Kveler
Ksenya Kveler, Haifa IL
Patent application number | Description | Published |
---|---|---|
20100332470 | METHOD AND SYSTEM FOR SEARCHING USING CONTEXTUAL DATA - A method and system for searching using contextual data are provided. The method includes receiving one or more areas of data captured by a user from a display, the data including content and context or structure. The method converts the area of captured data to one or more extensible markup language (XML) representations of the content and context or structure. The method provides multiple hierarchical textual instances with formatting (for example, as hypertext markup language instances) corresponding to the XML representations. A query is generated for searching in a search engine for each textual instance. The one or more areas of data captured by a user include an indication of whether the area of data is selected for content, context, or both. | 12-30-2010 |
Ksenya Kveler, Yoqneam Illit IL
Patent application number | Description | Published |
---|---|---|
20100106548 | MANAGING MEETING CALENDAR ENTRIES - Techniques for managing a meeting calendar entry are provided. The techniques include scheduling a meeting by sending an invitation to one or more individuals, wherein the meeting is scheduled by a primary organizer via a meeting calendar entry, defining one or more secondary organizers for the meeting, and facilitating the one or more secondary organizers to manage a meeting calendar entry for the meeting. | 04-29-2010 |
20120117660 | ACCESS CONTROL FOR SERVER APPLICATIONS - A method, system, and computer program product for access control for a server application provided between a server executing an application and a client. Access control is added to an existing server application (for example, a legacy application) without changing the application or the database. The method includes: capturing a screen from the server application; determining if the screen includes sensitive content; and checking a client user's authorization before sending a screen including sensitive content to the client. Determining if the screen includes sensitive content may include: carrying out text recognition on the screen content; and analyzing the output of the text recognition to identify sensitive content. | 05-10-2012 |
20130212689 | MANAGING NETWORK DATA - A method, system or computer usable program product for masking communication data using context based rules including intercepting a communication between a server and a client by an intermediary, the communication having a recipient, parsing the communication by the intermediary to determine whether a context based alteration rule should be applied, responsive to an affirmative determination, applying the rule to the communication to produce an altered communication with altered data, and sending the altered communication to the recipient so that the altered data in the communication is utilized in a masked manner. | 08-15-2013 |
Ksenya Kveler, Yokne' Am Ilit IL
Patent application number | Description | Published |
---|---|---|
20090222429 | Service identification in legacy source code using structured and unstructured analyses - Identifying service candidates in legacy source code, including a source code analyzer performing structured and unstructured analyses of computer software source code procedures, a repository storing results of the analyses, a target profile analyzer analyzing a target service description of a Service Oriented Architecture and formulating a query therefrom, a search module querying the repository to identify source code elements that match the target service description, and combining any matches within a predefined distance from each other within the source code, a ranking engine ranking the combined matches in accordance with predefined heuristics, and a procedure aggregator aggregating the combined matches by their location in propinquity to the procedures, comparing interface definitions defined for the service description to entry and exit points of the procedures to identify candidate procedures having similar input and output parameters, and producing a ranked list of candidate procedures that map into the target element. | 09-03-2009 |