Patent application number | Description | Published |
20100211890 | DYNAMIC VIRTUAL DASHBOARD - Techniques are disclosed for helping users of virtual worlds and social networking applications to control personal identity data that other users have access to and to determine the type of identity data that users know about each other. Generally, identity awareness records may be used to store the personal identity data that a user has revealed to other users. When the user sends information to another user, personal identity data is mapped to appropriate aliases, depending upon which user is receiving the information. When the user is in the presence of other users, a visual dashboard indicates the types of personal identity information that the user knows about each other user, as well as the types of personal identity information that each other user knows about the user. The visual dashboard may also indicate the types of personal identity information that the other users know about each other. | 08-19-2010 |
20100306366 | SYSTEM FOR ENABLING RICH NETWORK APPLICATIONS - The present invention generally provides methods, systems and articles of manufacture that provide an autonomous system for enabling rich network applications. Embodiments of the invention may monitor an existing network application and generate a profile on the network application based on what responses and data updates are triggered by various requests from a user. Embodiments of the invention may refactor the existing network application into a rich network application based on the profile created for that network application. | 12-02-2010 |
20110067025 | AUTOMATICALLY GENERATING COMPOUND COMMANDS IN A COMPUTER SYSTEM - A computer system provides a way to automatically generate compound commands that perform tasks made up of multiple simple commands. A compound command generation mechanism monitors consecutive user commands and compares the consecutive commands a user has taken to a command sequence identification policy. If the user's consecutive commands satisfy the command sequence identification policy the user's consecutive commands become a command sequence. If the command sequence satisfies the compound command policy, the compound generation mechanism can generate a compound command for the command sequence automatically or prompt an administrator to allow the compound command to be generated. Generating a compound command can be done on a user by user basis or on a system wide basis. The compound command can then be displayed to the user to execute so that the command sequence is performed by the user selecting the compound command for execution. | 03-17-2011 |
20110083086 | DYNAMICALLY DEPICTING INTERACTIONS IN A VIRTUAL WORLD BASED ON VARIED USER RIGHTS - Embodiments of the invention generally manage dynamically depicting interactions in a virtual world. Embodiments of the invention may receive one or more content restrictions associated with a first user of a virtual world, and may analyze the activity history of a second user in the virtual world. Embodiments of the invention may then determine what, if any, interactions should be permitted between the first user and the second user in the virtual world. | 04-07-2011 |
20110301996 | AUTOMATING WORKFLOW PARTICIPATION - A workflow system allows defining criteria for an automated task agent to perform tasks for a participant automatically without input from the participant at the time the task is performed. Automated tasks are performed by an automated task agent according to the participant's history in performing similar tasks in the past. Tasks completed by automated task agents are displayed to a user in a manner that distinguishes automated tasks from manual tasks. | 12-08-2011 |
20110302004 | CUSTOMIZING WORKFLOW BASED ON PARTICIPANT HISTORY AND PARTICIPANT PROFILE - A workflow system allows determining at least one date based on various factors including the complexity of a task, a participant's history as monitored by the workflow system, and a participant's profile as entered by the participant. In addition, the workflow system generates customized notifications according to the participant's reliability in meeting due dates in the past and a notification preference specified by the participant. The result is a powerful and flexible workflow system. The dates determined by the workflow system may include one or more due dates for tasks and one or more dates for notifications to participants. | 12-08-2011 |
20120042289 | AVOIDING DISPLAY OF BROWSER CONTENT THAT MAY INDUCE A SEIZURE IN VIEWERS WITH PHOTO-SENSITIVITY - Embodiments of the invention provide a browser safe for use by individuals with epilepsy. Embodiments of the invention include retrieving content in response to a request from a user, identifying one or more unsafe portions of the retrieved content, modifying the one or more unsafe portions to be epileptic safe portions, and displaying the modified content to the user. | 02-16-2012 |
20120046957 | PROVIDING LICENSED CONTENT TO A USER - When a user requests licensed content, a dynamic licensing mechanism automatically requests and receives licenses for the licensed content when one or more criterion in a licensing policy is satisfied by license information relating to the content, without the user providing any further input to acquire the licenses. | 02-23-2012 |
20120047231 | TIERED XML SERVICES IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) includes a value-add application with a first set of XML content services, one or more dedicated XML processing servers with a second and other sets of XML content services, and a core CMS with a third set of XML content services. The content management system may be designed to provide XML content services at any of these three tiers of processing. A first threshold is defined that allows the value-add application to determine when to offload XML content services to a dedicated XML processing server. A second threshold is defined that allows the core CMS to determine when to offload XML content services to a dedicated XML processing server. Callback services are included that allow each tier of XML content services to send or receive additional information to complete the XML processing. The result is a content management system that is very powerful and flexible. | 02-23-2012 |
20120158742 | MANAGING DOCUMENTS USING WEIGHTED PREVALENCE DATA FOR STATEMENTS - In an embodiment, respective strengths are determined for respective relationships in respective statements. Weights are decreased for the respective statements in proportion to respective amounts of time since the respective statements were added to documents. The weights are increased for a subset of the statements that were modified in a subset of the documents. Weighted prevalence data is calculated for respective time periods for the respective statements to be a sum of the weights for the respective statements in the time periods for those statements that have the respective strengths. | 06-21-2012 |
20120159247 | AUTOMATICALLY CHANGING PARTS IN RESPONSE TO TESTS - In an embodiment, in response to an error encountered by a test of a program, a rule is found that specifies the error and an action. A part in the program is selected in response to the action, the part is modified, and the test is re-executed. In various embodiments, the part is modified by changing the code in the part or by replacing the part with a previous version of the part. | 06-21-2012 |
20120209869 | ABSTRACT DATA MODEL EXTENSION THROUGH MANAGED PHYSICAL STATEMENT STRUCTURES - A method and system for integrating a physical query statement in a data abstraction model comprising a plurality of logical fields are provided. The method involves receiving the physical query statement and parsing the physical query statement to provide physical fields. The next step is determining whether the physical fields can be directly mapped to logical fields in the data abstraction model to yield a first determination result. Following this step, if at least one first physical field cannot be directly mapped to logical fields in the data abstraction model, then the next step is determining whether the first physical field can be determined from fields in the data abstraction model to yield a second determination result. Finally, the method involves providing a representation of the first determination result and a representation of the second determination result. | 08-16-2012 |
20120215582 | EXECUTING WORKFLOWS BASED ON SERVICE LEVEL AGREEMENTS - Techniques are disclosed for modeling costs when editing a workflow process model. A request may be received to assign a cost factor to a workflow process step of the workflow process model, where the cost factor depends on a property of a processing environment that executes the workflow process model. Responsive to the request, the cost factor may be assigned to the workflow process step, such that a traversal of the workflow process step by a transaction invoking the workflow process model results in the cost factor being included in a total cost to be charged for executing the transaction. | 08-23-2012 |
20120215723 | DETERMINING COSTS FOR WORKFLOWS - Techniques are disclosed for modeling costs when editing a workflow process model. A request may be received to assign a cost factor to a workflow process step of the workflow process model. Responsive to the request, the cost factor may be assigned to the workflow process step, such that a traversal of the workflow process step by a transaction invoking the workflow process model results in the cost factor being included in a total cost to be charged for executing the transaction. | 08-23-2012 |
20120310996 | RAPIDLY DEPLOYING VIRTUAL DATABASE APPLICATIONS USING DATA MODEL ANALYSIS - Techniques are described for creating a first data abstraction model for a first database. Embodiments analyze the first database to determine a first set of structural characteristics, and analyze a second database to determine a second set of structural characteristics. The analyzed second database is associated with a second data abstraction model. The first set of structural characteristics is compared with the second set of structural characteristics to identify one or more similarities between the two sets of structural characteristics. Embodiments then create the first data abstraction model for the first database, based on the identified similarities and the second data abstraction model. | 12-06-2012 |
20130080484 | RAPIDLY DEPLOYING VIRTUAL DATABASE APPLICATIONS USING DATA MODEL ANALYSIS - Techniques are described for creating a first data abstraction model for a first database. Embodiments analyze the first database to determine a first set of structural characteristics, and analyze a second database to determine a second set of structural characteristics. The analyzed second database is associated with a second data abstraction model. The first set of structural characteristics is compared with the second set of structural characteristics to identify one or more similarities between the two sets of structural characteristics. Embodiments then create the first data abstraction model for the first database, based on the identified similarities and the second data abstraction model. | 03-28-2013 |
20130096978 | DETERMINING COSTS FOR WORKFLOWS - Techniques are disclosed for modeling costs when editing a workflow process model. A request may be received to assign a cost factor to a workflow process step of the workflow process model. Responsive to the request, the cost factor may be assigned to the workflow process step, such that a traversal of the workflow process step by a transaction invoking the workflow process model results in the cost factor being included in a total cost to be charged for executing the transaction. | 04-18-2013 |
20130103589 | PROVIDING LICENSED CONTENT TO A USER - When a user requests licensed content, a dynamic licensing mechanism automatically requests and receives licenses for the licensed content when one or more criterion in a licensing policy is satisfied by license information relating to the content, without the user providing any further input to acquire the licenses. | 04-25-2013 |
20130138611 | TIERED XML SERVICES IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) includes a value-add application with a first set of XML content services, one or more dedicated XML processing servers with a second and other sets of XML content services, and a core CMS with a third set of XML content services. The content management system may be designed to provide XML content services at any of these three tiers of processing. A first threshold is defined that allows the value-add application to determine when to offload XML content services to a dedicated XML processing server. A second threshold is defined that allows the core CMS to determine when to offload XML content services to a dedicated XML processing server. Callback services are included that allow each tier of XML content services to send or receive additional information to complete the XML processing. The result is a content management system that is very powerful and flexible. | 05-30-2013 |
20130138782 | TIERED XML SERVICES IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) includes a value-add application with a first set of XML content services, one or more dedicated XML processing servers with a second and other sets of XML content services, and a core CMS with a third set of XML content services. The content management system may be designed to provide XML content services at any of these three tiers of processing. A first threshold is defined that allows the value-add application to determine when to offload XML content services to a dedicated XML processing server. A second threshold is defined that allows the core CMS to determine when to offload XML content services to a dedicated XML processing server. Callback services are included that allow each tier of XML content services to send or receive additional information to complete the XML processing. The result is a content management system that is very powerful and flexible. | 05-30-2013 |
20130159342 | AUTOMATICALLY MAKING CHANGES IN A DOCUMENT IN A CONTENT MANAGEMENT SYSTEM BASED ON A CHANGE BY A USER TO OTHER CONTENT IN THE DOCUMENT - A content management system detects a change to one part of a document, and to generate a corresponding change in a different part of the same document. Dynamic inclusion rules define conditions that, when satisfied, allow automatically changing a link in a document to a new link when corresponding data in the document is added or changed. If a change corresponds to a defined dynamic inclusion rule, a corresponding query in the rule is evaluated according to the changes in the document. When there is enough information to run the query, the query is automatically executed in a background process. If there is a single link that satisfies the query, the document may be updated with the new link. If multiple links satisfy the query, the top ranked query result may be automatically selected, or the user may select which link should be included in the document. | 06-20-2013 |
20130159838 | SCOPING SCRIPTS IN A PAGE - A mechanism on a server divides a page of content into sections defined by dividers, and renders the page stream with dividers to a browser. The browser reads the web page with dividers, and partitions the DOM for the page to create partitions in the DOM according to the sections in the page. Partitioning the DOM allows scripts in each partition to be scoped according to defined access rights for each partition. In this manner, a script in one DOM partition cannot access information in another DOM partition unless the access rights for the partition that contains the script allow it. By scoping scripts to appropriate DOM partitions, potential hacker attacks may be prevented. | 06-20-2013 |
20130159846 | PROFILING CONTENT CREATION AND RETRIEVAL IN A CONTENT MANAGEMENT SYSTEM - A content management system provides a profiling mechanism that automatically tags changes made to elements in a document with applicability metadata, and uses the applicability metadata when processing a request to the repository by a user to filter the query results according to a profile for the user. A profiling mapping policy defines roles for users of the content management system. When content is requested from the repository, the profiling mechanism inserts one or more additional request parameters based on the profile of the user. The results that match both the original request and the additional request parameter(s) are returned to the user. When the user views the results, additional filtering may occur to filter individual elements from the user that do match the user's profile. | 06-20-2013 |
20130160015 | AUTOMATICALLY GENERATING COMPOUND COMMANDS IN A COMPUTER SYSTEM - A computer system provides a way to automatically generate compound commands that perform tasks made up of multiple simple commands. A compound command generation mechanism monitors consecutive user commands and compares the consecutive commands a user has taken to a command sequence identification policy. If the user's consecutive commands satisfy the command sequence identification policy the user's consecutive commands become a command sequence. If the command sequence satisfies the compound command policy, the compound generation mechanism can generate a compound command for the command sequence automatically or prompt an administrator to allow the compound command to be generated. Generating a compound command can be done on a user by user basis or on a system wide basis. The compound command can then be displayed to the user to execute so that the command sequence is performed by the user selecting the compound command for execution. | 06-20-2013 |
20130166537 | DISTRIBUTED MULTI-STEP ABSTRACT QUERIES - Techniques for incorportating query results into an abstract database are described. Embodiments receive a first set of query results produced by executing a first abstract query using a first data abstraction model against a first database. One or more mappings between the first set of query results and one or more logical fields in a second data abstraction model are then determined, where the second data abstraction model models underlying physical data in a manner making a schema of the physical data transparent to a user of the second data abstraction model. Embodiments modify one or more logical field definitions to reference the first set of query results using the determined one or more mappings, such that abstract queries can be executed against both the second database and the first set of query results using the modified second data abstraction model. | 06-27-2013 |
20130166539 | DISTRIBUTED MULTI-STEP ABSTRACT QUERIES - Techniques for incorportating query results into an abstract database are described. Embodiments receive a first set of query results produced by executing a first abstract query using a first data abstraction model against a first database. One or more mappings between the first set of query results and one or more logical fields in a second data abstraction model are then determined, where the second data abstraction model models underlying physical data in a manner making a schema of the physical data transparent to a user of the second data abstraction model. Embodiments modify one or more logical field definitions to reference the first set of query results using the determined one or more mappings, such that abstract queries can be executed against both the second database and the first set of query results using the modified second data abstraction model. | 06-27-2013 |
20130166545 | GENERATING SIMULATED CONTAINMENT REPORTS OF DYNAMICALLY ASSEMBLED COMPONENTS IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) uses a simulated containment report generation mechanism to generate a simulated containment report for elements in the repository based on logged properties that represent potential use of the element during dynamic content delivery that are not represented in formal relationships in the content management system. Properties such as probability, popularity, and recent usage that are not explicit relationships between parent documents and child elements are logged and used to determine which document maps may potentially reuse a selected element. In this manner a simulated containment report can be created for an element that allows the user to see the document maps that are most likely to include the element. | 06-27-2013 |
20130185312 | GENERATING SIMULATED CONTAINMENT REPORTS OF DYNAMICALLY ASSEMBLED COMPONENTS IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) uses a simulated containment report generation mechanism to generate a simulated containment report for elements in the repository based on logged properties that represent potential use of the element during dynamic content delivery that are not represented in formal relationships in the content management system. Properties such as probability, popularity, and recent usage that are not explicit relationships between parent documents and child elements are logged and used to determine which document maps may potentially reuse a selected element. In this manner a simulated containment report can be created for an element that allows the user to see the document maps that are most likely to include the element. | 07-18-2013 |
20130185313 | GENERATING SIMULATED CONTAINMENT REPORTS OF DYNAMICALLY ASSEMBLED COMPONENTS IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) uses a simulated containment report generation mechanism to generate a simulated containment report for elements in the repository based on logged properties that represent potential use of the element during dynamic content delivery that are not represented in formal relationships in the content management system. Properties such as probability, popularity, and recent usage that are not explicit relationships between parent documents and child elements are logged and used to determine which document maps may potentially reuse a selected element. In this manner a simulated containment report can be created for an element that allows the user to see the document maps that are most likely to include the element. | 07-18-2013 |
20130191356 | AUTONOMIC GENERATION OF DOCUMENT STRUCTURE IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) autonomically generates structure for a document when a synchronization rule references structure that does not exist in the document. A dynamic structure policy specifies at least one criterion that determines if and how the structure is autonomically generated. By autonomically generating structure in a document, a CMS administrator or CMS user (such as the author) is relieved of the manual task of generating the structure before the synchronization rule can be successfully processed. Once dynamically generated, the added structure may be auto-populated with dummy data or with default data specified in the autonomic structure policy. | 07-25-2013 |
20130191420 | AUTONOMIC GENERATION OF DOCUMENT STRUCTURE IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) autonomically generates structure for a document when a synchronization rule references structure that does not exist in the document. A dynamic structure policy specifies at least one criterion that determines if and how the structure is autonomically generated. By autonomically generating structure in a document, a CMS administrator or CMS user (such as the author) is relieved of the manual task of generating the structure before the synchronization rule can be successfully processed. Once dynamically generated, the added structure may be auto-populated with dummy data or with default data specified in the autonomic structure policy. | 07-25-2013 |
20130198641 | PREDICTIVE METHODS FOR PRESENTING WEB CONTENT ON MOBILE DEVICES - Once a computing device receives a request to display a webpage, the device may use criteria to determine the portion of the page that is likely to be the most relevant to the user. The computing device may then zoom in (i.e., adjust the relative size and position of the elements in the webpage) and pan or scroll through the webpage such that the most relevant portion is displayed. Additionally, the computing device may superimpose on the displayed portion of the webpage links that represent other portions of the webpage that are currently not displayed but are relevant to the currently displayed portion. Selecting a link causes the computing device to display the corresponding portion. Furthermore, as the user zooms out, the computing device may also highlight hotspots or points of interests for the new content that is being displayed. | 08-01-2013 |
20140038154 | AUTOMATIC EBOOK READER AUGMENTATION - Method, system, and computer program product for performing an operation for automatic electronic book augmentation. The operation presents an electronic book via a display screen of an electronic device, and identifies user preferences. The operation then determines a current reading position of a user within the electronic book. The operation then identifies, based on the user's current reading position, a context within the electronic book. The operation then identifies, based on the context and the user preferences, sensory effects to enhance the user's experience. The operation then outputs the sensory effects. | 02-06-2014 |
20140040711 | AUTONOMOUS GADGET MANAGEMENT SYSTEM - Techniques are described for outputting web page components, or gadgets, on a web page or other graphical user interface. A gadget automatically conforms to particular styles based on the styles of the other gadgets and of controlling relationships to the other gadgets that are determined from page analysis and other policies. | 02-06-2014 |
20140040880 | APPLICATION DEPLOYMENT IN HETEROGENEOUS ENVIRONMENTS - Techniques are disclosed for evaluating an application to determine a processing environment suited for executing the application. A request may be received to execute the application. If execution data identified for the application do not satisfy a first set of criteria, the application is deployed for execution on a first processing environment. If the execution data satisfy the first set of criteria, the application is deployed for execution partially in time on a second processing environment, based on the execution data. The second processing environment provides a higher capability than the first processing environment in terms of at least one resource type. | 02-06-2014 |
20140047059 | METHOD FOR IMPROVING MOBILE NETWORK PERFORMANCE VIA AD-HOC PEER-TO-PEER REQUEST PARTITIONING - Method, computer program product, and system for identifying, responsive to a request for a network resource, at least one peer device, wherein the request is made by a first device on a mobile network, the at least one peer device on a local network with the first device, the local network different than the mobile network; partitioning, based on at least one content element of the requested network resource, the request into a plurality of subrequests, each subrequest specifying to retrieve one or more content elements of the requested network resource; assigning each subrequest to one of the peer devices and the first device, wherein each peer device and the first device retrieves the content elements specified by the subrequest assigned to the respective device, wherein each peer device transmits the retrieved portion of the network resource to the first device over the local network. | 02-13-2014 |
20140172139 | QUESTION CLASSIFICATION AND FEATURE MAPPING IN A DEEP QUESTION ANSWERING SYSTEM - System, method, and computer program product to identify relevant features in a deep question answering system, by classifying a first case received by the deep question answering system, and, while training the deep question answering system to answer the first case, identifying a first feature in the first case, computing a first feature score for the first feature, the first feature score indicating a relevance of the first feature in generating a correct response to the first case, and, identifying the first feature as relevant in answering the classified first case upon determining that the first feature score exceeds a relevance threshold. | 06-19-2014 |
20140172756 | QUESTION CLASSIFICATION AND FEATURE MAPPING IN A DEEP QUESTION ANSWERING SYSTEM - System, method, and computer program product to identify relevant features in a deep question answering system, by classifying a first case received by the deep question answering system, and, while training the deep question answering system to answer the first case, identifying a first feature in the first case, computing a first feature score for the first feature, the first feature score indicating a relevance of the first feature in generating a correct response to the first case, and, identifying the first feature as relevant in answering the classified first case upon determining that the first feature score exceeds a relevance threshold. | 06-19-2014 |
20140172878 | INTELLIGENT EVIDENCE CLASSIFICATION AND NOTIFICATION IN A DEEP QUESTION ANSWERING SYSTEM - System, method, and computer program product to identify changes in evidence used to answer questions by a deep question answering system, by identifying a first evidence related to a feature, the deep question answering system having identified the feature as being relevant to answering a first type of question of a plurality of types of questions, and responsive to: (i) detecting a change in the first evidence, and (ii) determining that a confidence score of a first response generated for a first question, of the first type of question, exceeds a confidence threshold, generating an updated response for the first question based on the changed first evidence. | 06-19-2014 |
20140172880 | INTELLIGENT EVIDENCE CLASSIFICATION AND NOTIFICATION IN A DEEP QUESTION ANSWERING SYSTEM - System, method, and computer program product to identify changes in evidence used to answer questions by a deep question answering system, by identifying a first evidence related to a feature, the deep question answering system having identified the feature as being relevant to answering a first type of question of a plurality of types of questions, and responsive to: (i) detecting a change in the first evidence, and (ii) determining that a confidence score of a first response generated for a first question, of the first type of question, exceeds a confidence threshold, generating an updated response for the first question based on the changed first evidence. | 06-19-2014 |
20140172882 | PARTIAL AND PARALLEL PIPELINE PROCESSING IN A DEEP QUESTION ANSWERING SYSTEM - System, method, and computer program product to reduce an amount of processing required to generate a response to a first case by a deep question answering system, by, determining that a similarity score, of the first case relative to a second case, exceeds a similarity threshold, identifying a first feature of the second case having a first relevance score exceeding a relevance threshold, identifying a first candidate answer for the first case that does not have the first feature, and refraining from analyzing the first candidate answer in generating the response to the first case, thereby reducing the amount of processing of the deep question answering system. | 06-19-2014 |
20140172883 | PARTIAL AND PARALLEL PIPELINE PROCESSING IN A DEEP QUESTION ANSWERING SYSTEM - System, method, and computer program product to reduce an amount of processing required to generate a response to a first case by a deep question answering system, by, determining that a similarity score, of the first case relative to a second case, exceeds a similarity threshold, identifying a first feature of the second case having a first relevance score exceeding a relevance threshold, identifying a first candidate answer for the first case that does not have the first feature, and refraining from analyzing the first candidate answer in generating the response to the first case, thereby reducing the amount of processing of the deep question answering system. | 06-19-2014 |
20140258203 | INNER PASSAGE RELEVANCY LAYER FOR LARGE INTAKE CASES IN A DEEP QUESTION ANSWERING SYSTEM - System, computer-implemented method, and computer program product to receive a case by a deep question answering system, identify a policy relevant in generating a response to the case, the policy containing a set of criteria used in generating the response to the case, produce, by a first annotator, of a set of annotators, one or more relevant passages of the case, compute a criteria score for a first criterion, of the set of criteria, based on the one or more relevant passages of the case, an determine that the first criterion is met by the case when the criteria score for the first criterion exceeds a predefined threshold. | 09-11-2014 |
20140258205 | INNER PASSAGE RELEVANCY LAYER FOR LARGE INTAKE CASES IN A DEEP QUESTION ANSWERING SYSTEM - System, computer-implemented method, and computer program product to receive a case by a deep question answering system, identify a policy relevant in generating a response to the case, the policy containing a set of criteria used in generating the response to the case, produce, by a first annotator, of a set of annotators, one or more relevant passages of the case, compute a criteria score for a first criterion, of the set of criteria, based on the one or more relevant passages of the case, an determine that the first criterion is met by the case when the criteria score for the first criterion exceeds a predefined threshold. | 09-11-2014 |
20140278351 | DETECTING AND EXECUTING DATA RE-INGESTION TO IMPROVE ACCURACY IN A NLP SYSTEM - In some NLP systems, queries are compared to different data sources stored in a corpus to provide an answer to the query. However, the best data sources for answering the query may not currently be contained within the corpus or the data sources in the corpus may contain stale data that provides an inaccurate answer. When receiving a query, the NLP system may evaluate the query to identify a data source that is likely to contain an answer to the query. If the data source is not currently contained within the corpus, the NLP system may ingest the data source. If the data source is already within the corpus, however, the NLP may determine a time-sensitivity value associated with at least some portion of the query. This value may then be used to determine whether the data source should be re-ingested—e.g., the information contained in the corpus is stale. | 09-18-2014 |
20140278352 | IDENTIFYING A STALE DATA SOURCE TO IMPROVE NLP ACCURACY - In some NLP systems, queries are compared to different data sources stored in a corpus to provide an answer to the query. However, the best data sources for answering the query may not currently be contained within the corpus or the data sources in the corpus may contain stale data that provides an inaccurate answer. When receiving a query, the NLP system may evaluate the query to identify a data source that is likely to contain an answer to the query. If the data source is not currently contained within the corpus, the NLP system may ingest the data source. If the data source is already within the corpus, however, the NLP may determine a time-sensitivity value associated with at least some portion of the query. This value may then be used to determine whether the data source should be re-ingested—e.g., the information contained in the corpus is stale. | 09-18-2014 |
20140278360 | PRESENTING KEY DIFFERENCES BETWEEN RELATED CONTENT FROM DIFFERENT MEDIUMS - System, method, and computer program product to identify differences between different media formats of a media title, by identifying at least one component of each of the different media formats of the media title, the at least one component comprising a unit of the media title, annotating a respective text transcription of each of the different media formats of the media title to include at least one attribute of the respective at least one component, computing a difference score for a first component of a first media format of the media title relative to each of the remaining different media formats of the media title, and upon determining that the difference score for the first component relative to a second media format of the media title exceeds a predefined threshold, creating an indication that the first component of the first media format is different from the second media format. | 09-18-2014 |
20140280203 | IDENTIFYING A STALE DATA SOURCE TO IMPROVE NLP ACCURACY - In some NLP systems, queries are compared to different data sources stored in a corpus to provide an answer to the query. However, the best data sources for answering the query may not currently be contained within the corpus or the data sources in the corpus may contain stale data that provides an inaccurate answer. When receiving a query, the NLP system may evaluate the query to identify a data source that is likely to contain an answer to the query. If the data source is not currently contained within the corpus, the NLP system may ingest the data source. If the data source is already within the corpus, however, the NLP may determine a time-sensitivity value associated with at least some portion of the query. This value may then be used to determine whether the data source should be re-ingested—e.g., the information contained in the corpus is stale. | 09-18-2014 |
20140280253 | DETECTING AND EXECUTING DATA RE-INGESTION TO IMPROVE ACCURACY IN A NLP SYSTEM - In some NLP systems, queries are compared to different data sources stored in a corpus to provide an answer to the query. However, the best data sources for answering the query may not currently be contained within the corpus or the data sources in the corpus may contain stale data that provides an inaccurate answer. When receiving a query, the NLP system may evaluate the query to identify a data source that is likely to contain an answer to the query. If the data source is not currently contained within the corpus, the NLP system may ingest the data source. If the data source is already within the corpus, however, the NLP may determine a time-sensitivity value associated with at least some portion of the query. This value may then be used to determine whether the data source should be re-ingested—e.g., the information contained in the corpus is stale. | 09-18-2014 |
20140281982 | PRESENTING KEY DIFFERENCES BETWEEN RELATED CONTENT FROM DIFFERENT MEDIUMS - System, method, and computer program product to present differences between a plurality of different media formats of a single media title, by presenting the media title in a first media format, of the plurality of different media formats, monitoring a progress of the presentation of the media title in the first format, identifying a first difference between the first media format and a second media format, of the plurality of different media formats of the media title, and providing an indication of the first difference based on the progress of the presentation of the media title in the first media format. | 09-18-2014 |
20140281989 | SYNCHRONIZING PROGRESS BETWEEN RELATED CONTENT FROM DIFFERENT MEDIUMS - System, method, and computer program product to resume playback between different media formats of a media title, by monitoring progress of a user consuming the media title in a first media format, differences existing between the first media format and the different media formats, responsive to the user stopping consumption of the media title in the first media format, computing a stopping point in the first media format, identifying at least one resume point for each of the different media formats, computing a similarity score for each identified resume point based on a similarity of the stopping point in the first media format and each identified resume point, and upon determining that the user has triggered an indication to consume the media title in a second media format, resuming playback of the media title at a resume point for the second media format having the highest similarity score. | 09-18-2014 |
20140282553 | META-APPLICATION MANAGEMENT IN A MULTITASKING ENVIRONMENT - Techniques are disclosed to identify concurrently used applications based on application state. Upon determining that usage of a plurality of applications, including a first state of a first application of the plurality of applications, satisfies a criterion for identifying concurrently used applications, the plurality of applications is designated as a first meta-application having a uniquely identifiable set of concurrently used applications. The first meta-application has an associated criterion for launching the first meta-application. Upon determining that the criterion for launching the first meta-application is satisfied, at least one of the plurality of applications is programmatically invoked. | 09-18-2014 |
20140282573 | RESOLVING DEPLOYMENT CONFLICTS IN HETEROGENEOUS ENVIRONMENTS - Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is resolved between the first application and at least a second application. | 09-18-2014 |
20140282582 | DETECTING DEPLOYMENT CONFLICTS IN HETEROGENOUS ENVIRONMENTS - Techniques are disclosed for managing deployment conflicts between applications executing in one or more processing environments. A first application is executed in a first processing environment and responsive to a request to execute the first application. During execution of the first application, a determination is made to redeploy the first application for execution partially in time on a second processing environment providing a higher capability than the first processing environment in terms of at least a first resource type. A deployment conflict is detected between the first application and at least a second application. | 09-18-2014 |
20140282606 | META-APPLICATION MANAGEMENT IN A MULTITASKING ENVIRONMENT - Techniques are disclosed to identify concurrently used applications based on application state. Upon determining that usage of a plurality of applications, including a first state of a first application of the plurality of applications, satisfies a criterion for identifying concurrently used applications, the plurality of applications is designated as a first meta-application having a uniquely identifiable set of concurrently used applications. The first meta-application has an associated criterion for launching the first meta-application. Upon determining that the criterion for launching the first meta-application is satisfied, at least one of the plurality of applications is programmatically invoked. | 09-18-2014 |
20150039579 | SEARCH QUERY OBFUSCATION VIA BROADENED SUBQUERIES AND RECOMBINING - System, method, and computer program product to perform an operation to obfuscate search queries via broadened subqueries and recombining, by referencing an ontology to identify a set of generalized terms corresponding to at least one term of a received query, generating a plurality of subqueries based on the received query and the set of generalized terms, executing each of the plurality of subqueries to retrieve a result set for each respective subquery, and filtering the result sets using the received query to produce a result set responsive to the received query. | 02-05-2015 |