Patent application number | Description | Published |
20100293301 | Dynamically Composing Data Stream Processing Applications - Techniques for dynamically modifying inter-connections between components in an application are provided. The techniques include receiving a data producer profile for each output port within a software application to be executed on one or more processors, receiving a data subscription profile for each input port of each component of the application, establishing connections between the output ports and the input ports of the components in the application based on a comparison of each data producer profile and each data subscription profile, executing the application on one or more processors to process streams of data, receiving either or both of a new data producer profile or a new data subscription profile during the execution of the application, and establishing at least one new connection between an output port and an input port based upon a revised comparison of the received data profiles that include the new data profile. | 11-18-2010 |
20110288808 | OPTIMAL TEST FLOW SCHEDULING WITHIN AUTOMATED TEST EQUIPMENT FOR MINIMIZED MEAN TIME TO DETECT FAILURE - The present invention describes a method and system for optimizing a test flow within each ATE (Automated Test Equipment) station. The test flow includes a plurality of test blocks. A test block includes a plurality of individual tests. A computing system schedule the test flow based one or more of: a test failure model, test block duration and a yield model. The failure model determines an order or sequence of the test blocks. There are at least two failure models: independent failure model and dependant failure model. The yield model describes whether a semiconductor chip is defective or not. Upon completing the scheduling, the ATE station conducts tests according to the scheduled test flow. The present invention can also be applied to software testing. | 11-24-2011 |
20120096549 | ADAPTIVE CYBER-SECURITY ANALYTICS - Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value. | 04-19-2012 |
20130151536 | Vertex-Proximity Query Processing - A method, an apparatus and an article of manufacture for processing a random-walk based vertex-proximity query on a graph. The method includes computing at least one vertex cluster and corresponding meta-information from a graph, dynamically updating the clustering and corresponding meta-information upon modification of the graph, and identifying a vertex cluster relevant to at least one query vertex and aggregating corresponding meta-information of the cluster to process the query. | 06-13-2013 |
20150058668 | OPTIMAL TEST FLOW SCHEDULING WITHIN AUTOMATED TEST EQUIPMENT FOR MINIMIZED MEAN TIME TO DETECT FAILURE - The present invention describes a method and system for optimizing a test flow within each ATE (Automated Test Equipment) station. The test flow includes a plurality of test blocks. A test block includes a plurality of individual tests. A computing system schedule the test flow based one or more of: a test failure model, test block duration and a yield model. The failure model determines an order or sequence of the test blocks. There are at least two failure models: independent failure model and dependant failure model. The yield model describes whether a semiconductor chip is defective or not. Upon completing the scheduling, the ATE station conducts tests according to the scheduled test flow. The present invention can also be applied to software testing. | 02-26-2015 |
Patent application number | Description | Published |
20090037829 | FRAMEWORK TO INTEGRATE WEB SERVICES WITH ON-PREMISE SOFTWARE - A service framework wherein a markup language based software development kit that maps an object model of a service SDK to a set of markup language schemas. On the basis of the markup language schemas the service may convert any service data object into a markup language string, and vice versa. All data exchange requests and responses are in the format of markup language strings such that web services perform data exchange with the service through standard internet technologies, for example JavaScript and SOAP. The UI of the service is abstracted to a markup language structure. The definition of interaction points of web services are also standardized, such that other services may customize the service user interface through a simple markup language string, passed via custom code. In this way, deployment and enlightening of web based services in the service may be controlled from the server or web service side. | 02-05-2009 |
20090063266 | PERFORMING OF MARKETING ACTIONS WHILE PRESERVING CONFIDENTIALITY - A system provides targeted advertising to customers of an application while preserving the confidentiality of the customers' application information. A marketing system provides a marketing engine that executes on a computer system of the customer of an application and provides targeted marketing to that customer. Since the marketing engine executes on the customer's own computer system, it may have access to the customer's application information. The marketing engine can analyze the application information and provide marketing information that is targeted to the customer without compromising the confidentiality of the customer's application information. | 03-05-2009 |
20090254524 | PROVIDING DATA BASED ON LANGUAGE CHOICE - Data may be provided in a language chosen by a user. A data record may be stored in a database using symbols to represent data. These symbols may be converted into various languages. A resource file for a given language defines a correspondence between the symbols in the record and the words in that language. A user indicates a choice of language in which to receive data. The user's choice is stored in the database, and conversion information from the resource file for the user's chosen language is copied to the database. When a program connects to a database and requests data records, the user's language choice is retrieved from the data, and the conversion information stored in the database is used to convert the data records into the chosen language. The requested data is then provided to the application in the user's chosen language. | 10-08-2009 |
20090313619 | INSTALLATION OF CUSTOMIZED APPLICATIONS - The described implementations relate to installation of customized applications. One technique obtains a software application generated by a producer. The technique identifies customizations made by a customizer to the software application that are desired by a customer. The technique further installs the software application and the customizations on the customer's computer in a single operation. | 12-17-2009 |
20120216240 | PROVIDING DATA SECURITY THROUGH DECLARATIVE MODELING OF QUERIES - Data security is implemented through a query based policy constraining a primary table. Nested tables inherit the security policy by implementing the policy queries of the primary table. Operations on nested tables such as join actions execute the security policy queries once due to inheritance from the primary table therefore optimizing query modeling. A security policy may respond to a context or a role by executing queries responsive to the context. | 08-23-2012 |
20130024246 | EMPLOYING SOFTWARE TO MODEL ORGANIZATIONAL STRUCTURES POLICIES AND PROCESSES - A modeling application enables consistency among business applications and among business application processes by providing internal control rules for the business applications according to an organization model. The modeling application may model the organization by structuring the organization types within the modeled organization and providing the internal control rules for deployed business applications to comply with the organization model. The internal control rules define application semantics, properties, and policies for the business applications to provide consistent functionality across the organization. | 01-24-2013 |
Patent application number | Description | Published |
20080294644 | METHOD AND SYSTEM FOR SEMANTIC PUBLISH-SUBSCRIBE SERVICES - A semantic publish-subscribe system, including: a plurality of subscribers; a plurality of publishers; and a server that receives and stores subscriptions that are described in web ontology language (OWL) graph patterns from the plurality of subscribers and that receives events that are described in semantic graphs formed by OWL assertions from the plurality of publishers, wherein when the server receives an event from a publisher, the server expands the OWL assertions of the event using a reasoner to produce an expanded event, the server matches the expanded event to a subscription, and then, the server notifies a subscriber whose interest matches the event. | 11-27-2008 |
20090043729 | Processing Overlapping Continuous Queries - An edge-covering based greedy method for shared filter ordering includes receiving a plurality of queries, wherein each query is a conjunction of filters, and each filter is shared across multiple queries of the plurality of queries, evaluating a unit price of each filter, evaluating, sequentially, each filter in order of a lowest to a highest unit price, to determine a value for each filter, and changing an ordering of the filters according to the values. | 02-12-2009 |