11th week of 2013 patent applcation highlights part 56 |
Patent application number | Title | Published |
20130066872 | Method and Apparatus for Organizing Images - A method and apparatus are defined for organizing a plurality of digital photos. The method comprises the steps of identifying a group of digital photos, receiving a number defining how many clusters to be formed from the group, receiving profile information to be used for clustering the digital photos into the number of clusters, clustering the group of digital photos according to the profile information, and identifying representative digital photo(s) of the clusters from the clustered digital photos based on the profile information. | 2013-03-14 |
20130066873 | AUTOMATIC GENERATION OF DIGITAL COMPOSITE PRODUCT REVIEWS - Consumers receive module-computed composite reviews that are lively, informative, coherent, and representative of a larger underlying collection of reviews. Representative phrases from reviews are extracted and aggregated into coherent sentences to create the composite review. Clear automatable criteria are provided to define coherence and other qualities, such as representativeness, liveliness, and informativity. Sentence coherence criteria involve syntax, shared vocabulary, phrase connectors, and phrase sentiment polarity, for instance. Phrase representativeness criteria involve review ratings and derived phrase ratings, for instance. Phrase liveliness criteria involve sentiment expression frequency, superlatives, comparatives, degree modifiers, affect activation scores, and affect imagery scores, for instance. Phrase informativity criteria involve product-specific words, review length, and recency, for instance. Prohibited language is filtered out. Composite reviews are automatically distributed, e.g., in response to a web search on the reviewed product. Reviews can be generated with a repeatability and rapidity not attainable by human performance alone. | 2013-03-14 |
20130066874 | SYSTEMS AND METHODS FOR PROBABILISTIC DATA CLASSIFICATION - A system for performing data classification operations. In one embodiment, the system comprises a file system configured to store a plurality of computer files and a scanning agent configured to traverse the file system and compile data regarding the attributes and content of the plurality of computer files. The system also comprises an index configured to store the data regarding attributes and content of the plurality of computer files and a file classifier configured to analyze the data regarding the attributes and content of the plurality of computer files and to classify the plurality of computer files into one or more categories based on the data regarding the attributes and content of the plurality of computer files. | 2013-03-14 |
20130066875 | Method for Segmenting Users of Mobile Internet - Domains supported by websites accessible to mobile network users over the Internet are classified into pre-defined categories based on domain content. A network intelligence solution (NIS) taps a stream of IP (Internet Protocol) packets traversing a node in the network between mobile equipment employed by network users and remote web servers. The NIS performs deep packet inspection to aggregate Internet usage so that a distribution of frequency of access by the network users to each of the classified domains may be calculated. Clusters encompassing one or more of the categories are specified based, at least in part, on the access frequency distribution. Each network user is assigned to one or more clusters based at least on observations of the user's frequency of access to the classified domains. Clusters are specified to meet a target homogeneity of access frequency for each encompassed category and further to meet a target heterogeneity across clusters. | 2013-03-14 |
20130066876 | IDENTIFYING UNSEEN CONTENT OF INTEREST - Making an information retrieval process public, so that it can be followed by others, allows capturing of an interest graph that allows people to learn more about shared interests with other people. This also allows items of interest to a trusted resource (such as an expert) to be identified. These items can then be brought to the attention of other users that share the same interest as the expert. In addition, by keeping track of what particular content a user has already seen, the system can bring items of interest to the user's attention, where the user has not yet seen those items. | 2013-03-14 |
20130066877 | DATA STREAMING FOR INTERACTIVE DECISION-ORIENTED SOFTWARE APPLICATIONS - Providing data to a computer software application by intercepting a request made by a computer software application to retrieve a first data set from a first data storage location, accessing a record, defined in advance of the request, that includes a reference to the first data set and a reference to a second data set, retrieving the first data set from a data storage location other than the first data storage location, and retrieving the second data set from a data storage location other than the first data storage location in advance of a request by the computer software application to access the second data set at the first data storage location. | 2013-03-14 |
20130066878 | METHOD AND APPARATUS FOR ENABLING VIRTUAL TAGS - A method and apparatus for enabling virtual tags is described. The method may include receiving a first digital image data and virtual tag data to be associated with a real-world object in the first digital image data, wherein the first digital image data is captured by a first mobile device, and the virtual tag data includes metadata received from a user of the first mobile device. The method may also include generating a first digital signature from the first digital image data that describes the real-world object, and in response to the generation, inserting in substantially real-time the first digital signature into a searchable index of digital images. The method may also include storing, in a tag database, the virtual tag data and an association between the virtual tag data and the first digital signature inserted into the index of digital images. | 2013-03-14 |
20130066879 | METHOD AND APPARATUS FOR MANAGING NUMEROUS MESSAGES - A method and apparatus for managing numerous messages are provided. The method includes: A. pulling, by a client terminal, a message index list from a server; B. pulling, by the client terminal, message bodies corresponding to message indexes in the message index list in batches; C. managing, by the client terminal, the pulled message bodies and message indexes by using a message pool mode; D. after receiving a finish indication triggered by a user, storing, by the client terminal, the message indexes and the message bodies in the message pool to a local disk. By using the present invention, numerous messages are managed. | 2013-03-14 |
20130066880 | METHOD FOR SEARCHING OBJECTS IN A DATABASE - The invention provides a method for searching objects in a database by means of an index data structure which associates object attribute values to collections of spatial elements—such as tiles of a quadtree or cuboids of an octtree—defined to partition a space, herein a predefined number of spatial elements being combinable to a next-level spatial element. The method comprising: searching the index data structure for a first input search pattern and, if the first input search pattern is associated to a first collection of spatial elements through the index data structure, including all spatial elements from the first collection into a first candidate set of spatial elements, wherein, if the number of spatial elements in the first candidate set exceeds a predetermined maximum, some or all of the spatial elements are combined to a reduced number of next-level spatial elements; searching the index data structure for a second input search pattern and, if the second input search pattern is associated to a second collection of spatial elements through the index data structure, including all spatial elements from the second collection into a second candidate set of spatial elements, wherein, if the number of spatial elements in the second candidate set exceeds a predetermined maximum, some or all of the spatial elements are combined to a reduced number of next-level spatial elements; forming, from of the first candidate set and the second candidate set, a combined candidate set of spatial elements; and searching, in the combined candidate set of spatial elements, for objects that match the first input search pattern and the input second search pattern to obtain a set of result objects. | 2013-03-14 |
20130066881 | INDEXING SYSTEM OF SPATIAL INFORMATION FOR COMBINED SOI OBJECT AND CONTENT - One aspect of the invention provides an indexing system of space of interest (SOI) defining at least a two-dimensional object. The system includes: a location data extractor configured calculate an index point for the space of interest; a map tile number converter configured to map the index point to a tile that lies within a plurality of tiles; and an indexer configured to index the space of interest based on the determined tile. | 2013-03-14 |
20130066882 | DATA STORAGE METHOD AND SYSTEM - A method and apparatus for storing time series data, in which a data structure is defined comprising a plurality of consecutive slices, each slice corresponding to a time period, time series data is stored in the data structure as runs of time series data entries each having a fixed, predetermined size and being associated with a time, each run of time series data entries comprising a number of consecutive time series data values, wherein each run of time series data is stored in a slice corresponding to the time period of the times associated with the time series data entries of the run, and each run of time series data is associated with metadata identifying the duration of the run and an offset of a start time of the run from a start time of the slice in which the run is stored. | 2013-03-14 |
20130066883 | DATA MANAGEMENT APPARATUS AND SYSTEM - A data management apparatus sends specific data and key information corresponding to the specific data to another apparatus, when executing a process to change a storage destination of the specific data in which the hash value obtained by applying a predetermined hash function to corresponding key information belongs to a certain range, from the data management apparatus to the other apparatus, and sends the identification information of the other apparatus stored in correspondence with the certain range to a request source of an operation request, when the operation request with respect to data corresponding to key information is received after the process. | 2013-03-14 |
20130066884 | EVALUATING AN ITEM BASED ON USER REPUTATION INFORMATION - Evaluating an item based on user reputation information is disclosed. Sharing event data is received. A graph is materialized from the received sharing event data. User reputation scores are determined based at least in part on the graph. A score is assigned to the item based at least in part on the user reputation scores of users associated with the item. | 2013-03-14 |
20130066885 | System and Method for Scoring the Popularity and Popularity Trend of an Object - A system and method for generating a Popularity Score for content objects in computer information systems based at least on user input. The system and method is functional in both binary (likes/dislikes) and ranked (numbered, star) rating systems. The Popularity Score utilizes the percentage of users that expressed a favorable opinion of the content object, as well as the total number of expressed user opinions to provide a more meaningful measure of the overall user likeability or appeal of the content object than systems that simply utilize user “likes” and “dislikes”. The system and method also generate Popularity Score Trends over various flexible time ranges that allow users to search, sort, and/or list content objects based on popularity over the selected date ranges. | 2013-03-14 |
20130066886 | METHOD FOR A NATURAL LANGUAGE QUESTION-ANSWERING SYSTEM TO COMPLEMENT DECISION-SUPPORT IN A REAL-TIME COMMAND CENTER - System and methods provide decision support by receiving suggested actions from a decision support system and automatically determining parameters of the suggested actions to serve as input to a question-answering system. System and methods also automatically generate questions based on the parameters, automatically search a corpus of unstructured data to retrieve answers to the questions, and automatically provide impact confidence values for each answer indicating the degree of impact the answers have on the suggested actions. The systems and methods can then output the questions, answers, and impact confidence values. | 2013-03-14 |
20130066887 | DETERMINING RELEVANT INFORMATION FOR DOMAINS OF INTEREST - Techniques are described for determining and using relevant information related to domains of interest. In at least some situations, the techniques include automatically analyzing documents, terms and other information related to a domain of interest in order to automatically determine information about relevant themes within the domain and/or about which documents have contents that are relevant to such themes. Such automatically determined information related to a domain may then be used in various ways, including to assist users in specifying themes of interest and/or in obtaining documents and/or document fragments with contents that are relevant to specified themes. In addition, information about how the automatically determined information is used by users may be tracked and used as feedback for learning improved determinations of relevant themes and relevant documents within the domain, such as by using automated machine learning techniques. | 2013-03-14 |
20130066888 | TRACKING CHANGES ACROSS COLLECTION OF DATA TABLES - A system is provided for tracking changes from two or more tables stored in a database management system. The system may enable two or more applications to track changes from two or more tables in the database management system, and may enable one or more tables to be tracked for changes concurrently. The system may be configured to automatically build a change tracking query in order to retrieve tracked changes from a collection of related tables, or an entity, in the database management system. The entity based tracking system may determine the relationships between the tables in the entity, and may generate a relational query based on the determined relationships. The system may automatically construct a union query from the relational query to activate tracking changes across the collection of tables in the database management system. | 2013-03-14 |
20130066889 | Obscuring Search Results to Increase Traffic to Network Sites - According to an embodiment of the present invention, a system alters search results to increase traffic at network sites, and comprises a computer system including at least one processor. The system processes a search query including an inquiry to determine corresponding search results and an answer to the inquiry, wherein the search results include one or more network sites and a corresponding description of content. The search results are filtered to remove from view the answer from the description of content for the network sites. The filtered search results are displayed to enable access of the network site having a corresponding description of content indicating the network site contains the answer. Alternatively, the answer is highlighted for readily viewing by the user. Embodiments of the present invention further include a method and computer program product for altering search results in substantially the same manners described above. | 2013-03-14 |
20130066890 | METHOD AND SYSTEM FOR SPECIFYING, PREPARING AND USING PARAMETERIZED DATABASE QUERIES - A representative parameterized query in a second database query language is generated from a parameterized query in first database query language. By randomly generating a query in the first database query language, translating this query into the second database query language, and then identifying locations of relevant parameters in the translated query, parameter placeholders can then be substituted at the identified locations to provide a parameterized query in the second database query language. A representative parameterized query in the second database query language can be selected by randomly generating multiple parameterized queries and applying statistical methods including Monte Carlo methods. | 2013-03-14 |
20130066891 | METHOD AND APPARATUS FOR PROCESSING METADATA IN ONE OR MORE MEDIA STREAMS - An approach is provided for processing metadata in one or more media streams. A media metadata processing platform determines to parse from a media data stream for metadata components. The media metadata processing platform also causes, at least in part, a storing of the parsed metadata components. The media metadata processing platform further determines to mark the media data stream with one or more hooks for embedding the parsed metadata components, one or more computational closures, or a combination thereof, the one or more computational closures being serialized. | 2013-03-14 |
20130066892 | INFORMATION INTEGRATING APPARATUS, METHOD, AND COMPUTER PRODUCT - A processing system that implements physical integration, virtual integration, and stream integration by defining meta-information correlating a physical model on an information source side and a logical model on a user-side and by selectively executing push-type information integration of returning to the user-side, an integration result according to information input from the information source side and pull-type information integration of returning to the user-side, an integration result according a query from the user-side. | 2013-03-14 |
20130066893 | PROTECTION OF DATA PRIVACY IN AN ENTERPRISE SYSTEM - Various embodiments of systems and methods for protection of data privacy in an enterprise system are described herein. A request to access data stored in an electronic database is received. The data comprises restricted and unrestricted entities. A restricted entity is replaced with one or more masked attributes that protect privacy of the restricted entity. A mask layout comprising the one or more masked attributes is defined for the restricted entity. The one or more masked attributes are then provided to a user in response to the request. | 2013-03-14 |
20130066894 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, PROGRAM, AND NON-TRANSITORY INFORMATION STORAGE MEDIUM - A cluster value identifying unit identifies a value of a parameter representing a level of a ground swell of interest related to provided information, which is determined in accordance with registration of information related to the provided information. A period identifying unit identifies, based on the value of the parameter, a period in which the ground swell of interest related to the provided information grows with a lapse of time. A user feature identifying unit identifies, based on the identified period, a feature of a user who registers the related information. Accordingly, the feature of the user may be identified based on the registration of the information related to the provided information. | 2013-03-14 |
20130066895 | Providing Suggestion and Translation Thereof In Accordance With A Partial User Entry - Systems and methods for providing suggestion and translation thereof in accordance with a partial user entry are disclosed. In some embodiments, a method includes: at a computer system with one or more processors and memory storing one or more programs for execution by the one or more processors, obtaining a partial search query; predicting from the partial search query a set of predicted complete queries relevant to the partial search query, wherein the partial search query and the set of predicted complete queries are in a first language; subsequent to the predicting, obtaining translations of at least a subset of the set of predicted complete queries, the translations are in a second language different from the first language, and the second language is predicted based, at least in part, on the partial search query; and formatting both the set of predicted complete queries and the corresponding translations for display. | 2013-03-14 |
20130066896 | DYNAMIC SPELLING CORRECTION OF SEARCH QUERIES - Methods, computer systems, and computer-readable storage media for dynamically correcting misspelled search queries are provided. A portion of a search query is received, and a data store is accessed. It is determined that the portion of the search query is absent from the data store and, thus, comprises a misspelled portion of a search query. Correctly spelled portions of search queries are dynamically determined for the misspelled portion of the search query using a trie data structure, and the misspelled portion of the search query is associated with the correctly spelled portions of search queries. Search suggestions are determined for the correctly spelled portions of search queries and are ranked based on a frequency of use and on a transformation cost of associating the misspelled portion of the search query with the correctly spelled portion of search queries. The ranked search suggestions are provided to a user. | 2013-03-14 |
20130066897 | User Interfaces for Life Cycle Inventory and Assessment Data - User interfaces are provided for submitting and obtaining life cycle inventory and assessment data. Suppliers of goods and/or services may provide life cycle inventory data via a user interface component through a secure framework to a life cycle inventory and assessment data hub for validation and auditing. Access to the life cycle inventory and assessment data hub may be through a web services platform for allowing the suppliers secured access to the data and functionality of the data hub. Suppliers and end users may access the data hub via the web services platform using one or more LCI/LCIA user interfaces for obtaining validated and audited life cycle inventory data and for obtaining generated and/or aggregated life cycle assessment scores for one or more goods and/or services. | 2013-03-14 |
20130066898 | MATCHING TARGET STRINGS TO KNOWN STRINGS - One or more techniques and/or systems are disclosed for matching a target string to a known string. A target string is broken into one or more target terms, and the one or more target terms are matched to known terms in an index tree. The index tree comprises one or more known terms from a plurality of known strings, where the respective known terms in the index tree are associated with one or more known string IDs. A known term that is associated with a known string ID (in the index tree, and to which a target term is matched), is comprised in a known string, which corresponds to the known string ID. The target string can be matched to the known string using the known string's corresponding known string ID that is associated with a desired number of occurrences in the matching of the one or more target terms. | 2013-03-14 |
20130066899 | Flexible Metadata Composition - Various embodiments provide an ability to abstract type resolution between multiple type systems. At least one type can be described in one or more programmatically accessible file(s). In some embodiments, an application using a different type system can programmatically access and resolve a type of the at least one type system without knowledge of a location of where a description of the type resides. Alternately or additionally, type descriptions contained in the one or more programmatically accessible file(s) can be analyzed and restructured into one or more new programmatically accessible file(s) based, at least in part, upon the type descriptions. | 2013-03-14 |
20130066900 | SYSTEM AND METHOD FOR ANALYZING DATABASE RECORDS USING SAMPLING AND PROBABILITY - A method for analyzing database records using sampling includes querying a recipient database for recipients with attributes that match one or more specified recipient attributes, querying a sampling database for transactions with attributes that match one or more specified transaction attributes, where the sampling database stores a subset of transactions that are also stored in a transaction database, intersecting the recipients resulting from the querying of the recipient database and the transactions resulting from the querying of the sampling database based on attributes thereof to create a set of joined sample results, and determining an approximate full count value by extrapolating a count value associated with the set of joined sample results based on both a total number of recipients in the recipient database and a total number of transactions in the transaction database. | 2013-03-14 |
20130066901 | HASH-BASED FILE COMPARISON - Concepts and technologies are described herein for hash-based file comparison. In accordance with the concepts and technologies disclosed herein, a comparison tool is configured to compare hash values in a first hash list associated with a first file to hash values in a second hash list corresponding to a second file. The hash values are computed for functional blocks of the respective files and therefore can be compared to indicate if the functional blocks of the two files match one another. If the hash values match, the functional blocks associated with the respective hash values can be determined to match, while hash values that do not match can indicate that the corresponding functional blocks do not match one another. | 2013-03-14 |
20130066902 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - According to one embodiment, an information processing apparatus includes a content display, an extraction module, and a keyword display. The content display is configured to display a content. The extraction module is configured to extract a keyword from the content displayed by the content display. The keyword display is configured to display the keyword extracted by the extraction module in a content display window. | 2013-03-14 |
20130066903 | System for Linking Medical Terms for a Medical Knowledge Base - A system generates medical knowledge base information by using predetermined data source specific message syntax information in identifying first and second information received from first and second data sources respectively. The first and second information indicates at least one type of medical relationship between the received first and second medical terms. The system determines likelihood of existence of the at least one type of medical relationship indicated by a combination of the first and second information, in response to predetermined information indicating a number of occurrences of the at least one type of relationship in data of at least one of the first and second data source. The system outputs first and second medical terms and the at least one type of medical relationship in response to the determined likelihood of existence. | 2013-03-14 |
20130066904 | INSERTING ADVERTISING CONTENT - Content may be inserted at a duplicating device by inserting advertising content into a duplicated feed, and transmitting the duplicated feed to the terminal. The transmission of the duplicated feed is performed in response to a state of the terminal. | 2013-03-14 |
20130066905 | Web-Enabled Database Access Tools - This description provides tools and techniques for Web-enabled database access tools. These tools may provide systems that include database access tools that provide at least one level of abstraction between external databases and users of the access tools. The systems may also include one or more internal databases maintained by the tool, with the internal database storing respective login information associated with the users. The login information may enable the users to access the tool without providing direct access to the external databases. | 2013-03-14 |
20130066906 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND RECORDING MEDIUM - The invention acquires article data (S | 2013-03-14 |
20130066907 | Enabling a Search for Both Local and Remote Electronic Content - A search for content may be performed. A query may be received from a user who is interacting with a first device. A first collection of content that is stored on the first device may be searched to identify local content that is related to the query. A second collection of content that is stored on a second device may be searched to identify remote content that is related to the query. The second device may be different from the first device and may be accessible through a network. Results that refer to both the identified local content and the identified remote content may be displayed to the user. | 2013-03-14 |
20130066908 | SYSTEM AND METHOD FOR SHARING MOBILE DEVICE CONTENT - A method, system and mobile communication device for searching, sharing and accessing content stored on a mobile or computing device. The exemplary embodiments disclosed herein allow a mobile communication device ( | 2013-03-14 |
20130066909 | Methods and Systems for Managing An Inventory Of Telephone Numbers - A system and method in accordance with exemplary embodiments may include storing telephone number inventory data using a database associated with a network, receiving, from a user system, a request for telephone number forecast data, forecasting future telephone number usage based on at least a history of telephone number inventory data, and providing, to the user system, telephone number forecast data based on at least the forecast of future telephone number usage. | 2013-03-14 |
20130066910 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An apparatus performs a first search for first information that contains a first character input through an operation, and performs a second search for second information that contains both of the first character and a second character when the second character is input after the first search is started. Before the searches are performed, either a first search mode or a second search mode is selected: in the first search mode, a search is started for the first information independently of an input of the second character after the input of the first character; and in the second search mode, a determination is made whether or not there is an input of the second character after the input of the first character, and a search is started for the first information when there is no input of the second character is selected. | 2013-03-14 |
20130066911 | Content item reconciliation - A source configuration management database (CMDB) is of an information technology (IT) infrastructure that includes an IT resource represented by a configuration item (CI). A target CMDB is of the IT infrastructure that includes the IT resource, too. The given CI is recursively reconciled to the target CMDB from the source CMDB. | 2013-03-14 |
20130066912 | Deriving Dynamic Consumer Defined Product Attributes from Input Queries - Methods and systems of defining product attributes may involve receiving a search query and extracting a user expectation from the search query. In addition, an attribute may be defined for a product based on the user expectation. In one example, consumer generated content such as forum content, review content, blog content and social networking content, is used to define the attribute. | 2013-03-14 |
20130066913 | DATASET RATING AND COMPARISON - Providing information about two or more datasets. The method includes accessing metadata for two or more datasets. The method further includes displaying a comparison of the two or more datasets based on metadata for the two or more datasets. | 2013-03-14 |
20130066914 | Deriving Dynamic Consumer Defined Product Attributes from Input Queries - Methods and systems of defining product attributes may involve receiving a search query and extracting a user expectation from the search query. In addition, an attribute may be defined for a product based on the user expectation. In one example, consumer generated content such as forum content, review content, blog content and social networking content, is used to define the attribute. | 2013-03-14 |
20130066915 | Method And System For Selecting A Subset Of Information To Communicate To Others From A Set Of Information - A method for selecting a subset of information to communicate to others from a set of information comprising a plurality of content items. In accordance with the method, the set of information is stored in a user retrievable format, a relative priority is assigned to each of the plurality of content items, and the subset of information is automatically generated by selecting a predetermined number of the plurality of content items from the set of information based on the relative priorities of each of the plurality of content items. The predetermined number is less than the number of said plurality of content items and the subset of information is a prioritized subset of the set of information. A system, and a computer readable medium carrying computer readable instructions for carrying out the method are also disclosed. | 2013-03-14 |
20130066916 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR IMPLEMENTING INTELLIGENT AGENT SERVICES - Implementing intelligent agent services includes generating an ontological domain for an individual based upon information elements that represent aspects of detectable behaviors of the individual at a point in time. The detectable behaviors occur within a physical and virtual geography and in relation to time. The services also include creating subdomains of contextually organized collections of the information elements and information elements collected from previously conducted detectable behaviors of the individual. The subdomains include orthogonally related data. The services further include determining a relevance of relationships among the information elements across the subdomains. Relationships determined to be relevant are identified as an interest of the individual. The services also include searching sources of information using the information elements having the relationships determined to be relevant and identifying a solution for satisfying the interest responsive to the searching. | 2013-03-14 |
20130066917 | COMMUNITY-BASED PARENTAL CONTROLS - According to a general aspect, a method includes maintaining rating groups, each rating group providing a rating for content compiled based on information received from a user evaluating the content. The method also includes receiving, from a first user, a selection of a first rating group, to be applied to a set of users associated with the first user. The method also includes receiving, from a user, a request for a piece of content. The method also includes determining that the user from which the request was received belongs to the set of users associated with the first user. The method also includes, based upon the determination that the user belonged to the set of users associated with the first user, accessing information associated with the first rating group and determining whether the first rating group includes a rating for the requested piece of content. | 2013-03-14 |
20130066918 | SYSTEM AND METHOD FOR PROVIDING AN ELECTRONIC LIBRARY - System and methods are provided for an electronic library service. In one embodiment, a method includes receiving a request for content of the electronic library service, the request identifying an account number for the electronic library service and identification number of a device, and authenticating the request based on an account number for the electronic library service and identification number of a device. The method may further include determining that content associated with the request is available for access by the device based on one or more restriction limitations, and providing access to the content based on one or more restriction limitations, wherein content of the electronic library is accessible to a device associated with the account number for a limited period of time. | 2013-03-14 |
20130066919 | COMMON POINT AUTHORING SYSTEM FOR THE COMPLEX SHARING OF HIERARCHICALLY AUTHORED DATA OBJECTS IN A DISTRIBUTION CHAIN - The Common Point Authoring system functions to provide Livestock Informational Objects via the use of a centralized repository of uniquely identified, immutable Livestock Informational Objects. This system automates the authoring, maintenance, and distribution of the Livestock Informational Objects by using an Internet-based paradigm and a centralized repository of uniquely-identified, immutable Data Elements. The Common Point Authoring system provides a set of software modules that the manufacturers can use to author, maintain, and distribute Livestock Informational Objects and their customers, as Members of the system of Livestock Informational Objects, can use to retrieve, maintain, and distribute the Livestock Informational Objects. The system's interconnectivity allows for the use of an Internet-based paradigm for the purchase and sale among Members of the system of Livestock Informational Objects as commodities, and for reducing the burden costs among Members of compliance with government regulations. | 2013-03-14 |
20130066920 | Relational Database Model Optimized for the Use and Maintenance of Watchlist Data in a High Demand Environment - A data structure embodied on a computer-readable medium in conformance with a database schema for accessing and managing data related to a plurality of watchlists in a relational database system in a high demand environment, wherein the database schema comprising a watchlist table, a watchlist entry table for storing high-level information, and a plurality of detail tables for storing detailed information associated with a watchlist. | 2013-03-14 |
20130066921 | ADAPTIVE ONTOLOGY - A computing system has a user interface allowing a user to view and input data related to concepts in a knowledge area associated with the user, an observation sub-system to centralize data and to identify a plurality of knowledge concepts, a conceptualization sub-system to generate a plurality of nodes within an ontological mapping, wherein each of the nodes corresponds to a certain one of the plurality of identified knowledge concepts identified by the observation sub-system, a relationship identification sub-system to create relationships between at least some of the plurality of identified knowledge concepts, and attribute affinity weights to the relationships, a change refinement sub-system to modify at least one of the plurality of nodes, affinity weights and relationships based upon information associated with the user, and a non-transitory knowledge store to store the information associated with the user pertaining to a sub-plurality of the plurality of identified knowledge concepts. | 2013-03-14 |
20130066922 | MANAGING DATA RECEIVED FROM MULTIPLE SOURCES FOR GENERATING A CONTACT PROFILE FOR SYNCHRONIZING WITH THE MULTIPLE SOURCES - Technology is disclosed for providing contact management services. Contact information (e.g., phone numbers, addresses, email addresses, etc.) are collected from multiple, different sources (e.g., a mobile phone, a web server, a social media web site, SMS, an App, etc.) Contact information can also be entered in a free-form format and parsed into structured data that is associated with a contact card. A contact card stores the contact information and the source of the information. Contact cards can be aggregated into a merged contact card that includes information from the multiple, different sources, without loosing the original information. The merged contact card can be disaggregated into its constituent contact cards and used to create other contact cards. A user can associate one or more of their contact cards with a group. The group is optionally notified when the users changes its contact information. | 2013-03-14 |
20130066923 | CONTROL SERVICE FOR RELATIONAL DATA MANAGEMENT - Aspects of a data environment, such as the creation, provisioning, and management of data stores and instances, are managed using a separate control environment. A user can call into an interface of the control environment, the call being analyzed to determine actions to be performed in the data environment. A monitoring component of the control plane also can periodically communicate with the data environment to determine any necessary actions to be performed, such as to recover from faults or events in the data environment. A workflow can be instantiated that includes tasks necessary to perform the action. For each task, state information can be passed to a component in the data environment operable to perform the task, until all tasks for an action are completed. Data in the data environment can be accessed directly using a separate interface of the data environment, without accessing the control plane. | 2013-03-14 |
20130066924 | METHOD AND APPARATUS FOR UTILIZING MATLAB FUNCTIONALITY IN JAVA-ENABLED ENVIRONMENT - A Java-MATLAB bridge is provided for enabling utilization of MATLAB® functionality in an enterprise environment. The Java-MATLAB bridge includes a Java® wrapper and a MATLAB wrapper. The MATLAB wrapper is coupled to the Java wrapper and the Java wrapper provides an entry point for invoking the MATLAB functionality in the enterprise environment. | 2013-03-14 |
20130066925 | ACCESSING DIFFERENT APPLICATION DATA VIA A COMMON DATA STRUCTURE - A common data type structure can be used to correlate access requests between applications that implement data in accordance with different types or type structures. In one implementation, a common data structure includes schemes for operations, sequences, records, and atoms (i.e., undefined). The system can then map any type structure to the schemes of the common data structure. In operation, a request for data by an application can involve identifying one or more proxies used by an application to map the data to the common data structure. The proxies map the data to the common data structure based on the shape of the data (to the extent it can be identified). The proxies then can return one or more data structures that comprise the identified mapping information. The application can then perform operations directly on the received data structures. | 2013-03-14 |
20130066926 | Accessible White Space in Graphical Representations of Information - Mechanisms are provided for representing white space in a graphical representation of a data model. These mechanisms involve analyzing output data that is to be output to a user via an output device, to identify white spaces in the output data. White spaces comprise portions of a range of metrics of output data values where the output data does not have data objects representing those portions of the range of metrics of output data. For each identified white space, a white space data object is created. The white space data objects are provided to an application which performs an operation on the white space data objects to output the white space data objects in a manner that identifies the white space data objects differently from non-white space data objects in the output data. | 2013-03-14 |
20130066927 | MANAGING OBJECT LIFETIME IN A CYCLIC GRAPH - The present invention extends to methods, systems, and computer program products for managing object lifetime in a cyclic graph. Embodiments of the invention include reclaiming allocated system resources, for example, from a graph of objects that mixes different resource reclamation techniques (such as reference counting and garbage collection). In response to determining that garbage collection is to be performed, references between GC objects and Ref. Counted objects are detected. A reference type (e.g., direct, indirect, standard, tracked, weakened, etc.) for any detected references is also determined. Garbage collection is performed to determine if any allocated system resources can be reclaimed. Garbage collection considers references and references types between GC objects and Ref. Counted objects when determining if objects are to be reclaimed. | 2013-03-14 |
20130066928 | CACHING SOCKET CONNECTIONS WHILE ENSURING THAT THERE ARE FILE DESCRIPTORS AVAILABLE FOR THE APPLICATIONS - A method, system and computer program product for caching socket connections while ensuring that there are file descriptors available for the applications. File descriptor references and their referenced objects are stored in a predefined memory region of the heap (“file descriptor heap”). Each time a socket connection is cached, a file descriptor reference may be created to be associated with the socket connection's file descriptor, where the file descriptor reference references the object of the cached socket connection. In order to ensure that there are available file descriptors for the applications, the file descriptor references and their referenced objects are collected by the garbage collector in response to various events (e.g., too many file descriptors are open) thereby freeing the file descriptors that were previously associated with the collected connection objects to be used by the applications. | 2013-03-14 |
20130066929 | VERSIONING IN INTERNET FILE SYSTEM - Techniques are provided for managing versions of files in a file system. According to one technique, new versions of directories are created in response to creation of new versions of files that descend from the directories, where the different versions of a versioned directory are associated with different points in time. Links are maintained between the files in the file system such that the versions of the files that descend from a particular version of a versioned directory reflect the point in time associated with the versioned directory. | 2013-03-14 |
20130066930 | METHOD FOR CREATING CLONE FILE, AND FILE SYSTEM ADOPTING THE SAME - In the prior art clone creating technique of a file, a management table of a snapshot and the file was created when creating the clone file, so that a considerable amount of creation time for creating the clone file and storage capacity was required. In order to solve the problems of the prior art, the present invention provides a system wherein if a request to create a clone of a file is received, a differential file is created while inhibiting update of the file, and update data is written to the differential file. Further, when a first update request is received to the differential file after creating the differential file, a management table is created. According to the invention, a large amount of clone files can be created speedily. | 2013-03-14 |
20130066931 | PEER-TO-PEER REDUNDANT FILE SERVER SYSTEM AND METHODS - Peer-to-peer redundant file server system and methods include clients that determine a target storage provider to contact for a particular storage transaction based on a pathname provided by the filesystem and a predetermined scheme such as a hash function applied to a portion of the pathname. Servers use the same scheme to determine where to store relevant file information so that the clients can locate the file information. The target storage provider may store the file itself and/or may store metadata that identifies one or more other storage providers where the file is stored. A file may be replicated in multiple storage providers, and the metadata may include a list of storage providers from which the clients can select (e.g., randomly) in order to access the file. | 2013-03-14 |
20130066932 | CONSTANT GEOMETRY SPLIT RADIX FFT - An apparatus for performing a Fast Fourier Transform (FFT) is provided. The apparatus comprises a reorder matrix, symmetrical butterflies, and a memory. The reorder matrix is configured to have a constant geometry, and the butterflies are coupled in parallel to the reorder matrix. The memory is also coupled to the reorder matrix and each butterfly. The reorder matrix, the butterflies, and the memory can then execute a split radix algorithm. | 2013-03-14 |
20130066933 | METHOD AND APPARATUS FOR DERIVING COMPOSITE TIE METRIC FOR EDGE BETWEEN NODES OF A TELECOMMUNICATION CALL GRAPH - A method for deriving a composite tie metric for an edge between nodes of a telecommunication call graph includes receiving descriptive data with original values for descriptive attributes associated with a telecommunication call graph formed by edges between nodes. Each edge relates to two nodes. Each original value relates to an edge and a descriptive attribute forming an edge-attribute pair for the corresponding original value. The descriptive data is stored in a local storage device. Scaling factors for each descriptive attribute are determined taking into account a distribution of the original values for the corresponding descriptive attribute and a common base for the descriptive attributes. Weighting factors are determined for each descriptive attribute. The composite tie metric is computed for an edge based on the original value, scaling factor, and weighting factor for the descriptive attributes. | 2013-03-14 |
20130066934 | SEMICONDUCTOR DEVICE - To variably change the filter characteristic of a decimation filter in accordance with a sampling rate. A decimation filter | 2013-03-14 |
20130066935 | METHOD AND SYSTEM OF MAPPING AT LEAST ONE WEB SERVICE TO AT LEAST ONE OSGI SERVICE AND EXPOSING AT LEAST ONE LOCAL SERVICE AS AT LEAST ONE WEB SERVICE - The present invention provides a method, system and computer program product for exposing at least one local service as at least one web service. In an exemplary embodiment, the method includes receiving a call for the at least one web service, where the call comprises a request and a response. The method also includes delegating the call to a client bundle. The method further includes obtaining the at least one local service from a service registry via the client bundle. The method also includes invoking at least one method on the at least one local service via the client bundle. The method further includes returning a response from the invoked method for the at least one web service. | 2013-03-14 |
20130066936 | Proximal Adaptive Collapsed Cloud Systems - A collapsed cloud proximal to the user of a client device determines, stores, and provides access to content needed by the user or group of users. Content needed by the user is pushed into one or more access points that a client device is accessing or is expected to access. The client device accesses the content via local access to the access point(s) that it connects to, access relevant content from the local storage of the access point that it connects to as it moves. | 2013-03-14 |
20130066937 | CONTENT DISTRIBUTION PLATFORM - A system is adapted to manage the distribution of content to one or more cooperating media/substrates. The system receives data representative of environment conditions for one or more cooperating media/substrates adapted to display digital content. The media/substrates may be located in public spaces. The system compares the received data representative of environment conditions with selection criteria to identify content for distribution to the media/substrates. The selected content is distributed to the one or more cooperating media/substrates. | 2013-03-14 |
20130066938 | PERFORMING COLLECTIVE OPERATIONS IN A DISTRIBUTED PROCESSING SYSTEM - Methods, apparatuses, and computer program products for performing collective operations on a hybrid distributed processing system that includes a plurality of compute nodes and a plurality of tasks, each task is assigned a unique rank, and each compute node is coupled for data communications by at least two different networking topologies. At least one of the two networking topologies is a tiered tree topology having a root task and at least two child tasks and the at least two child tasks are peers of one another in the same tier. Embodiments include for each task, sending at least a portion of data corresponding to the task to all child tasks of the task through the tree topology; and sending at least a portion of the data corresponding to the task to all peers of the task at the same tier in the tree topology through the second topology. | 2013-03-14 |
20130066939 | CLOUD SERVICE CONSUMING METHOD, CLOUD SERVICE PACKET, CLOUD SERVICE BROKER AND CLOUD SYSTEM - This disclosure discloses a cloud service consuming method, a cloud service message packet, a cloud serviced broker and a cloud system. Wherein, the cloud service consuming method comprises: a cloud service broker receives a cloud service consumer request sent by a cloud service requester (S202); the cloud service broker returns a cloud service consumer response to the cloud service requester (S204). Through this disclosure, the problems of wasted system resource and low system efficiency caused as the cloud service requester sends cloud service requests for many times are avoided, the utilization ratio of system resources is effectively improved, and the system efficiency is improved. | 2013-03-14 |
20130066940 | CLOUD SERVICE BROKER, CLOUD COMPUTING METHOD AND CLOUD SYSTEM - The disclosure discloses a cloud service broker, a cloud computing method and a cloud system. The cloud service broker comprises: a cloud service publishing interface module, configured to subscribe to information of cloud computing services and/or resources provided by a plurality of cloud service providers; a cloud service consuming interface module, configured to provide a consuming interface for a cloud service requester to access the cloud service provider; a cloud service processing module, configured to process a cloud service consumer request of the cloud service requester; and a cloud service adapting module, configured to adapt or call, according to cloud service consumer request, cloud computing services and/or resources provided by the cloud service provider. With the disclosure, the effect of facilitating cloud service requesters to use cloud services provided by different cloud service providers is achieved. Furthermore, system resources are saved and the system efficiency is improved. | 2013-03-14 |
20130066941 | CLUSTERED CLIENT FAILOVER - An application instance identifier is employed with various systems and methods in order to provide a requestor with continuous access to a resource when operating in a client clustered environment. A requestor residing on a first client in may attempt to access a resource. The first client sends a request to access the resource. The request may be associated with an application instance identifier that identifiers the requestor. At some point, the first client fails and the requestor is associated with a second client via a failover mechanism. The second client sends a second request to access the resource on behalf of the requestor. The second request is associated with the requestor's application instance identifier. The application instance identifier is used to identify the second request as belonging to the same requestor as the first request, thereby granting the second request to access the resource while avoiding a conflict situation. | 2013-03-14 |
20130066942 | Systems and Methods for Customizing Mobile Applications Based Upon User Associations with One or More Entities - Systems and methods for customizing mobile applications are provided. The systems and methods may include a computer program product, comprising a computer-usable medium having a computer-readable program code adapted to be executed to implement a method for customizing a mobile application, said method comprising: receiving or retrieving information representative of (i) a user, and (ii) an entity that the user is affiliated with; delivering the information representative of (i) the user, and (ii) the entity that the user is affiliated with; receiving customization information associated with one or both of the user or the entity; and presenting a user interface for the user, the user interface reflecting at least a portion of the customization information. | 2013-03-14 |
20130066943 | Application-Aware Quality Of Service In Network Applications - An approach is provided in which a number of requests are received from a variety of clients over a computer network. The system uses a processor to calculate request priority values pertaining to the received requests. The calculation of the request priority values is based on one or more attributes that correspond to the respective requests. For example, the attributes could include network level attributes, session attributes, and application specific attributes. Each of the requests is assigned a request priority value. A request may receive the same request priority value as other requests. The requests are queued in a memory based on the request priority values that were assigned to the requests. The queued requests are then serviced in order of request priority so that queued requests assigned higher request priority values are processed before queued requests with lower request priority values. | 2013-03-14 |
20130066944 | SOCIAL GATHERING OF DISTRIBUTED KNOWLEDGE - Management of a task made up of a list of activities is presented. A task includes an identification of a task creator and of a set of task activities retrieved by a computer system. A user likely to perform a portion of the set of activities is identified, wherein the portion includes one or more activities of the set of activities, and at least a portion of the set of activities is selectively delegated. The delegated portion of the set of activities is sent to the identified user. A set of responses related to the portion of the set of activities is received. Whether the task is complete is determined based on a policy for establishing that the set of responses meets a configured confidence level. Such set is reported to a task creator as responsive to determining completion of the set of responses. | 2013-03-14 |
20130066945 | Multi Tenant Access To Applications - A mechanism is provided for presenting a software application to a plurality of users in a cloud computing environment. For example, an application that was designed for use by a single user is provided in a cloud based platform without re-architecting the application. Using a web-based interface, multiple cloud users may launch and execute the application. The various instances of the application are provided to the cloud users as if the application were designed as a multi-user application. | 2013-03-14 |
20130066946 | SYSTEM AND METHOD FOR PROVIDING A DYNAMIC INVOCATION AND SERVICE INTERFACE FOR USE IN A MIDDLEWARE OR OTHER ENVIRONMENT - A system and method for providing a dynamic invocation and service interface for use in a middleware or other environment. At the service-side, messages can be inserted into an inbound processing chain. After service-side inbound processing, messages are given to the user via a provider request function. The user gives a response by using a provider response function that inserts messages into a service-side outbound processing chain. After service-side outbound processing, messages are given to the user's service response transport. On the client side, the user can insert messages into the outbound processing chain using a dispatcher request. After client-side outbound processing, messages are given to the user's client request transport. This decouples message processing from the transport and makes the message processing asynchronous in nature. When the response is received, a user uses a client response transport function to insert the response into the client-side inbound processing chain. | 2013-03-14 |
20130066947 | System and Method for Managing Applications for Multiple Computing Endpoints and Multiple Endpoint Types - A multi-endpoint application server is provided that allows administrators to create and update content and data for endpoint applications using content management capabilities that allows the administrators to control how the endpoint application should be presented and how it should behave for various end-point types. A runtime application can be provided to each endpoint, which is configured to obtain content that is managed and maintained from the server in the same way as a normal web browser-based application would. To enable such multiple endpoint types to experience the same or similar endpoint application experience, the multi-endpoint application server accepts requests from the runtime application and determines what kind of endpoint is making the request such that it can present the content to the runtime application in a manner that is deemed appropriate for the endpoint type. | 2013-03-14 |
20130066948 | IDEMPOTENCE FOR DATABASE TRANSACTIONS - A method, machine, and computer-readable medium is provided for managing transactional sets of commands sent from a client to a server for execution. A first server reports logical identifiers that identify transactional sets of commands to a client. The first server commits information about a set of commands to indicate that the set has committed. A second server receives, from the client, a request that identifies the set based on the logical identifier that the client had received. The second server determines whether the request identified the latest set received for execution in a corresponding session and whether any transactions in the set have not committed. If any transaction has not committed, the second server enforces uncommitted state of the identified set by blocking completion of the identified set issued in the first session. The identified set may then be executed in the second session without risk of duplication. | 2013-03-14 |
20130066949 | IDEMPOTENCE FOR DATABASE TRANSACTIONS - A method, machine, and computer-readable medium is provided for managing transactional sets of commands sent from a client to a server for execution. A first server reports logical identifiers that identify transactional sets of commands to a client. The first server commits information about a set of commands to indicate that the set has committed. A second server receives, from the client, a request that identifies the set based on the logical identifier that the client had received. The second server determines whether the request identified the latest set received for execution in a corresponding session and whether any transactions in the set have not committed. If any transaction has not committed, the second server enforces uncommitted state of the identified set by blocking completion of the identified set issued in the first session. The identified set may then be executed in the second session without risk of duplication. | 2013-03-14 |
20130066950 | Service Development Platform, System and Method Thereof - The present invention discloses a service development platform, system and method, wherein a service development platform processes a service request of a user equipment (UE), and the method includes: the UE dialing service access codes and initiating the service request; the service development platform establishing a media channel with the UE; the service development platform loading a WEB page on a WEB browser according to the service request of the UE; the service development platform capturing data of the WEB page on the WEB browser and sending the data after encapsulation to the UE through the media channel; and the service development platform receiving key information of the UE through the media channel, and sending the key information of the UE to the WEB browser in manner of a windows message, so as to realize an operation on the WEB page. | 2013-03-14 |
20130066951 | COMMUNICATION SYSTEM AND METHOD FOR MANAGING DATA TRANSFER THROUGH A COMMUNICATION NETWORK - A communication system is presented for managing data transfer via a communication network. The communication system comprises a server system connected to a plurality of client systems via a first management network of said communication network. Such first management network may for example be operable as multi-hops network. The server system is configured and operable to be responsive to data pieces from the client systems via said first management network, to selectively switch between first and second modes of operation. In the first operational mode, the server system manages and executes data transfer to and from the client systems through the first management network. In the second operational mode, the server system operates to manage direct data transfer between the client systems via a second data network of said communication network connecting the client systems between them. The second data network may for example be operable as ad-hoc circuits. | 2013-03-14 |
20130066952 | PRESERVING SERVER-CLIENT SESSION CONTEXT - Methods, devices, and storage media are provided for preserving the context of a server-client session. A server generates an initial context and a context for each user command executed in a first session and sends context to a client with the return for each command. The context describes software, session state, returned data, and/or hardware characteristics of a server-side environment for the first session. The client receives and stores the context with each user command. Upon determining that the database session should be rebuilt in the second session, the client sends initial context. A server for the second session receives the initial context and determines whether commands should be replayed in the second session. If commands are replayed, the server validates that server environment and client-visible results for each command in the second session match that from execution in the first session using the context for that command. | 2013-03-14 |
20130066953 | MULTIPLE CUSTOMER AND MULTIPLE LOCATION PC SERVICE PROVIDER SYSTEM - The present invention contemplates a system whereby a service provider can service a large number of customers (millions) and connect them to their rented PC from millions of locations around the world. Many customers (10 to 100 thousand) can be connected simultaneously. The service provider is responsible for maintaining the latest PC Hardware and Software configurations available on the market instead of the customer. The rented PC operates in essentially the same manner as if one purchased and maintained their PC at home or office. Access to the individuals rented PC can be obtained from any existing PC, office network computer, a Web TV computer or other customer interface computer which has been authorized by the service provider. The current invention will greatly improve existing Client/Server systems being used to service large global offices. However, the greatest improvement is to make the PC much more convenient and easier for the individual to use in the future and shift the PC hardware and software update burden to the service provider. | 2013-03-14 |
20130066954 | COMPUTER SOFTWARE ANALYSIS SYSTEM, CLIENT COMPUTER, METHOD OF CONTROLLING OPERATION OF SAME AND OPERATION PROGRAM THEREFOR - The security of source code is maintained when computer software is analyzed. To achieve this, computer software to undergo analysis is obfuscated in a client computer. The obfuscated computer software is transmitted to a server computer. Software analysis is performed in the server computer and data representing the result of this analysis is transmitted to the client computer. Since the data representing the result of analysis has thus been obfuscated, the contents of the computer software cannot be ascertained in the server computer. The obfuscated data representing the result of analysis is restored to the original in the client computer. | 2013-03-14 |
20130066955 | MASKING DATABASE OUTAGES FROM CLIENTS AND APPLICATIONS - Methods, devices, and computer-readable media are provided for restoring state that was built up on a first session between a first server instance and a client to a second session between a second server instance and the client. Non-transactional session state that existed for the first session is preserved by repeating non-transactional commands in the second session. Transactions are executed in the second session when the transactions did not complete in the first session. The first server instance sends, to the client in the first session, information to maintain for a possible replay of commands that were sent in a request to the first server instance for execution in the first session. If the first session becomes unavailable, the maintained information may be used by the second server instance to restore the database session, masking the outage from users, applications, and clients. | 2013-03-14 |
20130066956 | COMPUTER-READABLE RECORDING MEDIUM, INFORMATION MANAGEMENT METHOD AND INFORMATION MANAGEMENT DEVICE - An information management device includes: a receiving unit that receives a request of information from an information process unit having a CGI; an information collection unit that collects the information corresponding to the request; and a process unit that requests the information collection unit to collect the information corresponding to the request in response to the request of information, and during a time period shorter than a timeout period of the CGI, generates progress information indicating progress of collection of the information and corrected information, and causes a display unit to display the progress information. | 2013-03-14 |
20130066957 | Content Aggregation Service for Mobile Environment - A server device configured to provide a content aggregation service. The server device comprises a first transceiver unit configured to communicate with a terminal, a second transceiver unit configured to communicate with content network sources, a memory for storing a resource list of addresses of the content network sources, and a content aggregation processor operably connected with the first and second transceiver and the memory, and configured to fetch content from the addresses of the content network sources as well as to aggregate the fetched content into a notification message to the terminal. | 2013-03-14 |
20130066958 | MANAGING ACCESS TO DIGITAL CONTENT SOURCES - Access to content may be enabled by receiving an instruction indicating a client request to access content, accessing a list of content sources capable of rendering the content for which access is requested by the client, determining a performance metric for at least two of the content sources, and selecting among the content sources based on the performance metric to identify a content source to be accessed by the client. | 2013-03-14 |
20130066959 | URL RESCUE BY CORRECTION OF ENCODING ERRORS - A server system provides responsive content to a user when a request for an invalid URL is received. The server system may implement multiple rescue strategies for attempting to rescue the invalid URL. One such rescue strategy involves repairing the URL by correcting for encoding errors. Another rescue strategy involves determining that the URL contains an obsolete or outdated item identifier (e.g., product identifier) that renders the URL invalid, and returning information regarding one or more related items to the user. Another rescue strategy involves mining the invalid URL for one or more text strings reflective of the type of content desired, and then using the one or more text strings to execute a keyword search to identify content to provide to the user. The various rescue strategies may be attempted in sequence according to a hierarchy. | 2013-03-14 |
20130066960 | Apparatus and Mechanism for Dynamic Assignment of Survivability Services to Mobile Devices - A system, a method and a device are each configured for dynamic assignment of survivability services to communication devices (such as, e.g. tablets, smart phones, mobile phones, laptops or other types of mobile communication devices) based on the device's current location and network context. Survivability services provide session and service continuity in case a centralized or cloud based session management service that may be hosted by one or more remote computer devices, such as for example servers, is not reachable due to network failure or service failure. | 2013-03-14 |
20130066961 | AUTOMATED CROWDSOURCING TASK GENERATION - An embodiment of the invention automatically generates for a crowdsourcing procedure to achieve a goal. A first template pertaining to the prespecified goal is constructed, and provides a specified context and set of rules, and is associated with one or more data repositories. The first template is used to generate first level tasks, wherein a given first level task is completed by selecting a single object from a repository of objects, and then performing an operation requiring information from the single object. The first template is used further to generate second level tasks, a given second level task being completed by selecting a plurality of objects from the same or from different repositories, and then performing a single operation requiring information supplied by respective objects. The given second level task is submitted to the crowdsourcing procedure for execution. | 2013-03-14 |
20130066962 | METHOD AND APPARATUS FOR SOCIAL NETWORK - A system that creates an online social network platform that models a person's real life. This social network may reproduce the way users communicate and share information in their real “offline” life. Just as users create offline social circles of people they know, with each circle having varying limited knowledge of a person's personal information, the system allows users to create personal social circles online. Additionally, just as users most often belong to real life public circles through association as in work, school or residency, the system will foster and maintain such communication online. | 2013-03-14 |
20130066963 | Dynamically Created Shared Spaces - In one embodiment, a social networking system automatically create a shared space for posting requests to the social networking system from multiple users based on social, spatial and temporal proximity, and create a news feed corresponding to the shared space. | 2013-03-14 |
20130066964 | Composited Posting Interface for Social Networking System - In one embodiment, in response to a user's request to upload a photo to a social networking system, a client process accesses information in the user's current location and friends who may be with the user, present the information to the user in a composited posting user interface. After the user confirms a particular current location and a first and second friends who are currently with the user, the client process tags the particular current location and the first and second friends to the photo, and submit to the social networking system a primary posting request in photo upload, and a secondary posting request to check in the user, the first friend and the second friend to the particular current location. | 2013-03-14 |
20130066965 | SYSTEMS AND METHODS FOR OPTIMIZATION OF SUBSCRIPTIONS TO RESOURCE CHANGES IN MACHINE-TO-MACHINE (M2M) SYSTEMS - Systems and methods provide for bundling subscriptions associated with a Machine-to-Machine (M2M) device or M2M application into a single hypertext transport protocol (HTTP) session. A method includes subscribing, by a gateway (GW), to an M2M device on behalf of a plurality of subscribers using a single Hypertext Transport Protocol (HTTP) session. | 2013-03-14 |
20130066966 | METHODS AND APPARATUS FOR PEER DISCOVERY INTERFERENCE MANAGEMENT IN A WIRELESS WIDE AREA NETWORK - A method of operating a wireless device is provided in which the wireless device determines to use one grouping of peer discovery resources of a plurality of groupings of peer discovery resources based on one of a path loss or a distance to a base station. The plurality of groupings include a first grouping of resources having a first plurality of identical subsets of resources and a second grouping of resources having a second plurality of identical subsets of resources. Each of the first plurality of identical subsets of resources extends over at least one of a different time period or a different number of subcarriers than each of the second plurality of identical subsets of resources. The wireless device transmits a peer discovery signal on one subset of the identical subsets of said one grouping of peer discovery resources. | 2013-03-14 |
20130066967 | SYSTEM AND METHOD FOR DISCOVERING AND INTERACTING WITH COMMON CONNECTIONS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for facilitating sharing and accessing social networking information between two users. A user can establish a profile for sharing with others, which contains pre-authorization to access and share certain social network information. The profile can be linked by a machine-readable code, such as a QR code, that encodes a network address, such as a URL, to the profile containing access to the pre-authorized social networking information. The user shares information quickly with another user by sharing the QR code. Another user scans the QR code with a smartphone or other camera enabled device, which navigates to the profile. After the other user logs into social networks on the device, the profile scans and/or compares both users' social networking profiles for commonalities, such as shared interests and connections. Then, the users can quickly determine common connections almost immediately. | 2013-03-14 |
20130066968 | Extendable information management mechanism for collaborative online assessment, problem solving, and related activities - Online, computer-based systems and mechanisms that facilitate social (and/or community) and content networks are known. Existing online social media and/or social network mechanisms, however, are not generally designed, and/or maximizing their strengths, to solve humanity's problems, such as care and management of Earth's natural resources and human behaviors, in areas such as economics, health, and politics. The embodiment of the inventive concept generally relates to a system and method for managing online information and flow of such information among and between stakeholders (individuals and groups) and other content sources, in a computer-based environment. A goal of the embodiment of the inventive concept is to direct, create, and/or facilitate use of a knowledge sharing and collaborative platform, in the form of a website, websites, and/or online mechanisms, for individual and collective engagement in concerted and participatory assessment, problem solving, and related activities and processes. | 2013-03-14 |
20130066969 | PEER-TO-PEER LIVE STREAMING - According to a peer-to-peer protocol, a peer-to-peer network includes multiple clubs and multiple peers that receive content distributed by a source of the network. Each of the plurality of peers is part of at least two of the clubs. As content is generated, the source divides the content into multiple data blocks and assigns each data block to a club. Each data block is transmitted to peers that belong to the club assigned to the data block. When a peer in a club receives a data block assigned to that club, the peer distributes the data block to other peers in the club. Additionally, the peer transmits the data block to peers in other clubs. Also, the peer receives data blocks assigned to other clubs from peers that are not members of the club. | 2013-03-14 |
20130066970 | SYSTEM AND METHOD FOR CONFIRMING AUTHORSHIP OF DOCUMENTS - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for confirming authorship of documents is presented. A first document hosted on a first website of a first domain is accessed, the first document being linked to a second document through at least one link, and a respective link including a first predefined authorship attribute asserting authorship of a respective document including the respective link by a respective entity associated with a respective target document of the respective link. Authorship of the first document by an entity associated with the second document is conditionally confirmed when the second document includes a second link to the first website of the first domain, the second link including a second predefined authorship attribute indicating that the entity associated with the second document is an author of or contributor to content at the first website of the first domain. | 2013-03-14 |
20130066971 | SYSTEM AND METHOD FOR CONFIRMING AUTHORSHIP OF DOCUMENTS - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for confirming authorship of documents is presented. A document hosted on a website of a domain is accessed, where the document includes an authorship identifier asserting authorship of the document by an entity. Authorship of the document by the entity is conditionally confirmed when a profile for the entity is associated with the authorship identifier and when the profile for the entity indicates that the entity has confirmed that the authorship identifier is included in documents authored by the entity that are hosted on the first website of the first domain. Responsive to confirming authorship of the document by the entity, application of a confirmed authorship process to the document is permitted. Responsive to failing to confirm authorship of the document by the entity, application of the confirmed authorship process to the document is barred. | 2013-03-14 |