Patent application number | Description | Published |
20120095585 | System and Method for Workflow Integration - A system is provided. The system comprises a computer system, an at least one memory; and a first application stored in the at least one memory. When executed by the computer system, the first application automatically executes a workflow that receives a first input from a human machine interface (HMI) in a first plant, in response to the first input generates a first event that assigns a first task associated to a first functional role performed at the first plant, receives a second input associated with the first task, in response to the second input generates a second event that assigns a second task associated to a second functional role, receives a third input associated with the second task, in response to the third input transmits information to the human machine interface that changes the process mediated by the human machine interface in the first plant. | 04-19-2012 |
20120095925 | System and Method of Federated Workflow Data Storage - A system is provided comprising a first and second computer system, a first and second memory, and a first and second application. The first application executes a first workflow that receives a first input from an HMI in a first plant, in response generates a first event that assigns a first task associated to a role performed at the first plant, receives a second input associated with the first task, in response to the second input generates a second event, and transmits the second event. The second application executes a second workflow that receives the second event and assigns a second task associated to a role performed at the office separate from the first plant, receives a third input associated with the second task, and in response to the third input transmits information to the HMI that changes the process mediated by the HMI in the first plant. | 04-19-2012 |
20120096463 | System and Method for Integrated Workflow Scaling - A system is provided. The system comprises a first computer located in a first plant, a first memory, and a first object based process management application stored in the first memory. The system further comprises a second computer located in a location separate from the first plant, a second memory, and a second object based process management application stored in the second memory. When executed on the first computer, the first application invokes scripts in response to events and the scripts launch tasks. When executed on the second computer, the second computer invokes scripts in response to events and the scripts launch tasks, one of the events acted on by the second application is a message received from the first application. | 04-19-2012 |
20140214478 | SYSTEM AND METHOD FOR INTEGRATED WORKFLOW SCALING - A system is provided. The system comprises a first computer located in a first plant, a first memory, and a first object based process management application stored in the first memory. The system further comprises a second computer located in a location separate from the first plant, a second memory, and a second object based process management application stored in the second memory. When executed on the first computer, the first application invokes scripts in response to events and the scripts launch tasks. When executed on the second computer, the second computer invokes scripts in response to events and the scripts launch tasks, one of the events acted on by the second application is a message received from the first application. | 07-31-2014 |
20150356476 | SYSTEM AND METHOD FOR WORKFLOW INTEGRATION - A system is provided. The system comprises a computer system, an at least one memory; and a first application stored in the at least one memory. When executed by the computer system, the first application automatically executes a workflow that receives a first input from a human machine interface (HMI) in a first plant, in response to the first input generates a first event that assigns a first task associated to a first functional role performed at the first plant, receives a second input associated with the first task, in response to the second input generates a second event that assigns a second task associated to a second functional role, receives a third input associated with the second task, in response to the third input transmits information to the human machine interface that changes the process mediated by the human machine interface in the first plant. | 12-10-2015 |
Patent application number | Description | Published |
20100120911 | PRESERVATIVE SYSTEM FOR COSMETIC FORMULATIONS - Disclosed is a novel method for preserving cosmetic/personal care formulations through a two component preservative system, said system comprising (a) Component I which functions to eliminate the existing microbial contamination load in a natural cosmetic formulation base through an optimized pasteurization method that avoids deep freezing; and (b) Component II that includes the step of adding synergistic blends of fractionated essential oils, extracts and isolated compounds to the pre-pasteurized cosmetic base obtained through the method of component I, wherein the synergistic blends sustain the effects of pasteurization through anti-microbial and anti-oxidant effects, said anti-oxidant effects enhancing further the anti-microbial effects by virtue of inhibiting lipid per oxidation that facilitates the undue proliferation of microbe. | 05-13-2010 |
20120190744 | Preservative System for Cosmetic Formulations- Compositions and Methods Thereof - The present invention relates to preservation of cosmetic formulations. More specifically, the present invention relates to a preservative composition for cosmetic formulations comprising thymol, monolaurin and magnolol obtained from supercritical fluid extracts of | 07-26-2012 |
20140094517 | PRESERVATIVE SYSTEM FOR COSMETIC FORMULATIONS- COMPOSITIONS AND METHODS THEREOF - The present invention relates to preservation of cosmetic formulations. More specifically, the present invention relates to a preservative composition for cosmetic formulations comprising thymol, monolaurin and magnolol obtained from supercritical fluid extracts of | 04-03-2014 |
Patent application number | Description | Published |
20130286921 | SYSTEM AND METHOD FOR MITIGATING MULTICAST MESSAGE DUPLICATION IN A WIRELESS NETWORK - According to one embodiment of the invention, a method for mitigating duplication of multicast data streams to wireless client devices. The method comprises the operations of detecting, by one or more network devices, a multicast message, and controlling, by the one or more network devices, a forwarding of information within the multicast message to a network device handling multicast data transmissions. The forwarding is controlled based on information within the multicast message and the presence of such information in prior established data structure. | 10-31-2013 |
20140012967 | SYSTEM AND METHOD FOR SUPPORTING MULTICAST DOMAIN NAME SYSTEM DEVICE AND SERVICE CLASSIFICATION - According to one embodiment, a digital device is adapted to support one or more network services. The digital device comprises processing circuitry, and a memory coupled to the processing circuitry. The memory comprises logic that, when executed by the processing circuit, is configured to (i) detect, in response to a triggering event, one or more network services advertised by at least one digital device within a network, and (ii) store information only directed to the one or more network services. | 01-09-2014 |
20140036754 | OVERLAYING VIRTUAL BROADCAST DOMAINS ON AN UNDERLYING PHYSICAL NETWORK - The present disclosure discloses a method and network device for overlaying one or more broadcast groups over virtual local area networks in a wireless network. The network device receives a broadcast/multicast message from a member device of a broadcast group. The broadcast group includes a subset of devices sharing at least one common property. The broadcast/multicast message is to be received by other member devices, but not by non-member devices of the first broadcast group. Furthermore, the broadcast group includes one of (i) a subset of devices from a single virtual local area network, and (ii) at least two subsets of devices from different virtual local area networks. The network device then determines the broadcast group associated with the received broadcast/multicast message based on the common property, and then transmits the received broadcast/multicast message to other member devices in the broadcast group. | 02-06-2014 |
20150109924 | SELECTIVE SERVICE BASED VIRTUAL LOCAL AREA NETWORK FLOODING - The present disclosure discloses a method and network device for selective service based virtual local area network (VLAN) flooding. The disclosed system receives a packet originated from a device received on a first VLAN, and flood one or more copies of the packet to a second and different VLAN if the packet is received on an access port. Furthermore, the system will flood copies of the packet to the first and same VLAN if the packet is received on a trunk port. The device originating the packet is a member of the first VLAN but not a member of the second VLAN. | 04-23-2015 |
20150222727 | DETERMINING PACKET PRIORITY BASED ON A LOCATION ASSOCIATED WITH A CLIENT DEVICE - A non-transitory computer readable medium storing instructions which, when executed by one or more hardware processors, causes performance of operations including: determining a location associated with a client device, assigning a priority to packets, received from the client device or targeted for the client device, based at least on the location associated with the client device, and processing packets based on the priority assigned to the packets. | 08-06-2015 |
20150319728 | Precise and Custom Location Based Service Discovery Application for Wired and Wireless Devices - The present disclosure discloses a method and network device for providing precise and custom location based service discovery application for wired and wireless devices. Specifically, a network device determines a location of a client device. The network device also identifies a first region including the location of the client device, and identifies at least one network device associated with the first region. Responsive at least to determining that the at least one network device is associated with the first region that comprises the location of the client device, the network device selects the at least one network device, from a set of network devices, for presenting as an available resource to the client device. | 11-05-2015 |
20150382148 | SYSTEM AND METHOD FOR DISPLAYING MOBILITY TRAILS FOR MOBILE CLIENTS - The present disclosure discloses a system and a method for displaying mobile trails for mobile client devices. Specifically, a network device obtains a plurality of performance measurements and a corresponding plurality of physical locations for a client device over a period of time. Then the network device generates a plurality of visual representations for the client device over the period of time, each visual representation representing a respective performance measurement and a respective physical location at a respective time during the period of time. Moreover, the network device can display, store, and/or transmit a map of a physical environment with the plurality of visual representations. | 12-31-2015 |
20160028650 | METHOD AND SYSTEM FOR A USER TO CREATE FAVORITE SERVER LISTS FOR MULTIPLE SERVICES - The present disclosure discloses a method and system for a user to create favorite server lists for multiple services. Specifically, a network device receives a request for a particular service from a client device. Then, from a plurality of network devices that include functionality to provide the particular service, the network device selects a first subset of network devices based on stored data indicating that the first subset of network devices is associated with the client device. The network device further orders the plurality of network devices to obtain an ordered list such that the first subset of network devices is in a more preferred order than a second subset of network devices that are not included in the stored data. The network device next transmits, to the client device, information identifying the first subset of network devices as available devices for providing the particular service. | 01-28-2016 |
20160112427 | COMMUNICATION MODEL BASED ON USER ROLE - A non-transitory computer readable medium includes instructions which, when executed by one or more hardware processors, causes performance of operations. The operations include receiving, by a network device from a first user device, a first message addressed to a second user device and identifying a first user role associated with the first user device and a second user role associated with the second user device. The operations further include determining whether a set of predefined user role relationships authorizes a communication between user devices having the first user role and user devices having the second user role. In response to determining that the set of predefined user role relationships do not authorize the communication between user devices having the first user role and user devices having the second user role, the operations refrain forwarding the first message from the first user device to the second user device. | 04-21-2016 |
Patent application number | Description | Published |
20110277026 | Systems and Methods for Providing Single Sign On Access to Enterprise SAAS and Cloud Hosted Applications - The solution of the present application addresses the problem of authentication across disparately hosted systems by providing a single authentication domain across SaaS and cloud hosted applications as well as traditional enterprise hosted applications. An application delivery controller intermediary to a plurality of clients and the disparately hosted applications providing single sign on management, integration and control. A user may log in via an interface provided, controlled or managed by the ADC, which in turns, authenticates the user to the application in accordance with policy and the host of the application. As such, the user may login once to gain access to a plurality of disparately hosted applications. From the user's perspective, the user seamlessly and transparently gains access to different hosted systems with different passwords and authentication via the remote access provided by the system of the present solution | 11-10-2011 |
20120036244 | SYSTEMS AND METHODS FOR IIP ADDRESS SHARING ACROSS CORES IN A MULTI-CORE SYSTEM - In a multi-core system, multiple packet engines across corresponding cores may be working concurrently processing data packets from data flows of SSL VPN sessions. For example, a first core may establish a SSL VPN session with a client. Any one of the other cores, such as a second core, may received packets related to the session owned by the first core. Embodiments of the systems and method described below provide management of IIP addresses for the multi-core/multi-packet engine approach to providing SSL VPN service. In some embodiments, the approach to managing IIP addresses is to have one packet engine on a core act as a master or controller of the IIPs for the remaining packet engines and cores. The packet engines/cores use a protocol for communications regarding IIP management. | 02-09-2012 |
20120173759 | Systems and Methods for Policy Based Integration to Horizontally Deployed WAN Optimization Appliances - The present disclosure presents systems and methods for policy-based redirection of network traffic, by an intermediary device, to a horizontally deployed WAN device. An intermediary receives a request from a client to access a server. The request was previously modified by a first WAN device to include information in an option field of a transport layer. The intermediary may determine, responsive to a redirection policy, to send the request to a second WAN device deployed horizontally from the intermediary, instead of the server. The intermediary transmits the request to the second WAN device, while maintaining the information from the option field. The intermediary device receives the request including the information identifying the first WAN optimization device to the second WAN device. The intermediary receives a modified request from the second WAN device, the modified request determined by the intermediary to be sent to the destination server. | 07-05-2012 |
20120281706 | SYSTEMS AND METHODS FOR CLOUD BRIDGING BETWEEN INTRANET RESOURCES AND CLOUD RESOURCES - Embodiments of the present solution provide a cloud bridge to bring network transparency between the otherwise disparate networks of the datacenter and cloud service provider. For example, appliances may be deployed in the datacenter and on the edge of the cloud. These appliances may be configured or designed and constructed to communicate with each other and recognize and understand the local IP and/or public IP network information of the on-premise datacenter of the enterprise and the cloud datacenter. These appliances may manage the flow of network traffic between the on-premise and cloud datacenters in a manner to appear and act seamlessly and transparently as a single network spanning both the on-premise and cloud data centers. | 11-08-2012 |
20130007239 | SYSTEMS AND METHODS FOR TRANSPARENT LAYER 2 REDIRECTION TO ANY SERVICE - The present solution is directed to providing, transparently and seamlessly to any client or server, layer 2 redirection of client requests to any services of a device deployed in parallel to an intermediary device An intermediary device deployed between the client and the server may intercept a client request and check if the request is to be processed by a service provided by one of the devices deployed in parallel with the intermediary device. The service may be any type and form of service or feature for processing, checking or modifying the request, including a firewall, a cache server, a encryption/decryption engine, a security device, an authentication device, an authorization device or any other type and form of service or device described herein. The intermediary device may select the machine to process the request and use layer 2 redirection to the machine. The intermediary device may change a Media Access Control (MAC) address of a destination of the request to a MAC address of the selected machine. Once the selected machine processes the request, the intermediary device may receive from this machine a response to processing the request. The intermediary device may then continue processing the request of the client responsive to the response from the machine or in response to identifying that the response to the request is from that particular selected machine. The forwarding to and processing by the parallel deployed machine may be performed seamlessly and transparently to the server and/or client. | 01-03-2013 |
20150244781 | SYSTEMS AND METHODS FOR POLICY BASED INTEGRATION TO HORIZONTALLY DEPLOYED WAN OPTIMIZATION APPLIANCES - The present disclosure presents systems and methods for policy based redirection of network traffic, by an intermediary device, to a horizontally deployed WAN device. An intermediary receives a request from a client to access a server. The request was previously modified by a first WAN device to include information in a first option field of a transport layer. The intermediary may determine, responsive to a redirection policy, to send the request to a second WAN optimization device deployed horizontally from the intermediary, instead of the server. The intermediary transmits the request to the second WAN optimization device, while maintaining the information from the first option field. The intermediary device receives the request including the information in the first option field identifying the first WAN optimization device to the second WAN optimization device. The intermediary receives a modified request from the second WAN device, the modified request determined by the intermediary to be sent to the destination server. | 08-27-2015 |
Patent application number | Description | Published |
20150103252 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GAMMA CORRECTION IN A VIDEO OR IMAGE PROCESSING ENGINE - A system and method are provided for generating a gamma adjusted value. The method comprises generating a logarithm space representation of an input value by computing a logarithm of the input value, computing a logarithm space gamma-adjusted value by multiplying the logarithm space representation with a current gamma value, and generating the gamma adjusted value by computing an antilogarithm of the logarithm space gamma-adjusted value. | 04-16-2015 |
20150193903 | EFFICIENT CACHE MANAGEMENT IN A TILED ARCHITECTURE - A surface cache stores pixel data on behalf of a pixel processing pipeline that is configured to generate screen tiles. The surface cache assigns hint levels to cache lines storing pixel data according to whether that pixel data is likely to be needed again. When the pixel data is needed to process a subsequent tile, the corresponding cache line is assigned a higher hint value. When the pixel data is not needed again, the corresponding cache line is assigned a lower hint value. The surface cache is configured to preferentially evict cache lines having a lower hint value, thereby preserving cache lines that store pixel data needed for future processing. In addition, a fetch controller is configured to throttle the rate at which fetch requests are issued to the surface cache to prevent situations where pixel data needed for future operations becomes prematurely evicted. | 07-09-2015 |
20150193907 | EFFICIENT CACHE MANAGEMENT IN A TILED ARCHITECTURE - A surface cache stores pixel data on behalf of a pixel processing pipeline that is configured to generate screen tiles. The surface cache assigns hint levels to cache lines storing pixel data according to whether that pixel data is likely to be needed again. When the pixel data is needed to process a subsequent tile, the corresponding cache line is assigned a higher hint value. When the pixel data is not needed again, the corresponding cache line is assigned a lower hint value. The surface cache is configured to preferentially evict cache lines having a lower hint value, thereby preserving cache lines that store pixel data needed for future processing. In addition, a fetch controller is configured to throttle the rate at which fetch requests are issued to the surface cache to prevent situations where pixel data needed for future operations becomes prematurely evicted. | 07-09-2015 |
Patent application number | Description | Published |
20090031166 | WARM REBOOT ENABLED KERNEL DUMPER - In one embodiment, a method of a kernel dumper module includes generating a dump file associated with a kernel when the kernel crashes, storing the dump file to a functional memory upon applying an overwrite protection to a core dump of the dump file, restarting the kernel through a warm reboot of the kernel such that the core dump is not erased from the functional memory, and transferring the core dump to a system file using the kernel. | 01-29-2009 |
20110228696 | DYNAMIC DIRECTED ACYCLIC GRAPH (DAG) TOPOLOGY REPORTING - In one embodiment, a root device of a directed acyclic graph (DAG) may determine/detect a trigger to learn a network topology of the DAG. In response, the root device may transmit a DAG discovery request down the DAG with a route record request that requests that each device within the DAG add its device identification (ID) to a reverse route record stack for each route of a DAG discovery reply propagated up the DAG toward the root device. Upon receiving one or more DAG discovery replies, the root device may compile the recorded routes from the reverse route record stacks into a DAG network topology. Also, in one embodiment, the root device may determine “short-cuts” based on a traffic matrix generated in response to network statistics optionally included within the responses from the devices within the DAG. | 09-22-2011 |
20110231573 | DYNAMIC DIRECTED ACYCLIC GRAPH (DAG) ADJUSTMENT - In one embodiment, a root device may request that one or more devices of a computer network build a directed acyclic graph (DAG) for routing traffic within the computer network based on an objective function (OF), where the OF has one or more metrics to optimize the DAG against and optionally certain constraints. Particular devices that receive the request may then build the DAG based on the OF, and may determine and report OF feedback to the root device. Upon receiving the reports regarding OF feedback, the root device may then adjust the OF based on the feedback, and request a rebuild of the DAG from the devices based on the adjusted OF. | 09-22-2011 |
20120213124 | METHOD AND APPARATUS TO TRIGGER DAG REOPTIMIZATION IN A SENSOR NETWORK - In one embodiment, a probing technique allows a root node to determine whether to trigger reoptimization of a computer network represented by a directed acyclic graph (DAG) without injecting unnecessary traffic into the network. The root node may store and maintain information indicative of an ideal shape or topology of the DAG. During a normal DAG maintenance operation, the root node may transmit a DAG discovery request (probe request) that is configured to probe each node within the DAG for information used to determine a current topology of the DAG. In response, each node may record the information, e.g., routing and non-routing metrics, in a DAG discovery reply (probe reply) that is propagated to the root node. Upon receiving one or more replies, the root node may analyze the metrics to determine whether the current topology of the DAG deviates from the ideal DAG topology. The root node may thus determine DAG topology deviation upon probing at minimal cost. A number of algorithms may then be used to determine whether reoptimization, i.e., global repair, of the DAG is is required and, if so, the root node may dynamically trigger the global repair. | 08-23-2012 |
20120254338 | DISTRIBUTED CONTROL TECHNIQUE FOR RPL TOPOLOGY - In one embodiment, a distributed control technique may enable management of a monolithic routing topology of nodes in a computer network by apportioning the monolithic routing topology into a plurality of regional routing topology domains, each represented by a directed acyclic graph (DAG). The regional topology domains may include a super topology domain that is established as a super-DAG of intermediate nodes interconnected with leaf nodes and rooted by a master node of the computer network. The regional topology domains may further include at least one local topology domain that is established as a local-DAG of intermediate nodes interconnected with leaf nodes and rooted by a local root node of the computer network. Notably, a super node of the computer network may be configured to participate in both the super topology domain as an intermediate node of the super-DAG and the local topology domain as the local root node of the local-DAG. | 10-04-2012 |
20130191688 | TROUBLESHOOTING ROUTING TOPOLOGY BASED ON A REFERENCE TOPOLOGY - In one embodiment, a computing device (e.g., border router or network management server) transmits a discovery message into a computer network, such as in response to a given trigger. In response to the discovery message, the device receives a unicast reply from each node of a plurality of nodes in the computer network, each reply having a neighbor list of a corresponding node and a selected parent node for the corresponding node. Based on the neighbor lists from the replies and a routing protocol shared by each of the plurality of nodes in the computer network, the device may create a reference topology for the computer network, and based on the selected parent nodes from the replies, may also determine a current topology of the computer network. Accordingly, the device may then compare the current topology to the reference topology to detect anomalies in the current topology. | 07-25-2013 |
20130219045 | KEEPALIVE MECHANISM TO MAINTAIN LINKS IN A LOSSY ENVIRONMENT - In one embodiment, a particular device determines a selected link from the particular device toward a root device in a computer network, wherein traffic destined away from the root device via the particular device utilizes the selected link in reverse. By monitoring a link quality of the selected link in reverse based on received traffic over the selected link, the particular device may determine whether the link quality is below a lower threshold. In response to the link quality being below the lower threshold, the particular device activates use of keepalive messages from the particular device over the selected link. | 08-22-2013 |
20130227336 | EFFICIENT LINK REPAIR MECHANISM TRIGGERED BY DATA TRAFFIC - In one embodiment, an intermediate device transmits a data message away from a root device toward a receiver device in a computer network, the data message transmitted by utilizing, in reverse, a link that had been previously selected by the receiver device toward the root device. In response to detecting that the data message did not reach the receiver device, a discovery message is may be sent to one or more neighbor devices, wherein the discovery message carries an identification (ID) of the receiver device and a discovery scope indicating how many hops the discovery message is allowed to traverse to reach the receiver device, and wherein the receiver device, upon receiving the discovery message, triggers a local link repair of the link from the receiver device toward the root device. | 08-29-2013 |
Patent application number | Description | Published |
20160022135 | Method and Apparatus for Managing Blinking - A method and apparatus for managing blinking includes an electronic computing device detecting blinking of a user of the electronic computing device and determining an uninduced blink rate for the user from the detected blinking. The method also includes inducing the user to blink based on the uninduced blink rate. A further method and apparatus for managing blinking includes the electronic computing device presenting the user with a blink inducement of a plurality of blink inducements and determining whether the user blinked in response to presenting the blink inducement. The further method also includes presenting the blink inducement again based on the determination of whether the user blinked in response to presenting the blink inducement. | 01-28-2016 |
20160044089 | CONTEXT-BASED CONTACT NOTIFICATION - Disclosed are systems and methods for providing a context-based notification from a first device to a second device. In an embodiment, the first device is associated with a driver travelling to pick up a passenger, and the second device is associated with the passenger. Substantially at a notification point, the first device determines if, how, and when to transmit an auto-notification to the second device based on context. For example, if the passenger is not near the meeting point, then a notification is not sent, whereas if the passenger is in a conference with others, then a text rather than a call is sent. If traffic between the notification point and the meeting point is heavy, then the notification is delayed until the expected amount of travel time remains. | 02-11-2016 |
20160055324 | Context-Based Authentication Mode Selection - A system and method for configuring authentication of a mobile communications device entail detecting user context and device context factors and determining whether a current authentication mode is impractical or unfeasible in view of such factors. User context information of interest includes any indication that the user is driving or in a meeting for example. Context factors of interest include for example such factors as light, noise, or user activities such as driving. Based on this user context and device context, if the currently set authentication mode is impractical or unfeasible, then the device may select an available alternative authentication mode and reconfigure the device for that mode. | 02-25-2016 |
Patent application number | Description | Published |
20150195170 | Method and System for Calculating Latency in a Data Flow - The present invention provides a system for calculating latency in a distributed data flow environment. The system includes a plurality of hop servers and a central registry server. The plurality of hops servers is configured to receive a plurality of data packets across a time window, bucket each of the data packets of the plurality of data packets received across the time window into one or more buckets and transmit count of the plurality of the data packets in the one or more buckets and a window identifier associated with the time window to the central registry server. Each of the data packet of the plurality of data packets includes a header. The central registry server is configured to receive a plurality of counts and a plurality of window identifiers, to receive a latency query and to calculate latency. | 07-09-2015 |
20150358394 | Method and System for Delivering Data to a Batch Consumer and a Streaming Consumer - A method and system delivers data to a batch consumer and a streaming consumer. The method and system include retrieving data from a plurality of data centers, storing the data in a first directory, bundling the data into plurality of batches in the first directory, transferring each batch of the plurality of batches to the second directory, delivering the each batch of the plurality of batches in the second directory to the batch consumer and the streaming consumer and delivering the data in the first directory to the streaming consumer. | 12-10-2015 |
20160042286 | Method and System for Analyzing Data in a Database - A method and system analyze data in a database. The method and system include defining a plurality of set of rules, wherein each set of rules corresponds to a predictive model, storing the each set of rules corresponding to the predictive model in a library as a user-defined function, and calling the user-defined function via a standard sequel language. | 02-11-2016 |