24th week of 2012 patent applcation highlights part 63 |
Patent application number | Title | Published |
20120150754 | Lifecycle impact indicators - A system includes, but is not limited to, a physical product associated with a device-readable indicator, the device-readable indicator associated with a first potential-ecological-impact quantification and with a first-disposal-mode identifier describing a first mode of disposing of at least a first portion of the physical product. In addition to the foregoing, other aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2012-06-14 |
20120150755 | System and Method of Providing Compliance and Alerting of Toxic Gas Exposure for Health Monitoring and Plant Maintenance - An apparatus to obtain zoned real-time gas concentration and location information from a plurality of gas detectors and provide compliance information along with exposure trends and warning information. Acquired concentration and location information can be stored in a common memory unit for efficient trend analysis and generation of compliance information. | 2012-06-14 |
20120150756 | Ecological impact quantification identifiers - Systems and methods for providing ecological impact quantification identifiers may implement operations including, but not limited to: computing an ecological impact quantification associated with manufacturing at least a portion of a product according to product specification data associated with the product; and means for associating a device-readable indicator corresponding to the ecological impact quantification associated with manufacturing at least a portion of a product with a product manufactured at least partially according the product specification data. | 2012-06-14 |
20120150757 | Record-keeping system for live performances before transmission over a network - In a method of producing a live performance, the performance being transmitted over a network to a viewer at a physical location, the performance comprising content that is subject to a federal record-keeping requirement, a statement is transmitted by a computer system over a network to the viewer. The statement includes information pertaining to a live performance in accordance with a compliance statement publication requirement of a federal record-keeping requirement. The live performance is transmitted by a computer system over a network simultaneously with or subsequent to the transmission of the statement. | 2012-06-14 |
20120150758 | Efficiency of use of a common product - Systems and methods for determining efficiency-of-use scores related to uses of a product by two or more users may implement operations including, but not limited to: computing an efficiency-of-use score associated with a use of a first physical product of a set of products by a first user and an efficiency-of-use score associated with a use of a second physical product of the set of products by a second user; comparing the efficiency-of-use score associated with the use of the first physical product by the first user to the efficiency-of-use score associated with the use of the second physical product by the second user; and providing a notification according to the comparison of an efficiency-of-use score associated with the use of the first product by the first user to an efficiency-of-use score associated with the use of the second product by the second user. | 2012-06-14 |
20120150759 | NON-GAMING ON-LINE ACHIEVEMENT AWARDS - Example methods, apparatuses, or articles of manufacture are disclosed that may be implemented using one or more computing devices to facilitate or otherwise support one or more processes or operations associated with non-gaming on-line achievement awards for use in or with information or award management systems. | 2012-06-14 |
20120150760 | SYSTEM AND METHOD FOR VERIFYING EMPLOYMENT ELIGIBILITY - An employment eligibility verification system is provided which includes an employee database, for storing a plurality of employee records each record having data associated with an employee including an employee hire date and an employee hire status[ | 2012-06-14 |
20120150761 | Pre-Screening System and Method - An independent pre-screening system is provided. The independent pre-screening system may include a pre-screening workflow manager executed on one or more servers configured to receive a pre-screened candidate portfolio for an associated job posting. Each pre-screened candidate portfolio will receive a GPA based on predetermined set of fulfillment criteria. The system is configured to facilitate the execution of an automated pre-screening interview, and upon completion send the corresponding candidate portfolio to a candidate queue. The independent pre-screening system may further include a pre-screening candidate manager executed on the one or more servers configured to send a portion of the pre-screened candidate portfolio and a pre-screening rubric from the candidate queue to an online dashboard or remotely executed program, receive a portfolio evaluation from the pre-screening program, and rank the portfolio evaluation by GPA in a candidate status chart for the job posting. | 2012-06-14 |
20120150762 | Method of Screening People - A process for managing a screening interaction with a passenger, comprises a procedure for establishing an account from a passenger, and questions to establish the veracity of that account, such that more effective information can be gathered about the user's true intentions and identity. A computer apparatus intended to enable this process to be implemented is also described. | 2012-06-14 |
20120150763 | Selection of Individuals From a Pool of Candidates in a Competition System - An integrated highly automated competition system allows for selection of one or more competition winners. Documents can be submitted electronically or by hardcopy. Document submissions are checked against databases to determine duplicate existence by a variety of information extracted from the documents. Candidates are filtered by one or more filters requiring candidates meet completeness, qualification, eligibility, and partner/discretionary standards. Candidates are evaluated by one or more readers and scored on a plurality of cognitive and non-cognitive variables. Readers are monitored and corrective action is taken when reader evaluations are determined to require corrective action. Candidates are selected by a two stage process first using raw read scores and then using a successive weighted read score iteration or tie-breaking stage. Winning candidates are subject to progress tracking and re-qualification prior to receiving award payments. | 2012-06-14 |
20120150764 | METHOD AND SYSTEM FOR AUTOMATED BUSINESS ANALYTICS MODELING - A software system provides a programming language for non-mathematical experts to define the business relations underlying the analytical problem combined with an interpretation engine, model build engine, and model simulation engine to process user information and produce the desired output. By integrating and streamlining model definition and data processing, operating directly at the level of business relations and attributes, the software of the present invention opens up the world of advanced analytics to non-mathematical experts. | 2012-06-14 |
20120150765 | Regional Currency Portfolio And Index - A computerized method involves determining a first currency weighting factor, for a group of countries consisting of individual countries in a region, based upon individual country GDP information relative to total regional GDP information for the group, determining a second currency weighting factor for the individual countries based upon individual country currency liquidity information relative to total regional currency liquidity information for the group, determining a third currency weighting factor for the individual countries based upon implied volatility information for each individual country in the group's currency as a percentage of the sum of the implied volatility information of the group members, wherein the third currency weighting factors are higher for higher volatilities and lower for lower volatilities, and calculating, for each of the individual countries, a currency weight factor as an average of the first, second and third currency weighting factors. | 2012-06-14 |
20120150766 | Computer Based System for Pricing an Index-Offset Deposit Product - A computer-based method for determining a value of an index-offset deposit product, having a principal amount, a term, a specified guaranteed amount, and an index credit comprising the step of setting trial values for fixed-income-linked crediting parameters for the product implying an expected fixed-income-linked credit component at the end of the term. The method further comprises the steps of determining a cost for an option paying an index-linked credit component such that a composite index credit together with the principal is at least equal to a specified guaranteed amount. | 2012-06-14 |
20120150767 | CREDIT INDEX, A SYSTEM AND METHOD FOR STRUCTURING A CREDIT INDEX, AND A SYSTEM AND METHOD FOR OPERATING A CREDIT INDEX - The present invention relates to a credit index, a system and method for structuring a credit index, a system and method for operating a credit index, and a system and method for determining the liquidity of a credit. | 2012-06-14 |
20120150768 | COMPUTERIZED INVESTOR ADVISEMENT AND INVESTMENT MANAGEMENT SYSTEM - A system and method for evaluating, substituting and optimizing investment asset portfolios based on performance history to facilitate the investment process. An analyzed investment portfolio is compared to a dynamically composed reference portfolio of exchange-traded products whose periodic returns best approximate periodic returns of the analyzed portfolio. Excess periodic returns of the analyzed portfolio over those of the reference portfolio are discounted in time by a risk-adjusted rate, and the resulting normalized measure is used to rate and rank the analyzed portfolios. The analyzed portfolio is substituted with the reference portfolio through a periodic execution of adjustment trades in the latter, so that returns are closely tracked over time. The analyzed portfolio is optimized by using a lag fit of the reference portfolio, which smoothes out suboptimal market timing and macro-based investment decisions of the analyzed portfolio manager. | 2012-06-14 |
20120150769 | MORTGAGE AND EDUCATION FINANCIAL OPTIMIZATION - The invention relates to systems and methods for optimizing investments in view of anticipated education or mortgage expenses. One an allocation of assets among investments is determined, and education or mortgage costs are to be considered, systems and methods of the invention assist in optimizing a tax treatment by allocating the chosen investments from accounts based on the tax treatment of those accounts. The invention includes a computer system and methods of the invention run on a computer system. | 2012-06-14 |
20120150770 | GOVERNANCE IN WORK FLOW SOFTWARE - The disclosure presents categorization of users into groups comprising expert users and novice users. A system and method analyzes the users' inputted data in helpdesk troubleshooting software to determine the deviation of novice users from expert users, or the deviation of novice users to a preconfigured behavior as determined by management policy. Other embodiments are also disclosed. | 2012-06-14 |
20120150771 | Knowledge Corroboration - Knowledge corroboration is described. In an embodiment many judges provide answers to many questions so that at least one answer is provided to each question and at least some of the questions have answers from more than one judge. In an example a probabilistic learning system takes features describing the judges or the questions or both and uses those features to learn an expertise of each judge. For example, the probabilistic learning system has a graphical assessment component which aggregates the answers in a manner which takes into account the learnt expertise in order to determine enhanced answers. In an example the enhanced answers are used for knowledge base clean-up or web-page classification and the learnt expertise is used to select judges for future questions. In an example the probabilistic learning system has a logical component that propagates answers according to logical relations between the questions. | 2012-06-14 |
20120150772 | Social Newsfeed Triage - A social newsfeed being delivered to a user is triaged. A personalized model is established which predicts the importance to the user of data elements within a current social newsfeed being delivered to the user. The personalized model is established based on implicit actions the user takes in response to receiving previous social newsfeeds. The personalized model is then used to triage the data elements within the current social newsfeed. | 2012-06-14 |
20120150773 | USER INTERFACE AND WORKFLOW FOR PERFORMING MACHINE LEARNING - A computing device receives a training data set that includes a plurality of positive examples of sensitive data and a plurality of negative examples of sensitive data via a user interface. The computing device analyzes the training data set using machine learning to generate a machine learning-based detection (MLD) profile that can be used to classify new data as sensitive data or as non-sensitive data. The computing device displays a quality metric for the MLD profile in the user interface. | 2012-06-14 |
20120150774 | CONTROL APPARATUS - A control apparatus includes a learning portion which learns a control parameter by correcting a learning vector consisting of a plurality of variables and a control parameter based on a measurement vector. The control apparatus further includes an interpolation portion which computes the control parameter corresponding to current variables which represent a current environmental condition by interpolating the control parameter learned by the learning portion. The interpolation portion includes a selecting portion which selects three learning vectors from a plurality of learning vectors, and which computes the control parameter corresponding to the current variables by interpolating the control parameters on a flat surface including the selected three learning vectors. | 2012-06-14 |
20120150775 | SYSTEM FOR SEMANTIC HOME NETWORK MANAGEMENT, CLOUD INFERENCE APPARATUS FOR SEMANTIC HOME NETWORK MANAGEMENT, SEMANTIC HOME NETWORK, AND SEMANTIC HOME NETWORK CONNECTION DEVICE - A semantic home network management system includes: a home network for collecting sensing information based on a state of a home network and analyzing the collected sensing information to configure semantic information; and a cloud inference apparatus for collecting and managing the semantic information provided from the home network through an internet protocol (IP) network, and applying an inference rule to the collected and managed semantic information to provide inference rule-applied semantic information to the home network. The inference rule is a rule that performs inference by recognizing at least one of a device state, a network state, a system state, and a service state. | 2012-06-14 |
20120150776 | ADAPTIVE MULTIMEDIA PROCESSOR AND ADAPTIVE DATA PROCESSING METHOD - Disclosed is a structure of an adaptive multimedia processor and a method for implementing an adaptive data processing algorithm. The adaptive multimedia processor includes a bit stream analyzer for analyzing bit stream information of multimedia data, and a bit stream learning device for converting multimedia data having a format which cannot be reproduced in a device, to multimedia data having a format which can be reproduced in a device, through an execution of a learning algorithm, based on an analysis by the bit stream analyzer. | 2012-06-14 |
20120150777 | ACTION HISTORY SEARCH DEVICE - According to one embodiment, an action history search device receives an inquiry from a user and outputs a inquirty time and a target of inquiry, decides a range for searching action history information representing history of the user's action together with a time of the user's action using the target of inquiry, and calculates an elapsed time from the time of the user's action within the range to the inquiry time. The device judges using the elapsed time and a narrowing-down model a probability on each response candidate to the inquiry based on the history of the action within the range. The narrowing-down model is used for judging according to the elapsed time the probability that the response candidate to the inquiry obtained from the history of the action is the user's desired response. The device outputs the response candidate according to the probability. | 2012-06-14 |
20120150778 | METHOD AND SYSTEM FOR DETECTING OVERLOAD AND UNLAWFUL MEASUREMENT OF VEHICLE - A method and system to detect correctly overload & unlawful loading of cargoes under any circumstance. The Detection method of wrong measurement according to this invention are configured of Practicing Phase of Artificial Intelligence Algorithm to discriminate Wrong Measured Information by false manipulation of axle from Normal Measured Information without false manipulation of axle of vehicles by Pattern Information; Recognizing entering vehicle and Collecting Phase of Basic Data of the vehicle including dead weight, maximum pay load, and axles information; Verifying Phase of current vehicle information including total weight, load on each axle, and entering speed; And Classifying Phase of Measured Status of above vehicle using above collected and verified information as input value to Artificial Intelligence Algorithm. It might be desirable that Neural Back-Propagation Algorithm is implemented to detection method of wrong measurement according to the Invent as an Artificial Intelligence Algorithm. | 2012-06-14 |
20120150779 | Automated Entity Identification for Efficient Profiling in an Event Probability Prediction System - A computer-implemented method and system for automated entity identification for efficient profiling in an event probability prediction system. A first subset of entities belonging to one or more entity classes is defined. At least one historical profile is constructed for each entity in the subset of entities based on a set of possible outcomes of transaction behavior of each entity in the first subset of entities. Based on the historical profiles, a second subset of entities having transaction behavior associated with a transaction is selected, the transaction behavior being predictive of at least one targeted outcome from the set of possible outcomes. The first subset of entities is redefined with the second subset of entities. | 2012-06-14 |
20120150780 | PHYSICAL NEURAL NETWORK - A physical neural network includes at least one neuron-like node that sums at least one input signal and generates at least one output signal based on a threshold associated with the at least one input signal, at least one connection network associated with the at least one neuron-like node wherein the at least one connection network comprises a plurality of interconnected connections, such that each connection of the plurality of interconnected connections is strengthened or weakened according to an application of an electric field. In some cases, the threshold can include a threshold below which the at least one output signal is not generated and above which the at least one output signal is generated. | 2012-06-14 |
20120150781 | INTEGRATE AND FIRE ELECTRONIC NEURONS - An integrate and fire electronic neuron is disclosed. Upon receiving an external spike signal, a digital membrane potential of the electronic neuron is updated based on the external spike signal. The electric potential of the membrane is decayed based on a leak rate. Upon the electric potential of the membrane exceeding a threshold, a spike signal is generated. | 2012-06-14 |
20120150782 | TRUSTED DECISION SUPPORT SYSTEM AND METHOD - Methods and apparatus for providing a comprehensive decision support system to include predictions, recommendations with consequences and optimal follow-up actions in specific situations are described. Data is obtained from multiple disparate data sources, depending on the information deemed necessary for the situation being modeled. The decision support system provides a prediction or predictions and a recommendation or a choice of recommendations based on the correlative analysis and/or other analyses. Also described are methods and apparatus for developing application specific decision support models. The decision support model development process may include identifying multiple disparate data sources for retrieval of related information, selection of classification variables to be retrieved from the data sources, assignment of weights to each classification variable, selecting and/or defining rules, and selecting and/or defining analysis functions. | 2012-06-14 |
20120150783 | Disaster Analysis and Decision System - A disaster analysis and decision system comprises a geographic area module that comprises geographic data for a given geographic area; an artificial facilities module that comprises artificial facilities data positioned in the geographic area; a disaster control facilities module that comprises disaster control facilities data for the geographic area; an environmental variable module that receives and stores environmental variables that affects the geographic area; an analysis module that analyzes how the environmental variables affect the geographic area, the artificial facilities within the geographic area and the disaster control facilities for the geographic area, and decides how to control the disaster control facilities; a report module that provides reports for the analysis; and a database that stores data from other modules. | 2012-06-14 |
20120150784 | Immersive Planning of Events Including Vacations - The subject disclosure is directed towards a web service or the like that assists users in generating a plan, such as a vacation plan. In one aspect, a user chooses a model that generates a plan, including by selecting content objects (e.g., found by searching) corresponding to plan objects. Selection is based upon user input, along with rules, constraints and/or equations associated with the model. A presentation mechanism produces a presentation (e.g., an audiovisual experience) from the content/plan objects, such as a linear narrative, a timeline, a schedule, a calendar, a gallery, a list, and/or a map. The plan may be annotated with annotation data. The plan may be interacted with to re-plan it, and may be saved and/or provided to another user for viewing and/or re-planning. Plan versions may be compared to see the changes made. | 2012-06-14 |
20120150785 | ADDRESSING SYSTEM DEGRADATION BY APPLICATION DISABLING - In some embodiments, a routine is executed that identifies one or more applications that consume resources of the computer without a benefit that justifies such consumption, with the routine comprising evaluating at least some data from a source external to the computer, and an ability of the one or more identified applications to start on the computer absent user input requesting or authorizing use of such an application is disabled. In some embodiments, the external source of data may, for example, comprise a remote database identifying potentially undesirable applications and/or a remote software reputation service. In some embodiments, a routine is executed that identifies one or more applications that consume resources of the computer without a benefit that justifies such consumption and that also identifies one or more resources or utilities that utilize the one or more applications. An ability of the one or more identified applications to start on the computer absent user input requesting or authorizing use of such an application is disabled, and an ability of the one or more resources or utilities to attempt to utilize the one or more applications absent user input requesting or authorizing such an attempt is also disabled. | 2012-06-14 |
20120150786 | MULTIDIMENSIONAL RISK-BASED DETECTION - A computerized method detects suspicious and fraudulent activities in a group of subjects by defining and dynamically integrating multidimensional risks into a mathematical model. A subset of multidimensional risk-weighted detection algorithms are selected so that suspicious or fraudulent activities in the group of subjects can be effectively detected with higher resolution and accuracy. A priority sequence is produced to determine the priority of each detected case during the investigation process. Any set of multidimensional risks identifies a group of subjects that contain this set of multidimensional risks so that group statistics can be obtained for comparison and other analytical purposes. The detection results may adjust the definitions of the multidimensional risks, the mathematical model, and the multidimensional risk-weighted detection algorithms. | 2012-06-14 |
20120150787 | Addition of Plan-Generation Models and Expertise by Crowd Contributorst - The subject disclosure is directed towards a web service that maintains a set of models used to generate plans, such as vacation plans, in which the set of models includes models that are authored by crowd contributors via the service. The models include rules, constraints and/or equations, and may be text based and declarative such that any author can edit an existing model or combination of existing models into a new model. Users can access the models to generate a plan according to user parameters, view a presentation of that plan, and interact to provide new parameters to the model and/or with objects in the plan to modify the plan and view a presentation of the modified plan. | 2012-06-14 |
20120150788 | AUTOMATED FACILITIES MANAGEMENT SYSTEM - An automated facilities management system has the ability to predict occupant behavior by identifying recurring patterns in the way that people use buildings and comparing them with environmental characteristics. This technology is not limited to human behavior patterns, but extends to any mechanical systems or data points that tend to vary in recurring patterns. The data processing is carried out by rules engines triggered by relational database modifications. | 2012-06-14 |
20120150789 | DETERMINING AND CONVEYING USER AVAILABILITY - Determining and conveying availability information regarding a user may be accomplished by a variety of techniques. In one general implementation, determining and conveying availability information regarding a user may include determining an availability intent for a user of a user interface device, determining at least one availability desire for the user, and/or determining an inferred availability state for the user. The availability intent, the availability desire, and/or the inferred availability state for the user may be used to determine a composite availability state for the user, and the composite availability state may be conveyed to a remote server system. | 2012-06-14 |
20120150790 | GENERATING A RECOMMENDATION TO ADD A MEMBER TO A RECEPTIVITY COHORT - A processor-implemented method, system, and/or computer program product generate a recommendation to add a member to a receptivity cohort. A receptivity cohort is made up of members who share a conduct attribute, which is a facial expression, body language, and/or social interaction of a person. The conduct attribute has been predetermined to be an indicator of a level of receptiveness to a proposed future change in a set of circumstances. Biometric sensor data, which describe the facial expression, body language and/or social interaction for a candidate member, are retrieved from a set of biometric sensors. The retrieved biometric sensor data for the candidate member is compared to the conduct attribute of members of the receptivity cohort. In response to the biometric sensor data for the candidate member matching the conduct attribute of members of the receptivity cohort, a recommendation is generated to add the candidate member to the receptivity cohort. | 2012-06-14 |
20120150791 | METHODS AND SYSTEMS FOR LOADING DATA INTO A TEMPORAL DATA WAREHOUSE - A system disclosed includes a temporal data warehouse and a platform independent temporal data warehouse load application operable to run on the system. The load application uses timestamp data from incoming data in conjunction with a relational algebra of set operators to identify and sequence net changes between the incoming data and data previously stored within the data warehouse. The load application loads the identified and sequenced net changes into the data warehouse with relatively little intrusion into normal operation of the data warehouse. Optimizations, including but not limited to, distinct partitioning of the workload into parallel streams are selectable via metadata. | 2012-06-14 |
20120150792 | DATA EXTRACTION FRAMEWORK - The present disclosure involves systems, software, and computer implemented methods for providing a data extraction framework for extracting data and metadata from an application to provide additional functionality for the extracted data and metadata. One process includes operations for identifying a first application for data extraction and determining a set of data suitable for extraction from the first application using a software development kit associated with the first application. The set of data is stored in a repository without storing visualization components of the first application in the repository. The set of data is sent to a second application for further processing of the set of data. The second application is configured to bind different visualization components to the set of data for display of data elements in the set of data to a user. | 2012-06-14 |
20120150793 | SYSTEMS AND METHODS FOR FILE LOADING - The application describes systems and methods for preventing the distribution of large volumes of electronic data by loading selected sensitive files with pad data to increase the size of the files such that file transfer, distribution, or downloading to removable media storage devices is more cumbersome. In one aspect, a file loading system comprises a datastore for storing a plurality of data files where each of the plurality of data files includes information and a processor arranged to: access the plurality of data files in the datastore, and load a data pad into one or more of the plurality of data files to increase the size of the one or more of the plurality of data files. | 2012-06-14 |
20120150794 | CARD AUTHORIZATION TERMINAL SYSTEM AND CARD MANAGEMENT METHOD USING THE SAME - A card authorization terminal system of present invention includes a card identifying unit, a database management unit, and an authorization processing unit. The card identifying unit deciphers card property information stored in a card and determines whether the card is valid. The database management unit determines final card property information based on the card property information deciphered by the card identifying unit and property change information stored in the database management unit. The authorization processing unit calculates charges and processes card transactions based on the final card property information generated by the database management unit. The database management unit generates identification numbers sequentially assigned from a predetermined number with respect to respective card numbers corresponding to the property change information, stores the identification number and the property change information corresponding to the identification numbers, and determines the final card property information corresponding to the card property information based on the stored property change information. | 2012-06-14 |
20120150795 | SERVER APPARATUS AND METHOD OF AQUIRING CONTENTS - A server apparatus ( | 2012-06-14 |
20120150796 | Transparent Caching of Configuration Data - The present disclosure involves systems, software, and computer implemented methods for providing transparent caching of configuration data in distributed landscapes. One process includes operations for receiving a read request of original configuration data stored at a second system. A first timestamp associated with local configuration data stored locally at a first system is identified. A second timestamp associated with the original configuration data is identified, and the second timestamp is determined to be later in time than the first timestamp. A copy of the original configuration data from the second system is retrieved for storage locally in place of the local configuration data at the first system based on the determination that the second timestamp is later in time than the first timestamp. The first timestamp is updated with a current timestamp associated with a time the copy of the original configuration data was retrieved from the second system. | 2012-06-14 |
20120150797 | METHOD AND SYSTEM FOR SAFELY TRANSPORTING LEGACY DATA TO AN OBJECT SEMANTIC FORM DATA GRID - A computer system architecture and process transforms the organizing principles of business data management seen in traditional or common place settings across disparate data stores into an object-semantic model. The transformation is implemented in a transitory, managed risk implementation approach for data access migration. This approach will enable data agility and will move data storage closer to information storage, while supporting the rapid development of business capabilities. This approach will bridge the gaps between relational database/file based storage (less expressive) and object-semantic representation (more expressive). This process/method will connect information residing in legacy data structures such as relational database/file based storage on disk drives to instances populating an expressive object-semantic model in persistent grid based memory. It will also maintain a linkage between the original legacy data to the enhanced object-semantic data allowing for ongoing modernization and removing the need for point migrations. | 2012-06-14 |
20120150798 | METHOD AND SYSTEM FOR REPLICATING DATA - Methods, computer systems, and computer program products for replicating data are provided. Meta-data and data associated with the meta-data are received at a first data server. A new portion of the data that is not already stored on the first data server is identified. The new portion of the data is stored on a second data server before the meta-data is stored on the second data server. | 2012-06-14 |
20120150799 | DATA SYNCHRONIZATION AMONG FILE STORAGES USING STUB FILES - A method switches file server from old file server to new file server which are coupled via a backend network and provides data synchronization. The old file server and new file server are coupled with one or more host computers via a frontend network to direct input/output (I/O) requests from the one or more host computers. The method comprises creating stub files in the new file server, the stub files including stub information indicating location of data in the old file server; switching I/O requests directed to old file server to I/O requests directed to the new file server; checking whether the new file server has any stub files; and, if the new file server has one or more stub files, recalling data corresponding to the one or more stub files from the old file server according to the stub information to replace the one or more stub files. | 2012-06-14 |
20120150800 | INDEPENDENT FILESET GENERATIONS IN A CLUSTERED REDIRECT-ON-WRITE FILESYSTEM - Maintaining a generation value for each fileset that is distinct from a corresponding fileset manager preserves the independence of nodes while also allowing distributed fileset management. A fileset manager can maintain a value that reflects consistency snapshots for that node (“node generation”) separately from a value that reflects consistency snapshots for a particular fileset (“fileset generation”). | 2012-06-14 |
20120150801 | PLATFORM AGNOSTIC FILE ATTRIBUTE SYNCHRONIZATION - One or more techniques and/or systems are disclosed for providing platform agnostic synchronization for a custom functionality attribute of a file in a distributed data management system. An application and/or device may create or utilize a custom functionality attribute for a file in the distributed data management system. A custom attribute field, comprising data representative of the custom functionality attribute, can be attached to the file, such as with other metadata for the file. The custom attribute field can be stored with the file in the distributed data management system, and can remain unchanged and be synchronized with the file when the file is touched by a device on the distributed data management system. | 2012-06-14 |
20120150802 | DATABASE REPLICATION - A fault-tolerant node for synchronous heterogeneous database replication and a method for performing a synchronous heterogenous database replication at such a node are provided. A processor executes a computer program to generate a series of database transactions to be carried out at the fault-tolerant node. The fault-tolerant node comprises at least two relational database management systems, each of which are different relational database management system products, each implementing snapshot isolation between concurrent transactions. Each system comprises a database and a database management component. For each database transaction, operation instructions are provided concurrently to each of the systems to carry out operations on their respective databases and to provide respective responses. The responses generated by the systems either comprise an operation result or an exception. Only one of the systems is configured with a NOWAIT exception function enabled, which returns an exception when it is detected that two or more concurrent transactions are attempting to modify the same data item. The other systems are configured with the NOWAIT exception function disabled. The fault-tolerant node detects that two or more concurrent transactions are attempting to modify the same data item, and ensures that all systems apply the same order of modification of the data item by the concurrent transactions. | 2012-06-14 |
20120150803 | REPLICATION RESYNCHRONIZATION - System, method, computer program product embodiments and combinations and sub-combinations thereof for replication resynchronization are provided. An embodiment includes providing a mode of operation in a replication control system for repopulating a replicated version of a primary database that does not affect an ability to continue activity in the primary database. Further included is managing the repopulating of the replicated version with attention to at least a resynchronization marker. | 2012-06-14 |
20120150804 | MULTIPLE CONTEXTS IN A REDIRECT ON WRITE FILE SYSTEM - A method includes initiating committing to persistent storage of a current consistency snapshot of a plurality of data objects in a redirect-on-write file system. Each of the plurality of data objects has a first copy of at least two copies of the data having a first context of at least two contexts. The method includes receiving, during committing to storage of the current consistency snapshot, an update to a data object of the plurality of data objects. The method also includes responsive to receipt of the update to the data object, creating a second copy of data of the data object from the first copy. The second copy of the data has a second context of the at least two contexts. The method includes responsive to receipt of the update to the data object, updating, based on the update, the second copy of the data of the data object. | 2012-06-14 |
20120150805 | Efficient Backup and Restore of a Cluster Aware Virtual Input/Output Server (VIOS) Within a VIOS Cluster - In a Virtual Input/Output (I/O) Server (VIOS) partition within a data processing system that comprises cluster-aware VIOSes, a method includes: performing, via a backup/restore utility of a cluster aware (CA) operating system (OS) executing on a processor resource of the first VIOS partition, a backup operation on the first VIOS partition, which creates a first configuration backup file having configuration information about the hardware, logical and virtual devices of the VIOS partition; storing the configuration backup file within local storage; and responsive to receipt of a VIOS restore command: retrieving the configuration backup file from the local storage; and restoring the configuration of the hardware, logical and virtual devices of the first VIOS to a state that existed at a time at which the backup operation creating the configuration backup file was performed. | 2012-06-14 |
20120150806 | NORMALIZING DATA ON DATABASE RESTORE - Techniques for normalizing a database as part of a database restore. Embodiments may receive a database restore request indicating a previous state to restore a database to. Responsive to the request, embodiments may restore the database to the previous state using backup data associated with the previous state, and normalize the restored database using historical database usage data based on one or more previous database operations. | 2012-06-14 |
20120150807 | TECHNIQUE FOR INCREASING THE NUMBER OF PERSISTENT CONSISTENCY POINT IMAGES IN A FILE SYSTEM - An on-disk storage arrangement increases the number of persistent consistency point images (PCPIs) that may be maintained for a volume of a storage system. The on-disk storage arrangement comprises a novel volume information (volinfo) block representing a root of the volume; the volinfo block is stored at predefined locations on disk and comprises various system wide configuration data. The volinfo block further comprises a data structure configured to provide a level of indirection that increases the number of PCPIs maintainable by a file system executing on the storage system. To that end, the data structure may be organized as an array of pointers, wherein each pointer references a block containing a snapshot root, thereby enabling efficient access to each PCPI maintained by the file system. | 2012-06-14 |
20120150808 | METHOD AND SYSTEM FOR PERFORMING DATA BACKUP AND RESTORATION - An approach for enabling execution of data backup and restoration among a group of user devices is described. A data management platform detects at a source device, one or more peer devices capable of wireless communication with the source device. It then determines one or more of the peer devices as belonging to a backup device group according to a predetermined criterion. The data management platform | 2012-06-14 |
20120150809 | DISASTER RECOVERY SERVICES - A system and method for server recovery and migration is presented. The method comprises backing up data and device drivers on a server to a central location, logging-in to the central location, obtaining the backed up data and device drivers from the central location, copying the obtained data to a computer medium and booting the server using the computer medium. In one aspect, the method can further comprise determining whether recovery is needed and performing logging-in, obtaining, copying, and booting when the recovery is needed. In one aspect, the method can further comprise determining whether the server has new device drivers and backing up the device drivers when the server has new device drivers. In one aspect, the backing up is performed periodically. In one aspect, the computer medium is a CD. In one aspect, the obtained backed up data is an ISO file. | 2012-06-14 |
20120150810 | Backing up data objects identified by search program and corresponding to search query - A backup program running on a computing device receives a search query. The backup program transmits the search query to a search program. The backup program receives search results corresponding to the search query from the search program. The search results include a list of data objects stored on a storage device and that satisfy the search query. The backup program backs up one or more selected data objects of the list of data objects. The backup program can periodically and automatically without user interaction retransmit the search query to the search program, and receive updated search results corresponding to the search query from the search program. The updated search results include an updated list of data objects stored on the storage device that satisfy the search query. The backup program can then back up the data objects within the updated list of data objects. | 2012-06-14 |
20120150811 | Flash-copying within asynchronous mirroring environment - A first command is sent from a primary host system to a primary storage controller device, specifying that a first primary volume is to be flash-copied to a second primary volume. Flash-copying provides for completion of copying the first primary volume to the second primary volume to be signaled prior to data on the first primary volume being physically copied to the second primary volume. A first state of the first primary volume and the second primary volume is verified by the primary storage controller device to determine whether the first state permits flash-copying of the first primary volume to the second primary volume. A first query is sent from the primary storage controller device to a secondary host system, requesting whether a first secondary volume can be flash-copied to a second secondary volume. The first and second secondary volumes asynchronously mirror the first and second primary volumes, respectively. | 2012-06-14 |
20120150812 | CONTENT LICENSE STORAGE - Content license storage is provided by holding, in a temporary license store on the content consumption device, a plurality of content licenses for a plurality of content streams, wherein each content license of the plurality of content licenses includes a removal date. The method further includes for each content license of the plurality of content licenses corresponding to a content stream of the plurality of content streams which is designated for archived playback, copying the content license into an embedded license store within the content stream to form an archived content stream. The method further includes removing one or more of the plurality of content licenses held at the temporary license store if the removal date included in the content license has been reached, while leaving each content license stored within an archived content stream even if the removal date has been reached. | 2012-06-14 |
20120150813 | USING RSS ARCHIVES - In some aspects, at least two different probes are applied to datafeed archives to derive information based on data in the archives. The probes are part of a probe plan to determine a result based on the derived information. The result is determined based on the derived information. | 2012-06-14 |
20120150814 | CLIENT-SIDE REPOSITORY IN A NETWORKED DEDUPLICATED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage. | 2012-06-14 |
20120150815 | EFFICIENT BACKUP AND RESTORE OF VIRTUAL INPUT/OUTPUT SERVER (VIOS) CLUSTER - A method enables cluster-level backup and restore functionality of all Virtual Input/Output Server (VIOS) configuration data within a VIOS cluster and the data of a shared VIOS cluster database. The method comprises: performing, via a backup/restore utility of a VIOS partition, a cluster level backup, which creates a first VIOS cluster configuration backup file having configuration information about hardware, logical and virtual devices of each VIOS partition within a VIOS cluster and all cluster data from the shared VIOS database of the VIOS cluster; storing the VIOS cluster configuration backup file within a storage location; and responsive to receipt of a VIOS restore command at a VIOS partition: retrieving the configuration backup file from the storage location; restoring a configuration of the hardware, logical and virtual devices of each VIOS within the VIOS cluster to prior state; and restoring the shared VIOS database with the backed-up cluster data. | 2012-06-14 |
20120150816 | METHOD AND TOOL TO OVERCOME VIOS CONFIGURATION VALIDATION AND RESTORATION FAILURE DUE TO DRC NAME MISMATCH - In a Virtual Input/Output (I/O) Server (VIOS) partition, a method comprises a cluster aware (CA) operating system (OS) of a VIOS partition performing the functions of: responsive to a restore command: retrieving a configuration backup file from storage; comparing a DRC name from the retrieved file with a DRC name of the current VIOS partition performing the restore operation; in response to an occurrence of a DRC name mismatch: retrieving an initial UUID of the VIOS from the configuration backup file; accessing a UUID table within a management tool; locating a matching UUID to the initial UUID within the UUID table; and in response to locating the matching UUID: verifying that the configuration data file belongs to the current VIOS initiating the restore operation; and performing the restore operation to restore the configurations of the hardware, logical and virtual devices of the first VIOS to an earlier configuration state. | 2012-06-14 |
20120150817 | CLIENT-SIDE REPOSITORY IN A NETWORKED DEDUPLICATED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage. | 2012-06-14 |
20120150818 | CLIENT-SIDE REPOSITORY IN A NETWORKED DEDUPLICATED STORAGE SYSTEM - A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage. | 2012-06-14 |
20120150819 | Trash Daemon - A method of managing a database system that includes a swarm database with nodes of processors and memory. The memory stores programs that can be executed on the processors. Determining data files to delete, moving the data files to delete to a trash directory, truncating using a trash daemon, larger files to delete to smaller sized file pieces and deleting the smaller sized file pieces by a local operation system. | 2012-06-14 |
20120150820 | SYSTEM AND METHOD FOR TESTING DATA AT A DATA WAREHOUSE - A system and method for performing testing of data at a data warehouse is provided. The methodology of the invention describes steps to develop and further invoke one or more data quality-accuracy test cases from a framework. The data quality-accuracy test cases check the sanity of the data stored at the data warehouse. The one or more data quality-accuracy test cases are developed based on at least one predefined strategy, which in turn are stored in the framework. The methodology further executes the developed one or more data quality-accuracy test cases as either batch or independently, based on the requirements of the test. Thereafter, the methodology maintains traceability of the executed test at the data warehouse, incorporating details from the development of the one or more data quality-accuracy test cases to the final output of the test. | 2012-06-14 |
20120150821 | CONFIGURATION INFORMATION MANAGEMENT DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND CONFIGURATION INFORMATION MANAGEMENT METHOD - When receiving a change of property information that is a key for performing property information integration, a FCMDB refers to the information stored in a property management information DB. Then, when property information that is a key after change is identical with the property information before change in the same configuration item, the FCMDB maintains the property information of the property information DB with respect to the configuration item. On the other hand, when the two property information data are not identical to each other, the FCMDB integrates property information for each configuration item on the basis of the key after change and registers the result in a property information storage unit. | 2012-06-14 |
20120150822 | METHOD AND SYSTEM FOR PERSONALITY COMPARISION VIA PUBLIC CONSENSUS - A method and system of comparing data sets related to personality traits to identify various comparison results. The method and system include determining, by a processing device, a plurality of data sets. The data sets include information related to a self-evaluation report for a first user based upon the first user's answers to a set of questions. The data sets also include information related to anonymous, aggregated data received from other users. The first user may select a context for performing a comparison of two or more of the data sets, including a self-evaluation report, an aggregated public perception of the first user, or an aggregated public perception of another user. The system performs the comparison to produce comparison results. The comparison results provide the first user with information related to their individual personality and/or information related to an existing or potential relationship between the first user and another user. | 2012-06-14 |
20120150823 | DE-DUPLICATION INDEXING - Example apparatus, methods, and computers support data de-duplication indexing. One example apparatus includes a processor, a memory, and an interface to connect the processor, memory, and a set of logics. The set of logics includes an establishment logic to instantiate one-to-many de-duplication data structures, a manipulation logic to update the de-dupe data structure(s), a key logic to generate a key from a block of data to be de-duplicated, and a similarity logic to make a similarity determination for the block. The similarity determination identifies the block as a unique block, a duplicate block, or a block that meets a similarity threshold with respect to a stored de-duplicated block accessible through the dedupe data structure. The similarity determination involves comparing the block to be de-duplicated to a stored block available to the apparatus using a byte-by-byte approach, a hash approach, a delta hash approach and/or a sampling sequence approach. | 2012-06-14 |
20120150824 | Processing System of Data De-Duplication - A processing system of data de-duplication includes a client and a server. A characteristic value of each data block is compared with characteristic values stored in the client. If the same characteristic value exists in the client, the data block corresponding to the compared characteristic value is deleted. A server data management module is connected to a client data management module through a network. If the characteristic value does not exist in the server, a corresponding data block is obtained from the client, and the new data block and the characteristic value are stored in the server. A file management module records a storage address of the data blocks in the server into an index file. In this way, the server is not required to perform all data de-duplication processes of the clients, thus reducing the occupation of bandwidth and improving the processing efficiency of the server. | 2012-06-14 |
20120150825 | Cleansing a Database System to Improve Data Quality - According to one embodiment of the present invention, a system controls cleansing of data within a database system, and comprises a computer system including at least one processor. The system receives a data set from the database system, and one or more features of the data set are selected for determining values for one or more characteristics of the selected features. The determined values are applied to a data quality estimation model to determine data quality estimates for the data set. Problematic data within the data set are identified based on the data quality estimates, where the cleansing is adjusted to accommodate the identified problematic data. Embodiments of the present invention further include a method and computer program product for controlling cleansing of data within a database system in substantially the same manner described above. | 2012-06-14 |
20120150826 | DISTRIBUTED DEDUPLICATED STORAGE SYSTEM - A distributed, deduplicated storage system according to certain embodiments is arranged in a parallel configuration including multiple deduplication nodes. Deduplicated data is distributed across the deduplication nodes. The deduplication nodes can be networked together and communicate with one another according using a light-weight, customized communication scheme (e.g., a scheme based on FTP or HTTP). In some cases, deduplication management information including deduplication signatures and/or other metadata is stored separately from the deduplicated data in deduplication management nodes, improving performance and scalability. | 2012-06-14 |
20120150827 | DATA STORAGE DEVICE WITH DUPLICATE ELIMINATION FUNCTION AND CONTROL DEVICE FOR CREATING SEARCH INDEX FOR THE DATA STORAGE DEVICE - A file server performs duplicate elimination on files, and creates a virtual file system that does not include a duplicate file and is used for creating a search index. A search server acquires search target files from the virtual file system in the file server, and creates the search index. | 2012-06-14 |
20120150828 | METHOD AND APPARATUS FOR DECODING ENCODED STRUCTURED DATA FROM A BIT-STREAM - A method for decoding encoded structured data from a bit-stream comprising a plurality of encoded data units having the steps of, obtaining unit information comprising positions of the encoded data units within the bit-stream, retrieving the encoded data units from the bit-stream based on the unit information, creating decoding tasks for decoding the retrieved encoded data units, assigning the created decoding tasks to cores of a multi-core decoder, based on estimated decoding costs of the encoded data units, running the tasks on their assigned cores to decode the encoded data units in parallel is disclosed. It is applied to the decoding of XML documents in the EXI format. | 2012-06-14 |
20120150829 | Asynchronous Deletion of a Range of Messages Processed by a Parallel Database Replication Apply Process - Mechanisms are provided for replicating transactions at a source database node on a target database node of the data processing system. A transaction message, for a transaction, is stored in a receive queue data structure of the target database node. An agent thread applies a change to data of the target database node based on a specification of the change in the transaction message. An identifier of the transaction message is stored in a done message data structure of the target database node and the identifier of the transaction message is also stored in a prune queue data structure of the target database node. A prune thread determines if a contiguous range of identifiers of transaction messages equal to or greater than a predetermined batch size is present in the prune queue data structure. If so, then a range of transaction messages is deleted from the done message data structure. | 2012-06-14 |
20120150830 | DATA RETRIEVAL APPARATUS, DATA RETRIEVAL METHOD, AND PROGRAM - A data retrieval apparatus selects data to be retained in a cache so that a cache created in retrieval at a previous stage is reused in retrieval at a later stage, and implements retrieval processing to enhance a reusability of retrieved data and upgrade a response speed. | 2012-06-14 |
20120150831 | UPDATING A SEARCH INDEX USING REPORTED BROWSER HISTORY DATA - Methods, systems, and computer-readable media are provided for updating a search index with new uniform resource locators (URLs) and spiking URLs with increased user interest. History data, provided from browser applications residing on users' computers that indicate URLs accessed by the users, is parsed to identify new/previously unknown URLs. The history data also indicates URLs in which there is increased interest based on a number of recent hits as compared to an average number of hits determined over time. Author postings of new URLs to social networking sites and a quality rating of the authors may also be used to identify and filter new URLs. Search indexes are updated with the new and spiking URL data. As such, lag time between posting of new URLs and spiking of URL interest and inclusion of this data in a search index is greatly decreased. | 2012-06-14 |
20120150832 | METHOD AND SYSTEM TO ENABLE NAVIGATION OF DATA ITEMS - There is provided methods and systems to enable navigation of data items based on aspect-value pairs extracted from the data items. First, the system receives the query. Second, the system identifies the plurality of data items found by the query. Third, the system identifies an aspect of at least one of the plurality of data items. Fourth, the system identifies a value of a plurality of values corresponding to the aspect. Fifth, the system a request to navigate to a set of data items within the plurality of data items, the request comprising the aspect and a requested value of the plurality of values. Each one of the set of data items has the aspect and the value. Sixth, the system presents, in a user interface, information about each one of the set of data items. | 2012-06-14 |
20120150833 | USING SOCIAL-NETWORK DATA FOR IDENTIFICATION AND RANKING OF URLS - Methods, systems, and computer-readable media are provided for updating a search index with new uniform resource locators (URLs) and with metadata for new and known URLs. Data associated with communications made by users using a social network is received. The communications include a URL therein that a user has shared, posted, or otherwise communicated to one or more other users using the social network. When the URL is not found in a search index it is identified as a new URL and is added to the search index. A measure of a trending interest, or virality, of the URL is determined from the data. The determined virality is associated with the URL in a search index as metadata. The virality is useable to inform a ranking of the URL against a plurality of other URLs for identification and presentation as a search result in a search engine results page. | 2012-06-14 |
20120150834 | CREATION SUPPORTING SYSTEM USING METADATA BASED ON USER AND INFORMATION PROVIDING METHOD THEREOF - Provided is a creation supporting system and method using user-based metadata. According to the creation supporting system and method, metadata collected by a user for video content are stored so as to be provided to a creator. The creation supporting system includes a user terminal configured to receive evaluation data on video content from a user who watched the video content; a utilizer terminal configured to receive a search value from a utilizer desiring a search and request a video content search; and a service providing server configured to receive the evaluation data from the user terminal, construct metadata of video content, and compare the search value received from the utilizer server with the metadata for searching for a corresponding video content. | 2012-06-14 |
20120150835 | KNOWLEDGE CORRELATION SEARCH ENGINE - An improved search engine creates correlations linking terms from inputs provided by a user to selected target terms. The correlation search process receives pre-processed inputs from a user including a wide variety of input formats including keywords, phrases, sentences, concepts, compound queries, complex queries and orthogonal queries. The pre-processing also includes pre-processing of general digital information objects and static or dynamic generation of questions. After a correlation search of the information presented by the pre-processing, the search results are processed in novel ways to provide an improved relevance ranking of results. | 2012-06-14 |
20120150836 | TRAINING PARSERS TO APPROXIMATELY OPTIMIZE NDCG - A supervised technique uses relevance judgments to train a dependency parser such that it approximately optimizes Normalized Discounted Cumulative Gain (NDCG) in information retrieval. A weighted tree edit distance between the parse tree for a query and the parse tree for a document is added to a ranking function, where the edit distance weights are parameters from the parser. Using parser parameters in the ranking function enables approximate optimization of the parser's parameters for NDCG by adding some constraints to the objective function. | 2012-06-14 |
20120150837 | OPTIMIZING BLENDING ALGORITHMS USING INTERLEAVING - Methods and computer-readable media are provided for interleaving multiple sets of blended search results to identify a preferred set of blended search results for a search query or for a category of search queries. A search query is received and routed to multiple ranking systems, which return search results that are blended into sets of blended search results. Interleaving experiments are performed to determined, based on user preferences, which set of blended search results are preferred for that particular search query. Based on the outcome, a preferred blending algorithm is identified. | 2012-06-14 |
20120150838 | AUTOMATED DATABASE GENERATION FOR ANSWERING FACT LOOKUP QUERIES - Technologies pertaining to fact lookup queries are described herein. A relational database is automatically built by extracting attribute identities and attribute values from a one dimensional table, wherein the one dimensional table does not include an entity identity that corresponds to the attribute identity and the attribute value. The entity identity is inferred, and the attribute value is indexed in a relational database by the entity identity and the attribute identity. When a query is issued by a user that includes the entity identity and the attribute identity, the corresponding attribute value in the relational database is returned to the user. | 2012-06-14 |
20120150839 | SEARCHING LINKED CONTENT USING AN EXTERNAL SEARCH SYSTEM - A message is delivered to an external indexing service when a link is located within a given communication. The message includes a request to index content contained within the link to ensure that the link is indexed. When a keyword search query is performed within the communication system, both a local index and an external index associated with the external indexing service are queried. Results from the query are merged and surfaced. | 2012-06-14 |
20120150840 | SEARCH SERVER INTERCONNECTION METHOD, SEARCH SERVER AND SYSTEM FOR MOBILE SEARCH - A search server interconnection method, a search server, and a system for mobile search are disclosed The method includes: sending an information list of a first group of member engines to a search server; receiving an information list of a second group of member engines, where the information list of the second group of member engines is returned by the search server; and sending meta-index information of member engines in the information list of the second group of member engines to the search server. In the present invention, an effective mobile search service across search servers is realized. | 2012-06-14 |
20120150841 | AUDITING QUERIES USING QUERY DIFFERENTIALS - Methods and systems for auditing queries using query differentials are disclosed. A method includes identifying a set of queries, determining if results of each query of the set of queries are different from results of respective differentials of each query of the set of queries, and based on the determining, making a characterization of each query of the set of queries as one of safe and unsafe. Access is provided to the characterization of each query of the set of queries. | 2012-06-14 |
20120150842 | MATCHING QUERIES TO DATA OPERATIONS USING QUERY TEMPLATES - Systems and methods are described herein that can implemented by a middle tier of a multi-tier data retrieval system to select data operation(s) that correspond to a query. The query may be received from a front tier. The selection is performed by comparing the query to a query template associated with each data operation. The query template for each data operation includes an algebraic description of queries that each respective data operation can satisfy. The selected data operation(s) are then executed against a data service to obtain data, which is then provided to the front tier. In some embodiments, an execution plan may be created by the middle tier for satisfying the query. The execution plan can include the selected data operation(s) and post-processing step(s). The post-processing step(s) can be applied to the obtained data to satisfy the query. The post-processed data is then provided to the front tier. | 2012-06-14 |
20120150843 | System and method for coordinating asset entitlements - There is presented a system and method for coordinating asset entitlements, the system comprising a server including a processor and a memory and accessible by multiple domains over a network, and an asset entitlement database searchable by the server, wherein an entry of the asset entitlement database links a domain transcendent user identification (ID) of a user and at least one asset entitlement acquired by the user from any of the domains. In one embodiment, the server is configured to receive an asset entitlement inquiry from one of the domains, search the asset entitlement database for asset entitlements acquired by the user from any of the domains, generate a search result identifying the asset entitlements acquired by the user from the domains, and send data corresponding to the search result to the domain from which the asset entitlement inquiry was received. | 2012-06-14 |
20120150844 | Slashtags - A method of requesting a search query to be displayed in a web browser. The method includes receiving search terms and slash operators and generating results based on the search terms and slash operators. | 2012-06-14 |
20120150845 | System and Method for Collapsing Search Results - A system and method for collapsing search results. User input is received to perform a search of a communications network. The search results and multiple selection elements are displayed for removing each of the search results. A user selection of a selection element associated with a search result is received. A determination is made of irrelevant results that are similar to the search result. The search results are collapsed to remove the search result and the irrelevant search results. | 2012-06-14 |
20120150846 | Web-Relevance Based Query Classification - Methods, systems, algorithms, and media are provided for query classification based upon web relevance. In embodiments, a knowledge domain is selected. A knowledge domain includes a set of seed-web domains which are classified to belong to the knowledge domain. For each seed-web domain, a filtered web search of a given query is implemented utilizing a filter associated with a particular seed-web domain to obtain a total number of filtered results for the seed-web domain. For each seed-web domain, a total number of non-filtered results are referenced. A percentage of coverage for each seed-web domain is calculated using the total number of filtered results for the seed-web domain and the total number of non-filtered results for the seed-web domain. An average percentage of coverage for the knowledge domain is calculated using the percentage of coverage for each seed-web domain. | 2012-06-14 |
20120150847 | EFFICIENT USE OF COMPUTATIONAL RESOURCES FOR INTERLEAVING - Methods and computer-readable media are provided for improving the efficiency of the interleaving process. Once it is determined that a search query is to be used in an interleaving experiment, a primary ranking system and a secondary ranking system are analyzed to determine whether their respective search results for that search query would be identical. If the search results would be identical, the search query is routed only to the primary ranking system and not the secondary ranking system. If, however, it is determined that the search results would not be identical, both the primary ranking system and the secondary ranking system receive the search query for processing. | 2012-06-14 |
20120150848 | PROVIDING DEFINITIONS THAT ARE SENSITIVE TO THE CONTEXT OF A TEXT - Systems and techniques for providing definitions to a user. The provision embodies the context of a text in which the defined term appears. In one aspect, a system includes an electronic device that includes one or more data processing devices programmed to respond to receipt of the user selection of the first term by performing operations. The operations include accessing, from the one or more persistent data storage devices, the characterizations of the contexts of the texts, comparing the accessed characterizations of the contexts of the texts with one or more characteristics of the context of the textual content of a media file, and ranking the definitions of the first term according to respective likelihoods that the definitions appropriately characterize the usage of the first term within the textual content of the media file. | 2012-06-14 |
20120150849 | METHOD FOR SELECTING VERSIONS OF A DOCUMENT FROM A PLURALITY OF VERSIONS RECEIVED AFTER A SEARCH, AND RELATED RECEIVER - The present invention pertains to a method for selecting a version of a document. The user inputs an identifier of a document at the level of his receiver connected to at least one communication network, and initiates a search request to receive versions of at least one part of this document. The receiver then receives a plurality of versions of the said document. Each version received is analysed by a plurality of evaluation modules so as to calculate an evaluation value for each version received according to a predetermined criterion. The receiver selects for each of the evaluation modules a version of the document having the best evaluation in respect of this criterion, and displays the identifiers of versions having the best evaluations according to each criterion. The user can then easily select the version for reproduction thereof which best meets a criterion. The invention also relates to a receiver implementing the said method. | 2012-06-14 |
20120150850 | SEARCH RESULT RELEVANCE BY DETERMINING QUERY INTENT - Embodiments of the present invention relate to systems, methods, and computer-storage media for determining search query intent based on search results retrieved in response to a search query. In one embodiment, a plurality of search results that are responsive to a search query are retrieved. The plurality of search results is ranked based on relevance to the search query. Additionally, an adult-content score is assigned to one or more of the plurality of search results based on categorizing an amount of adult content within each of the one or more plurality of search results. Further, a search-query-intent score is determined based on the adult-content score of each of the one or more plurality of search results and the ranking of each of the one or more plurality of search results. | 2012-06-14 |
20120150851 | MATCHING REVIEWERS TO REVIEW OBJECTS - Techniques are described for incorporating different types of input available to administrators responsible for assigning reviewers (persons) to objects to be reviewed. A plurality of types of assignment ranking algorithms is provided. Each ranking algorithm can output a different set of candidate assignments (reviewer-review object pairs) with corresponding ranks/weights (measures of how well object fit reviewers). Some ranking algorithms may automatically generate assignments by using information about review objects and reviewers to find matches therebetween. Other algorithms might simply rank or weigh suggested matches (e.g., from manual input). The ranked/weighted assignments from the various algorithms are combined to produce a final result set of suggested assignments of reviewers. In one embodiment, a bidding algorithm, referral algorithm, and a relevance algorithm may be used, and intermediate results therefrom are combined for a final result. | 2012-06-14 |
20120150852 | TEXT ANALYSIS TO IDENTIFY RELEVANT ENTITIES - A system includes a data structure comprising a plurality of mesh entities, the data structure associating each of the plurality of mesh entities with a respective name and a respective one or more attribute values, and associating each of the plurality of mesh entities with one or more relations to one or more other ones of the plurality of mesh entities. Some aspects include reception of a file comprising text, identification of text entities from the text, identification of first mesh entities from the plurality of mesh entities based on the identified text entities, determination, for each of the first mesh entities, of a name and one or more attribute values, and determination of a relevance associated with each identified text entity based on the determined name and one or more attribute values. | 2012-06-14 |
20120150853 | ADVERTISEMENT DELIVERY SYSTEM WITH LOCATION BASED CONTROLLED PRIORITY MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of an advertisement delivery system includes: receiving a selection for a category of interest; generating search results for the selection, the search results based on a current location for locating a device providing the selection; generating a weighted distance based on distances of the search results from the current location; generating a weighted relevancy based on relative matches of the search results and the selection; generating a weighted customization with the search results sharing a common attribute that is predefined; and delivering a notification from the search results by an aggregation of the weighted distance, the weighted relevancy, and the weighted customization, the aggregation meeting or exceeding a threshold for displaying on the device. | 2012-06-14 |