34th week of 2009 patent applcation highlights part 54 |
Patent application number | Title | Published |
20090210406 | METHOD AND SYSTEM FOR CLUSTERING IDENTIFIED FORMS - A method is provided for organizing a plurality of documents that include forms. An initial set of clusters is defined for the plurality of documents. The initial set of clusters is reclustered based on similarity values calculated in multiple feature spaces. For example, a first feature space may be associated with a content of a document while a second feature space may be associated with a content of a form associated with the document. Each cluster has an associated centroid vector in each feature space that is used to represent the cluster. The similarity between the document and each cluster is calculated in both feature spaces. Each document is assigned to the cluster whose centroid is most similar. The cluster centroids may be recalculated and the process repeated until the cluster assignments become stable. | 2009-08-20 |
20090210407 | METHOD AND SYSTEM FOR ADAPTIVE DISCOVERY OF CONTENT ON A NETWORK - A method is provided for identifying documents that include a searchable form relevant to a topic. A document is received. If the received document comprises a form is determined. A form includes a field presented to a user requesting information from the user. If the received document is determined to comprise a form, a determination is made concerning whether or not the form is a searchable form. A searchable form returns non-trivial information to a requester in response to a submission of the form. If the form is determined to be a searchable form, a determination is made concerning whether or not the form is relevant to an identified topic. If the form is determined to be relevant to the identified topic, the document is identified as a searchable form relevant to the identified topic. | 2009-08-20 |
20090210408 | METHOD AND SYSTEM FOR ROLE BASED SITUATION AWARE SOFTWARE - A method for role based situation aware software includes: mapping one or more users to one or more communities of practice (CoP); aggregating a series of tags from the one or more CoP to form an initial set of role-based tags; filtering the initial set of role-based tags based on user context elements to form context sensitive user-role tags; querying one or more information services based on the context sensitive user-role tags; aggregating information obtained from querying the one or more information services; and providing the aggregated information to the user as dynamic context related content. | 2009-08-20 |
20090210409 | INCREASING ONLINE SEARCH ENGINE RANKINGS USING CLICK THROUGH DATA - A method for providing keywords for a web page so as to increase online search engine rankings of the web page is provided. The method includes detecting click-throughs to the web page from a link in a search result list of an online search engine. The method further includes collecting data for each click-through, including: a) at least one keyword entered into an online search engine by a user to produce the search result list from which the click-through originated and b) a position value. The method further includes assigning a score to each keyword based on a number of words in the keyword and position values associated with each keyword. The method further includes providing keywords with a score that meets a predefined threshold as a suggestion for improving search engine rankings of the web page. | 2009-08-20 |
20090210410 | STORAGE METHOD AND SEARCH METHOD FOR MARK EVENT ON TWO-DIMENSIONAL SPACE - A storage method and a search method for mark events on two-dimensional space are provided. First, an event and a corresponding coordinate thereof are retrieved. Next, calculation on the coordinate of the event is performed to generate an index representing a bucket position in a storage device. Next, whether or not there is any existing search tree stored in the bucket position is judged, and then the event is inserted into a linked list of a node of the search tree stored in the bucket position according to a judgment result. Besides, when a range on the two-dimensional space is designated, corresponding nodes in the search tree are rapidly accessed according to the index obtained by a hash function, and further by application of pointers pointing to the bucket position having the search tree stored therein and by real-time return of search result, the search speed is high. | 2009-08-20 |
20090210411 | Information Retrieving System - A user speech analyzing component poses, to a user, question sentences for respective ones of a plurality of attributes, and analyzes an attribute value for each of the attributes from an answer sentence from the user to the sentence question. A user data holding component, as a result of analysis, holds user data that allows the plurality of attributes, and respective user attribute values for the attributes to correspond to one another. A matching component, when an acquisition ratio of the attribute values from the user with respect to all of the attributes is a predetermined value or greater, selects at least one target data candidate that matches each of the attributes and each of the attribute values of the user data, from a plurality of target data. A dialogue control component outputs each of the target data candidates selected, to the user's side. | 2009-08-20 |
20090210412 | Method for searching and indexing data and a system for implementing same - A system and method for processing a plurality of data to identify and search words contained with the plurality of data, wherein prior knowledge of the data format is unknown, is provided. The method includes identifying words within the data, wherein indentifying includes, processing the data to identify words, prior to searching. The method also includes storing the words in a predetermined manner and searching the words, wherein searching includes searching the words responsive to at least one search term to identify match results and processing the match results to at least one of save the match results to a file and display the match results. | 2009-08-20 |
20090210413 | K-NEAREST NEIGHBOR SEARCH METHOD, K-NEAREST NEIGHBOR SEARCH PROGRAM, AND K-NEAREST NEIGHBOR SEARCH DEVICE - Provided is a k-nearest neighbor search method of searching for a query number k of nearest points to an arbitrary point in a DBMS for creating a spatial index from multidimensional points, comprising setting a search conditions, judging which of a lowest branch and an intermediate branch of the spatial index a nearest region to the query point is, calculating, when the nearest region is judged to be the lowest branch, a distance between the query point and a child region of the nearest region, storing information of a divided region which has become a calculation target, calculating, when the nearest region is judged to be the intermediate region, a distance between the query point and a point included in the nearest region, storing information of the point which has become a calculation target, finishing search processing when the search conditions are satisfied, and obtaining a search result from the DBMS. | 2009-08-20 |
20090210414 | Bit string searching apparatus, searching method, and program - Bit string searching apparatus using a coupled node tree with a root node and a node pair stored in adjacent areas that is formed by a branch node and a leaf node, branch nodes, or leaf nodes; the branch node including a discrimination bit position in the search key and information indicating a position of a primary node that is one node of a node pair; the leaf node including an index key formed by a bit string; from the root node of an arbitrary subtree of the coupled node tree, linking is repeated based on the search key's bit value at the discrimination bit position and information indicating a position of a primary node until a leaf node is reached; an index key stored in the leaf node is obtained as a search result key of the subtree by means of the search key. | 2009-08-20 |
20090210415 | MEDIASET GENERATION SYSTEM - Disclosed are various embodiments of systems and methods for generating composite mediasets from mediasets, each comprising media items, associated with a plurality of users. In some embodiments, individual and/or group recommendations are provided for creating a group playlist by aggregating user taste data for a plurality of users in a group. In other embodiments, systems and methods are provided which allow for sharing and playing of a group playlist by users in a group, each of which has a media playback device. Each media item, such as a song, is played from one of the individual user devices for the benefit of all users in the vicinity at the time. Music thus can be “shared” without transferring files potentially in violation of copyrights. | 2009-08-20 |
20090210416 | SEARCH ENGINE USING WORLD MAP WITH WHOIS DATABASE SEARCH RESTRICTIONS - A search operation can provide geographically restricted and verified information to a user. A two-step approach is used to perform these searches. The first step is to obtain high relevance search results by searching only in a specific region defined for a search operation. The second step further improves the quality of the search results by performing contact address correlation. If the search server finds a reliable reference address in the search results, then these search results can be presented to the user, whereby search results that are not correlating well with legitimate and registered addresses for the site are removed from the search result lists. Therefore, the region-restricted search does searching in a selected geographical region and only presents legitimate web pages or search results to a user. Thus, the region-restricted search operation improve quality and may minimize search time and reduce a huge volume of non-valued Internet traffic, which is likely to impair the overall performance and experience on the Internet. | 2009-08-20 |
20090210417 | SEARCH ENGINE FEEDBACK FOR DEVELOPING RELIABLE WHOIS DATABASE REFERENCE FOR RESTRICTED SEARCH OPERATION - A system and method monitors and weeds out illegitimate/illegal websites during search engine indexing and domain name registration. The whois database generated during domain name registration is used as a reference database for correlation with a database generated by the search crawler on a search engine server. A whois analyzer from the search engine server extracts a set of URLs into a database called the uncorrelated URL database. The uncorrelated URL database contains those URLs from both the aggregate whois database and reverse index database after removing common URLs. The uncorrelated URLs are contacted and advised by the whois administrator to take necessary action to be listed in the whois database and properly be indexed during search engine crawling. This process ensures that every URL is properly registered and identified on the Internet thus eliminating the success of illegal/unwanted websites. | 2009-08-20 |
20090210418 | TRANSFORMATION-BASED FRAMEWORK FOR RECORD MATCHING - A transformation-based record matching technique. The technique provides a flexible way to account for synonyms and more general forms of string equivalences when performing record matching by taking as explicit input user-defined transformation rules (such as, for example, the fact that “Robert” and “Bob” that are synonymous). The input string and user-defined transformation rules are used to generate a larger set of strings which are used when performing record matching. Both the input string and data elements in a database can be transformed using the user-defined transformation rules in order to generate a larger set of potential record matches. These potential record matches can then be subjected to a threshold test in order to determine one or more best matches. Additionally, signature-based similarity functions are used to improve the computational efficiency of the technique. | 2009-08-20 |
20090210419 | METHOD AND SYSTEM USING MACHINE LEARNING TO AUTOMATICALLY DISCOVER HOME PAGES ON THE INTERNET - A method for automatically determining an Internet home page corresponding to a named entity identified by a specified descriptor including building a trained machine-learning model, generating candidate matches from the specified descriptor, wherein each candidate match includes an Internet address, extracting content-based features from websites associated with the Internet addresses of the candidate matches, determining a model score for each candidate match based on the content-based features using the trained machine-learning model, and determining a match from among the candidate matches according to the scores, wherein the match is returned as the Internet home page corresponding to the named entity. | 2009-08-20 |
20090210420 | Methods, systems and computer applications for real time data processing - Methods, systems and software applications are provided for real time data processing. In one implementation, a method is provided for locking data objects in a computer system. The method may comprise requesting, with a first processing module, a lock service module to lock one or more (n) data objects for access for further data processing modules by creating one or more lock objects for the one or more data objects. The method may also include performing the following steps with the lock service module: receiving names of one or more (m) key fields of the one or more data objects to be locked, receiving n values for each of the m key fields of n data objects to locked, receiving a maximum number (k) of locks to lock the n data objects, and checking whether n<=k and, in case yes, creating one or more lock-objects comprising the m names and n values for the m key fields and, in case no, querying the n values of the m key fields and determining numbers (y1 to ym) of different values (Val_1.1 to Val_m.ym) of the key fields 1 to m. Further, the method may include determining consecutively from a first to i-th field where i<=m until y1* . . . *yi>=k and, in case the condition is satisfied, creating one or more lock objects comprising the names of the key fields 1 to m and values Val_1.1 to Val_(i−1).y(i−1) for the key fields 1 to i−1 and comprising wildcards for the remaining key fields. | 2009-08-20 |
20090210421 | ACCESS CONTROL DECISION METHOD AND SYSTEM - An access control method and system. The method includes enabling, by a computing system for a requester, access to the computing system. The computing system comprises group based access control data and computing resource data organized based on an XML schema that comprises a recursive format used to support a plurality of branch levels in a resource tree. The computing system associates first group data of the group based access control data with the requester. The computing system receives a request from the requester to access the computing resource data. The computing system determines an access control decision associated with the request to access the computing resource data. The computing system presents the access control decision to the requester. | 2009-08-20 |
20090210422 | Secure Database Access - Secure database access may be provided. First, a first schema associated with a database having a second schema may be defined. Next, a user type may be defined. The user type may comprise a user type that does not require a log-in. The defined user type may then be associated with the defined first schema. Next, at least one permission may be granted to the user type to the database on a database level. The at least one permission may comprise a create procedure permission, a create table permission, or a create function permission. Then permission to the second schema may be denied to the user type. Next, a procedure may be received comprising a procedure that poses a high security risk to the database. The received procedure may then be executed as the defined user type. The received procedure may be executed using a wrapper procedure. | 2009-08-20 |
20090210423 | METHODS AND SYSTEMS FOR MAINTAINING PERSONAL DATA TRUSTS - Methods and systems are provided that may be used to maintain personal data trusts in a computing environment. An exemplary system may include a repository adapted to store personal data, an identification agent adapted to identify at least one computing resource that may have personal data, a collection agent adapted to selectively retrieve the personal data and provide it to the repository for storage therein, and a disposition agent adapted to selectively control access to the collected and stored personal data. | 2009-08-20 |
20090210424 | AUTHENTICATION APPARATUS AND AUTHENTICATION METHOD - According to one embodiment, an authentication apparatus comprises a storage module configured to store permission information unique to a type of an apparatus which is permitted to access a database, a reception module configured to receive a data-acquisition request from a terminal apparatus, a check module configured to check unique information to a type of the terminal apparatus contained in the data-acquisition request with the permission information stored in the storage module, an access permitting module configured to permit the terminal apparatus to access the database when the unique information coincides with the permission information as a result of check performed by the check module. | 2009-08-20 |
20090210425 | Method for sending dynamic content and dynamic content delivery server - A method for sending dynamic content and a dynamic content transmission server are disclosed. The method for sending dynamic content includes: storing an original dynamic content subscribed to by a user; creating and storing a corresponding relationship between the user and the subscribed original dynamic content; and obtaining the corresponding original dynamic content according to the corresponding relationship, and performing personalized processing on the original dynamic content, and sending the processed dynamic content to the user. This method can implement sending of personalized subscribed dynamic content. | 2009-08-20 |
20090210426 | SYSTEM AND METHOD FOR EFFICIENT MANAGEMENT OF DISTRIBUTED SPATIAL DATA - A system and method of providing efficient management of distributed, diversified, large sized spatial data as a scalable solution. | 2009-08-20 |
20090210427 | Secure Business Continuity and Disaster Recovery Platform for Multiple Protected Systems - A data processing system, comprising a plurality of customer premises equipment (CPE) servers located at a plurality of different active sites, each of the CPE servers comprising a local storage unit, wherein each of the CPE servers is configured to collect one or more copies of one or more servers, applications or data of the active site at which that CPE server is located and to store the copies in the local storage unit of that CPE server; a data storage and compute unit that is coupled to the CPE servers through a network, wherein the data storage unit is configured to receive transmissions of the copies, to verify the copies, and to store the copies in online accessible secure storage that is segregated by business entity; logic stored in a computer-readable storage medium and coupled to the data storage unit and to the CPE servers through the network, wherein the logic is operable to receive a request from a particular active site to restore one or more data elements contained in the secure storage of the data storage unit associated with the particular active site, to inflate the one or more data elements, and to provide the particular active site with online access to the one or more data elements that are inflated. | 2009-08-20 |
20090210428 | System and method for writing data dependent upon multiple reads in a distributed database database - An improved system and method for writing data dependent upon multiple reads in a distributed database is provided. A client may read several data records and may then send a request to a database server to perform a transaction to write a data record dependent upon multiple data records read. A database server may receive the request specifying a transaction to write a data record dependent upon multiple data records read and may perform the transaction by latching a master data record to be written and validating the data records the write depends upon. The multiple data records upon which the write depends may be validated by verifying the multiple data records are current versions of the data records stored in the distributed database. Data intensive applications may use this transaction type in large scale distributed database systems to provide stronger consistency without significantly degrading performance and scalability. | 2009-08-20 |
20090210429 | System and method for asynchronous update of indexes in a distributed database - An improved system and method for asynchronous update of indexes in a distributed database is provided. A database server may receive the request to update the data and may update the data in a primary data table of the distributed database. An asynchronous index update of the indexes may be initiated at the time a record is updated in a data table and then control may be returned to a client to perform another data update. An activity cache may be provided for caching the records updated by a client so that when the client requests a subsequent read, the updated records may be available in the activity cache to support the various guarantees for reading the data. Advantageously, the asynchronous index update scheme may provide increased performance and more scalability while efficiently maintaining indexes over database tables in a large scale, replicated, distributed database. | 2009-08-20 |
20090210430 | Creating pivot tables from tabular data - System and method of simultaneously creating and managing a plurality of OLAP cubes in real time, each from a different tabular data source, comprising, for each cube, defining the table columns as either dimensions or measures of the cube using at least one of predefined semantics and data formats, generating the cube using said defined dimensions and measures, updating the cube when the respective data source is modified and deleting the cube according to predefined criteria. | 2009-08-20 |
20090210431 | Load Sharing Cluster File Systems - Load sharing clusters in which each node is responsible for one or more non-overlapping subset(s) of the cluster namespace and will process only those requests that access file or directory objects in the partitioned namespace that the node controls while redirecting requests designated for other nodes. A non-overlapping subset may be migrated from a source node to a destination node, for example, for load sharing or hotspot mitigation. Migration typically includes maintaining a file virtualization link from the destination node to the source node to permit forwarding of requests by the destination node to the source node during migration of metadata and then migration of data from the source node. After migration is complete, the file virtualization link is broken and the destination node services requests for the non-overlapping subset from the migrated metadata and data. | 2009-08-20 |
20090210432 | DATA MANAGEMENT SYSTEM, METHOD, AND SOFTWARE - A data management system and method for updating and aligning a plurality of management components, wherein the data management system is accessible to various users from a remote location, is disclosed. The data management system includes a user system having a web browser, a database including a plurality of management components for storing information related to a client group, and a server system in communication with the user system and the database, wherein the server system includes a change management component adapted to manage information stored on the database and dynamically update each of the management components when information stored on the database is modified. | 2009-08-20 |
20090210433 | Parallelizing Data Manipulation by Data Set Abstraction - A first request to access a first set of items is received, wherein each item is associated with one or more properties. A second request to access a second set of items is also received. A determination is made as to whether items from the first set are in the second set of items, and the sets are divided into one or more subsets based on the determining. Each of the one or more subsets is assigned to a respective thread, and the respective thread of the subset that does not contain items in the second request is processed. This way, individual subsets (i.e. data partitions) can be processed by multiple threads in parallel without having to synchronize them. | 2009-08-20 |
20090210434 | STORAGE AND RETRIEVAL OF VARIABLE DATA - Methods and apparatus, including computer program products, implementing and using techniques for managing data items. A data store includes at least two copies of each data item. Each copy of a data item is used for a unique set of operations performed on the data item. An application programming interface receives a request from a consumer to perform an operation on a data item in the data store. The application programming interface selects, based on the received request, which copy of the data item is to be used when performing the operation. | 2009-08-20 |
20090210435 | CONFIGURATION ITEM MANAGEMENT TOOL - A computer system is presented for managing a plurality of configuration items. A first computer may be connected to a second computer over a network. The first computer may manage configuration items conforming to a first specification, while the second computer may manage configuration items conforming to a second specification. A repository may store, for each of the configuration items, a set of data conforming to the first specification. The set of data may include one or more predetermined attributes of each configuration item, and at least one relationship between each configuration item and other configuration items. A discovery section may detect external reference data associated with configuration items conforming to the second specification. The set of data for each configuration item conforming to the second specification may be created from the external reference data and stored in the repository. | 2009-08-20 |
20090210436 | ENCODING A HIERARCHICAL MULTI-LAYER DATA PACKAGE - A hierarchical encoder is operable to create a hierarchical multi-layer data package. The hierarchical multi-layer data package includes a plurality of layers and one or more subpackages in each layer. The layers include one or more subpackages. A subpackage in an outer layer is related to a subpackage in an inner layer. Also, each subpackage includes meta data describing the encoding, a summary of a subset of data in the hierarchical multi-layer data and a link or ID of the subset of data in a compressed form. | 2009-08-20 |
20090210437 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SAVING AND RESTORING A COMPRESSION/DECOMPRESSION STATE - A system, method, and computer program product are provided for saving and restoring a compression-decompression state. In operation, data is processed, the processing including compressing or decompressing the data. Additionally, a state of the processing is saved. Further, the state of the processing is restored. | 2009-08-20 |
20090210438 | APPARATUS AND METHOD FOR POSITIONING USER-CREATED DATA IN OLAP DATA SOURCES - A computer readable storage medium comprises executable instructions to receive user-created data for user-specified positions in an OLAP hierarchy. The OLAP hierarchy is reorganized according to the user-created data. Data manipulation statements are generated to evaluate a set of members of the OLAP hierarchy according to the user-specified positions. | 2009-08-20 |
20090210439 | METHOD FOR EFFICIENT DATA TRANSFORMATION - A digraph including a plurality of ordinary nodes, at least one of a composition node and a decomposition node, and a plurality of arcs interconnecting any of said nodes. | 2009-08-20 |
20090210440 | METHOD AUTHORING METHOD - Embodiments of the present invention address deficiencies of the art in respect to method authoring and provide a method and computer program product for method authoring according to an inception phase, an elaboration phase, a construction phase and a transition phase. In an embodiment of the invention, a method authoring method can be provided to include generating a method sketch for a method from a vision and project plan for the method. The method sketch can include a walkthrough of a lifecycle for the method. Thereafter, a method definition can be defined from the method sketch and the method definition can be transformed into a Web site for the method. Finally, the Web site can be published for review by reviewers of the method, and the method definition can be iteratively refined based upon the review of the Web site. | 2009-08-20 |
20090210441 | INTEGRATION OF STATIC AND DYNAMIC DATA FOR DATABASE ENTITIES AND THE UNIFIED PRESENTATION THEREOF - A method is disclosed for presenting static and dynamic data corresponding to an entity within an application on a mobile device. An entity object is created as part of a data model within the application such that the entity object has a plurality of fields with the plurality of fields having static data corresponding to the entity. Based on the static data corresponding to the entity, dynamic data corresponding to the entity is received into the entity object from at least one of a plurality of applications executable within the mobile device. The static and dynamic data from the entity object corresponding to the entity is displayed simultaneously within a user interface of the application in a single presentation view. | 2009-08-20 |
20090210442 | Collaborative Categorization System - A collaborative categorization system for efficiently allowing communities of users to record and share observations and events. The collaborative categorization system generally includes making an observation, providing a software platform, wherein said software platform is connected to at least one network, recording said observation as an event upon said software platform, categorizing said event within a particular eventset and sharing said event through said eventset upon said at least one network. | 2009-08-20 |
20090210443 | METHOD AND APPARATUS TO FACILITATE THE CREATING AND ALTERING OF INDEX OBJECTS ON TABLES - A method for facilitating creation and managing of partitioned table indices of a table object of a first partitioning type includes steps of: automatically looking up a table and its partitioning type definition; retrieving the table index and all indices defined for that table object, and their definitions; presenting to a user at least a portion of the table index in a single set of index alter screens; receiving from the user an alter request in the form of a screen option; performing validity checking on the screen option, based on the index type. If the screen option is not compatible with the index type, the method automatically overrides the screen option with one that is compatible, and issues a diagnostic message. If the screen option is valid for the index type, the user is notified about the changes that will be made and the effect of those changes. Data definition language statements are then generated consistent with the screen options. | 2009-08-20 |
20090210444 | SYSTEM AND METHOD FOR COLLECTING BONAFIDE REVIEWS OF RATABLE OBJECTS - A method for providing a computer-based service to automatically evaluate and determine authenticity of a rating. The computer system receives (a) input with rating information that includes a rating and identification data for a specified ratable object and (b) rater profile information including identification information and usage information associated with a user of the computer based service. At least one evaluation step is performed to determine a risk level associated with the rating information, the rater profile information, and an associated time frame. Based on the risk level, an evaluation outcome message is communicated to the user. The evaluation outcome message may include an acceptance message, an information request message, and a rejection message. With the acceptance message, the service accepts the rating for storage in a rating information database. With the information request message, the service implements a verification process. With the rejection message, the service rejects the rating. | 2009-08-20 |
20090210445 | METHOD AND SYSTEM FOR OPTIMIZING DATA ACCESS IN A DATABASE USING MULTI-CLASS OBJECTS - Methods for optimizing data access in a row-oriented relational database containing data sets having attributes using a computer are presented the method including: causing a computer to analyze a database workload to determine an access frequency for each of the attributes; causing the computer to assign each of the attributes to a priority classes corresponding with the access frequency, where the priority classes include a higher priority class and a lower priority class, and where a higher priority class corresponds with a higher access frequency and a lower priority class corresponds with a lower access frequency; causing the computer to store the attributes in accordance with the classes, where the attributes assigned to the higher priority class are stored in a high priority storage medium, and where the attributes assigned to a lower priority class are stored in a low priority storage medium. | 2009-08-20 |
20090210446 | Method for Efficient Association of Multiple Distributions - An association method for analyzing a dataset and grouping its objects in homogeneous groups. Multiple grouping algorithms of the art are performed against the dataset, each producing its own grouping results. All the distributions (groupings) are ordered in a matrix, where each distribution suggested by a specific algorithm and/or parameters is presented in a column of the matrix, and each object is presented in a row of the matrix. The association method is applied to the grouping results and associates similar groups among different grouping methods. The best grouping of the objects is determined according to one or more quality criteria. The various grouping results are represented by colors in the matrix such that similar colors, even on different rows, represent similar grouping recommendations. | 2009-08-20 |
20090210447 | PROCESSING AND ANALYZING HYPER-SPECTRAL IMAGE DATA AND INFORMATION VIA DYNAMIC DATABASE UPDATING - Processing and analyzing hyper-spectral image data and information via dynamic database updating. (a) processing/analyzing representations of objects within a sub set of the hyper spectral image data and information, using a first reference database of hyper spectral image data, information, and parameters, and, a second reference database of biological, chemical, or/and physical data, information, and parameters. Identifying objects of non-interest, and objects of potential interest, from the data/information sub-set. (b) processing/analyzing identified objects of potential interest, by further using first and second reference databases. Determining absence or presence of objects of interest, additional objects of non-interest, and non-classifiable objects of potential interest, from the data/information sub set. (c) updating first and second reference databases, using results of (a) and (b), for forming updated first and second reference databases. (d) repeating (a) through (c) for next sub-set of hyper spectral image data/information, using updated first and second reference databases. (e) repeating (d) for next sub-sets of hyper spectral image data/information. | 2009-08-20 |
20090210448 | FAST SEARCH IN A MUSIC SHARING ENVIRONMENT - A method, apparatus and system of method and system of directory sharing and management in a group communication environment is disclosed. In one embodiment, a method of a fast-search server includes processing a character of a query of music data, referencing the character with a reverse index of a music database, determining that the character matches a data record of the music database using the reverse index and returning the data record of the music database prior to receiving all characters of the query of music data from a user. The reverse index may be created from a combination of letters appearing as a string in a data field of the music database. The method may include preforking the character of the query of music data along with other processes in the fast-search server to minimize concurrency issues and to minimize threading locks. | 2009-08-20 |
20090210449 | Maintenance of Group Shared Inventories in a Virtual Universe - Generally speaking, systems, methods and media for maintenance of group shared inventories in a virtual universe are disclosed. Embodiments of the method may include receiving usage information for one or more inventory items each shared by a group having a plurality of users and storing the received usage information. Embodiments may also include analyzing the usage information for at least one shared inventory item and performing an action based on the analysis of the usage information. The action performed may include archiving, deleting, changing the price for, or adding to a list of included inventory items the shared inventory item. Further embodiments may include determining whether a rule based on group usage is satisfied and performing the action accordingly. Further embodiments may also include analyzing the usage information to determine trends of usage, comparing the determined usage trends to an established heuristic, and performing an action as a result. | 2009-08-20 |
20090210450 | Clinically intelligent parsing - A method, a device and a system for correlating medical information of a first format to medical information of a second format are provided. The method includes parsing an input sequence representing textual information into plural terms; searching a medical database to associate each term with a medical diagnosis; and translating each term into a coded phrase previously associated with the medical diagnosis in the medical database. | 2009-08-20 |
20090210451 | CONTENT REALIZATION ENGINES - A method for creating Web pages with a content realization engine embodied in a computer includes the steps of creating and storing primary content that is generally applicable, and inserting shims in the primary content, each shim being a placeholder for secondary content. The method creates and stores secondary content that is applicable to a specific topic. By combining the primary and secondary content, e.g., by replacing the shims with secondary content, a Web site directed to the specific topic is formed. | 2009-08-20 |
20090210452 | Method of substituting process in storage system - There is provided a computer system comprising: a storage system for storing data; and a management server coupled to the storage system. The storage system comprises a first interface, a first processor and a first memory. The management server comprises a second interface, a second processor and a second memory. In the case of which a first storage system stops receiving a process request, the management server selects a second storage system which receives a process request directed to the first storage system in place of the first storage system to be stopped. The second storage system instructs the first storage system to change an identifier of the first storage system, and receives a process request directed to the first storage system by assigning the identifier of the first storage system before the change to the second storage system. | 2009-08-20 |
20090210453 | Service for verifying consistency of replicated data - Any external application using data access functionality can use the attribute consistency service to update and synchronize attribute value for an entity. The application can access the relations of an entity, which are stored in an entity reference database. In case of inconsistent attribute values, a master attribute value is determined which is then written to the defined attributes of the applications. | 2009-08-20 |
20090210454 | FILE SYSTEM WATCHER IN THE PRESENCE OF DIFFERENT FILE SYSTEMS - The claimed subject matter is directed to a file system watcher in the presence of different file systems to allow synchronization of replicated files distributed among different file systems without compromising the features of each file system. To synchronize the distributed replications, a platform independent synchronization manager creates a file system watcher for each file system associated with a replication of the file. The file system watcher monitors each object for events affecting the object or the object's constituent files, such as creation, deletion, change and rename. Notifications are sent to the synchronization manager, which consolidates the modifications and updates a locally stored replication, if necessary. The synchronization manager then sends a notification of an update to all other synchronization managers for all replications of the distributed file or folder. Synchronization is complete when the nonconforming synchronization managers acquire a replication of the locally stored replication and update their respective objects to conform therewith. | 2009-08-20 |
20090210455 | CONTINUOUSLY AVAILABLE PROGRAM REPLICAS - A method for replicating a program and data storage according to one embodiment comprises sending program replication data from a first program to a second program, the second program having an application program that is a replica of an application program of the first program; sending data storage requests from the first program to a first storage system; and replicating data stored in the first storage system in a second storage system. Additional methods, systems, and computer program products are disclosed. | 2009-08-20 |
20090210456 | Methods, Systems and Media for TPM Recovery Key Backup and Restoration - A method of trusted platform module (TPM) activation and recovery in an information handling system (IHS). The method includes providing a first virtual recording medium associated with a first recording medium, wherein the first recording medium is coupled to a management console. Further, a TPM recovery key is stored on the first virtual recording medium. | 2009-08-20 |
20090210457 | TRANSACTIONAL MEMORY WITH DYNAMIC SEPARATION - Strong semantics are provided to programs that are correctly synchronized in their use of transactions by using dynamic separation of objects that are accessed in transactions from those accessed outside transactions. At run-time, operations are performed to identify transitions between these protected and unprotected modes of access. Dynamic separation permits a range of hardware-based and software-based implementations which allow non-conflicting transactions to execute and commit in parallel. A run-time checking tool, analogous to a data-race detector, may be provided to test dynamic separation of transacted data and non-transacted data. Dynamic separation may be used in an asynchronous I/O library. | 2009-08-20 |
20090210458 | Tag based backup and recovery - Systems, methods, and other embodiments associated with selective tag-based file backup and recovery are described. One example method includes selectively tagging a file for inclusion in a snapshot-based backup image by associating a tag with the file. The associating may include encoding file metadata with a tag. The method may include selectively adding a file to the backup image upon determining that the file has experienced a write event and that the file is associated with a tag. The method may also include receiving a request to provide a recovery file from the backup image and selectively providing the recovery file upon determining that the recovery file is associated with a recovery tag specified in the request. | 2009-08-20 |
20090210459 | DOCUMENT SYNCHRONIZATION SOLUTION - A method for synchronizing a database with displayed data, includes providing a data feed to receive data from the database to provide displayed document data, detecting a database change to the data within the database by a database synchronizer to provide a change event, polling the database synchronizer using an HTTP message to detect the change event, and pushing the database change to the displayed document data to update the displayed document data in accordance with the database change and the polling. The polling includes long polling and short polling. A polling servlet within the database synchronizer performs the polling by the database synchronizer. The database synchronizer updates the displayed document data by way of a data structure. The data structure is a queue. | 2009-08-20 |
20090210460 | Organization of archival elements for analog/digital hybrid data on film - A system and method for archiving films includes a film feature including analog film content on a reel for archival storage. N parts of the film content are created based on criteria. The N parts include digitally stores metadata such that the film includes a hybrid of analog and digital data representing an entire record of the film on a single media. | 2009-08-20 |
20090210461 | Network Attached Storage System and Method - A network attached storage system comprising: a computer; a network in signal communication with the computer; a network attached storage device in signal communication with the network, and not physically connected to the computer; an internet in signal communication with the network; a storage server remotely located from the computer, the network attached storage device, and the network, the storage server in signal communication with the internet; a sync server remotely located from the computer, the network attached storage device, and the network, and the sync server in signal communication with the internet; where the network attached storage device is configured to store data, and where the network attached storage device is further configured to periodically communicate with the storage server and backup the data to the storage server. A method for backing up data to a remote location, the method comprising: setting a counter N to 1; attaching an Nth network attached storage device to an Nth network; storing data on the Nth network attached storage device; backing up data, periodically, from the Nth network attached storage device to a remote storage server; determining whether N is equal to the total number of network attached storage devices to be put in operation; managing all of the network attached storage devices with a remote sync server, if N is equal to the total number of network attached storage devices to be put in operation; determining whether there is a data replacement request from a user; locating the data on the storage server, if there is a data replacement request from the user; sending data replacement to the user; determining whether a new network attached storage device is to be put into operation; and advancing counter by 1, if there is a new network attached storage device to be put into operation. | 2009-08-20 |
20090210462 | METHODS AND APPARATUS TO CONTROL TRANSITION OF BACKUP DATA - Disclosed is a system incorporating a management computer, host computers, a backup server and at least one storage system. Backup data generated in the system are stored in various storage system such as disk array, tape library and VTL (virtual tape library) with various methods such as continuous data protection and snapshot, and management information of the backup data is maintained by the management computer. The management computer conducts transition of mode of the backup data by detecting that a condition to perform the transition is satisfied, determining a plan of transition according to predetermined scenario, performing (instructing) the transition based on the plan and updating the management information of the backup data. By keeping the management information up to date, the management computer can provide a unified means to restore necessary data from the backup data even if the transition (moving and/or change) of the backup data has been performed. | 2009-08-20 |
20090210463 | COMPUTER SYSTEM AND FILE STORAGE/READ-OUT METHOD - When storing data (D | 2009-08-20 |
20090210464 | STORAGE MANAGEMENT SYSTEM AND METHOD THEREOF - A storage management system includes a storage unit with first and second partitions with consecutive physical addresses. The control unit manages the storage unit and has a measurement unit, arrangement unit, and reallocation unit. The arrangement unit arranges currently stored files in the two partitions. The measurement unit measures the file, the free space of the two partitions, a difference between the file size and the free space of the second partition, and determines whether the free space of the second partition is sufficient to store the file. The reallocation unit shares the free space from the first partition to the second partition. | 2009-08-20 |
20090210465 | COMPARING PROCESS SIZES - A system to compare process sizes is described. In one example embodiment, the system comprises memory and one or more processing devices. The memory may be configured to store executable instructions. The one or more processing devices may be configured to execute the instructions. The instructions may cause the one or more processing devices to generate a first process that corresponds to an activity, generate data objects that correspond to the elements associated with the activity, and identify a number of data objects associated with the first process. The one or more processing devices may further obtain a reference size for the first process based on the number of data objects and compare the reference size for the first process with the reference size for another process. | 2009-08-20 |
20090210466 | ELECTRONIC CALCULATOR WITH A FORMULA DISPLAY FUNCTION - When the intake input mode is set and a 2D function key, such as “√{square root over ( )}” or “a/b,” is operated in a state where the cursor has been moved to an arbitrary position on the formula displayed on the display unit of an electronic calculator, the range of the formula covered by the input 2D function (or to be calculated) is determined on the basis of the position of the cursor by recognizing a formula part sandwiched by parentheses or a chunk of the formula part of a function with parentheses, recognizing a chunk of a formula part of a 2D function, recognizing a chunk of a formula part with successive numerals and characters, and recognizing the position of an arithmetic symbol (“+,” “−,” “×,” or “÷”) or a delimiter (“:” or “,”) The determined range is taken in by the input 2D function. | 2009-08-20 |
20090210467 | ASCII to Binary Floating Point Conversion of Decimal Real Numbers on a Vector Processor - The present invention provides a system, method, and apparatus for converting a decimal real number in ASCII format to a decimal real number in floating point binary decimal format in a vector processor. | 2009-08-20 |
20090210468 | GENERATION OF THERMAL AGITATION NOISE ACCORDING TO A PREDETERMINED HISTOGRAM - The invention relates to a method and a device for generating agitation noise, and the agitation noise obtained. | 2009-08-20 |
20090210469 | METHODS AND DEVICES FOR FILTERING AND CODING A DIGITAL SIGNAL - To filter a digital signal, in which, for each sample of the signal, a plurality of context functions take account of a predetermined number of other samples of the signal: the value of a context function from the plurality of context functions for each sample to be filtered is calculated; the signal is divided into a set of sub-signals corresponding respectively to the different values of the context functions; and, for each sub-signal: an optimal filter is determined according to a first criterion that depends on the values of the sub-signal; and the optimal filter is associated with the context function corresponding to the sub-signal. | 2009-08-20 |
20090210470 | APPARATUS AND METHODS FOR LOSSLESS COMPRESSION OF NUMERICAL ATTRIBUTES IN RULE BASED SYSTEMS - Disclosed are apparatus and methods for compressing a set of numerical values for a set of feature values, which can be utilized by a rule based or decision tree system. In certain embodiments, the numerical values are transformed into a subset of integer values based on how they are to be analyzed by conditional processes of the rule based or decision tree system that compare such numerical values to one or more threshold values. This transformation is accomplished such that if the rule based or decision tree system is applied after transformation, identical results are produced as compared to the original numerical values being used by the rule based or decision tree system. Other compression techniques may also be applied to the transformed values. An altered rule based or decision tree system, in which threshold values are also transformed to integer values, may be applied to the transformed values. Alternatively, the rule based or decision tree system may be applied to a set of decoded numerical values. | 2009-08-20 |
20090210471 | METHOD FOR TRANSFORMING DATA STREAM AND COMMUNICATION SYSTEM THEREOF - A method for transforming a data stream and a communication system thereof are provided. In a second communication terminal, a padding data of the data stream of a first communication terminal is checked whether it corresponds to a default value so as to determine whether a first bit order used for the data stream of the first communication terminal is consistent with a second bit order used for a data stream of the second communication terminal. When the padding data does not correspond to the default value, the data stream transmitted from the first communication terminal is transformed from the first bit order to the second bit order by the second communication terminal. | 2009-08-20 |
20090210472 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING DECIMAL FLOATING POINT ADDITION OPERATIONS THAT DO NOT REQUIRE ALIGNMENT, NORMALIZATION OR ROUNDING - A method, computer program product and a system for identifying decimal floating point addition operations that guarantee operand alignment and do not require alignment, normalization or rounding are provided. The method includes: receiving an instruction to perform an addition of a first operand and a second operand; extracting a first exponent (EXP) and a first most significant digit (MSD) from the first operand; extracting a second EXP and a second MSD from the second operand; and determining whether alignment between the first operand and the second operand is guaranteed, based on the first EXP, the first MSD, the second EXP and the second MSD. | 2009-08-20 |
20090210473 | EMBEDDED MULTI-CHANNEL KNOWLEDGEBASE - Embodiments of the present invention provide a method, system and computer program product for an embedded multi-channel knowledgebase for embedded product support. In one embodiment of the invention, an embedded multi-channel knowledgebase data processing system can be configured for embedded product support. The system can include a consumer appliance, a knowledgebase embedded in the consumer appliance, a help module disposed in the consumer appliance and programmed to provide access to the knowledgebase through the consumer appliance, and multi-channel escalation and reporting logic coupled to the help module. The logic can include program code enabled to escalate support requests in the help module from the embedded knowledgebase to a remote, communicatively coupled response manager over a computer communications network. | 2009-08-20 |
20090210474 | SYSTEM AND METHOD FOR WIRELESS COMMUNICATION NETWORK USING BEAMFORMING AND HAVING A MULTI-CAST CAPACITY - A method and system for sending the same data in multiple directions via directional transmission is disclosed. One embodiment of the invention allows for processing power to be saved by introducing a buffer in the physical (PHY) layer, after some baseband (BB) processing has been performed. In one embodiment of the invention the method comprises receiving data from a MAC layer, performing preliminary processing on data in the PHY layer, storing the preliminarily processed data in a buffer located in the PHY layer, performing secondary processing on the preliminarily processed data, transmitting the secondarily processed data in a first direction, via directional transmission, reading the preliminarily processed data from the buffer, performing secondary processing on the preliminarily processed data, and transmitting the secondarily processed data in a second, third, fourth and so-on direction. | 2009-08-20 |
20090210475 | RECOMMENDATION SYSTEM AND METHOD OF OPERATION THEREFOR - A recommendation system comprises a plurality of recommenders for generating recommendations in accordance with a user preference profile having a recommender specific representation. The recommender specific representation is different for different recommenders and each recommender comprises translation data relating the recommender specific representation to a shared ontology. A recommender comprises a translation unit which generates first user preference data in accordance with the shared ontology in response to a user preference profile and translation data relating the recommender specific representation to the shared ontology. In addition, a confidence indication for at least part of the user preference data is generated. A transmitter transmits the user preference data and the confidence indication to a second recommender. The second recommender may translate the received data into its recommender specific representation and combine the received data with locally generated user preference data. The invention may facilitate and/or improve sharing of user preference data. | 2009-08-20 |
20090210476 | SYSTEM AND METHOD FOR PROVIDING TANGIBLE FEEDBACK ACCORDING TO A CONTEXT AND PERSONALITY STATE - A system and method for maintaining a personality and an associated state and further causing an apparatus to perform tangible actions according to a personality, a state and a context. Embodiments of the invention may compute a state of a personality and a context according to detected events and input obtained. A state may further be computed according to a maintained context. An apparatus may be commanded to perform actions reflecting a computed state and context. Other embodiments are described and claimed. | 2009-08-20 |
20090210477 | SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT - A system that incorporates teachings of the present disclosure may include, for example, a media distribution system having a controller to identify a plurality of media presentation devices of a user of the MDS, identify one or more distribution preferences supplied by the user for distributing media content to the plurality of media presentation devices, receive media content from one of a plurality of media sources of the user, determine a media content type from the received media content, and distribute the received media content to one or more of the plurality of media presentation devices according to the one or more distribution preferences and the media content type. The one or more distribution preferences comprise in part media content distribution arrangements assigned by the user between the plurality of media sources of the user and the plurality of media presentation devices of the user. Other embodiments are disclosed. | 2009-08-20 |
20090210478 | System and Method for Resolving Extensions for the SIP Session Policy Framework - A method for providing policy information to a user agent. The method comprises the user agent transmitting information related to a plurality of uniform resource identifier (URI) schemes that the user agent supports for communication over a policy channel and transmitting information related to a plurality of representations of the policy information that the user agent supports. The method further includes the user agent receiving an indication of a selection of at least one of the plurality of URI schemes and a selection of at least one of the plurality of versions of the policy information. The method further includes the user agent obtaining policy information using at least one of the selected representations of the policy information and using at least one of the selected URI schemes. | 2009-08-20 |
20090210479 | METHOD AND APPARATUS FOR COMMUNICATING COMPRESSION STATE INFORMATION FOR INTERACTIVE COMPRESSION - A method of determining, at a mobile device, side information including compression state information. The method includes receiving, from a server, a unique side information identifier identifying a unit of side information used by the server for compressing data, determining, based on the side information identifier, if the unit of side information is resident on said device, and if the unit of side information is resident on the mobile device, loading the side information for decompressing the data. Otherwise, if the unit of side information is not resident on the mobile device, the method includes requesting the unit of side information from one of the server and another device. | 2009-08-20 |
20090210480 | METHOD AND SYSTEM FOR COLLECTIVE SOCIALIZING USING A MOBILE SOCIAL NETWORK - A method for collective socializing using a mobile social network, which includes obtaining collective socializing data on at least one location, and transmitting the collective socializing data upon request of at least one user. In addition, the step of obtaining collective socializing data on at least one locations further includes storing the collective socializing data on the at least one location on a system server, obtaining additional collective socializing data from a plurality of users on the at least one location; and combining the additional collective socializing data with the collective socializing data on the system server for transmittal to the at least one user upon request. | 2009-08-20 |
20090210481 | DYNAMIC MASHUP CREATION FROM A SET OF RESOURCES AND RESOURCE RELATIONSHIPS - A dependency hierarchy of resources can be determined for a dynamic mashup. The dependency hierarchy can specify dependency relationships among a set of resources. A set of views that correspond to the set of resources can be ascertained. For each view, a view template can be determined that is to be applied to that view. The mashup can be dynamically created that includes the views, each of which is configured in accordance with the associated view template. The created mashup can also include content defined by the set of resources that is configured in a manner consistent with the dependency relationships of the dependency hierarchy. | 2009-08-20 |
20090210482 | Framework for Rendering Plug-ins in Remote Access Services - A framework for and hosting rendering plug-ins in remote access services is disclosed. The framework provides an interface between the core components of the remote access system and the rendering plug-ins. The framework utilizes public APIs to provide the interface between the core components and the rendering plug-ins. Using the APIs, the framework can allow various existing and new rendering plug-ins to interact with the core components of the remote access system, thereby making an extensible system that can support a variety of rendering plug-ins. | 2009-08-20 |
20090210483 | Systems Methods and Computer Program Products for Remotely Controlling Actions of a Virtual World Identity - Methods for remotely controlling actions of a virtual world identity of a user include transmitting instructions to the virtual world identity of the user from a mobile terminal associated with a real world identity of the user. The instructions are transmitted as a voice call, a text message and/or an instant message (IM). Updated information associated with the transmitted instructions is received from the virtual world identity of the user at the mobile terminal. The updated information includes an identification of a condition triggering transmission of the updated information. | 2009-08-20 |
20090210484 | Peer-to-peer object distribution - Methods and systems for distributing objects over a network. In one embodiment, the system includes at least one primary network device, and multiple secondary network devices coupled to the primary network device via a network. The primary network device may receive, from a server, objects for the devices managed by the server. The secondary network devices may receive an identifier of the primary network device from the server and may request updates for objects deployed at individual secondary network devices from the primary network device. | 2009-08-20 |
20090210485 | ELECTRONIC DEVICE AND BASE STATION FOR MAINTAINING A NETWORK CONNECTION - An electronic device and wireless base station for maintaining a persistent connection is provided. In an embodiment, a system includes an electronic device that connects to a web-server via a physical link that is bandwidth-constrained. The physical link also includes a wireless base station and at least one network address translation (“NAT”) router that is configured to terminate idle connections between the client and the web-server. One of the electronic device and the wireless base station is configured to send keep-alive packets to the web-server in order to reduce the likelihood of the NAT router terminating the connection. The keep-alive packets are sent on a variable basis that is intended to reduce bandwidth consumption while ensuring that the NAT router does not deem the connection idle and terminate the connection. | 2009-08-20 |
20090210486 | METHOD AND APPARATUS FOR ASSOCIATING GRAPHIC ICON IN INTERNET VIRTUAL WORLD WITH USER'S EXPERIENCE IN REAL WORLD - A method and apparatus to associate a graphic icon representing a user in an Internet virtual world with the user's experience in the real world, the method including: logging data of an event occurring to the user in the real world; transmitting the logged data to a server; and updating the graphic icon in the virtual world according to the transmitted data. Accordingly, by associating the contents of the user's experience with a database (DB) and expressing the contents in the graphic icon, the user's experiences in the real world can be more realistically expressed in a virtual world. | 2009-08-20 |
20090210487 | CLIENT-SERVER VISUALIZATION SYSTEM WITH HYBRID DATA PROCESSING - The invention comprises a system of client-server visualization with hybrid data processing, having a server digital data processor, that allows for server side rendering and processing image data, and client digital data processors simultaneously connected to the server, which receives messages from the clients, creates rendered images of data sets or other data processing results and sends those rendered images and results to the clients for display or further processing. Performing certain image rendering operations on either the server or the client according to which is better suited for the tasks requested by the user at any point in time, and possibly adjusting this division of work dynamically, improves rendering speed and application responsiveness on the clients. | 2009-08-20 |
20090210488 | REMOTE USER INTERFACE PROXY APPARATUS AND METHOD OF PROCESSING USER INTERFACE COMPONENTS THEREOF - Provided is a proxy apparatus having an embedded remote user interface client (RUIC) and an embedded remote user interface server (RUIS) that transmits a UI component received from an external RUIS or session information of the UI component to an external RUIC. Thus, a user can use contents of a remote user interface server (RUIS) with a new RUIC while maintaining a session state between the external RUIS and an existing RUIC. Since the UI components, prohibited from being forwarded by the external RUIS, are not forwarded to the new RUIC, the contents policy, which corresponds with the business needs of contents providers, can be ensured. | 2009-08-20 |
20090210489 | METHODS FOR PEER-CACHING FOR FASTER LOOKUPS IN PEER-TO-PEER SYSTEMS - The invention improves query response latency in a peer-to-peer network. The invention augments core neighbors included in a neighbor list of a peer node by selecting auxiliary neighbors for inclusion in the neighbor list of the peer node of a peer-to-peer network. In one embodiment, a method includes maintaining query frequency information associated with each of a plurality of peer nodes of the peer-to-peer network, selecting at least one of the peer nodes of the peer-to-peer network as an auxiliary neighbor using the query frequency information, and updating a neighbor list to include the at least one peer node selected as the at least one auxiliary neighbor. The core neighbors stored at a peer node attempt to minimize the worst-case query latency for that peer node. The auxiliary neighbors stored at the peer node attempt to reduce the average query latency for that peer node. The auxiliary neighbors may be used in any peer-to-peer system, such as Pastry, Tapestry, Chord, SkipGraph, and the like. | 2009-08-20 |
20090210490 | TECHNIQUES TO AUTOMATICALLY CONFIGURE RESOURCES FOR A MULTIMEDIA CONFRENCE EVENT - Techniques to automatically configure resources for a multimedia conference event are described. A system may comprise a meeting resource and a local meeting console to couple to the meeting resource. The local meeting console may include a meeting resource management module operative to manage the meeting resource for a conference room, and automatically establish a media connection between a remote meeting console and a meeting resource for a multimedia conference event. Other embodiments are described and claimed. | 2009-08-20 |
20090210491 | TECHNIQUES TO AUTOMATICALLY IDENTIFY PARTICIPANTS FOR A MULTIMEDIA CONFERENCE EVENT - Techniques to automatically identify participants for a multimedia conference event are described. An apparatus may comprise a content-based annotation component operative to receive a meeting invitee list for a multimedia conference event. The content-based annotation component may receive multiple input media streams from multiple meeting consoles. The content-based annotation component may annotate media frames of each input media stream with identifying information for each participant within each input media stream to form a corresponding annotated media stream. Other embodiments are described and claimed. | 2009-08-20 |
20090210492 | METHOD FOR COMBATTING THE ILLICIT DISTRIBUTION OF PROTECTED MATERIAL AND COMPUTER SYSTEM FOR CARRYING OUT SAID METHOD - The invention relates to a method for hindering or preventing the illegal distribution of protected data in a peer-to-peer network comprising at least one peer operating an exchange programme designed for distribution of data to at least one client according to a selective exchange protocol permitting the peer to operate a selection of clients to which the data is transferred, said selection being carried out as a function of one or more characteristics of the clients. In said method bogus data is sent to the peer such as to influence the selection of clients served by the peer, such that the peer is made to favour the transfer to authorised clients. | 2009-08-20 |
20090210493 | Communicating and Displaying Hyperlinks in a Computing Community - Various aspects are disclosed herein for communicating and displaying of hyperlinks in a computing community. Hyperlinks can be communicated by being embedded in messages, such that users of a closed computing community can send and receive such hyperlinks. These hyperlinks can link to hyperlinked content that can be stored on a central computing device responsible for administering the community. Moreover, any content that is associated with hyperlinks, whether that content is in the form of blogs, RSS feeds, and so on, can be made publicly available while any associated hyperlinks will be visible only to a subset of computing devices, namely, the community computing devices (but not to any general computing devices accessing the content). This task may be accomplished by using predetermined and/or proprietary schema properly understood only by the community computing devices. | 2009-08-20 |
20090210494 | Device, System, and Method of Electronic Communication to Facilitate Collaboration and Meeting - Device, system, and method of electronic communication to facilitate collaboration and meeting. For example, a method of inducing social interaction among users of an electronic communication network includes: receiving a first behavioral profile representing one or more schedule items of a first user; receiving a second behavioral profile representing one or more schedule items of a second user; identifying a time-slot in which the first and second users are available according to the first and second behavioral profiles, respectively, and identifying a common activity-of-interest reflected in the first and second behavioral profiles; and sending to the first and second users invitations to engage in said activity-of-interest in said time-slot. | 2009-08-20 |
20090210495 | ADAPTIVE SEARCH IN MOBILE PEER-TO-PEER DATABASES - Information is stored in a plurality of mobile peers. The peers communicate in a peer to peer fashion, using a short-range wireless network. Occasionally, a peer initiates a search for information in the peer to peer network by issuing a query. Queries and pieces of information, called reports, are transmitted among peers that are within a transmission range. For each search additional peers are utilized, wherein these additional peers search and relay information on behalf of the originator of the search. | 2009-08-20 |
20090210496 | SYSTEM AND METHOD FOR LEAVING AND RETRIEVING ELECTRONIC MESSAGE NOTES - Methods and apparatus for allowing a message to be left for an expected user of a network application are disclosed. According to one embodiment, a method includes determining when a first user has requested access to a first application, and determining if there is a message for the first user when it is determined that the first user has requested access to the first application. The method also includes informing the first user of the message if it is determined that there is the message for the first user, as well as providing the first user with access to the first application after informing the first user of the message and after the first user acknowledges that the first user has been informed of the message. | 2009-08-20 |
20090210497 | SELECTIVE INSTANT MESSAGING (IM) NOTIFICATIONS BASED ON SENDER/RECEIVER RELATIONSHIPS - The present invention presents a solution for prioritizing instant messaging (IM) communications based on sender/receiver relationships and for presenting selective notifications based upon the established priorities. The invention can include a data store, a message prioritization engine, and a client-side IM application. The data store can manage information describing relationships among people and recipient configurable IM prioritizing information. The message prioritization engine can determine a priority value for IM communications based upon the relationships and recipient configurable IM prioritizing information of the data store. The client-side IM application can receive IM messages that have an associated priority value established by the message prioritization engine. The client-side application can present an indicator of the priority value for associated IM messages within a user interface. In one embodiment, the information describing relationships used by the prioritization engine can be acquired from at least one social networking system. | 2009-08-20 |
20090210498 | METHOD, SERVER AND SYSTEM FOR OPTIMIZING HTML-BASED CONTENT - A method, server and system for optimizing and delivering HyperText Markup Language (HTML)-based content such as HTML-based email messages to mobile communication devices is provided. In accordance with one embodiment, the method comprises: receiving an email message comprising an HTML portion comprising an HTML header and an HTML body; determining if the HTML header includes a reference to a Cascading Style Sheet (CSS) document comprising one or more rules; if the HTML header includes a reference to a CSS document, replacing the reference with the CSS rules of the CSS document, and sending the transformed email message to a destination mobile communication device. | 2009-08-20 |
20090210499 | Service Identification And Decomposition For A Health Care Enterprise - In embodiments, a health insurance computer application enterprise system is provided employing a service oriented architecture (SOA) with a service granularity component that dynamically customizes a reusable service based on one or more of user identity element, service data elements, and service action elements parsed from service request parameters. The health insurance enterprise system includes a plurality of applications making use of functionality provided by a reusable service. In an embodiment, the health insurance enterprise system includes a customer service application, a consumer web portal application, and an integrated voice response (IVR) application. The applications provide different channels of communicating health insurance data to various health insurance system constituents by presenting customized views of the data tailored to a given communications method, user access rights, as well as other factors. | 2009-08-20 |
20090210500 | SYSTEM, COMPUTER PROGRAM PRODUCT AND METHOD OF ENABLING INTERNET SERVICE PROVIDERS TO SYNERGISTICALLY IDENTIFY AND CONTROL SPAM E-MAIL - Presently, when an e-mail message is identified as SPAM, it is deleted and the process ends. According to the system, computer program product and method provided herein, upon identifying an e-mail message as SPAM, source information, identity and data stream of the e-mail message are transferred to a database accessible by trusted ISPs. The trusted ISPs may compare the transferred data stream to data stream of incoming and outgoing e-mail messages to determine whether they are also SPAM and the transferred source information and identity may be used to determine an original sender (i.e., a spammer) of the message. | 2009-08-20 |
20090210501 | BLOCKING OF SPOOFED E-MAIL - Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism. | 2009-08-20 |
20090210502 | System and method for bypassing uploading of data from a wireless device using outbound attachment caching - A method comprising: storing outbound attachments uploaded from a wireless device in a cache memory of a wireless service; receiving, over the wireless network, an electronic message that includes an attachment from a wireless device; determining whether the attachment is stored within the cache memory; and sending the electronic message to one or more addressees based on the determining. | 2009-08-20 |
20090210503 | Website presence - Website presence includes receiving aggregated website presence information describing website presence information for one or more objects of a website, and displaying the aggregated website presence information based at least in part on a website object profile for an object of the website. The website presence information describes one or more of the state of a website object regarding its participation in a communication session, the ability of the website object to participate in a communication session, and the willingness of the website object to participate in a communication session. Each of the one or more objects represents an entity associated with the website. | 2009-08-20 |
20090210504 | ERRONEOUS ADDRESSING PREVENTION FOR ELECTRONIC MESSAGING - An electronic mail client includes features for preventing addressing errors in electronic messaging such as those caused by predictive text features. A messaging client tracks addressing parameters including the length of time since each previous addressee has been messaged, the quantity of times selected addressees have been co-addressees on messages, if any, whether the addressees are designated as sensitive and whether the messages contain sensitive subject matter. If a high risk of addressing error is determined, the client delays transmission of the message to permit the user to review the message recipient addresses and correct any erroneous addressees. | 2009-08-20 |
20090210505 | SYSTEMS AND METHODS FOR OPTIMIZING SMART MAIL - Methods and systems provide for creating and generating dynamic mailings which include providing for static and dynamic content to be included in a dynamically generated e-mail; establishing filters for determining dynamic content; establishing a generic e-mail including static and dynamic content; selecting dynamic content using the filters; generating a dynamic e-mail based upon the generic e-mail and the dynamic content selected; and transmitting the dynamically generated e-mail. | 2009-08-20 |