40th week of 2011 patent applcation highlights part 71 |
Patent application number | Title | Published |
20110246360 | Money Transfer Using Cellular Networks - A method of transferring money from a first user to another user through a cellular network is disclosed. The method includes a the first user buying a voucher of a specified money from market and sending a USSD string to a cellular network, the cellular network authorizing details provided by the first user, sending a notification to the first user confirming transfer of the money to the second user, sending the second user a notification informing receipt of the money from the first user, sending the second user a secret code, a vendor confirming details provided by second user by contacting the cellular network, the cellular network further confirming the second user, authorizing the vendor to pay the specified money to the second user, crediting the money to the vendor account, and sending a confirmation to the first user notifying the second user has received the cash. | 2011-10-06 |
20110246361 | METHOD AND APPARATUS FOR FACILITATING PURCHASE TRANSACTIONS ACROSS A NETWORK - One embodiment of the present invention relates to a system that provides information and records information to facilitate a purchase transaction across a network. The system operates by receiving a request for billing information relating to a purchase transaction from a remote computer system. In response to the request, the system retrieves the billing information from a local store in the local computer system, and sends the billing information to the remote computer system. After the remote computer system completes the purchase transaction, the system receives confirmation information for the purchase transaction from the remote computer system. The system records this confirmation information in the local store in the local computer system. This enables a user of the local computer system to subsequently look up the confirmation information based on a purchase transaction identifier. In one embodiment of the present invention, retrieving the billing information involves asking the user of the local computer system if the billing information can be released to the remote computer system. If the user confirms that the billing information can be released to the remote computer system, the local computer system sends the billing information to the remote computer system. | 2011-10-06 |
20110246362 | Method and System for Processing Internet Payments Using the Electronic Funds Transfer Network - A system and method for effectuating Electronic Funds Transfer credit messages. The main structural components of the system include a Payment Portal Processor (PPP), an Internet Pay Anyone (IPA) Account, a Virtual Private Lockbox (VPL) and an associated Account Reporter, the existing EFT networks, and a cash card for accessing a VPL or IP account. The PPP is a software application that provides a secure portal for accessing (linking to) either the user's Demand Deposit Account (DDA) or an IPA account and can be combined with the functionality of a traditional digital Wallet. Consumers use a PPP enhanced Wallet to fund their account, shop on the web, pay bills, pay anyone, store electronic receipts and transaction history, and check their recent PPP enhanced Wallet activity. The IPA account is a special purpose account with limited functionality for making electronic payments in the form of EFT credit messages. The VPL is a limited function receive only account for receiving electronic payments through the EFT. The Account Reporter is a portal to view transaction history and balance of IPA and VPL accounts, provide online, real-time transaction reports, and to reconciles accounts receivable/purchase records against incoming EFT payment records. A physical card can be associated with either an IPA or VPL account in order to provide PIN debit capability. | 2011-10-06 |
20110246363 | TWO DEVICE AUTHENTICATION - In one embodiment, a transaction is authenticated by a payment provider, as opposed to a merchant, using two user devices without the user having to enter information, such as an email or password. When the user is ready to make a purchase from a merchant site, a unique transaction ID is created by the payment provider. That transaction ID, along with data about the transaction, such as specific items and cost, is automatically sent to the payment provider through a second device linked to the purchasing device. The payment provider compares the identifier from the sending device, such as the phone number, and the transaction ID with information stored in its database. If there is a match, the transaction/user may be approved or authenticated. | 2011-10-06 |
20110246364 | SECURE EXCHANGE OF INDICIA OF VALUE AND ASSOCIATED INFORMATION - Secure exchange of value and associated information in financial transactions involving beneficial offers available for customers is provided. Various offers, including discounts, prepaid amounts, and the like may be purchased by customers for use with various merchants. A third party issuer obtains information from the customer in selling the offers and issues some kind of indicium of value having a representation of the value of the offer associated therein. Record of the indicia are maintained and either transmitted to the merchant or kept by the issuer or associated financial institutions. When the customer redeems the offer by presenting the indicium to the merchant, the merchant may either authenticate the indicium using the records received by the issuer, or establish communication with the issuer for the issuer to authenticate the indicium, either by itself or in cooperation with one or more related financial institutions. | 2011-10-06 |
20110246365 | SECURE EXCHANGE OF INDICIA OF VALUE AND ASSOCIATED INFORMATION - Secure exchange of value and associated information in financial transactions involving beneficial offers available for customers is provided. Various offers, including discounts, prepaid amounts, and the like may be purchased by customers for use with various merchants. A third party issuer obtains information from the customer in selling the offers and issues some kind of indicium of value having a representation of the value of the offer associated therein. Record of the indicia are maintained and either transmitted to the merchant or kept by the issuer or associated financial institutions. When the customer redeems the offer by presenting the indicium to the merchant, the merchant may either authenticate the indicium using the records received by the issuer, or establish communication with the issuer for the issuer to authenticate the indicium, either by itself or in cooperation with one or more related financial institutions. | 2011-10-06 |
20110246366 | AUTHENTICATION USING TELECOMMUNICATIONS DEVICE - A method for authenticating a transaction being conducted remotely of a commerce server is disclosed. The method comprises selecting a telephone number from a pool of telephone numbers and making a telephone call to a registered telecommunications device, the telephone call being made with caller identification activated. A prompt is provided for the entry of at least a part of the telephone number as an authentication of the transaction. Upon the telephone number being entered within a set time the transaction is approved and effected. | 2011-10-06 |
20110246367 | Payment service to efficiently enable electronic payment - A method to forward a browser client is disclosed. The method comprises storing information at a payment service server. The information includes a return network address corresponding to a interface hosted by a merchant server. Next, the method performs the step of comparing the return network address that is included in the information to a reference return network address corresponding to the interface hosted by the merchant server and identifying whether the return network address matches the reference return network address. Finally, the method comprises forwarding the browser client to the interface hosted by the merchant server responsive to the identifying the match. | 2011-10-06 |
20110246368 | METHOD AND APPARATUS FOR A NO PRE-SET SPENDING LIMIT TRANSACTION CARD - A method and apparatus are provided for a no pre-set spending limit transaction card with features and attributes of both a credit card and a charge card, including an overlimit spend feature and an associated communicated line of credit. The transaction card may carry a balance like a credit card and may require that a card user pay down the balance carried forward to the line of credit subsequent to the end of each billing cycle. When the user has reached or exceeded the communicated line of credit, each subsequent transaction request for a new transaction by the user is evaluated on a case-by-case basis by a process that includes execution an overlimit spend authorization logic or process | 2011-10-06 |
20110246369 | EVENT ACCESS WITH DATA FIELD ENCRYPTION FOR VALIDATION AND ACCESS CONTROL - The utility of a portable consumer device is extended by allowing account holders the ability to gain entry into access-controlled venues (e.g., baseball or soccer game, cinema, public transit) using a portable consumer device that is associated with an account that was used to purchase the admission or tickets to the event at the access-controlled venue. Techniques disclosed allow cardholder authentication in a non-payment setting that enables cardholders access to a location or a specific event. A first validation cryptogram is generated in the purchase cycle and is stored. A second validation cryptogram is generated in the validation cycle at the venue. If the second validation cryptogram matches the first validation cryptogram, the consumer is granted access. Validation cryptograms may be based on input data that is specific to the payment card holder (e.g., primary account number), specific to the ticket selling merchant (e.g., merchant identifier), specific to the event (e.g., event identifier, date/time, location, etc.), and/or specific to the transaction (e.g., authorization code from a payment network). Based on the input data, validation cryptograms may be generated using encryption, hashing, a combination of encryption and hashing, and/or other operations on the input data. | 2011-10-06 |
20110246370 | FACILITATING TRANSACTIONS USING UNSUPPORTED TRANSACTION IDENTIFIER TYPES - Facilitating transactions using unsupported transaction identifier types entails receiving a unique transaction indicator having a transaction indicator type, and an indication that a corresponding transaction is to be carried out with a device that does not adequately support the transaction indicator type, and sending information to the device to allow the corresponding transaction to be completed. In one example, an encoded version of the unique transaction indicator is prepared by dividing an image constituting the unique transaction indicator into a plurality of sub-areas, and representing each of the sub-areas using the characters, which respectively represent the content of each sub-area. | 2011-10-06 |
20110246371 | ENCODING OF A BANK TRANSFER - Process for encoding and/or decoding of the contents of data fields of a form, the contents of several data fields being combined into a first character chain, this first character chain being encoded in the corresponding number of bits into a corresponding first bit code, and this first bit code by means of second encoding, especially using 6 bits per character, being converted into a second character chain, this second character chain conversely being decodable/decoded into the contents of the data fields. | 2011-10-06 |
20110246372 | SYSTEM AND METHOD FOR POINT-TO-POINT ENCRYPTION WITH ADJUNCT TERMINAL - A system for point-to-point encryption is provided. A card reader system reads unencrypted card data stored on a magnetic stripe of a card and encrypts the card data, the card reader system being contained in a first housing. A point of sale device coupled to the card reader system and contained in a second housing separate from the first housing has a user interface for obtaining a transaction amount. A transaction request system transmits the transaction amount and the encrypted card data to an authorization gateway, wherein the unencrypted card data is prevented from being processed by the point of sale device. | 2011-10-06 |
20110246373 | PAYMENT MANAGEMENT ON MOBILE DEVICES - Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a manageability engine on a mobile device, communicates with an online bill payment service. The bill payment management module may receive information about bill payments, including bills which are due, and presents selective information to a bill payment client application. A bill payer can then access the information on the mobile device through the bill payment client application and review or change the payment amounts. The review and the modifications may be performed when the mobile device is offline and the modifications may be stored until a later time when the mobile device can connect to a network. Once a network is available, the bill payment management module may send payment instructions to the online bill payment service. Other embodiments may be described and claimed. | 2011-10-06 |
20110246374 | MOBILE COMMERCE PAYMENT SYSTEM - A mobile commerce system and components thereof are provided in which multiple wireless mobile communications devices (mobile devices) each has a unique electronic identification and processing circuit capable of encrypting data utilizing an encryption key and a first software application providing connectivity to commercial webpage servers for purposes that include the conduct of selected transactions involving a payment for goods or services. Each mobile device is independently enabled to conduct financial transactions in real time by communication with a financial institution. Each mobile device further has a second software application termed mobile payment application adapted to interact with the first application to receive data as to a payment required to conclude a transaction conducted by way of a commercial webpage server. The mobile payment application initiates an instruction to the financial institution to make a payment to a payee designated by way of such data wherein the instruction is encrypted utilizing the unique electronic identification and processing circuit. | 2011-10-06 |
20110246375 | HOME PURCHASE PROGRAM - Embodiments of the invention provide apparatuses and methods that provide for a housing purchase program in which a seller agrees to sell a home at a reduced price in return for the buyer agreeing to share with the seller some portion of the home's future appreciation. For example, the seller may desire to sell a home at a first price but the potential buyer wants to purchase the home at a lower price. The seller may agree to sell the home at a price lower than that which the seller desires, but only if the buyer agrees to share some portion of the home's future appreciation. In some embodiments, the housing purchase program further includes a mortgagee/investor that, at least temporarily, pays-off or forgives the seller's remaining mortgage principal that is above the sale price if the seller agrees to pay the mortgagee/investor back with any future appreciation in which the seller shares. | 2011-10-06 |
20110246376 | COST BENEFIT BASED ANALYSIS SYSTEM FOR NETWORK ENVIRONMENTS - A method, apparatus, and computer program product for planning changes to network data processing systems. A number of processes performed in a current network data processing system and labor used to perform the number processes are identified. Resources in the current network data processing system used by the number of processes are identified. A first cost for labor used to perform the number of processes using the current network data processing system is calculated. A second cost for the resources in the current network data processing system is calculated. A first change in the first cost for labor in a new network data processing system based on a number of changes to the number of processes when the number of processes is performed in the new network data processing system is identified. A second change in the second cost for the resources in the new network data processing system is identified. | 2011-10-06 |
20110246377 | Conditional Establishment of a Communications Connection with a Mobile Terminal in Response to a Query From the Mobile Terminal - A mobile implementation channel supports the processing of a request for requested information for a customer of a business. The request may be generated through a wireless terminal and include a customer identification of the customer. Profile information about the customer may then be accessed and the user identification mapped to a device type of the customer. When the profile information indicates that the customer should be invited to interact with a representative the business, an invitation message is directed through the corresponding mobile communication channel type to the customer's device of the customer. The invitation message may include contact information and the requested information. The contact information may then be utilized to establish a communications connection between the customer and the representative of the business. Otherwise, only the requested information is directed through the mobile communication channel type to the customer's device. | 2011-10-06 |
20110246378 | IDENTIFYING HIGH VALUE CONTENT AND DETERMINING RESPONSES TO HIGH VALUE CONTENT - Systems and methods automatically determine responses to content based on semantic analysis, token analysis and influence ratings. The systems and methods identify relevant queries for product support, purchase or advocacy from multiple communications channels and further separate the high-value conversations and individuals from the low value conversations and individuals in an efficient manner. Described herein is a system and method to use the identification of important individuals and the context of their conversations to appropriately route content items and messages and subsequent responses in such a way as to allow an efficient interaction to occur. | 2011-10-06 |
20110246379 | INTELLECTUAL PROPERTY SCORING PLATFORM - A method, system, and apparatus for scoring an intellectual property asset, such as a patent. A platform for automated scoring can implement a z-score statistical method, or variations thereof, to score a patent. The z-score statistical method can be used to measure where a value of a parameter in a patent lies in relation to the average value of that parameter in a patent population. Parameter scores can be obtained for each parameter of the patent. Additionally, a composite score can be provided that indicates an overall score or value of the patent, at least with respect to the parameters examined, as against the patent population. The composite score can be a weighted score of the z-scores of different parameters of the patent. | 2011-10-06 |
20110246380 | LOCATING TECHNOLOGY CENTERS IN AN ORGANIZATION USING A PATENT SEARCH ENGINE - A search platform that can locate a technology center within an organization using a patent search engine. Since organizational resources tend to be associated with patents or patent-related projects from a technical standpoint, the search platform can utilize these associations to identify particular technology centers within the organization. By searching patent collections and organizational workspaces associated with patents to obtain information on an organization's technology centers, the search platform can provide business intelligence to the organization without the need for a dedicated knowledge network to be built and maintained by the organization. | 2011-10-06 |
20110246381 | SYSTEMS AND METHODS OF MODELING ENERGY CONSUMPTION OF BUILDINGS - A modeling system is configured to model a building from incomplete physical constraint information. When initial user input related to the proposed building is received that identifies a building type, a location, and a square footage, the modeling system retrieves a baseline factor based on the user input and multiplies it by the square footage to produce a baseline energy usage model. As additional user inputs are received that further define the proposed building, efficiency factors are selectively applied that model the energy usage impact related to particular user inputs to produce an adjusted energy usage model, which can be compared to the baseline energy usage model. | 2011-10-06 |
20110246382 | License Tracking System and Related Software for Complex License and Compliance Requirements - A license tracking system has been developed that comprises: a) at least one set of license requirements, b) at least one form, questionnaire, prompt series, survey interface or combination thereof that requests at least one piece of input data related to a licensee, the license requirements or a combination thereof from a user, c) at least one database that collects and compares the at least one set of license requirements and the at least one piece of input data to produce a set of compliance instances and a set of alert instances, d) a compliance notice component that provides the set of compliance instances to the user, and e) an alert notice component that provides at least one of the alert instances to the user. Methods of tracking licenses and license-related information have also been developed, along with network systems capable of executing software programs comprising license tracking software. | 2011-10-06 |
20110246383 | SUMMARY PRESENTATION OF MEDIA CONSUMPTION - Summary presentation of media consumption is described herein. An exemplary method for generating a personal highlight reel includes receiving personal consumption data indicating one or more media units consumed by a user computing device, and storing the personal consumption data in association with a user identifier. The method further includes identifying one or more relevant personal media units based on the personal consumption data. The method further includes generating a personal highlight reel including one or more personal media events representative of the one or more relevant personal media units, and outputting the personal highlight reel. | 2011-10-06 |
20110246384 | Apparatus, Systems and Methods For Online, Multi-Parcel, Multi-Carrier, Multi-Service Enterprise Parcel Shipping Management - The present invention provides a plurality of Enterprises with a single online user interface with which the Enterprise can provide Enterprise Shippers, shipping origination users and shipping intermediary users with an automated parcel management system for a plurality of supported Carriers for a plurality of services. The present invention provides for the hierarchical definition of users, including the establishment of at least one user for each Enterprise as a Super-Administrator with the highest level of privileges and authority for the Enterprise, and the identification of other users as Sub-Administrators, Desktop Users and Shipping Station Users. The present invention also provides for the hierarchical definition of organizational units within each Enterprise, including the definition of sites, groups within a site, and users within a group. The present invention further provides for a distinct definition of policies, privileges, and other types of specifications for each user level, each user, and each organizational unit. The present invention applies the user and organizational policies, privileges and other specifications as they apply to each particular user to drive the interactive interface with each particular user and to provide among other things, shipping options, shipping services, shipping rates, traveler and/or shipping label preparation, and shipment tracking. | 2011-10-06 |
20110246385 | AUTOMATICALLY RECALIBRATING RISK MODELS - Methods, computer readable media, and apparatuses for automatically recalibrating risk models are presented. An identifier of a modeling function may be received. The modeling function may have at least one input variable and a first set of one or more coefficients. Updated performance data that includes at least one input value corresponding to the at least one input variable may be received from a data source. Then, a second set of one or more coefficients may be calculated for the modeling function based on the updated performance data. If it is subsequently determined that the modeling function more accurately models the updated performance data when the second set of one or more coefficients is used in computing a result of the modeling function, then the first set of one or more coefficients may be replaced with the second set of one or more coefficients to recalibrate the modeling function. | 2011-10-06 |
20110246386 | METHODS AND SYSTEMS FOR GENERATING TRANSITION PROBABILITY MATRICES THROUGH AN OPTIMIZATION FRAMEWORK - A method for generating an optimized transition probability matrix (OTPM) is provided. The method is performed using a computer system coupled to a database. The method includes storing in the database financial data including obligor credit ratings, generating multi-period empirical transition probability matrices (ETPMs) for a selected time horizon using the financial data stored within the database, generating a mathematical expression to minimize a difference between target ETPM values and candidate OTPM values, and calculating the OTPM from the generated mathematical expression and the financial data stored within the database, wherein the calculated OTPM includes a first set of optimized transition probability values for predicting a likelihood that a credit rating of an obligor will migrate from one credit state to another credit state during a first time interval in the future. | 2011-10-06 |
20110246387 | CONSUMER BEHAVIOR MODIFICATION TOOL - Embodiments of the present invention relate to methods and apparatuses for implementing, in connection with a financial account, a consumer behavior modification tool. In some embodiments, the method includes: identifying a financial account that can be used by a consumer to make a purchase, recording in connection with the financial account a rule that additional liability in the form of a transaction fee or interest rate will be applied to the financial account when a purchase meeting predefined criteria is made using the financial account, wherein the predefined criteria is defined such that only a subset of the set of potential purchases that can be made using the financial account meet the predefined criteria, receiving an indication that a purchase has been made using the financial account, applying the rule to determine that the purchase that has been made meets the predefined criteria recorded in connection with the financial account, and investing the additional liability, in the form of a transaction fee or finance charge, into an investment vehicle. | 2011-10-06 |
20110246388 | SYSTEM AND METHOD FOR PROVIDING FINANCIAL ASSET PRICING CHART WITH AGGREGATED, RANKED AND FILTERED ARTICLES - A system and a method for rendering a graphical chart of time and pricing data of financial assets marked by indicators corresponding to related articles of information and events, and adapted to communicate with a client, wherein the articles of information and events are ranked and filtered based on a combination of multiple automatic machine ranking and user-assigned ranking algorithms. | 2011-10-06 |
20110246389 | Electronic trading spooler - A spooler for a computerized trading system is provided. The spooler acts as a master to a calculation engine slave that calculates the desired state of the orders and quotes in the market. Thus, the spooler controls the high-level allocation of computational and communicational resources of the computerized trading system and the calculation engine receives from the spooler what to calculate. The spooler imposes when necessary an overall priority of calculation of the trading system that supports the spooling activity. The spooler comprises a scheduler and a package assembly. The scheduler determines the current state of the underlying prices relative to the underlying prices used to calculate quotes still active in the exchange and whether the computational resources of the trading system should focus as much as possible on preparing quoting operations, or whether other activities of the trading system can be done. The package assembly prepares quoting operations and builds the quoting operation data package. Depending on the state of the system, the scheduler operates in different modes: a “normal computations” mode, a “priority computations” mode, and a “masshold” mode. | 2011-10-06 |
20110246390 | SYSTEM AND METHOD FOR CONSTRUCTING INVESTMENT INSTRUMENTS, PORTFOLIOS , AND BENCHMARK INDEXES WITH ACTIVE LEVERAGED WRITTEN CALL OR PUT OPTIONS OVERLAY - An electronic pricing and trading system and method can be used for providing financial investment instrument or performance benchmark through an investment portfolio. The investment portfolio can have a long exposure to one or more underlying equities or an equity index. A technical rule can be used to determine a pricing trend associated with the underlying equities periodically. The technical rule can be electronically calculated based on prices of the one or more underlying equities or equity index investment, and a determined pricing trend is one of an up trend and a down trend. An option overlay component can be associated with the investment portfolio based on a determined pricing trend. For an up trend, the option overlay component contains written or shorting put options associated with the underlying equities or equity index. And, for a down trend, the option overlay component contains written or shorting call options associated with the underlying equities or equity index. | 2011-10-06 |
20110246391 | BOND ISSUE INFORMATION MANAGEMENT AND DISTRIBUTION SYSTEM - Disclosed is a new bond issue information management and distribution system and methods of using the same in which users, including bond issuers, investors, underwriters, and other financial intermediaries may participate regardless of affiliation, or lack of affiliation, amongst them. The disclosed system and method provides a central clearinghouse for information regarding new issue bonds and provides open access to such information. Also disclosed is a system and method for distribution of advertisements regarding new issue bonds. | 2011-10-06 |
20110246392 | SYSTEM AND METHOD FOR DISPLAYING TRADING DATA - A system and method are provided for presenting trading information. One example method includes displaying a plurality of effective trade indicators corresponding to price levels at which effective trades have been initiated, and displaying trading information corresponding to each effective trade. The effective trades can be determined based on user-configured trade definitions. The trading information can include a traded quantity and profit/loss corresponding to each effective trade. In addition to the trading information, current market information could be displayed as well in relation to the plurality of effective trades. | 2011-10-06 |
20110246393 | SYSTEMS AND METHODS FOR SCHEDULING CONTRIBUTIONS TO A RETIREMENT SAVINGS PLAN - Computer-based systems and methods are described for generating personalized, automated contribution strategies for scheduling contributions to a retirement savings plan or other savings plan. Embodiments of the systems and methods provide visual, graphic, and other educational displays to assist a client in choosing a suitable savings contribution strategy that may take into account at least one of the set consisting of: details of an employer-sponsored savings fund available to the client which may include opportunities for employer matching-funds, desired portion of potential standard-of-living increases derived from salary raises that the client is willing to contribute to a savings plan, client's current savings behavior and value of savings portfolio, effects of the stochastic nature of future investment portfolio value, and changing federal tax regulations. Clients may use the systems for educational and planning purposes and/or may authorize automated triggering of contributions with scheduled increases and/or decreases as specified by the selected strategy. | 2011-10-06 |
20110246394 | SCANNING BASED SPREADS USING A HEDGE RATIO NON-LINEAR OPTIMIZATION MODEL - The disclosed embodiments utilize hedge ratios to determine the optimal hedge ratio and associated scanning spread. This tells traders what ratios of the quantities of products they should have in their portfolio in order to maintain the status of the portfolios as delta neutral, i.e. be delta hedged, and receive optimal margin credits therefore. | 2011-10-06 |
20110246395 | Method and Apparatus For Welding Cost Calculator - A method and apparatus for providing welding-type power is disclosed and includes a cost calculator. | 2011-10-06 |
20110246396 | SYSTEMS AND METHODS FOR ISOBUTYL ALCOHOL (IBA) RECOVERY - Methods and systems for creating dynamic performance measures (DPMs) for an IBA manufacturing process. Included is a method for monitoring an Isobutyl Alcohol (IBA) recovery system that includes computing at least one of an amount of IBA recovered from the IBA recovery system and an amount of waste material produced from the IBA recovery system, and displaying at least one of the recovered IBA and the waste material produced based on time. The method also includes computing a cost saved based on a cost of virgin IBA and the amount of IBA recovered. Computing an amount of waste material includes measuring waste material flow, and computing a cost of waste material management based on the measured waste material flow and a cost per unit volume to dispose of waste material. The IBA recovery system can include an evaporation IBA recovery system and/or a distillation IBA recovery system. | 2011-10-06 |
20110246397 | METHOD FOR IMPROVING THE ENVIRONMENTAL IMPACT OF FORMULATED PRODUCTS - Disclosed are methods for developing a product having a relatively benign environmental impact. The methods evaluate the environmental hazard of various chemical components in formulated products and identify improvements in environmental safety based on those evaluations. Environmental criteria are in part developed based on three factors including; persistence, bioaccumulation and toxicity. One method includes obtaining a preliminary formula for a product, wherein the preliminary formula includes a plurality of chemical components, identifying at least one different chemical component that is capable of being substituted for the chemical component in the preliminary formulation and determining an environmental performance score for the chemical component and the different chemical component and determining an environmental performance score of the preliminary formula and a second formula, wherein the second formula utilizes the different chemical component. The formula having the highest environmental performance score is selected as the product. A second method includes tracking the use of chemical components in an existing product portfolio offered or sold by a business unit or a company, in which existing products having the lowest environmental performance scores would be targeted for replacement by reformulated products having higher environmental scores in order to improve the environmental performance of the business unit or company. | 2011-10-06 |
20110246398 | Leveraging to Minimize the Expected Multiplicative Inverse Assets - The question of how much should be placed at risk on a given investment, relative to the total assets available for investment, is basically that of determining the optimal leverage. An existing well known method for calculating optimal leverage does not appear to be derived from sound principles. The approach taken by the method described in this specification is to optimize the expected future value of a function of the assets, conditioned on the assets having some estimated distribution. Asymptotically over time, the distribution of log-assets becomes Gaussian. Using this analysis, a couple of the more obvious strategies are ruled out, while the strategy of minimizing the reciprocal expected assets yields an elegant result that can also be interpreted in some sense as minimizing the risk of bankruptcy. It seems this strategy is particularly relevant for insurance companies, financial security ratings, and financial leveraging. | 2011-10-06 |
20110246399 | PREDICTING RESPONSE TO A HER INHIBITOR - The present application describes the use of low HER3 as a selection criterion for treating patients with a HER inhibitor, such as pertuzumab. | 2011-10-06 |
20110246400 | SYSTEM FOR OPTICAL METROLOGY OPTIMIZATION USING RAY TRACING - Provided is a system for determining profile parameters of a sample structure on a workpiece using an optical metrology system optimized to achieve one or more accuracy targets. The optical metrology system comprises an optical metrology tool configured to measure a diffraction signal off a sample structure, an optical metrology tool model configured to model the optical metrology tool using a selected number of rays and selected beam propagation parameters for the illumination beam and the diffraction beam; a signal adjuster configured to adjust the measured diffraction signal off the sample structure using the optical metrology tool model and calibration parameters, the signal adjuster generating an adjusted metrology output signal; and a profile extractor configured to determine one or more profile parameters of the sample structure using the adjusted metrology output signal, a profile model of the sample structure, and one or more extraction modules. | 2011-10-06 |
20110246401 | GRAPHICAL INFORMATION NAVIGATOR - Embodiments are disclosed for facilitating graphical navigation of data. In a specific embodiment, the system includes a graphical user interface that is adapted to graphically depict data via one or more displayed icons. The graphical user interface is further adapted to enable a user to cause display a first icon and one or more second icons associated therewith by selection of the first icon. A learning module is adapted to monitor use of the graphical user interface and to adjust behavior of the graphical user interface in response thereto based on learned information obtained from monitoring the use of the graphical user interface. The system may be specifically adapted to facilitate user navigation of data that is maintained by Enterprise Resource Planning (ERP) software. | 2011-10-06 |
20110246402 | ACOUSTIC EVENT CLASSIFICATION USING PARTICLE SWARM OPTIMIZATION WITH FLEXIBLE TIME CORRELATION MATCHING - An acoustic event classifier uses particle swarm optimization (PSO) to perform a flexible time correlation of a sensed acoustic signature to reference acoustic signatures in a multi-dimensional parameter space. The classifier may fuse the acoustic signatures from multiple acoustic sensors to form the sensed acoustic signature. The approach is generally applicable to classify all types of acoustic events but is particularly well-suited to classify “explosive” events such as gun shots, mortar blasts, improvised explosive device blasts etc. | 2011-10-06 |
20110246403 | Method and System for Automated Supervised Data Analysis - The invention relates to a method for automatically analyzing data and constructing data classification models based on the data. In an embodiment of the method, the method includes selecting a best combination of methods from a plurality of classification, predictor selection, and data preparatory methods; and determining a best model that corresponds to one or more best parameters of the classification, predictor selection, and data preparatory methods for the data to be analyzed. The method also includes estimating the performance of the best model using new data that was not used in selecting the best combination of methods or in determining the best model; and returning a small set of predictors sufficient for the classification task. | 2011-10-06 |
20110246404 | Method for Allocating Trip Sharing - A method and system for allocating users as trip accompanies provides for: creating a first trip prediction algorithm, collecting input parameters, predicting by the first trip prediction algorithm using the collected input parameters as input, at least one first trip, executing a matching method, the matching method comparing attributes of the predicted at least one first trip with attributes of at least one second trip, and allocating the first and the second user to each other as trip accompanies in dependence of the matching score of the first and second potential trip data object. | 2011-10-06 |
20110246405 | SYSTEM FOR ANIMAL HEALTH DIAGNOSIS - A diagnosis of the health of an animal is obtained through a combination of computerized data and human interpretation. Data relates to the physical characteristics of the animal, and includes data obtained from a physical inspection of the animal. A blood or other fluid sample is used to obtain a computer generated laboratory analysis. This is reported through an internet network to the clinical pathologist. The clinical pathologist has the data relating to the physical characteristics, and thereby makes a diagnosis of the animal health. A drop-down menu on a computer screen provides supplemental reports to support the diagnosis. This can be enhanced by further input from the pathologist through keyboard entry into the computer to obtain an integrated computer report having the laboratory analysis, supplemental report, and selectively an enhanced report. The integrated report is electronically communicated to a client. | 2011-10-06 |
20110246406 | METHOD AND SYSTEM FOR CREATING A PREDICTIVE MODEL FOR TARGETING WEB-PAGE TO A SURFER - A system and a method for creating a predictive model to select an object from a group of objects that can be associated with a requested web-page, wherein a configuration of the requested web-page defines a subgroup of one or more selected objects from the group of objects. Each web-page can include one or more links to be associated with content objects from the group. For each content object presented over a requested web-page, one or more predictive model with relevant predictive factors is processed such that the predicted objective, the probability of success for example, is calculated. A success is defined as a surfer responding to the presented content according to the preferences of the site owner. Each predicted model can be associated with a key-performance indicator (KPI). Further, a predictive model can reflect the number of times the surfer requested the web page during the surfer's visit. | 2011-10-06 |
20110246407 | SYSTEM AND METHOD FOR HYBRID RETE REASONING BASED ON IN-MEMORY AND DBMS - A system and method for hybrid Rete reasoning based on memory and DBMS are provided. The system for hybrid Rete reasoning based on memory and DBMS includes a reasoning rule type classification means for classifying an input reasoning rule as one of one or more types. A network generation means generates a network depending on the classified reasoning rule type. A network execution means derives extended triples by applying a predetermined triple to the generated network. | 2011-10-06 |
20110246408 | Rules Engine for Enterprise System - An example embodiment provides a process relating to an inference engine for enterprise systems and enterprise contracts. In the example, the inference engine receives a fact and stores it in an input queue. Then the inference engine retrieves the fact from the input queue and routes the fact to a schedule queue on the basis of the fact's processing schedule and a condition that is part of a rule. The inference engine retrieves the fact from the schedule queue in accordance with the processing schedule and routes the fact to a rule executer on the basis of the fact's contents. The rule executer applies an action to the fact, where the action is also part of the rule and the action transforms the fact or creates new facts. Then the inference engine routes the transformed fact or new facts to the input queue and possibly to a persistent storage device. | 2011-10-06 |
20110246409 | DATA SET DIMENSIONALITY REDUCTION PROCESSES AND MACHINES - Provided in part herein are processes and machines that can be used to reduce a large amount of information into meaningful data and reduce the dimensionality of a data set. Such processes and machines can, for example, reduce dimensionality by eliminating redundant data, irrelevant data or noisy data. Processes and machines described herein are applicable to data in biotechnology and other fields. | 2011-10-06 |
20110246410 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM - An information processing apparatus includes a display control unit adapted to, with respect to each of a plurality of predetermined attributes, display on a display unit, for each of a plurality of inference conditions, inference results obtained by inferring a probability that input data belongs to the attribute under the inference condition; and a receiving unit adapted to receive selection of one of a plurality of parameters for specifying an inference condition from a user, wherein the display control unit highlights, with respect to each of the plurality of inference conditions, the inference results according to values of the selected parameter of the inference condition. | 2011-10-06 |
20110246411 | SEQUENCE DETECTION METHODS, DEVICES, AND SYSTEMS FOR SPECTRUM SENSING IN DYNAMIC SPECTRUM ACCESS NETWORKS - In one embodiment, a cognitive radio dynamic spectrum access sensing system is configured to incorporate a hidden Markov model and a risk function to determine the primary user state sequence with the minimum amount of associated risk. The system comprises one or more weighted cost factors that can be used to handle a missed detection sensing error differently from a false alarm sensing error. The system further comprises a complete forward partial backward computation designed to increase sensing accuracy with limited effect on sensing delay and complexity. | 2011-10-06 |
20110246412 | Trust Rating Metric for Future Event Prediction of an Outcome - In at least one embodiment, a trust rating system and method provide a precise and accurate, structured (yet adaptable and flexible), quantifying way of expressing historical trustworthiness so the user or decision maker can make more informed decisions on the data or information being evaluated. | 2011-10-06 |
20110246413 | METHOD FOR JUDGING RISK OF CANCER RECURRENCE, COMPUTER PROGRAM, AND COMPUTER SYSTEM - A method for judging a risk of cancer recurrence comprising: acquiring an activity value and expression level of a first cyclin dependent kinase (CDK) of a cell contained in tissues extracted from cancer patients, an activity value and expression level of a second CDK, and a number of Ki67-expressing cells or an expression level of Ki67; and judging a risk of cancer recurrence based on the acquired activity value and expression level of the first CDK, the activity value and expression level of the second CDK, and a percentage of Ki67-expressing cells or the expression level of Ki67. A computer program product and a computer system are also disclosed. | 2011-10-06 |
20110246414 | IDENTIFICATION OF SUBSTANCES BY ION MOBILITY SPECTROMETRY - The invention relates to identifying substances in a sample by similarity comparisons between series of ion mobility spectra of the sample and series of ion mobility spectra of reference samples. The collection of series of spectra of reference samples, termed reference library, are divided into classes, with the class assignment of a series of spectra being calculated from the measured values themselves, and limiting the similarity comparisons to series of spectra with the same class assignment. First and second moments of the spectra have proven to be particularly favorable characteristics for the class assignment. | 2011-10-06 |
20110246415 | METHOD AND SYSTEM FOR VALIDATING DATA - A method and system for validating data. Warehouse data is generated by transforming source data via an ETL transformation model. A data cube is generated by transforming the warehouse data via an OLAP transformation model. A report dataset (MDS | 2011-10-06 |
20110246416 | STUBBING SYSTEMS AND METHODS IN A DATA REPLICATION ENVIRONMENT - Stubbing systems and methods are provided for intelligent data management in a replication environment, such as by reducing the space occupied by replication data on a destination system. In certain examples, stub files or like objects replace migrated, de-duplicated or otherwise copied data that has been moved from the destination system to secondary storage. Access is further provided to the replication data in a manner that is transparent to the user and/or without substantially impacting the base replication process. In order to distinguish stub files representing migrated replication data from replicated stub files, priority tags or like identifiers can be used. Thus, when accessing a stub file on the destination system, such as to modify replication dath or perform a restore process, the tagged stub files can be used to recall archived data prior to performing the requested operation so that an accurate copy of the source data is generated. | 2011-10-06 |
20110246417 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SYNCHRONIZING ENTITIES WITHIN A SYSTEM - In accordance with embodiments, there are provided mechanisms and methods for synchronizing entities. These mechanisms and methods for synchronizing entities can enable improved data synchronization, improved data management, etc. | 2011-10-06 |
20110246418 | SYNCHRONIZATION FRAMEWORK THAT RESTORES A NODE FROM BACKUP - Architecture for restoring nodes. After restoring a node, fix-up occurs to make the node appears as a different node than before the restore operation. The node appears as a new node, which new node knows the data up to a certain point from when the new node had the prior identity. This allows for new changes generated by the new node to flow to the other nodes in the topology, as well as have the changes that the prior identity sent to other nodes flow back to the new node. In other words, the architecture maintains information to create the new node in the topology while maintaining prior data knowledge. Additionally, item level metadata of associated data items is updated to correlate with the updated data items so that changes can be correctly enumerated and applied. This metadata update occurs across scopes of which the data items are included. | 2011-10-06 |
20110246419 | REDUCING DATABASE DOWNTIME - Embodiments enable reduction of database downtime in a live production environment of an on-demand database service during repair and/or maintenance tasks. A source database and a target database are provided. Data is copied from the source database to the target database to create a mirrored set of data. Access is limited to one or more designated tables in the target database. General traffic is redirected from the source database to the target database, wherein the redirection occurs for a duration of a maintenance period. Data modifications that occur in the target database during the maintenance period are captured and then replicated into the source database. Finally, general traffic is redirected from the target database to the source database. | 2011-10-06 |
20110246420 | DATABASE SYSTEM BASED ON WEB APPLICATION AND DATA MANAGEMENT METHOD THEREOF - A database system based on a WEB application includes a database server ( | 2011-10-06 |
20110246421 | DISTRIBUTED PROCESSING DEVICE, AND STORAGE MEDIUM STORING DISTRIBUTED PROCESSING PROGRAM - A distributed processing device includes receiving unit receives a plurality of process requests to records stored on a database, an acquiring unit acquires execution frequency of each processes responsive to the plurality of process requests related to a record identified by an attribute name, on a per attribute name basis of a plurality of attribute names, each attribute name identifying each of the plurality of records, sorting unit sorts the plurality of process requests into a first set and a second set in accordance with the acquired execution frequency of each process on each of the plurality of attribute names, a determining unit determines a first node, serving as an allocation destination of the process request sorted in the first set, from among a plurality of nodes, each node having the database, and an allocating unit allocates the process request sorted in the first set to the first node. | 2011-10-06 |
20110246422 | CONSOLIDATION OF PATCH TRANSFORMATIONS FOR DATABASE REPLICATION - Embodiments of the invention provide for applying modifications to database instances in a way that allows some of instances to be modified without requiring that all of the instances be modified. Patching less than all of a plurality of replicated database instances can comprise applying a patch to a first version of a table in a first database instance. The first version of the table may be replicated in a corresponding first version of the table in a second database instance. Applying the patch to the first version of the table in the first database instance can result in a second version of the table in the first database instance. Transformations caused by applying the patch to the first version of the table in the first database instance can be consolidated based on differences between the first version of the table and the second version of the table. | 2011-10-06 |
20110246423 | METHOD FOR IMPLEMENTING MULTI-ARRAY CONSISTENCY GROUPS USING A WRITE QUEUING MECHANISM - A method for implementing multi-array consistency groups includes applying a write Input/Output (I/O) queue interval to a Logical Unit (LU) member of a consistency group (CG). The method also includes marking each write I/O with a timestamp and suspending I/O from the participating storage array to the LU member of the CG upon the participating storage array receiving a snapshot request from a master storage array. The method further includes determining whether the snapshot request timestamp is within the write I/O queue interval of the participating storage array. | 2011-10-06 |
20110246424 | AUTOMATED RELOCATION OF IN-USE MULTI-SITE PROTECTED DATA STORAGE - Methods of providing access to data are presented. The method includes providing a storage grid which includes a source chain of storage nodes and a target chain of storage nodes, the source chain including a primary source node and a secondary source node which operates as a data minor of the primary source node, and the target chain including a primary target node and a secondary target node which operates as a data mirror of the primary target node. The method also includes initially storing data on the source chain, the primary source node of the source chain maintaining a primary source copy of the data, and the secondary source node of the source chain maintaining a secondary source copy of the data. The method further includes relocating the data from the source chain to the target chain, the primary target node of the target chain maintaining a primary target copy of the data, and the secondary target node of the target chain maintaining a secondary target copy of the data, access to the data being continuously provided from the storage grid to an external device before, during, and after relocation of the data from the source chain to the target chain. | 2011-10-06 |
20110246425 | Managing Data Backup of an In-Memory Database in a Database Management System - System, method, computer program product embodiments and combinations and sub-combinations thereof for backing up an in-memory database. In an embodiment, a backup server is provided to perform backup operations of a database on behalf of a database server. A determination is made as to whether the database is an in-memory database. Database server connections are utilized during data accesses for the backup operations when the database is an in-memory database. | 2011-10-06 |
20110246426 | METHOD AND APPARATUS FOR INFORMATION RECOVERY USING SNAPSHOT DATABASE - The present invention provides a method for information recovery using a snapshot database, comprising the steps of: collecting first user log information for users of one or more user terminals; sorting effective information from the first user log information; storing the sorted effective information into the format of a snapshot database in accordance with period information; receiving recovery request information for the effective information from the user terminals; comparing and analyzing the second user log information and the effective information at the point of time where said recovery request information is received in accordance with said recovery request information; and recovering the second user log information to said effective information in accordance with the result of the analysis. | 2011-10-06 |
20110246427 | Computer File Storage, Backup, Restore and Retrieval - Computer file storage, backup, restore and retrieval is disclosed. A method includes providing a restore file interface allowing a user to restore a plurality of files based on a plurality of filter options, the files stored on multiple local and/or remote storage devices, computing devices, servers, and clouds. A filter option selection is received from the user, and filter details may also be received from the user. An available file list may be prepared based on the filter option selection and, if received, the filter details. A user selection from the available file list may be received. The user selected files are retrieved from one or more appropriate storage devices, computing devices, servers, and clouds. The method may be performed by software executing on a computing device. | 2011-10-06 |
20110246428 | METHOD FOR COMMUNICATING DEVICE MANAGEMENT DATA CHANGES - Methods and apparatuses relating to Open Mobile Alliance (OMA) device management (DM) are provided. An embodiment provides a method in which a mobile device is configured for: accumulating delta records on the mobile device; and pushing delta records to a DM server when a threshold for the delta records is met or exceeded. The delta records relate to changes made to an Open Mobile Alliance (OMA) device management (DM) tree. The delta records may be purged after the pushing operation. Other embodiments provide a mobile device and computer-readable medium for performing or facilitating the method. | 2011-10-06 |
20110246429 | STUB FILE PRIORITIZATION IN A DATA REPLICATION SYSTEM - Stubbing systems and methods are provided for intelligent data management in a replication environment, such as by reducing the space occupied by replication data on a destination system. In certain examples, stub files or like objects replace migrated, de-duplicated or otherwise copied data that has been moved from the destination system to secondary storage. Access is further provided to the replication data in a manner that is transparent to the user and/or without substantially impacting the base replication process. In order to distinguish stub files representing migrated replication data from replicated stub files, priority tags or like identifiers can be used. Thus, when accessing a stub file on the destination system, such as to modify replication data or perform a restore process, the tagged stub files can be used to recall archived data prior to performing the requested operation so that an accurate copy of the source data is generated. | 2011-10-06 |
20110246430 | DATA RESTORE SYSTEMS AND METHODS IN A REPLICATION ENVIRONMENT - Stubbing systems and methods are provided for intelligent data management in a replication environment, such as by reducing the space occupied by replication data on a destination system. In certain examples, stub files or like objects replace migrated, de-duplicated or otherwise copied data that has been moved from the destination system to secondary storage. Access is further provided to the replication data in a manner that is transparent to the user and/or without substantially impacting the base replication process. In order to distinguish stub files representing migrated replication data from replicated stub files, priority tags or like identifiers can be used. Thus, when accessing a stub file on the destination system, such as to modify replication data or perform a restore process, the tagged stub files can be used to recall archived data prior to performing the requested operation so that an accurate copy of the source data is generated. | 2011-10-06 |
20110246431 | STORAGE SYSTEM - The present invention relates to a storage system including a de-duplicate function and a full-text search function or the like, and reduces an amount of index information about full-test search to save storage resource. In this system, a storage apparatus includes a processing unit for de-duplicating a plurality of files having the same content regarding a file group of data inputted/outputted through a host apparatus. A full-text search processing server performs a full-text search processing to the file group and includes a processing unit for causing the full-text search processing to correspond to de-duplicate. An index information creation processing performed to a plurality of target files having the same content by the full-text search processing unit is inhibited according to a status of de-duplicate to the file group by the processing unit. Thereby, the amount of index information can be reduced. | 2011-10-06 |
20110246432 | ACCESSING DATA IN COLUMN STORE DATABASE BASED ON HARDWARE COMPATIBLE DATA STRUCTURES - Embodiments of the present invention provide one or more hardware-friendly data structures that enable efficient hardware acceleration of database operations. In particular, the present invention employs a column-store format for the database. In the database, column-groups are stored with implicit row ids (RIDs) and a RID-to-primary key column having both column-store and row-store benefits via column hopping and a heap structure for adding new data. Fixed-width column compression allow for easy hardware database processing directly on the compressed data. A global database virtual address space is utilized that allows for arithmetic derivation of any physical address of the data regardless of its location. A word compression dictionary with token compare and sort index is also provided to allow for efficient hardware-based searching of text. A tuple reconstruction process is provided as well that allows hardware to reconstruct a row by stitching together data from multiple column groups. | 2011-10-06 |
20110246433 | RANDOM NUMBER BASED DATA INTEGRITY VERIFICATION METHOD AND SYSTEM FOR DISTRIBUTED CLOUD STORAGE - A data integrity verification method and system based on a root random number to ensure secure distributed data storage on a public cloud. A new root random number can be generated in response to receiving a file for storage to the public cloud. A unique random number tag for each data chunk associated with the file can be calculated via a shift operation and the tag can be added to the data chunk. A hash function (message digests) can be then generated and concatenated with the data chunk and the random number tag. The data chunk in conjunction with the hash and the random number tag can be encrypted by an encryption module and stored to the public cloud in order to provide multiple levels of security with respect to the distributed public cloud storage. Upon file retrieval, the encryption module decrypts all data chunks and recalculates the hash in order to verify the data integrity of the file. | 2011-10-06 |
20110246434 | METHODS AND SYSTEMS FOR BULK UPLOADING OF DATA IN AN ON-DEMAND SERVICE ENVIRONMENT - Methods and systems for bulk uploading of data in an on-demand service environment are described. In one embodiment, such a method includes retrieving a bulk transaction request from a transaction queue within a host organization, where the bulk transaction request specifies a plurality of database transactions to be processed against a multi-tenant database system of the host organization. Such a method further includes determining a current computational load of the multi-tenant database system, processing a subset of the plurality of database transactions specified by the bulk transaction request against the multi-tenant database system when the current computational load is below a threshold, and updating a bulk transaction results log based on the subset of the plurality of database transactions processed. Remaining database transactions specified by the bulk transaction request may then be re-queued for later processing. | 2011-10-06 |
20110246435 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MAINTAINING DATA STORED IN A DATA STRUCTURE - There are provided mechanisms and methods for maintaining data stored in a data structure. These mechanisms and methods for maintaining data stored in a data structure can provide maintenance operations with improved efficiency, functionality, etc. | 2011-10-06 |
20110246436 | Binary Method for Locating Data Rows in a Compressed Data Block - A system and method is provided for locating one or more compressed data rows in a data block. A 16 byte “row map” may be added at the end of each compressed data block. The row map may provide seven binary address points in the compressed data block (i.e., by dividing the compressed data block into 8ths). | 2011-10-06 |
20110246437 | COMPANION EXPERIENCE - Various embodiments provide a so-called companion experience in which content consumed on a primary screen can serve as a source for an automatic search that returns related content that can be presented on an auxiliary screen. The companion experience can be considered to reside in a layer that can be moved across different screens. The different screens can include different physical screens, such as those associated with different computing devices, or the same physical screen in which the companion experience would be rendered in a frame or sub-window. | 2011-10-06 |
20110246438 | METHOD AND APPARATUS FOR CONTEXT-INDEXED NETWORK RESOURCES - Techniques to provide context-indexed network resources include determining a network resource that is associated with first data in response to receiving first data that describes a context feature. A context token is determined, which indicates a probability, in the first data, of a topic from a context vocabulary. The context vocabulary includes concepts describing temporal, spatial, environmental or activity circumstances of consumers. Second data is stored, which indicates the network resource in association with the context token. In some embodiments, determining a network resource associated with the first data includes sending a topic based on the feature context token to a network resource search engine; and, the network resource is determined based on data returned from the network resource search engine. | 2011-10-06 |
20110246439 | AUGMENTED QUERY SEARCH - A query is annotated with a small sketch (e.g. a Bloom filter) that approximates a set of interest that is related to the query. The query and sketch may be forwarded to index servers that each stores a portion of a search engine corpus. Each of the index servers may filter documents using the sketch before returning results for aggregation. The sketch is designed so there may be false positives (results returned by authors not in the set), but no false negatives (all relevant results are returned). The final aggregated results set may be checked against the full set to remove false positives before returning the final results to the user. | 2011-10-06 |
20110246440 | Systems And Methods For Organizing And Displaying Electronic Media Content - Systems and methods are disclosed for displaying available or recommended electronic multimedia content to a user, including electronic media content on the Internet. According to one implementation, a method is provided that includes receiving a request from a user, the request specifying electronic media content desired by the user; analyzing an indexed web history of a plurality of other users, based on the request for desired content; and selecting and sorting a subset of available content groups, based on the request for desired content and the indexed web history. The method also includes selecting and sorting, for each selected and sorted content group, a subset of available content; providing instructions to display, to a user, the selected and sorted content groups along a first axis of a two-dimensional grid; and further providing instructions to display, to the user, the selected available content for each content group along a second axis of the two-dimensional grid. | 2011-10-06 |
20110246441 | CONSTRUCTING A DOMAIN-SPECIFIC ONTOLOGY BY MINING THE WEB - A method, apparatus, and program product is provided for constructing a domain-specific ontology for interpreting a policy. A phrase assumed to be associated with a policy is received. An indefinite term in the phrase is identified. Internet searches are performed on a plurality of terms from the phrase. A plurality of potential replacement terms is extracted from the Internet search results for the indefinite term. A context-specific ontology is built for the indefinite term based upon tracked occurrences of the plurality of potential replacement terms. The policy is interpreted by accessing the domain-specific ontology to interpret the indefinite term, where the indefinite term is interpreted by mapping the indefinite term to a plurality of potential replacement terms in the ontology for a plurality of contexts, and creating a policy based upon the interpretation of the indefinite term from the ontology. | 2011-10-06 |
20110246442 | Location Activity Search Engine Computer System - A computer system that includes a computer that couples with a database. The computer includes program code or modules to gather location and activity content from disparate sources, and through text analytics, extract associations from the content and populate the database with the associations between locations and activities. Further modules provide end user interaction through presentation of a search user interface specific to locations and activities. Additional modules provide the capability to search the database, rank the results of the search and present the results to the user. | 2011-10-06 |
20110246443 | SUGGESTED CONTENT WITH ATTRIBUTE PARAMETERIZATION - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 2011-10-06 |
20110246444 | METHOD AND SYSTEM FOR MANAGING ENTERPRISE CONTENT - A method and system for providing a consistent flow documents and data content across different organizational units of a company or agency where the documents and data come from different enterprise systems and data stores but are related to linked processes that share models for organizing the content in the business context and in a format that enables a user to relate the content to the process step or steps they are performing. The system includes a network service that enables a configuration utility to automatically discover the objects and metadata and provides for a mapping of selected fields of the metadata to regions displayed in the user interface view with provision for filtering the data by mapping selected fields to a user input form. Thereby, a business analyst can create solutions without writing and maintaining complex program logic for each combination of presentation environment, enterprise system and data store. | 2011-10-06 |
20110246445 | METHODS AND SYSTEMS FOR QUERYING EVENT STREAMS USING MULTIPLE EVENT PROCESSORS - In one embodiment, a system for distributed event processing includes a first event processor and a second event processor. The first event processor receives event data associated with an event stream. The second event processor receives a query associated with the event stream. A request to the first event processor is generated by the second event processor based on the query for a first portion of event data associated with the event stream. The second event processor receives the first portion of event data from the first event processor. The second event processor then generates an event based on the first portion of event data. | 2011-10-06 |
20110246446 | OPTIMIZING, DISTRIBUTING, AND TRACKING ONLINE CONTENT - The subject matter described herein relates to systems and techniques for optimizing, distributing, and tracking the use of content online in, for example, Internet search engines and other Internet distribution networks. | 2011-10-06 |
20110246447 | INLINE DATA CORRELATION AND HIERARCHICAL DATASETS - Architecture which provides that certain data-bound objects in the report can be configured by the report author to use data from a specific query result rather than take data from the containing data bound object. The report author defines a relationship between the data in the contained object and the data in the container, allowing instances of the descendant object to be correlated with instances of the ancestor object. This relationship can be either explicit with join conditions or implicit due to an intrinsic hierarchical relationship between the query results. | 2011-10-06 |
20110246448 | DATABASE DISTRIBUTION SYSTEM AND METHODS FOR SCALE-OUT APPLICATIONS - Systems and method are disclosed for query optimization in a scale-out system with a single query processing machine and a distributed storage engine to store data by receiving a query rewritten for an internal schema; optimizing a query execution plan for the query; and executing the plan and returning result to an application. | 2011-10-06 |
20110246449 | IMPLEMENTING COMPOSITE CUSTOM INDICES IN A MULTI-TENANT DATABASE - Methods and systems for query optimization for a multi-tenant database system are provided. Some embodiments comprise receiving, at a network interface of a server computer in a multi-tenant database system, an original query transmitted to the multi-tenant database system by a user associated with a tenant, wherein the original query is associated with data accessible by the tenant, and wherein the multi-tenant database system includes a first two-column custom index. Metadata associated with the data accessible by the tenant is retrieved, using a processor of the server computer, wherein at least a portion of the data accessible by the tenant is stored in a common table within the multi-tenant database system. A tenant-selective query syntax is determined, using the processor, wherein determining comprises analyzing at least one of metadata generated from information about the tenant or metadata generated from the data accessible by the tenant. Finally, using the processor, an improved query is generated using the query syntax, wherein the improved query is based at least in part upon the original query and data stored in the first two-column custom index. | 2011-10-06 |
20110246450 | Method and system for acceleration of pathway detection and ranking within an information technology database - Methods, systems and computer-readable medium are provided for replicating the data fields used by relational join operations in transient or persistent data structures with explicit support for named relationships that may have 1:1, 1:many, many:1 or many:many cardinality. An algorithm is applied to predetermine the optional search path for finding relationships between any two rows of any of one or more tables, including relationships defined between other tables. The schema of a target relational database, either derived or input, is converted into an object-oriented schema that explicitly defines relationships between columns in the tables of the relational database and represents the tables as object classes. The schema is analyzed and optimal search paths are derived and stored for subsequent use. A query engine accesses the predefined search paths in order to execute the specific types of query listed above and incrementally populates instances of the transient or persistent structures. | 2011-10-06 |
20110246451 | STORAGE DEVICE HAVING FULL-TEXT SEARCH FUNCTION - According to one embodiment, a storage device includes an interface, a first and second memory blocks and a controller. The interface receives a content search request. The first memory block stores files and inverted files corresponding to contents included in the files. The second memory block stores a file search table. The controller creates the inverted file for each content included in the files and stores IDs of the files including the content in the inverted file. The controller obtains, by search of the content, a corresponding inverted file from the inverted files stored in the first memory block and stores, in the file search table, the IDs of the files included in the obtained inverted file. The controller outputs the IDs of the files stored in the file search table from the interface as a search result for the content search request. | 2011-10-06 |
20110246452 | TRADEMARK REPORT WITH STORE LAYOUT DIAGRAM - The results of a trademark availability search can be graphically depicted using a store layout diagram. A store layout diagram shows the layout of a store including the various sections of the store. Graphical elements representing trademarks are arranged on the store layout diagram and positioned so that they are visually associated with the relevant sections of the store. | 2011-10-06 |
20110246453 | Apparatus and Method for Visual Presentation of Search Results to Assist Cognitive Pattern Recognition - An apparatus and method for searching using cognitive pattern recognition comprising searching at least one document associated with a search text; presenting a quantity of the at least one document in a scaled common image format (CIF); selecting a document in the quantity for display; adding a visual distinction to all pages of the selected document where the search text exists from the rest of the pages of the selected document; and displaying all pages of the selected document wherein the search text exists in the scaled common image format (CIF). | 2011-10-06 |
20110246454 | System and Method for Displaying Results of Search - The present invention relates to the system and the method for graphically displaying the results of search engine on a terminal of client, so that client can see a search process at first glance and move between a higher category and a lower category easily and learn the results of search engine quickly. | 2011-10-06 |
20110246455 | DATA SEARCH DEVICE, DATA SEARCH METHOD, AND RECORDING MEDIUM - A data search device to extract relevant data matching a specified requirement from multiple pieces of data to be searched stored in a database. The data search device includes a specified requirement data acquisition unit to acquire specified requirement data including the specified requirement, a data extraction unit to extract the relevant data based on the specified requirement data, an extracted data counter to count a number of pieces of the relevant data for each piece of classification data provided for the data to be searched, a display data generation unit to generate data to display the number of pieces of the relevant data counted for each piece of classification data on a coordinate space based on the classification data, and a positional data storage unit to store positional data including coordinates for specifying a position in the coordinate space and the classification data associated with the coordinates. | 2011-10-06 |
20110246456 | DYNAMIC RERANKING OF SEARCH RESULTS BASED UPON SOURCE AUTHORITY - Concepts and technologies are described herein for dynamically reranking search results based upon source authority. A search query is received and analyzed. One or more topics are identified in the search query. An authority index is searched to identify authoritative sources for content relating to the identified topic(s). Promoted results corresponding to content generated by the authoritative sources relating to the identified topics are obtained. The promoted results can be presented to an entity requesting the search, or injected into search results. Contribution dimensions associated with the promoted results can be determined, and filters based upon the contribution dimensions can be generated and used by an entity to dynamically manipulate the search results. | 2011-10-06 |
20110246457 | RANKING OF SEARCH RESULTS BASED ON MICROBLOG DATA - An information retrieval system is described herein that monitors a microblog data stream that includes microblog posts to discover and index fresh resources for searching by a search engine. The information retrieval system also uses data from the microblog data stream as well as data obtained from a microblog subscription system to compute novel and effective features for ranking fresh resources which would otherwise have impoverished representations. An embodiment of the present invention advantageously enables a search engine to produce a fresher set of resources and to rank such resources for both relevancy and freshness in a more accurate manner. | 2011-10-06 |
20110246458 | AUTOMATED UNIT FINDING FOR NUMERIC INFORMATION RETRIEVAL - The present invention is related to the task of retrieving numeric information in response to a textual keyword-based query by automatically associating a unit to the type of data being retrieved. An information retrieval system is presented which suggests a unit for data exploration by leveraging the local environment of numeric data across the corpus. This local environment is parsed, including through natural language processing and proximity-based techniques, to determine units relevant to particular keyword phrases. The system also relies on knowledge of semantically and scientifically related units to optimize their binning for suggested unit scoring. | 2011-10-06 |
20110246459 | SYSTEMS AND METHODS FOR ANALYZING METADATA TAG RELEVANCE RATINGS FOR COHESIVENESS - A content item may be associated with metadata comprising one or more tags. A user may indicate a relevance rating associated with a tag. The relevance rating may indicate whether the user feels the tag is relevant to the associated content item. Using a plurality of user-provided relevance ratings, a tag relevance model may be established. A tag relevance model may comprise a weighted or un-weighted average and/or median relevance rating of the tag and/or a cohesiveness of the of the relevance ratings. Rating cohesiveness may be used to identify controversial tags. Tag relevance information may be used to order search results. Tag ratings may also be used to aggregate users into groups comprising users having a similar point of view relative to one or more tag ratings. In addition, users may be grouped according to content access and/or tags rated regardless of the relevance rating applied. | 2011-10-06 |