACI LittletonAAST MAAACO USAAGP LaSante; Ryan S. Littleton MA USAANM Brown; Sean P.AACI San FranciscoAAST CAAACO USAAGP Brown; Sean P. San Francisco CA US - Some embodiments relate to techniques for performing a search for content, in which a user may issue a search query, and the search engine or engines to which that query is provided may be determined dynamically based on any of a variety of factors. For example, in some embodiments, the search engine or engines to which the query is provided may be determined based on the content of the search query, and/or auxiliary information such as the user's location, demographics, query history and/or browsing history. | 2013-01-17 |
20130018864 | METHODS AND APPARATUS FOR IDENTIFYING AND PROVIDING INFORMATION OF VARIOUS TYPES TO A USERAANM Regan; Marc W.AACI CambridgeAAST MAAACO USAAGP Regan; Marc W. Cambridge MA USAANM Sejnoha; VladimirAACI LexingtonAAST MAAACO USAAGP Sejnoha; Vladimir Lexington MA USAANM Hebert; MatthieuAACI MelochevilleAACO CAAAGP Hebert; Matthieu Melocheville CAAANM Duta; NicolaeAACI WinchesterAAST MAAACO USAAGP Duta; Nicolae Winchester MA USAANM Halperin; NirAACI Hod-HasharonAACO ILAAGP Halperin; Nir Hod-Hasharon ILAANM Brikman; CarmitAACI Kfar-WarbourgAACO ILAAGP Brikman; Carmit Kfar-Warbourg ILAANM Leong; MichaelAACI MontrealAACO CAAAGP Leong; Michael Montreal CA - Some embodiments relate to techniques for receiving a query comprising content; in response to the query being received, determining that the content may have at least a first semantic meaning or a second semantic meaning that is different than the first semantic meaning; and identifying a plurality of search engines to which to submit a representation of the query, the plurality of search engines comprising a first search engine identified based on the first semantic meaning and a second search engine identified based on the second semantic meaning. | 2013-01-17 |
20130018865 | METHODS AND APPARATUS FOR EMPLOYING A USER'S LOCATION IN PROVIDING INFORMATION TO THE USERAANM Regan; Marc W.AACI CambridgeAAST MAAACO USAAGP Regan; Marc W. Cambridge MA USAANM Leong; MichaelAACO USAAGP Leong; Michael USAANM Brikman; CarmitAACI Kfar-WarbourgAACO ILAAGP Brikman; Carmit Kfar-Warbourg ILAANM LaSante; Ryan S.AACI LittletonAAST MAAACO USAAGP LaSante; Ryan S. Littleton MA USAANM Watson; John R.AACI BostonAAST MAAACO USAAGP Watson; John R. Boston MA US - Some embodiments relate to techniques for receiving a query from a device and location data indicating a location of the device, the location data having a level of specificity; in response to the query being received, identifying at least one first search engine to which to submit a representation of the query; determining whether the level of specificity of the received location data is sufficient for the at least one first search engine; if the level of specificity of the location data is sufficient, instructing the device to issue the representation of the query to the at least one first search engine; and if the level of specificity of the location data is not sufficient, instructing the device to send, to to the at least one computer, location data at a greater level of specificity. | 2013-01-17 |
20130018866 | SYSTEM FOR SEARCHING FOR A WEB DOCUMENT - Provided is a system for searching for a web document. The system includes a receiver configured to receive a user's search request. A search engine is configured to search for a web document related to the search request based on a web document index, and to determine a move path for accessing the web document based on a move path index of the web document. A sender is configured to send the move path for accessing the web document to the user. | 2013-01-17 |
20130018867 | METHODS AND APPARATUS FOR INITIATING AN ACTIONAANM Regan; Marc W.AACI CambridgeAAST MAAACO USAAGP Regan; Marc W. Cambridge MA USAANM Sejnoha; VladimirAACI LexingtonAAST MAAACO USAAGP Sejnoha; Vladimir Lexington MA USAANM Evermann; GunnarAACI BostonAAST MAAACO USAAGP Evermann; Gunnar Boston MA USAANM Brown; Sean P.AACI San FranciscoAAST CAAACO USAAGP Brown; Sean P. San Francisco CA USAANM Laverty; Stephen W.AACI SomervilleAAST MAAACO USAAGP Laverty; Stephen W. Somerville MA USAANM Slater; Jeremy A.AACI GrotonAAST MAAACO USAAGP Slater; Jeremy A. Groton MA USAANM Watson; John R.AACI BostonAAST MAAACO USAAGP Watson; John R. Boston MA USAANM Lyons; Peter K.AACI ChelmsfordAAST MAAACO USAAGP Lyons; Peter K. Chelmsford MA USAANM LaSante; Ryan S.AACI LittletonAAST MAAACO USAAGP LaSante; Ryan S. Littleton MA US - Some embodiments relate to techniques for receiving a query from a device, the query comprising content; determining based at least in part on the content of the query that an application is to be launched on the device; and causing the device to launch the application using at least some information determined from the content of the query. Some embodiments relate to techniques for receiving a free-form query from a user; transferring a representation of the query to at least one computer; and receiving from the at least one computer at least one instruction to launch an application on the device. | 2013-01-17 |
20130018868 | SEARCHING DOCUMENTATION ACROSS INTERCONNECTED NODES IN A DISTRIBUTED NETWORKAANM Chi; Lucas YiAACI Cortlandt ManorAAST NYAACO USAAGP Chi; Lucas Yi Cortlandt Manor NY USAANM Parker; BryanAACI ChicagoAAST ILAACO USAAGP Parker; Bryan Chicago IL USAANM Xu; Xi SeanAACI Lake HiawathaAAST NYAACO USAAGP Xu; Xi Sean Lake Hiawatha NY US - Documentation from a network including a plurality of computing nodes is achieved by processing a query for documentation at one or more of the computing nodes within the network in accordance with a priority of each of the computing nodes to obtain search results pertaining to the documentation, where the priority for each computing node is based on a quantity of incoming connections for each computing node. The search results are prioritized in accordance with the priority of the corresponding one or more computing nodes providing the search results. | 2013-01-17 |
20130018869 | COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR PROVIDING INTERNAL CUSTOM FEED ITEMS - Disclosed are systems, apparatus, and methods for presenting feed items in an information feed. In various implementations, a first result object is received, where the first result object is a data structure including a result of a feed query, where the result of the feed query includes at least one feed item to be included in the information feed, and where the at least one feed item has a first presentation. In various implementations, at least one custom object associated with the at least one feed item is received, where the at least one custom object provides a second presentation of the at least one feed item. In some implementations, the at least one custom object is included with the first result object to define an intermediary data structure. In some implementations, the intermediary data structure is stored on one or more storage mediums. | 2013-01-17 |
20130018870 | METHOD AND APPARATUS FOR MANAGING FOR HANDWRITTEN MEMO DATAAANM CHO; Sung JaeAACI SeoulAACO KRAAGP CHO; Sung Jae Seoul KR - A method and apparatus for storing and searching for handwritten memo data in a database in which the handwritten memo data are stored in the form of bit streams representing continuous and discontinuous elements constituting the handwritten memo data are provided. The memo data search method includes receiving an input of memo data, storing the memo data in the form of a bit stream, searching, when a search for the memo data is requested, a memo index database for the memo data, and displaying a search result. The handwritten memo data management method and apparatus stores and searches for the memo data regardless of orientation and size. | 2013-01-17 |
20130018871 | Identifying and ranking networked biographies and referral paths corresponding to selected qualificationsAANM Mehta; SunilAACI FremontAAST CAAACO USAAGP Mehta; Sunil Fremont CA USAANM Meyer; DavidAACO USAAGP Meyer; David USAANM Murgai; PoonamAACI FremontAAST CAAACO USAAGP Murgai; Poonam Fremont CA US - The most common automated search methods produce less-than-ideal results when searching online resumes, profiles, and the like (“biographies”) for the identities of people with a searcher-selected qualification (“candidates”). Keywords, their proximities, and their repetitions are less informative in biographies than in other informational documents. Similarly, chains of social connection (“referral paths”) do not always reveal the likelihood or ease of a searcher's introduction to a candidate. In both cases, the display order of results may be unrelated to any estimate of merit. To answer the question “Whom do I need and how do I reach them?” a classifier system uses heuristics or algorithms adapted to match the reactions of human experts on the selected qualifications. Terms in biographies, regardless of structure, are standardized and disambiguated for accurate comparisons, meaningful context is preserved, and biographies and referral paths are scored based on expected usefulness to the searcher. | 2013-01-17 |
20130018872 | Dynamically Altered Search AssistanceAANM Velipasaoglu; Omer EmreAACI San FranciscoAAST CAAACO USAAGP Velipasaoglu; Omer Emre San Francisco CA US - Search-engine software displays a group of search results in a graphical user interface (GUI) for a search engine. The search-engine software captures positive feedback and negative feedback as to the search results from a user. Then the search-engine software determines a collective aboutness signature for the search results associated with the positive feedback and a collective aboutness signature for search results associated with the negative feedback. The search-engine software obtains a score of similarity to each of the collective aboutness signatures for a representation of each query suggestion in a group of query suggestions. Then the search-engine software separates the scored query suggestions into two or more groups, based on the similarity scores, and displays query suggestions from the groups in the GUI. | 2013-01-17 |
20130018873 | VERSIONING OF METADATA, INCLUDING PRESENTATION OF PROVENANCE AND LINEAGE FOR VERSIONED METADATAAANM Velasco; MarcAACI OrangeAAST CAAACO USAAGP Velasco; Marc Orange CA US - Metadata associated with content is versioned by receiving updated values for the metadata and storing the updated values and also previous values for metadata separately from the content, comparing the updated values to the previous values of the metadata, and determining a modification indicator for the metadata based upon the comparison of the updated values to the previous values of the metadata, where the modification indicator provides an indication of extent of differences between the updated and previous values. The modification indicator for the metadata can further be displayed to provide version information for the metadata to a user. | 2013-01-17 |
20130018874 | SYSTEM AND METHOD OF SENTIMENT DATA USE - A method, computer-readable medium, and a computer system for processing data are disclosed. First data associated with a search may be accessed. Second data may be accessed from a database using the first data, where the second data may be associated with at least one sentiment of the first data. The second data may include at least one score, at least one classification, and at least one degree, some combination thereof, etc. Third data may be generated, based on the second data, for performing at least one operation associated with the search results. The at least one operation may include filtering the search results, ranking the search results, displaying an image associated with the at least one sentiment, some combination thereof, etc. | 2013-01-17 |
20130018875 | SYSTEM AND METHOD FOR ORDERING SEMANTIC SUB-KEYS UTILIZING SUPERLATIVE ADJECTIVES - A method, computer-readable medium, and a computer system for determining an ordering is disclosed. A search query including a semantic key and a superlative adjective may be accessed, where the semantic key may be associated with a plurality of semantic sub-keys. At least one respective instance of at least one respective superlative adjective in at least one respective document may be determined for each semantic sub-key of the plurality of semantic sub-keys. Each instance of the at least one respective instance may include a respective superlative adjective that is associated with a respective sentiment of a respective semantic sub-key of the plurality of semantic sub-keys. An ordering of the plurality of semantic sub-keys may be determined based on the at least one respective instance of at least one respective superlative adjective in at least one respective document. | 2013-01-17 |
20130018876 | PROVIDING ANSWERS TO QUESTIONS USING HYPOTHESIS PRUNING - A method, system and computer program product for generating answers to questions. In one embodiment, the method comprises receiving a query, conducting a search through one or more data sources to identify candidate answers to the query, and providing each of the candidate answers with a preliminary score. The method further comprises filtering out any of the candidate answers with a preliminary score that does not satisfy a defined condition. The candidate answers having preliminary scores that satisfy this condition form a subset of the candidate answers. Each of the candidate answers in this subset is processed to produce further scores. A ranking function is applied to these further scores to determine a ranking for each of the candidate answers in the subset; and after this ranking function is applied, one or more of the candidate answers are selected as one or more final answers to the query. | 2013-01-17 |
20130018877 | Identifying and Changing Personal Information - Systems, apparatuses, and methods for analyzing information about a user are presented which include obtaining at least one search result based on at least one search terms describing the user; presenting the at least one search result to the user; receiving an indication from the user of the desirability of a search result; and performing an action based on the desirability of the search result. Systems, apparatuses, and methods are also presented for determining a reputation score representing the reputation of a user which include collecting search results from data source, determining an effect on the reputation of the user of the search results from the data source, and calculating a reputation score for the user based on the determined effect on the reputation of the user from the search results from the data source. | 2013-01-17 |
20130018878 | COMMUNICATIONS SYSTEM, APPARATUS AND METHODAANM Sansom; Patrick MichaelAACI LondonAACO GBAAGP Sansom; Patrick Michael London GBAANM Valentine; Ian JamesAACI LondonAACO GBAAGP Valentine; Ian James London GB - The present invention relates to a communications system ( | 2013-01-17 |
20130018879 | METHOD AND SYSTEM FOR PROVIDING RECOMMENDED INFORMATION FROM A CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM - A method for providing recommended information to a user system from a customer relationship management (CRM) system is disclosed. The method embodiment includes receiving by a server a message including a request for recommended information from a requesting user system associated with a user, where the message also includes real-time user-specific information collected by and stored on the requesting user system. The method also includes identifying by the server records managed by a CRM system, related to the real-time user-specific information and that the user is authorized to access. A relevance score is determined for each of the identified records based on relevance factors, and recommended records are selected based on the relevance scores of the recommended records. Information identifying the recommended records is included in a response message that is transmitted by the server to the requesting user system. | 2013-01-17 |
20130018880 | METHOD AND SYSTEM FOR DYNAMICALLY PROCESSING AMBIGUOUS, REDUCED TEXT SEARCH QUERIES AND HIGHLIGHTING RESULTS THEREOF - A method and system are provided of processing a search query entered by a user of a device having a text input interface with overloaded keys. The search query is directed at identifying an item from a set of items. Each of the items has a name including one or more words. The system receives from the user an ambiguous search query directed at identifying a desired item. The search query comprises a prefix substring of at least one word in the name of the desired item. The system dynamically identifies a group of one or more items from the set of items having one or more words in the names thereof matching the search query as the user enters each character of the search query. | 2013-01-17 |
20130018881 | Geo-Tagging Digital ImagesAANM Bhatt; NikhilAACI CupertinoAAST CAAACO USAAGP Bhatt; Nikhil Cupertino CA US - Methods, systems, and apparatus, including computer programs encoded on computer storage media, are described for automatically and/or interactively editing image metadata. In one aspect, the methods include the actions of obtaining two from among three items of geo-metadata associated with an image. The three items of geo-metadata include an acquisition geo-location for the image, an acquisition geo-orientation for the image and a geo-location of a subject depicted in the image. The methods further include the actions of representing on a map the two obtained items of geo-metadata associated with the image, and determining candidates for the third item of geo-metadata based on the representations of the two obtained items of geo-metadata. In addition, the methods can also include the actions of determining the third item of geo-metadata associated with the image from among the generated candidates. | 2013-01-17 |
20130018882 | Method and System for Sharing Life Experience Information - A computer-implemented method and system comprise a server executing a computer-executable program being configured for receiving psychological profiling information, life experience information and tags at least comprising date information, comments and emotions for the life experience information from registered members of a life experience system. The server is further configured for processing the psychological profiling information, life experience information and tags to generate a psychological profile of the member and a timeline of the life experience information. A client executing a computer-executable application is configured for submitting the psychological profiling information, life experience information and tags to the server. The client is further configured for receiving from the server a home page in which the time line and the life experience information is accessible. | 2013-01-17 |
20130018883 | SYSTEM FOR MANAGING RELATIONSHIP AND HISTORY OF COMBINED SPACE OF INTEREST (SOI) OBJECT AND CONTENT - A system for managing a relationship or a history of a space of interest (SOI) containing information of a space having a certain area or structure and a content, the system comprising: an SOI-content selection unit configured to newly generate a desired SOI and contents or select the desired SOI or contents among existing SOIs or contents; a term of use setting unit configured to set a duration of use or a theme of use of the generated or selected SOI and contents; and an SOI-content relationship management unit configured to generate contents of an SOI that connects the generated or selected SOI and contents and configured to manage the contents of the SOI. | 2013-01-17 |
20130018884 | Systems and Methods for Providing a Content Item Database and Identifying Content ItemsAANM Chandrasekharappa; Santhosh BaramasagaraAACI BangaloreAACO INAAGP Chandrasekharappa; Santhosh Baramasagara Bangalore INAANM Ekambaram; SivakumarAACI BangaloreAACO INAAGP Ekambaram; Sivakumar Bangalore INAANM Sohoney; SaurabhAACI BangaloreAACO INAAGP Sohoney; Saurabh Bangalore INAANM Nigam; RakeshAACI ChennalAACO INAAGP Nigam; Rakesh Chennal IN - Systems and methods are provided for identifying unsolicited or unwanted electronic communications, such as spam. The disclosed embodiments also encompass systems and methods for selecting content items from a content item database. Consistent with certain embodiments, computer-implemented systems and methods may use a clustering based statistical content matching anti-spam algorithm to identify and filter spam. Such a anti-spam algorithm may be implemented to determine a degree of similarity between an incoming e-mail with a collection of one or more spam e-mails stored in a database. If the degree of similarity exceeds a predetermined threshold, the incoming e-mail may be classified as spam. Further, in accordance with other embodiments, systems and methods may be provided to determine a degree of similarity between a query or search string from a user and content items stored in a database. If the degree of similarity exceeds a predetermined threshold, the content item from the database may be identified as a content item that matches the query or search string provided by the user. | 2013-01-17 |
20130018885 | INDICATING STATES IN A TELEMATIC SYSTEMAANM Guenkova-Luy; TeodoraAACI UlmAACO DEAAGP Guenkova-Luy; Teodora Ulm DE - A status management system includes a computer-implemented method for delivering status information to a requester, comprising providing status codes, clustering the status codes in a number of status codes clusters, hierarchically sorting the status codes clusters and transmitting at least one of the status codes to the requester depending on the hierarchy of the sorted status codes clusters. | 2013-01-17 |
20130018886 | EFFECT MEASUREMENT DEVICE, EFFECT MEASUREMENT METHOD, AND EFFECT MEASUREMENT PROGRAMAANM Minamizawa; TakeakiAACI Minato-kuAACO JPAAGP Minamizawa; Takeaki Minato-ku JP - Segment group generating means | 2013-01-17 |
20130018887 | Image Viewer SystemAANM Silva; Octavio CesarAACO USAAGP Silva; Octavio Cesar US - The invention, the Image Viewer system, represents a new way to store and access medical images such as scans and X-rays. The invention is comprised of the web portal design, including the web browser layout, and the software application. A patient's medical images, created during an imaging session, are stored at a central location, a web portal, by medical personnel who catalog and code the images using the software application or a web browser. The images stored at the portal can be accessed by any networked device with a web browser or the software application from any connection to the Internet. The connection to the Internet can be wired or wireless, such as WiFi or cellular. Networked devices include PCs, tablets, laptops and smart phones. Physicians with a network device can retrieve images and enter data in the web portal, including diagnoses and personal information. Patients with a networked device can access the portal to download images or to enter their personal profile. | 2013-01-17 |
20130018888 | ANALYZING SOFTWARE-USAGE INFORMATIONAANM JOHN; PETERAACI NeckargemuendAACO DEAAGP JOHN; PETER Neckargemuend DE - Various embodiments of systems and methods for analyzing software-usage information are described herein. Traffic numbers are obtained from data stored in a database using measurement objects that are associated with one or more keys. The measurement objects output the traffic numbers and the one or more keys are related to elements of the data. Identifiers and categories are assigned to the measurement objects. The categories represent attributes of a software product. A data structure comprising the identifiers, the traffic numbers, and the categories is generated and stored. The stored data structure and a header comprising one or more fields are used to generate a report. | 2013-01-17 |
20130018889 | Lossless compression of high nominal-range dataAANM Jagmohan; AshishAACI IrvingtonAAST NYAACO USAAGP Jagmohan; Ashish Irvington NY USAANM Knight; Joshua W.AACI Mohegan LakeAAST NYAACO USAAGP Knight; Joshua W. Mohegan Lake NY USAANM Lastras-Montano; Luis A.AACI Cortlandt ManorAAST NYAACO USAAGP Lastras-Montano; Luis A. Cortlandt Manor NY US - A method for receiving a data stream that includes data samples, each data sample having one of a plurality of actual values. For each data sample in the data stream, a first index in a dictionary is selected. The dictionary includes indices corresponding to each of the plurality of actual values. The first index corresponds to an actual value of the data sample. A predicted value of the data sample is generated in response to previously received data samples in the data stream and to a prediction algorithm. A second index in the dictionary that corresponds to an actual value in the dictionary that is closest to the value of the predicted value is selected. The difference between the first index and the second index is calculated and compressed. The compressed difference between the first index and the second index is then output. This process is performed for each data sample in the data stream. | 2013-01-17 |
20130018890 | CREATING A CUSTOM INDEX IN A MULTI-TENANT DATABASE ENVIRONMENT - Methods and systems are described for creating a custom index in a multi-tenant database environment. In one embodiment, a method includes obtaining query for a multi-tenant database that is recommended as a candidate for creating an additional filter, evaluating the query against criteria to determine whether to select the query for creating the additional filter, and creating the additional filter for the query, if the query is selected. | 2013-01-17 |
20130018891 | REAL-TIME SEARCH OF VERTICALLY PARTITIONED, INVERTED INDEXES - Provided are techniques for processing a query. A query including constraints for at least two vertically partitioned, inverted indexes is received. The constraints in the query are separated based on the vertically partitioned, inverted indexes. A document identifier iterator is obtained for each of the constraints, wherein each document identifier iterator is associated with a posting list, and wherein each posting list is ordered by document identifier order. A run-time join of the posting lists is performed to obtain a final result set. | 2013-01-17 |
20130018892 | Visually Representing How a Sentiment Score is ComputedAANM Castellanos; Maria G.AACI SunnyvaleAAST CAAACO USAAGP Castellanos; Maria G. Sunnyvale CA USAANM Ruiz; PerlaAACI HermosilloAACO MXAAGP Ruiz; Perla Hermosillo MXAANM Dayal; UmeshwarAACI SaratogaAAST CAAACO USAAGP Dayal; Umeshwar Saratoga CA USAANM Dekhil; MohamedAACI Santa ClaraAAST CAAACO USAAGP Dekhil; Mohamed Santa Clara CA US - A method of visually representing how a sentiment score is computed comprises, with a sentiment scoring device, determining a number of sentiment scores for each of a number of attributes within a forum, writing a visualization file in a database based on metadata representing the sentiment scores, and outputting, to an output device, a representation of how the sentiment score was computed based on the visualization file. A system for displaying to a user how a sentiment score is computed comprises a sentiment scoring device, a forum source communicatively coupled to the sentiment scoring device, and an output device communicatively coupled to the sentiment scoring device, in which the sentiment scoring device obtains text from the forum source, determines sentiment scores for a number of attributes within the text, and outputs, to the output device, a representation of how the sentiment score was computed. | 2013-01-17 |
20130018893 | METHOD AND SYSTEM FOR DETERMINING A USER'S BRAND INFLUENCE - A method for identifying an influencer of a brand is disclosed. The method embodiment includes scanning social media objects published by at least one social networking entity to identify a first social media object posted by a first user and relating to a brand associated with a product, an enterprise, a service, a person, a concept, and/or a trackable object. The social media objects include messages, video and audio clips, and/or image files posted by a plurality of users. The method also includes calculating a brand influence score for the first user based on a plurality of influence factors. The brand influence score for the first user is compared to a threshold influence score, and the first user is identified as a brand influencer when the first user's brand influence score is greater than the threshold influence score. | 2013-01-17 |
20130018894 | SYSTEM AND METHOD OF SENTIMENT DATA GENERATION - A method, computer-readable medium, and a computer system for automatically generating sentiment data are disclosed. One or more portions of at least one document may be determined to be associated with at least one sentiment of one or more other portions of the at least one document. One or more scores associated with the at least one sentiment may be automatically determined based on at least one respective attribute of the one or more portions. The at least one respective attribute may include a positive category, a negative category, a neutral category, a degree associated with a positive sentiment, a degree associated with a negative sentiment, some combination thereof, etc. In this manner, data associated with sentiment of one or more portions of at least one document may be generated. | 2013-01-17 |
20130018895 | SYSTEMS AND METHODS FOR EXTRACTING MEANING FROM SPEECH-TO-TEXT DATA - Systems and methods are provided for simulating an interactive conversation with a recorded subject. In accordance with an implementation, a server receives a text string corresponding to a query spoken by a user during the interactive conversation, and subsequently obtains information associated with a plurality of candidate queries posed to the recorded subject. The obtained information may include, for corresponding ones of the candidate queries, a primary keyword, at least one of a contextual keyword or a qualifier keyword associated with the primary keyword, and synonym data. The server may generate scores for the candidate queries based on the text string and at least one of the keyword data or the synonym data. Based on the candidate query scores, the server may select one of the candidate queries that corresponds to the text string and video content that responds to the spoken query. | 2013-01-17 |
20130018896 | Topic and Time Based Media Affinity Estimation - An affinity server estimates an affinity between two different time based media events (e.g., TV, radio, social media content stream), between a time based media event and a specific topic, or between two different topics, where the affinity score represents an intersection between the populations of social media users who have authored social media content items regarding the two different events and/or topics. The affinity score represents an estimation of the real world affinity between the real world population of people who have an interest in both time based media events, both topics, or in a time based media event and a topic. One possible threshold for including a social media user in a population may be based on a confidence score that indicates the confidence that one or more social media content items authored by the social media user are relevant to the topic or event in question. | 2013-01-17 |
20130018897 | SYSTEM AND METHOD FOR DISTRIBUTING MEDIA RELATED TO A LOCATION - A system and method for distributing media related to a location. The physical location of a media presentation device is received over a network. The physical location of a plurality of end users are identified, via the network, wherein each of plurality of users is associated with a user device capable of storing media files. At least one of the end users is identified who is located in such proximity to the media presentation device that the user can perceive media that presented on the media presentation device. At least one media file that is currently being presented on the media presentation device is identified and transmitted over the network to each of the identified end users. | 2013-01-17 |
20130018898 | TRACKING QUERIES AND RETRIEVED RESULTSAANM FORSTMANN; GERDAACI NUSSLOCHAACO DEAAGP FORSTMANN; GERD NUSSLOCH DEAANM MUENCH; STEPHANAACI KARLSRUHEAACO DEAAGP MUENCH; STEPHAN KARLSRUHE DE - Various embodiments of systems and methods for tracking queries and retrieved results are described herein. In one aspect, a first query is associated with a first result set in a first tuple and a second query is associated with a second result set in a second tuple. The first result set is retrieved based on the execution of the first query and the second result set is retrieved based on the execution of the second query. The first and the second tuples are retained in a data structure in the order of execution of the respective queries. The retrieved result sets may be accessed forwards or backwards along the data structure without re-execution of the queries. | 2013-01-17 |
20130018899 | ELECTRONIC DATA GENERATION METHODSAANM HARGREAVES; Michael JohnAACI SunburyAACO AUAAGP HARGREAVES; Michael John Sunbury AUAANM LEVINE; MicheleAACI MelbourneAACO AUAAGP LEVINE; Michele Melbourne AUAANM MOR; Jonathan ZioAACI CheltenhamAACO AUAAGP MOR; Jonathan Zio Cheltenham AUAANM NGO; Duc AnhAACI SunshineAACO AUAAGP NGO; Duc Anh Sunshine AUAANM REEVES; Tristan AaronAACI FootscrayAACO AUAAGP REEVES; Tristan Aaron Footscray AUAANM RHYS-JONES; Grant LeslieAACI MacleodAACO AUAAGP RHYS-JONES; Grant Leslie Macleod AUAANM TARRANT; Marcus AdrianAACI Middle ParkAACO AUAAGP TARRANT; Marcus Adrian Middle Park AUAANM WILDENAUER; Michael ErnstAACI Mount MacedonAACO AUAAGP WILDENAUER; Michael Ernst Mount Macedon AU - An electronic method for generating group data indicative of the collective response of at least a subset of respondents to at least one portion of a time-varying stimulus the method comprising: receiving responses to the time-varying stimulus from respective ones of a plurality of respondent devices, each response including data indicative of a response of a respondent associated with the respective respondent device to the time-varying stimulus; filtering the responses to generate a filtered response data set that excludes responses outside of a timing tolerance relative to a portion of the time-varying stimulus to which the group data is intended to relate; and processing at least a subset of the filtered response data set to generate the group data. | 2013-01-17 |
20130018900 | METHOD AND SYSTEM FOR SEMANTIC SEARCH AGAINST A DOCUMENT COLLECTIONAANM Cheng; HeyningAACI San JoseAAST CAAACO USAAGP Cheng; Heyning San Jose CA USAANM Tunkelang; DanielAACI Mountain ViewAAST CAAACO USAAGP Tunkelang; Daniel Mountain View CA US - Disclosed in one example is a method for searching. In some examples, the method includes receiving an unstructured search query, parsing the unstructured search query into a plurality of structured search attributes using a search term attribute dictionary, performing a search of a structured database based upon the plurality of structured search attributes to identify a plurality of search results, populating a plurality of form fields of a search form with the plurality of structured search attributes, and displaying the search form in association with the search results. | 2013-01-17 |
20130018901 | Search Optimization In a Computing EnvironmentAANM Bnayahu; JonathanAACI HaifaAACO ILAAGP Bnayahu; Jonathan Haifa ILAANM Landau; ArielAACI NesherAACO ILAAGP Landau; Ariel Nesher ILAANM Nisenson; MordechaiAACI HaifaAACO ILAAGP Nisenson; Mordechai Haifa IL - Systems and methods for verifying membership in one or more sets that are subsets of a global set are provided. The method compromises representing members of the global set by mapping each member to a distinct Boolean variable of length d, wherein 2 | 2013-01-17 |
20130018902 | TRANSLATING PROGRAMMING LANGUAGE PATTERNS INTO DATABASE SCHEMA PATTERNSAANM Vickers; Arthur John CerdicAACI RedmondAAST WAAACO USAAGP Vickers; Arthur John Cerdic Redmond WA USAANM Vega; Diego BernardoAACI SammamishAAST WAAACO USAAGP Vega; Diego Bernardo Sammamish WA USAANM Miller; Rowan LaurenceAACI KirklandAAST WAAACO USAAGP Miller; Rowan Laurence Kirkland WA USAANM Peters; Andrew JohnAACI SammamishAAST WAAACO USAAGP Peters; Andrew John Sammamish WA USAANM Laverty; Timothy A.AACI SeattleAAST WAAACO USAAGP Laverty; Timothy A. Seattle WA USAANM Derstadt; Jeffrey MichaelAACI SammamishAAST WAAACO USAAGP Derstadt; Jeffrey Michael Sammamish WA US - Techniques are described herein that are capable of translating programming language patterns into database schema patterns. Examples of a programming language pattern include but are not limited to a source code pattern, an intermediate language code pattern, metadata associated with a source code pattern, metadata associated with an intermediate language code pattern, or any combination thereof. The programming language patterns may define objects that are included in an object model. Database schema patterns that define a database are automatically (e.g., inferentially) created based on respective programming language patterns that define objects of an object model. The programming language patterns are automatically mapped to the respective database schema patterns. | 2013-01-17 |
20130018903 | OPTIMIZING DATA PROCESSING USING DYNAMIC SCHEMASAANM Taranov; IgorAACI BellevueAAST WAAACO USAAGP Taranov; Igor Bellevue WA US - A computer system accesses rows of feed data. and converts the received feed data into portions of binary blob data. The computer system also sends the binary blob data to a database server which is configured to access metadata associated with a feed including a dynamic server statement to determine how to convert the binary blob data to a server table with a blob column configured to store the rows of feed data. The database server accesses feed data belonging to a particular feed and executes a dynamic server statement to create a relational dataset in an in-memory table of the server. A second dynamic statement applies data processing conditions indicated in the metadata. When feed data rows match conditions, the computer system places feed data row information into an alert table that includes references to the blob table with blob data, thereby triggering an alert. | 2013-01-17 |
20130018904 | METHOD AND SYSTEM FOR DOCUMENT INTEGRATION - A method for integrating a document from a first document repository to another document repository in a cloud computing environment is disclosed. The method embodiment includes receiving by a server a configuration setup file including information identifying a source document repository, a destination document repository located in a cloud computing environment, and at least one web portal. When an indication to upload a document from the source document repository to the destination document repository is received by the server, the server is configured to retrieve automatically the document from the source document repository, to convert automatically the document from a first format to a second format, and to transmit the converted document to the destination document repository, whereby the converted document is accessed via the at least one web portal. | 2013-01-17 |
20130018905 | METHOD AND RECORDING MACHINE FOR RECORDING HEALTH-RELATED INFORMATIONAANM Tesmer; KarlAACI ViganelloAACO CHAAGP Tesmer; Karl Viganello CH - The invention relates to a method (E) for recording health-related information (GI) about internal organs and/or a metabolism of a person to be examined. Based on input questions, cartographic features (M, | 2013-01-17 |
20130018906 | Systems and Methods for Providing a Spam Database and Identifying Spam CommunicationsAANM NIGAM; RakeshAACI ChennaiAACO INAAGP NIGAM; Rakesh Chennai INAANM Chandrasekharappa; Santhosh BaramasagaraAACI BangaloreAACO INAAGP Chandrasekharappa; Santhosh Baramasagara Bangalore INAANM Ekambaram; SivakumarAACI BangaloreAACO INAAGP Ekambaram; Sivakumar Bangalore INAANM Sargent; JamesAACI PurcellvilleAAST VAAACO USAAGP Sargent; James Purcellville VA USAANM Moortgat; Jean-JacquesAACI CliftonAAST VAAACO USAAGP Moortgat; Jean-Jacques Clifton VA USAANM Selvaraj; Senthil Kumar SellaiyaAACO USAAGP Selvaraj; Senthil Kumar Sellaiya US - Systems and methods are provided for identifying unsolicited or unwanted electronic communications, such as spam. The disclosed embodiments also encompass systems and methods for selecting content items from a content item database. Consistent with certain embodiments, computer-implemented systems and methods may use a clustering based statistical content matching anti-spam algorithm to identify and filter spam. Such a anti-spam algorithm may be implemented to determine a degree of similarity between an incoming e-mail with a collection of one or more spam e-mails stored in a database. If the degree of similarity exceeds a predetermined threshold, the incoming e-mail may be classified as spam. Further, in accordance with other embodiments, systems and methods may be provided to determine a degree of similarity between a query or search string from a user and content items stored in a database. If the degree of similarity exceeds a predetermined threshold, the content item from the database may be identified as a content item that matches the query or search string provided by the user. | 2013-01-17 |
20130018907 | Dynamic Subsumption Inference - Systems and methods for Dynamic Subsumption Inference are disclosed. For example, a method for Dynamic Subsumption Inference, may include: receiving a time signal associated with the current time; receiving a first input signal comprising data associated with a user at the current time; determining a first context based on the first input signal and the current time; comparing the first context to a database of contexts associated with the user; and determining a second context based in part on the comparison. | 2013-01-17 |
20130018908 | INTERACTIVE MEDIA CARD - A method is disclosed wherein a capsule is searchable, the capsule of data having data stored in multiple data stores. In use, a portion of the capsule is displayed and the searched data includes data that is not displayed but is retrievable via the search operation. | 2013-01-17 |
20130018909 | PROVIDING AN ANSWER TO A QUESTION LEFT UNANSWERED IN AN ELECTRONIC FORUM - Systems and methods are provided for providing an answer to a question left unanswered in an electronic discussion forum. In some embodiments, a question that has not been answered may be identified in a first discussion forum. A second discussion forum in which to present the question may be determined, where the second discussion forum is more likely than the first discussion forum to result in an answer to the question. The question may then be presented in the second discussion forum, and one or more responses to the question may be received in the second discussion forum. It may then be determined whether one of the one or more responses includes a good answer to the question, and when the determination is that one of the one or more responses includes a good answer, the good answer may be presented in the first discussion forum. | 2013-01-17 |
20130018910 | Enterprise Intelligence ('EI') Reporting In An EI FrameworkAANM Reddington; Francis X.AACI SarasotaAAST FLAACO USAAGP Reddington; Francis X. Sarasota FL USAANM Sahota; NeilAACI Costa MesaAAST CAAACO USAAGP Sahota; Neil Costa Mesa CA US - Enterprise Intelligence (‘EI’) reporting in an EI framework, including: identifying, by an EI report generator, EI report criteria for inclusion in an EI report; extracting, by an EI report generator, EI report information that meets the EI report criteria from an EI data repository; assembling, by an EI report generator, the EI report information into an EI report; and presenting the EI report to an EI administrator. | 2013-01-17 |
20130018911 | Variable-Length Nonce GenerationAANM Liu; LikaiAACI CambridgeAAST MAAACO USAAGP Liu; Likai Cambridge MA US - Methods and systems for obtaining a scalable variable-length nonce are provided. An exemplary method for obtaining a scalable variable-length nonce includes obtaining an initial nonce candidate. The exemplary method also includes transmitting a query to determine whether the initial nonce candidate has already been assigned. When the initial nonce candidate has already been assigned, a combined nonce candidate is obtained. The combined nonce candidate includes characters appended to the initial nonce candidate. An exemplary system for obtaining a scalable variable-length nonce includes a transmitting engine that transmits a request associated with a current token. The exemplary system also includes a receiving engine that receives a message associated with the current token. The exemplary system further includes a token acquiring engine that obtains a new token, and an appending engine that appends the new token to the current token. | 2013-01-17 |
20130018912 | METHOD AND SYSTEM FOR SEARCHING FOR A WEB DOCUMENTAANM Bao; Sheng HuaAACI BeijingAACO CNAAGP Bao; Sheng Hua Beijing CNAANM Chen; JianAACI BeijingAACO CNAAGP Chen; Jian Beijing CNAANM Su; ZhongAACI BeijingAACO CNAAGP Su; Zhong Beijing CNAANM Wang; RuiAACI BeijingAACO CNAAGP Wang; Rui Beijing CN - Provided is a method applied to a system including a plurality of sensors, a proxy, and a server. The method includes: measuring objects by the plurality of sensors to obtain first measurement values; computing a correlation among the first measurement values by the server based on the first measurement values; computing an actual measurement value of a second measurement value by the proxy based on the first measurement values and a given function; verifying the plurality of sensors by setting one or more sensors as verification target sensors in turn by the server at predetermined timing; computing a predicted value of the second measurement value by the server based on the correlation and the first measurement values obtained from the other sensors; and outputting the predicted value of the second measurement value instead of the actual measurement value thereof at least during the verification of the verification target sensors. | 2013-01-17 |
20130018913 | ANONYMOUS SEARCH SYSTEM USING HUMAN SEARCHERS - A system and a method for performing a search with the assistance of a computer may assign a unique identifier to a user, to a query submitted to the system by the user, to a human searcher that may respond to the query, and to a result produced by a human searcher in response to the query. These unique identifiers may be stored in a database, and associated with one another. The system maintains a database of unique identifiers for each original query associated with the unique identifier of the posing user and responding searcher, and may establish an anonymous communication channel between the user and the searcher during the initial session when the query is posed and answered, and during follow-up sessions that may occur in the future. | 2013-01-17 |
20130018914 | SYSTEM AND METHOD FOR FACILITATING USE OF A SELECTION GUIDE - A system and method functions to automatically invoke a link to a selection guide when the search term(s) being provided in a freeform search query are determined to be associated with a category of item for which a selection guide will provide the most efficient means for the user to locate items of interest. | 2013-01-17 |
20130018915 | MOBILE WIRELESS COMMUNICATIONS DEVICE WITH SEARCH SHORTCUT AND RELATED METHODS - A mobile wireless communications device ( | 2013-01-17 |