Patent application number | Description | Published |
20080198982 | METHOD AND SYSTEM FOR AUTOMATICALLY SELECTING OUTGOING VOICEMAIL MESSAGES - A system for automatically selecting an outgoing message for an incoming call. In response to receiving an incoming call, a calling party is identified. The identified calling party is compared against call log data to determine that the identified calling party has previously heard a first outgoing message. In response to determining that the identified calling party has not previously heard the first outgoing message, the first outgoing message is played as a selected outgoing message for the incoming call. In response to determining that the identified calling party has previously heard the first outgoing message, a second outgoing message is played as the selected outgoing message for the incoming call. Then, the call log data is updated to identify the selected outgoing message played for the incoming call. | 08-21-2008 |
20080212946 | Personal Video Recorder With Storage Space Loans - Automated personal video recording for multi-user personal video recorders having a multiplicity of registered users, each user having allocated storage space on the PVR which allocated storage space for each user includes storage space upon which shows are recorded and storage space upon which shows have not been recorded (free space), including recording for a borrower a show owned by the borrower, the show having a storage space requirement exceeding the borrower's free space by a deficit amount; selecting, in dependence upon the deficit amount, one or more lenders, wherein the lenders are users, registered on the PVR, having free space; and borrowing, in dependence upon the deficit amount, from the lenders for the borrower, at least one loan amount of storage space. Embodiments include returning from the borrower to the lender the deficit amount after displaying the show to the borrower or upon repossession by a lender. | 09-04-2008 |
20080232783 | Personal Video Recording With Machine Learning For Messaging - Machine learning for control of a personal video recorder (“PVR”), including providing records of transmissions of messages; identifying a message point in operation of a PVR; selecting, in dependence upon the message point, a message to be transmitted; and determining in dependence upon the records of transmissions of messages whether to transmit the selected message. Embodiments include determining whether to transmit the selected message in dependence upon a frequency with which the message is transmitted to a user. Embodiments include transmitting to users messages prompting for responses identifying commands; storing records of transmissions of messages, including storing records of responses; and selecting a message to be transmitted in dependence upon the records of responses to messages. Embodiments include structuring the selected message in dependence upon the records of responses to messages, including inserting in the selected message choices for a set of sequenced commands. | 09-25-2008 |
20080250113 | INDIVIDUALLY SPECIFYING MESSAGE OUTPUT ATTRIBUTES IN A MESSAGING SYSTEM - A method, system and program for specifying message outputs in a messaging session are provided. A message entry is received in association with a particular topic from among multiple available topics from a particular user from among multiple users participating in a messaging session. Output attributes are assigned to the message entry according to receiving user specified output preferences for the particular topic individually specified by each of the receiving users participating in the messaging session, such that output of the message entry is uniquely specified for each of the receiving users participating. | 10-09-2008 |
20080263520 | METHOD FOR VISUALLY INDICATING PRECEDING AND SUCCEEDING SOURCE CODE LINES THAT ARE EXECUTED IN A GRAPHICAL DEBUGGING ENVIRONMENT - A method for visually displaying an indicator for preceding and succeeding source code lines being executed within a graphical debugging environment. The method includes displaying within a GUI source code lines for a segment of currently examined source code, displaying a visual indicator that is associated with a presently examined source code line, and determining a previously examined source code line, wherein the location of the previously examined line of source code is determined by the use of information that is associated with the previously examined line of source code. The method further includes displaying a visual indicator that is associated with the previously examined line of source code, determining a next source code line that is to be examined, and displaying a visual indicator that is associated with the next source code line that is to be examined. | 10-23-2008 |
20080279347 | DESTINATION DEVICE BILLING ACCORDING TO CALL RECIPIENT - A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices. | 11-13-2008 |
20080306924 | MOBILE TELEPHONE OBJECT LOOKUP AND IDENTIFICATION - Provided is a system and method for providing an information retrieval service on a mobile computing device such as a wireless computer or cellular telephone. The user of a mobile computing device provides vocal, visual or textual data to the service provider. The service scans a transmitted data to convert the data into a digital form and the data is converted into a text file. The service provider performs analytical computations on the data in the text file and, using context and preference rules, produces and transmits information of value to the user. In addition, the service may request additional information from the user for the purpose of better servicing the query. A query to the claimed service may be modified based upon configuration information stored with respect to a particular user or based upon previous queries from the particular user. | 12-11-2008 |
20090016506 | Logging Calls According To Call Context - A method, system, and program for logging calls according to call context are provided. A context for a call is detected, where the context include information such as the parties to a call, whether a backup party is accessed, where the call is on behalf of another, the locations of the parties to the call, the subject matter of the call, tariffs applied during the call, billing for telephone services accessed during the call, and orders placed during the call. At least one context based logging request valid for the context for the call is accessed from among multiple context based logging requests stored for multiple parties. Parties requesting logging may include parties to the call, on behalf of parties, third parties, and guardians. The context is logged according to the context based logging request. | 01-15-2009 |
20090044113 | Creating a Customized Avatar that Reflects a User's Distinguishable Attributes - A capture system captures detectable attributes of a user. A differential system compares the detectable attributes with a normalized model of attributes, wherein the normalized model of attributes characterize normal representative attribute values across a sample of a plurality of users and generates differential attributes representing the differences between the detectable attributes and the normalized model of attributes. Multiple separate avatar creator systems receive the differential attributes and each apply the differential attributes to different base avatars to create custom avatars which reflect a selection of the detectable attributes of the user which are distinguishable from the normalized model of attributes. | 02-12-2009 |
20090074380 | Personal Video Recording With Storage Space Distributed Among Remote Personal Video Recorders - Automated personal video recording comprising scheduling a show for a user having allocated storage space on a personal video recorder (“PVR”), wherein the show has a storage space requirement that exceeds the user's free space, and the PVR is coupled for data communications to a storage space provider; and transmitting to the storage space provider an order to record the show through the storage space provider in storage space on a remote PVR that is coupled for data communications to the storage space provider. Receiving in a storage space provider from a personal video recorder (“PVR”) an order to record a show on a remote PVR, the order comprising an identification of a show and a schedule for recording the show; selecting a remote PVR; and recording the show, in dependence upon the show identification and the schedule for recording the show, in storage space on the selected remote PVR. | 03-19-2009 |
20090089186 | CONSUMER REPRESENTATION RENDERING WITH SELECTED MERCHANDISE - At least one computing system, in a network or stand-alone environment, accesses a consumer representation, wherein the consumer representation comprises a three dimensional model rendered to depict a consumer appearance and movement in each frame of a captured video stream and specified by a selection of sizing measurements detected from a scan of a consumer body shape. The computing system selects at least one merchandise item from among multiple merchandise items each with separate merchandise characteristics. In particular, the computing system selects the merchandise item of a size selected to fit the selection of sizing measurements for the consumer. The computing system renders the merchandise item on each rendered frame of the three dimensional model according to the merchandise characteristics as applied to the sizing measurements, wherein a display of the rendered three dimensional model shows a realistic image of the consumer appearance and movement as captured in the video stream rendering the consumer wearing the selected merchandise item. | 04-02-2009 |
20090164755 | Optimizing Execution of Single-Threaded Programs on a Multiprocessor Managed by Compilation - A method for optimizing execution of a single threaded program on a multi-core processor. The method includes dividing the single threaded program into a plurality of discretely executable components while compiling the single threaded program; identifying at least some of the plurality of discretely executable components for execution by an idle core within the multi-core processor; and enabling execution of the at least one of the plurality of discretely executable components on the idle core. | 06-25-2009 |
20090164759 | Execution of Single-Threaded Programs on a Multiprocessor Managed by an Operating System - A method and apparatus for speculatively executing a single threaded program within a multi-core processor which includes identifying an idle core within the multi-core processor, performing a look ahead operation on the single thread instructions to identify speculative instructions within the single thread instructions, and allocating the idle core to execute the speculative instructions. | 06-25-2009 |
20090165016 | Method for Parallelizing Execution of Single Thread Programs - A method and apparatus for speculatively executing a single threaded program within a multi-core processor which includes identifying an idle core within the multi-core processor, performing a look ahead operation on the single thread instructions to identify speculative instructions within the single thread instructions, and allocating the idle core to execute the speculative instructions. | 06-25-2009 |
20090216769 | Digital Rights Management of Captured Content Based on Criteria Regulating a Combination of Elements - When captured content is detected, the captured content is analyzed to determine whether any portion of the content is subject to digital rights management protection specified for content captured. Responsive to determining that the captured content is subject to a first digital rights management protection, a database is queried to select at least one digital rights management rule associated with a first restricted element specifying at least one first criteria for combining the first restricted element with at least one other element. A determination is made whether the first restricted element is combined with the at least one other element in the captured content. Responsive to detecting the first restricted element is combined with the at least one other element, the captured content rights controller determines a combined digital rights management protection rule reconciling the at least one first criteria for combining the first restricted element with the presence of the at least one other element. The combined digital rights management rule is applied to restrict use of the captured content. | 08-27-2009 |
20090217343 | Digital Rights Management of Streaming Captured Content Based on Criteria Regulating a Sequence of Elements - A captured content rights controller detects a first portion of streaming captured content and a second portion of the streaming captured content after the first portion of the streaming captured content is detected. The captured content rights controller determines whether rendering the second portion of the streaming captured content after the first portion of the streaming captured content is subject to at least one digital rights management protection rule for streaming captured content as specified by at least one owner of at least one restricted element within the streaming captured content captured independent of distribution of the content by the owner of the at least one restricted element within the streaming captured content. The captured content rights controller applies the at least one digital rights management protection rule to restrict rendering of the second portion of the streaming captured content after the first portion of the streaming captured content. | 08-27-2009 |
20090217344 | Digital Rights Management of Captured Content Based on Capture Associated Locations - When captured content is detected, the captured content is analyzed to determine whether any portion of the content is subject to digital rights management protection specified for content captured, where captured content is content captured independent of distribution of the content by an owner of at least one restricted element within the captured content. In response to determining that a portion of the captured content is subject to digital rights management protection, a database is queried to select at least one digital rights management rule associated with the portion and comprising at least one location based criteria. At least one relevant location is associated with the captured content. At least one digital rights management rule is applied to restrict usage of the captured content, with the at least one location based criteria specified by the at least one relevant location. In addition, in response to determining that the captured content is not subject to digital rights management protection, a certification is applied to the captured content designating a particular system that determined no portion of the captured content is subject to digital rights management protection. | 08-27-2009 |
20100049963 | Multicore Processor and Method of Use That Adapts Core Functions Based on Workload Execution - A processor has multiple cores with each core having an associated function to support processor operations. The functions performed by the cores are selectively altered to improve processor operations by balancing the resources applied for each function. For example, each core comprises a field programmable array that is selectively and dynamically programmed to perform a function, such as a floating point function or a fixed point function, based on the number of operations that use each function. As another example, a processor is built with a greater number of cores than can be simultaneously powered, each core associated with a function, so that cores having functions with lower utilization are selectively powered down. | 02-25-2010 |
20100166322 | Security Screening Image Analysis Simplification Through Object Pattern Identification - A mechanism is provided for security screening image analysis simplification through object pattern identification. Popular consumer electronics and other items are scanned in a control system, which creates an electronic signature for each known object. The system may reduce the signature to a hash value and place each signature for each known object in a “known good” storage set. For example, popular mobile phones, laptop computers, digital cameras, and the like may be scanned for the known good signature database. At the time of scan, such as at an airport, objects in a bag may be rotated to a common axis alignment and transformed to the same signature or hash value to match against the known good signature database. If an item matches, the scanning system marks it as a known safe object. | 07-01-2010 |
20110282726 | PROVIDING CONSUMERS WITH INCENTIVES FOR HEALTHY EATING HABITS - A method, system, and program for providing consumer healthy habits incentives are provided. A consumable item, consumed by an individual, is detected. A health factor is detected for the consumable item. An electronic incentive is selected for the individual according to the health factor, such that the individual is encouraged to consume a healthy selection of consumable items. An electronic incentive may be further specified according to the personal health history, exercise history and consumption history of an individual. | 11-17-2011 |
20110287709 | RESPONDING TO RECIPIENT RATED WIRELESSLY BROADCAST ELECTRONIC WORKS - A method, system, and program for responding to recipient ratings of wirelessly broadcast electronic works are provided. A secondary player receives a wireless broadcast of an electronic work from a primary player. Next, responsive to a playback of the electronic work from the secondary player, the secondary player requires a recipient of the electronic work to rate the electronic work. Then, responsive to the recipient rating the electronic work or an automatic rating selection made based on the recipient's preferences, the options available to the recipient may be dynamically adjusted. First, responsive to the recipient rating the electronic work with a favorable rating, the secondary player triggers a purchase offer for the electronic work when the secondary player is connected to a network providing access to a purchase server. Second, responsive to the recipient rating the electronic work, the secondary player transfers the rating to the primary player, such that the primary player is enabled to dynamically adjust a next electronic work selection for broadcast based on the rating for the previously broadcast electronic work. | 11-24-2011 |
20110288758 | MANAGEMENT OF TRAFFIC SIGNALS AT ROAD INTERSECTION TO AVOID BLOCKING VEHICLES - A computer controlled system for managing traffic signals at the intersection of at least two traffic lanes to avoid collisions between motor vehicles in intersecting lanes. An implementation with means for controlling traffic signals at the intersection to permit vehicles in each of the intersecting traffic lanes a time period to pass through the intersection, means for detecting the presence of a vehicle in the intersection beyond said permitted time period, and means responsive to a detection of the presence of the vehicle, for controlling the traffic signals to stop other vehicles from passing through the intersection. | 11-24-2011 |
20110289213 | TRACKING LOCALLY BROADCAST ELECTRONIC WORKS - A method, system, and program for tracking locally broadcast electronic works are provided. According to one aspect of the invention, a sending player locally broadcasts an electronic work. In particular, the local broadcast may be a wireless broadcast creating an ad-hoc radio system. At least one recipient player receives the localized broadcast of the electronic work and accepts a distribution cookie for tracking distribution of the electronic work. The at least one recipient player updates the distribution cookie with tracking information about the broadcast of the electronic work, including ratings by users at the second player and purchase of the broadcast electronic work. Each of the at least one recipient players may in turn become a sending player that broadcasts the electronic work to other recipient players and requires the other recipient players to accept a copy of the distribution cookie updated by the second player. Then, responsive to detecting a network connection to a statistics server, the at least one recipient player provides the distribution cookie to the statistics server, such that localized broadcast distribution of the electronic work is tracked. | 11-24-2011 |
20110289601 | DIGITAL RIGHTS MANAGEMENT OF STREAMING CAPTURED CONTENT BASED ON CRITERIA REGULATING A SEQUENCE OF ELEMENTS - A captured content rights controller detects a first portion of streaming captured content and a second portion of the streaming captured content after the first portion of the streaming captured content is detected. The captured content rights controller determines whether rendering the second portion of the streaming captured content after the first portion of the streaming captured content is subject to at least one digital rights management protection rule for streaming captured content as specified by at least one owner of at least one restricted element within the streaming captured content captured independent of distribution of the content by the owner of the at least one restricted element within the streaming captured content. The captured content rights controller applies the at least one digital rights management protection rule to restrict rendering of the second portion of the streaming captured content after the first portion of the streaming captured content. | 11-24-2011 |
20120005473 | Secure Dynamically Reconfigurable Logic - A mechanism for securely and dynamically reconfiguring reconfigurable logic is provided. A state machine within a data processing system establishes a hardware boundary to the reconfigurable logic within the data processing system thereby forming isolated reconfigurable logic. The state machine clears any prior state existing within the isolated reconfigurable logic. The state machine authenticates a new configuration to be loaded into the isolated reconfigurable logic. The state machine determines whether the authentication of the new configuration is successful. Responsive to the authentication of the new configuration being successful, the state machine loads the new configuration into the isolated reconfigurable logic. The state machine then starts operation of the isolated reconfigurable logic. | 01-05-2012 |
20120096084 | SHARED MEDIA EXPERIENCE DISTRIBUTION AND PLAYBACK - Embodiments of the present invention provide a method, system and computer program product for providing a shared user experience during media playback. In an embodiment of the invention, a method for providing a shared user experience during media playback is provided. The method includes selecting for a particular user a media file for playback in a media player executing in memory by a processor of a computer. The method also includes retrieving a shared user experience audio file recorded for a different user during a previous playback of the selected media file. Finally, the method includes playing back for the particular user both the selected media file and the retrieved shared user experience audio file concurrently in the media player. | 04-19-2012 |
20120106796 | CREATING A CUSTOMIZED AVATAR THAT REFLECTS A USER'S DISTINGUISHABLE ATTRIBUTES - A capture system captures detectable attributes of a user. A differential system compares the detectable attributes with a normalized model of attributes, wherein the normalized model of attributes characterize normal representative attribute values across a sample of a plurality of users and generates differential attributes representing the differences between the detectable attributes and the normalized model of attributes. Multiple separate avatar creator systems receive the differential attributes and each apply the differential attributes to different base avatars to create custom avatars which reflect a selection of the detectable attributes of the user which are distinguishable from the normalized model of attributes. | 05-03-2012 |
20120134483 | DESTINATION DEVICE BILLING ACCORDING TO CALL RECIPIENT - A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices. | 05-31-2012 |
20120140042 | WARNING A USER ABOUT ADVERSE BEHAVIORS OF OTHERS WITHIN AN ENVIRONMENT BASED ON A 3D CAPTURED IMAGE STREAM - A computer-implemented method, system, and program includes a behavior processing system for capturing a three-dimensional movement of a monitored user within a particular environment monitored by a supervising user, wherein the three-dimensional movement is determined by using at least one image capture device aimed at the monitored user. The behavior processing system identifies a three-dimensional object properties stream using the captured movement. The behavior processing system identifies a particular defined adverse behavior of the monitored user represented by the three-dimensional object properties stream by comparing the identified three-dimensional object properties stream with multiple adverse behavior definitions. In response to identifying the particular defined adverse behavior from among the multiple adverse behavior definitions, the behavior processing system triggers a warning system to notify the supervising user about the particular defined adverse behavior of the monitored user through an output interface only detectable by the supervising user. | 06-07-2012 |
20120179822 | TECHNIQUES FOR PROVISIONING CLOUD COMPUTING ENVIRONMENT RESOURCES BASED ON SOCIAL MEDIA ANALYSIS - A technique for provisioning computing environment resources based on social media analysis includes monitoring, using a data processing system, references (e.g., hyperlinks) provided by a first website to detect an anticipated flash crowd for a web-accessible resource (e.g., second website). The technique also includes generating, using the data processing system, a notice to allocate resources associated with the web-accessible resource to service the anticipated flash crowd. | 07-12-2012 |
20120185305 | PROVIDING CONSUMERS WITH INCENTIVES FOR HEALTHY EATING HABITS - A method, system, and program for providing consumer healthy habits incentives are provided. A consumable item, consumed by an individual, is detected. A health factor is detected for the consumable item. An electronic incentive is selected for the individual according to the health factor, such that the individual is encouraged to consume a healthy selection of consumable items. An electronic incentive may be further specified according to the personal health history, exercise history and consumption history of an individual. | 07-19-2012 |
20120201365 | CONTROLLING HOLD QUEUE POSITION ADJUSTMENT - A question of a first caller from among multiple callers waiting in a hold queue of a call center is published. Responsive to a second caller from among multiple callers indicating a readiness to answer to the question, the first caller is connected with the second caller. Responsive to the second caller answering the question, the second caller is awarded an advancement token for storage in association with an authenticated identifier for the second caller in a caller profile for redemption by the second caller for a value selected by the second caller. | 08-09-2012 |
20120201418 | DIGITAL RIGHTS MANAGEMENT OF CAPTURED CONTENT BASED ON CAPTURE ASSOCIATED LOCATIONS - A certification is received from a user stating that captured content does not comprise a particular restricted element and a request from the user for an adjustment of a digital rights management rule identified for the captured content based on the captured content comprising the particular restricted element. At least one term of the digital rights management rule is adjusted to reflect that the captured content does not comprise the particular restricted element. The usage of the captured content by the user is monitored to determine whether the usage matches the certification statement. | 08-09-2012 |
20120271785 | ADJUSTING A CONSUMER EXPERIENCE BASED ON A 3D CAPTURED IMAGE STREAM OF A CONSUMER RESPONSE - A survey controller receives response records from response processing systems, wherein the response records comprise a selection of response records each identifying a separate response of at least one consumer to a particular stimulus within a consumer environment detected from a three-dimensional movement of the at least one consumer captured within the consumer environment. The survey controller stores response records in a response database. The survey controller calculates, from the selection of response records stored in the response database, statistics associated with the particular stimulus within the consumer environment. The survey controller stores, by the survey controller, the calculated statistics. | 10-25-2012 |
20130003135 | Security Screening Image Analysis Simplification Through Object Pattern Identification - A mechanism is provided for security screening image analysis simplification through object pattern identification. Popular consumer electronics and other items are scanned in a control system, which creates an electronic signature for each known object. The system may reduce the signature to a hash value and place each signature for each known object in a “known good” storage set. For example, popular mobile phones, laptop computers, digital cameras, and the like may be scanned for the known good signature database. At the time of scan, such as at an airport, objects in a bag may be rotated to a common axis alignment and transformed to the same signature or hash value to match against the known good signature database. If an item matches, the scanning system marks it as a known safe object. | 01-03-2013 |
20130013903 | Multicore Processor and Method of Use That Adapts Core Functions Based on Workload Execution - A processor has multiple cores with each core having an associated function to support processor operations. The functions performed by the cores are selectively altered to improve processor operations by balancing the resources applied for each function. For example, each core comprises a field programmable array that is selectively and dynamically programmed to perform a function, such as a floating point function or a fixed point function, based on the number of operations that use each function. As another example, a processor is built with a greater number of cores than can be simultaneously powered, each core associated with a function, so that cores having functions with lower utilization are selectively powered down. | 01-10-2013 |
20130179296 | CONSUMER REPRESENTATION RENDERING WITH SELECTED MERCHANDISE - A representation system receives a subscription for a consumer to monitor online vendors. The representations system monitors a separate inventory of merchandise items of each online vendor. The representations system detects a new merchandise item added by at least one of the online vendors to a current inventory of merchandise items. The representation system accesses a representation of the consumer specified by a selection of sizing measurements stored by the selection service. The representation system selects at least one merchandise item from among the new separate merchandise items each with a set of merchandise characteristics of a size selected to fit the selection of sizing measurements. The representation system generates an email communication to deliver to the consumer from which a rendering of the selected merchandise item on the representation according to the set of merchandise characteristics as applied to the selection of sizing measurements is accessible to the consumer. | 07-11-2013 |
20140019218 | PROVIDING CONSUMERS WITH INCENTIVES FOR HEALTHY EATING HABITS - A method, system, and program for providing consumer healthy habits incentives are provided. A consumable item, consumed by an individual, is detected. A health factor is detected for the consumable item. An electronic incentive is selected for the individual according to the health factor, such that the individual is encouraged to consume a healthy selection of consumable items. An electronic incentive may be further specified according to the personal health history, exercise history and consumption history of an individual | 01-16-2014 |
20140049410 | SELECTIVE RECOMPRESSION OF A STRING COMPRESSED BY A PLURALITY OF DIVERSE LOSSLESS COMPRESSION TECHNIQUES - In response to receiving an input string to be compressed, a plurality of diverse lossless compression techniques are applied to the input string to obtain a plurality of compressed strings. The plurality of diverse lossless compression techniques include a template-based compression technique and a non-template-based compression technique. A most compressed string among the plurality of compressed strings is selected. A determination is made regarding whether or not the most compressed string was obtained by application of the template-based compression technique. In response to determining that the most compressed string was obtained by application of the template-based compression technique, the most compressed string is compressed utilizing the non-template-based compression technique to obtain an output string and outputting the output string. In response to determining that the most compressed string was not obtained by application of the template-based compression technique, the most compressed string is output as the output string. | 02-20-2014 |
20140049412 | DATA COMPRESSION UTILIZING LONGEST COMMON SUBSEQUENCE TEMPLATE - In response to receipt of an input string, an attempt is made to identify, in a template store, a closely matching template for use as a compression template. In response to identification of a closely matching template that can be used as a compression template, the input string is compressed into a compressed string by reference to a longest common subsequence compression template. Compressing the input string includes encoding, in a compressed string, an identifier of the compression template, encoding substrings of the input string not having commonality with the compression template of at least a predetermined length as literals, and encoding substrings of the input string having commonality with the compression template of at least the predetermined length as a jump distance without reference to a base location in the compression template. The compressed string is then output. | 02-20-2014 |
20140049413 | DATA COMPRESSION UTILIZING LONGEST COMMON SUBSEQUENCE TEMPLATE - In response to receipt of an input string, an attempt is made to identify, in a template store, a closely matching template for use as a compression template. In response to identification of a closely matching template that can be used as a compression template, the input string is compressed into a compressed string by reference to a longest common subsequence compression template. Compressing the input string includes encoding, in a compressed string, an identifier of the compression template, encoding substrings of the input string not having commonality with the compression template of at least a predetermined length as literals, and encoding substrings of the input string having commonality with the compression template of at least the predetermined length as a jump distance without reference to a base location in the compression template. The compressed string is then output. | 02-20-2014 |
20140064469 | DESTINATION DEVICE BILLING ACCORDING TO CALL RECIPIENT - A method, system, and program for billing for service provided to destination device according to the calling plan of the individual receiving the call. An authenticated identity for a callee answering a call placed to a destination device is received at an intermediary device. The intermediary device then accesses a billing plan for the authenticated identity of the callee and loads the billing plan for specifying charges for the call, such that telephone service billed to the callee is accessible at multiple destination devices. | 03-06-2014 |
20140098944 | CONTROLLING HOLD QUEUE POSITION ADJUSTMENT - A computer system detects a call from a caller at a hold queue, wherein an identity of the caller is authenticated according to a voice identity of the caller. The computer system accesses a caller profile according to the identity of the caller, wherein the caller profile comprises at least one previously earned advancement token. The computer system offers the caller an option of redeeming the previously earned advancement token for adjustment of a position of the caller in the hold queue. | 04-10-2014 |
20140257993 | CONSUMER REPRESENTATION RENDERING WITH SELECTED MERCHANDISE - A rendering constraint is detected for a maximum time between capture of each a plurality of frames of a captured video stream of a consumer and a rendering of each corresponding frame of a consumer representation comprising a rendered three dimensional model rendered to depict a consumer appearance and a movement wearing a particular merchandise item. Processor elements accessible to the at least one computing system are selected that are able to generate the rendered three dimensional model within the time period specified in the rendering constraint. At least one processing task is directed to the selected processor elements to build the consumer representation comprising the three dimensional model and generate a rendering of the three dimensional model wearing the particular merchandise item as the captured video stream is received in real time at the at least one computer system. | 09-11-2014 |