Patent application number | Description | Published |
20080228585 | Methods and Apparatus for Presenting Personazlized Information to Consumers in a Retail Environment - Methods and apparatus are provided for presenting personalized information to consumers in a retail environment. A personalized price is determined for at least one product that is in physical proximity to the customer. The physical proximity may be determined, for example, by evaluating identifiers, such as RHD tags, associated with each customer and product. A personalized message can be also presented to a customer regarding at least one product that is in physical proximity to the customer. The personalized message can provide, for example, dietary or safety information relevant to the customer and at least one product in the proximity of the customer. The personalized information may be determined based on one or more personalized message rules. | 09-18-2008 |
20080307491 | SECURE SYSTEM AND METHOD FOR ENFORCEMENT OF PRIVACY POLICY AND PROTECTION OF CONFIDENTIALITY - The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party. | 12-11-2008 |
20090006870 | METHOD, SYSTEM, AND APPARATUS FOR DYNAMIC DATA-DRIVEN PRIVACY POLICY PROTECTION AND DATA SHARING - A method of sharing telematics data for a vehicle with service providers can include receiving the telematics data for the vehicle, where the telematics data dynamically changes over time, and comparing the telematics data with a privacy policy associated with the vehicle. The privacy policy can specify rules for selectively releasing items of the telematics data to one or more service providers. Data items of the telematics data can be selectively provided to the service providers according to the comparing step. | 01-01-2009 |
20120134527 | HAZARD DETECTION FOR ASSET MANAGEMENT - An approach that detects locations of hazardous conditions within an infrastructure is provided. This approach uses satellite imagery, GIS data, automatic image processing, and predictive modeling to determine the location of the hazards automatically, thus optimizing infrastructure management. Specifically, a hazard detection tool provides this capability. The hazard detection tool comprises a detection component configured to: receive visual media containing asset location data about a set of physical assets, and hazard location data about potential hazards within a vicinity of each of the set of physical assets. The detection component further receives graphical information system (GIS) data containing asset location data about each of the set of physical assets. The hazard detection tool further comprises an analysis component configured to: analyze the visual media to determine if a hazardous condition exists for each of the set of physical assets; and apply the GIS data to the visual media to determine a location of hazardous conditions within the infrastructure. | 05-31-2012 |
20120303672 | FEDERATION OF MULTI-LEVEL MASTER DATA MANAGEMENT SYSTEMS - Federating multiple-level master data management systems may include a first set of master data management nodes having one or more common characteristics. A first group master data management node may be assigned to centrally manage the first set of master data management nodes, the first group master data management node maintaining master data management functionalities at a group level and providing a single logical view of master data to the first set of master data management nodes. Each master data management node in the first set has data access link with the first group master data management node based on implementation style of said each master data management node. | 11-29-2012 |
20120303673 | DATA STEWARDSHIP IN FEDERATED MULTI-LEVEL MASTER DATA MANAGEMENT SYSTEMS - Managing data stewardship in multi-level MDM systems may include a steward data composer that creates data steward repository for a master data management system to define relationships between data stewards and data objects for which data stewards are responsible and steward data consolidator that creates an integrated data steward repository by combining multiple data steward repositories. | 11-29-2012 |
20120303692 | FEDERATION OF MASTER DATA MANAGEMENT SYSTEMS - Federating master data management systems may include a network-aware adapter configured with a host master data management node. The network-aware adapter may establish one or more links with other master data management systems to allow the system to work together and leverage each other's data. | 11-29-2012 |
20130013640 | MINING GENERALIZED SPATIAL ASSOCATION RULE - A system, method and computer program product for mining a rule including spatial information and non-spatial information by using a SAR (Spatial Association Rule) mining tool. The computing system is configured to construct an expanded spatial predicate transaction table for reference spatial objects and a generalized taxonomy for task-relevant spatial objects. The computing system is configured to run the SAR mining tool with the constructed expanded spatial predicate transaction and the generalized taxonomy. The computing system outputs, from the SAR mining tool, a set of generalized spatial association rules for the reference spatial objects. The generalized spatial association rule includes the spatial information and non-spatial information, associated with both the reference spatial objects and the task-relevant spatial objects. | 01-10-2013 |
20130124420 | SECURE SYSTEM AND METHOD FOR ENFORCEMENT OF PRIVACY POLICY AND PROTECTION OF CONFIDENTIALITY - The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party. | 05-16-2013 |
20140164389 | MINING TRAJECTORY FOR SPATIAL TEMPORAL ANALYTICS - Embodiments relate to generating a trajectory heat map at an aggregated level using computed transit points is provided. An aspect includes generating, by a processing device, a trajectory database from time-stamped global positioning system (GPS) sample points. According to exemplary embodiments, transit points are computed for each trajectory in the trajectory database. A temporal transit graph is constructed from the transit points. The transit graph of embodiments captures the shortest paths among these transit points. The transit graph is then indexed and stored in a spatial-temporal database for online analytic processing. | 06-12-2014 |
20140164390 | MINING TRAJECTORY FOR SPATIAL TEMPORAL ANALYTICS - Embodiments relate to generating a trajectory heat map at an aggregated level using computed transit points is provided. An aspect includes generating, by a processing device, a trajectory database from time-stamped global positioning system (GPS) sample points. According to exemplary embodiments, transit points are computed for each trajectory in the trajectory database. A temporal transit graph is constructed from the transit points. The transit graph of embodiments captures the shortest paths among these transit points. The transit graph is then indexed and stored in a spatial-temporal database for online analytic processing. | 06-12-2014 |
20150015606 | HAZARD DETECTION FOR ASSET MANAGEMENT - An approach that detects locations of hazardous conditions within an infrastructure is provided. This approach uses satellite imagery, GIS data, automatic image processing, and predictive modeling to determine the location of the hazards automatically, thus optimizing infrastructure management. Specifically, a hazard detection tool provides this capability. The hazard detection tool comprises a detection component configured to: receive visual media containing asset location data about a set of physical assets, and hazard location data about potential hazards within a vicinity of each of the set of physical assets. The detection component further receives graphical information system (GIS) data containing asset location data about each of the set of physical assets. The hazard detection tool further comprises an analysis component configured to: analyze the visual media to determine if a hazardous condition exists for each of the set of physical assets; and apply the GIS data to the visual media to determine a location of hazardous conditions within the infrastructure. | 01-15-2015 |
20150073686 | TRAFFIC CONTROL AGENCY DEPLOYMENT AND SIGNAL OPTIMIZATION FOR EVENT PLANNING - Embodiments relate to traffic control resource planning. An aspect includes receiving information about available routes in a transportation network and receiving an estimate of a traffic demand in the transportation network. Traffic control planning is performed and it may include: simulating a traffic flow based on the available routes and the traffic demand; applying a model that varies traffic control agent (TCA) placement and traffic signal settings in the transportation network to minimize a cost associated with the traffic flow, the cost including a TCA deployment cost and a traffic delay cost; and outputting a traffic control plan based on the applying, the traffic control plan including a TCA placement and traffic signal setting plan. | 03-12-2015 |
20150073687 | TRAFFIC CONTROL AGENCY DEPLOYMENT AND SIGNAL OPTIMIZATION FOR EVENT PLANNING - Embodiments relate to traffic control resource planning. An aspect includes receiving information about available routes in a transportation network and receiving an estimate of a traffic demand in the transportation network. Traffic control planning is performed and it may include: simulating a traffic flow based on the available routes and the traffic demand; applying a model that varies traffic control agent (TCA) placement and traffic signal settings in the transportation network to minimize a cost associated with the traffic flow, the cost including a TCA deployment cost and a traffic delay cost; and outputting a traffic control plan based on the applying, the traffic control plan including a TCA placement and traffic signal setting plan. | 03-12-2015 |
20150073688 | Traffic Impact Prediction for Multiple Event Planning - Embodiments relate to traffic impact prediction in a transportation network. Link level background traffic demand in a transportation network may be estimated based on information about available routes, and based on expected background traffic volumes between origins and destinations. A background traffic flow model that optimizes a background flow of the expected background traffic volumes among the available routes to minimize a sum of background congestion costs, background path entropy, and errors between an observed background traffic flow and the optimized background flow may be applied. Alternative routes may be identified based on the available routes and event based control plans. Expected additional event based traffic volumes may be received. A link level total traffic demand in the transportation network may be estimated based on the expected additional event based traffic volumes, the identified alternative routes, and the estimated background traffic demand. | 03-12-2015 |
20150073689 | Traffic Impact Prediction for Multiple Event Planning - Embodiments relate to traffic impact prediction in a transportation network. Link level background traffic demand in a transportation network may be estimated based on information about available routes, and based on expected background traffic volumes between origins and destinations. A background traffic flow model that optimizes a background flow of the expected background traffic volumes among the available routes to minimize a sum of background congestion costs, background path entropy, and errors between an observed background traffic flow and the optimized background flow may be applied. Alternative routes may be identified based on the available routes and event based control plans. Expected additional event based traffic volumes may be received. A link level total traffic demand in the transportation network may be estimated based on the expected additional event based traffic volumes, the identified alternative routes, and the estimated background traffic demand. | 03-12-2015 |