38th week of 2011 patent applcation highlights part 57 |
Patent application number | Title | Published |
20110231310 | VEHICULAR-BASED TRANSACTIONS, SYSTEMS AND METHODS - Various systems and methods are described for conducting and staging money transfer transactions from a vehicle. The systems and methods may include using a wireless transmitter on board the vehicle for wirelessly communicating with a money transfer system. Also, a user-input device integrated with the vehicle's navigation system, entertainment system, and/or climate system may be used. Using the wireless transmitter, the user-input device may interface with the money transfer system. Also, one or more identity authentication devices may be integrated with the vehicle that collect information to authenticate a user's identity. | 2011-09-22 |
20110231311 | METHOD AND SYSTEM FOR PROCESSING MESSAGES IN A BILL PAYMENT AND PRESENTMENT SYSTEM OVER A COMMUNICATIONS NETWORK - In a bill payment and presentation system, a method for electronically routing billing information over a communications network is provided, using an open financial exchange communication protocol. The method provides for a centrally located mainframe system and a switching system for coordinating the routing of messages between customer service providers and biller service providers. In particular, the method collects at the CSPs and at the BSPs mainframe application files comprising the messages, forwards these files in batch mode to the mainframe system and converts with a switching system these mainframe files into web-enabled addresses, allowing for the effective transmission of financial billing information in flat-file and/or Internet-based form. | 2011-09-22 |
20110231312 | PAYMENT ACCOUNT MONITORING SYSTEM AND METHOD - A network includes an account status system for checking the status of checking accounts used to make payments, and a payment account monitoring system that includes linking files that store, for individual credit card accounts, the account numbers for checking accounts used to pay the credit card accounts. The monitoring system periodically retrieves checking account numbers from the linking files and checks the account numbers at the status system. If a negative status is indicated at the status system, an alert is provided to the credit card company. | 2011-09-22 |
20110231313 | Creating and Utilizing an Image Replacement System - Aspects of this disclosure relate to a computer which may include a processor and memory storing computer executable instructions that, when executed, cause the computer to perform a method for preparing an image replacement document. According to aspects of the disclosure, the method may include electronically receiving a notification of a potential defect in a negotiable instrument, associated with a financial transaction, uploaded at an automated teller machine (ATM), electronically receiving an electronic copy of an image of the negotiable instrument uploaded at the ATM, and electronically receiving information regarding the financial transaction which included the negotiable instrument being uploaded at the ATM, wherein the information regarding the financial transaction includes an account number of an account into which funds of the negotiable instrument are to be credited. | 2011-09-22 |
20110231315 | METHOD AND SYSTEM FOR MAKING SECURE PAYMENTS - The invention discloses a method, system and computer program product for making secure payments. A customer selects one or more items to be purchased. The customer then enters an authentication detail and a dynamic password, also referred to as a One Time Password (OTP), on an Electronic Data Capture device for authenticating the payment. Based on the authenticity of the OTP and the authentication details, a payment request is sent to an organization for completing the payment. | 2011-09-22 |
20110231316 | METHOD, SYSTEM AND COMPUTER READABLE MEDIA CONTAINING A PROGRAM FOR IDENTIFYING WHETHER A PRODUCT IS GENUINE - Provided herein is a method, system and non-transitory computer readable medium storing instructions related to receiving and storing product code information from plural surveyor surveillance devices and compensating a party associated with each surveyor device that provides information potentially related to a improper transacted sales of a product associated with a gathered product code. The information gathered from the surveillance devices can assist in investigating whether existing products are genuine or counterfeit by identifying non-valid and/or non-registered product codes and improper sales transactions associated with product codes received from the surveillance devices. In an embodiment, a determination is made whether received product code information corresponds to a registered product code stored in a data structure, and for a stored registered product code corresponding to the received product code information, a determination is made of a number of instances the product code information has been received. A party associated with the surveillance device is compensated, or rewarded if the determined number of instances is greater than a predetermined value or the received product code is determined not to correspond to a registered product code. | 2011-09-22 |
20110231317 | SECURITY SENSITIVE DATA FLOW ANALYSIS - A system and method for security-aware data flow analysis are described. In various embodiments, a system analyses relationships between users, roles, tasks, and data objects, and permissions set thereon and grants access to users to specific data objects or data fields. In various embodiments, a method for creating an authorization matrix for data used in business processes is described. The method includes analyzing organizational policies associated with functional requirements and granting access to data to users if organizational policies are complied with. | 2011-09-22 |
20110231318 | PAY AT PUMP ENCRYPTION DEVICE - Embodiments of the present invention are drawn to systems and methods for securing information using cryptographically keyed units. Specifically, in one embodiment of the present invention, a system is provided for securing information that uses two cryptographically keyed units to encrypt information flowing between a fuel pump device and a remote device. Thus, even if the information is intercepted, it could not be used to perpetrate fraud. | 2011-09-22 |
20110231319 | Method to Make Payment or Charge Safe Transactions Using Programmable Mobile Telephones - A system, method and mobile application for conducting financial transactions wherein a mobile device operated by a user is operably coupled to a server over a mobile communication network. Both the server and the user's mobile device store a user encryption key (UEK) and a user access key (UAK). A software application stored on the user's mobile device and the server are configured to conduct a transaction wherein a session key (SK) specific to the transaction is exchanged in an encrypted form based upon the UEK. The software application is further configured to i) generate transaction data, ii) access the UAK stored on the mobile device, iii) encrypt the UAK and transaction data into an encrypted form based upon the SK, and iv) send the UAK and transaction data in encrypted form from the mobile device to the server over the mobile communication network in order to conduct the transaction. | 2011-09-22 |
20110231320 | ENERGY MANAGEMENT SYSTEMS AND METHODS - Systems, methods and software for energy management; for negotiations and/or auctions between energy aggregators and utility companies. | 2011-09-22 |
20110231321 | METHOD AND APPARATUS FOR PROVIDING PREDETERMINED PROMOTIONAL OFFERS - Embodiments provide methods, apparatus, systems, and computer readable media associated with provisioning of promotional offers from merchants to consumers. Merchants may submit schedules to a promotional offer provision service. The schedules may describe promotional offers which are usable during specific pre-determined time periods. The schedules may also describe other aspects of the promotional offers, such as type of offer or discount, and may include restrictions, such as restrictions based on a consumer's history of follow-through. Consumers may search the system, such as through a website, for offers of interest. Consumers may search based on criteria such as time and location. If the consumer accepts the offer, he or she may be provided a coupon with a unique code for presentation to the merchant. The consumer may also negotiate terms of the promotional offer, if desired. Other embodiments may be described and claimed. | 2011-09-22 |
20110231322 | AUTOMATED RULES-BASED RIGHTS RESOLUTION - A rules engine program is driven by one or more stored “rules” to make rights determinations normally made by a human operator; that is whether a request for a right can be granted, what price should be paid by the requestor and how much royalty should be paid to the rightsholder. In order to avoid specific coding for each right, the rules and parameters necessary to make the required determinations are constructed to form a standard set of reusable rule records that can be linked in different ways to process different rights. Additional display rules that are linked to the type of use control a graphic user interface in order to prompt the user for information needed to decide whether the request can be granted and to display to the user a determined price if the request is granted. | 2011-09-22 |
20110231323 | ENABLEMENT OF LICENSED FEATURES AT A LOGICAL VOLUME LEVEL OF GRANULARITY - A licensing application implemented in a computational device receives a request to enable a feature for a logical volume of a plurality of logical volumes controlled by the computational device, wherein each feature of a plurality of features is configurable to be enabled or disabled for one or more logical volumes of the plurality of logical volumes. The licensing application determines, whether enabling the feature for the logical volume causes a licensed capacity limit for the feature to be exceeded. Enabling the feature for the logical volume is avoided, in response to determining that enabling the feature for the logical volume causes the licensed capacity limit for the feature to be exceeded. | 2011-09-22 |
20110231324 | SYSTEM AND METHOD OF ATTRACTING AND LODGING PCT NATIONAL PHASE APPLICATIONS - A computer implemented system and method of attracting and lodging PCT national phase patent applications. The computer system for lodging a PCT national phase application with a patent office has an interface which is adapted to receive a national phase filling instruction. The interface is in communication with a document generator which is adapted to generate a national phase entry message. The generator is in communication with a document sender which is adapted to send the national phase entry message to the patent office. When the interface receives a national phase filing instruction the document generator generates the national phase entry message and the document sender sends the message to the patent office thereby lodging the PCT national phase application. | 2011-09-22 |
20110231325 | System for Preparing a Patent Application - A method of preparing a patent application by running a software macro to present a Tool bar to display options including Setup and Number Claims and Build Description and Build Intro Sections and Build Abstract and Count Abstract and Format and Mark Element and Element List and Number Patent wherein a Collect option for arranging the order of and renumbering the claims to place each claim as close as possible to the parent claim from which it depends is presented in response to selecting Number Claims and an Element Combinations option for displaying the element combinations assigned to a selected element name in the plural without an adjective and all reference numerals used with that selected element name differentiated by adjectives is presented in response to selecting Mark Element. | 2011-09-22 |
20110231326 | Web-Based System and Method for Collection and Management of Real Estate Open House Data - A system and method for management of real estate open house data includes a database and a website configured to provide access to information from the database. The website is configured to communicate with a user identification device, in the form of a user's cell phone or other mobile device, upon a user's entry into the open house, to transfer user identification data to the database. | 2011-09-22 |
20110231327 | METHODS, SYSTEMS, AND DEVICES FOR VERIFYING AND APPROVING GOVERNMENT REQUIRED RELEASE FORMS - The disclosure herein provides methods, systems, and devices for managing, transferring, modifying, converting and/or tracking medical files and/or medical system messages. In certain embodiments, the foregoing may generally be based on requesting medical files at a first medical facility, identifying the requested medical files at a second medical facility, initiating a secure network connection between the first and second medical facility, modifying a header portion of the medical files based on patient identification information created by the first medical facility, and other processing steps. | 2011-09-22 |
20110231328 | Methods And Systems For Shareholder Information Sharing And Collaboration - Methods and systems for a server-based internet accessible efficient exchange of shareholder information between mutual shareholders, shareholder representatives, concerned parties, and the concerned corporations utilizing a database and software for automatic execution of the methods. The database contains, for example, individual account data of registered shareholders, a data base of known corporate contact information. Software applications provide, for example, an email generating application, a date/time keeping application, an evaluation and outcome application that displays process information, an electronic notification process, a database recording function that records the correspondence, and a search function that allows concerned members to access the historical data. | 2011-09-22 |
20110231329 | CAREER AND EMPLOYMENT SERVICES SYSTEM AND APPARATUS - Systems, methods, distributed networks, and computer-readable media are provided that relate to recruiting and employment. Background information associated with talent-capability attributes is received from talent. Job description information is received from employers. Prospective matches are identified between employers and candidates, and employers and candidates are given an opportunity to exchange information. | 2011-09-22 |
20110231330 | JOB MATCHING METHOD - A job matching method that matches applicants with employers is revealed. The job matching method includes steps of providing a plurality pieces of capability information of a job seeker, creating a capability map by quantifying the pieces of capability information, and matching the capability map with a plurality of recruitment requirements. Thus the job applicant's capabilities are shown by the capability map clearly and the employers find qualified candidates more quickly. The length of the interview is reduced and the recruitment period is minimized. Therefore, the recruitment is more efficient. | 2011-09-22 |
20110231331 | Providing An Enhanced Shopping Experience - Methods, apparatus, and products are disclosed for enhancing a shopping experience that include: determining, by a self-checkout terminal, that a shopper invoked a help event; selecting, by the self-checkout terminal in dependence upon the help event, a shopper assistant to assist the shopper; and providing, by the self-checkout terminal to the shopper, distinguishing information identifying the shopper assistant. | 2011-09-22 |
20110231332 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER FOR ACCESSING ACCOUNT INFORMATION USING A WEB-ENABLED DEVICE - Systems, methods, and computer program products are provided for authenticating and efficiently re-authenticating a user with a financial institution in order to gain access to account information using a web-enabled device. The web-enabled device stores user profiles associated with the user including authentication information provided by the user during primary authentication. The device retrieves the authentication information upon secondary authentication, that is, validation of the user's identity, which in some embodiments, includes local validation of a personal identification number (“PIN”) and/or a remote control passcode (“RCP”). As such, the web-enabled device re-authenticates the user without requiring authentication communication with a financial institution server, and thereafter, the user interacts with an application running on the web-enabled device to retrieve desired account information from the financial institution server. | 2011-09-22 |
20110231333 | REGISTRATION METHOD AND REGISTRATION SYSTEM OF NETWORK SERVICE SYSTEM - A registration method includes dividing data items needed for registration into a first batch of data items needing to be verified and a second batch of data items not needing to be verified; receiving, by user side device, a first batch of content items corresponding to the first batch of data items, transmitting the first batch of content items to server side device before receiving a second batch of content items; invoking, by server side device, a verification standard, verifying the first batch of content items, identifying content items in the first batch with “verification-passed” if verification is passed, identifying content items in the first batch with “verification-failed” if verification isn't passed; after receiving the second batch of content items and if all content items in the first batch are identified with “verification-passed”, registering user, taking the first and second batches of content items as data of user, identifying user with “verification-passed”. | 2011-09-22 |
20110231334 | Parcel delivery system and method - A system and method for providing a shipper with a carrier service based on mix and match of transit days and times for better matching of shipper's needs with carriers' services. The shipper inputs origin and destination, wherein distance is calculated between origin and destination zip codes and a zone is assigned corresponding to transit days. The shipper is then presented with options and cost to ship based on transit days. Shipper makes the decision and the computer presents the shipper with options and cost for delivery time based on the distance from carrier's facility. Shipper then makes a decision based on delivery time, and the package is routed through the appropriate network. Shipper can also make both decisions about day and time for delivery (including delivery by desired appointment window of one, two or such defined time period in minutes or hours) in one step. | 2011-09-22 |
20110231335 | SYSTEM FOR OPTIMIZING TRANSPORTATION SCHEDULING - A computer modeling application is disclosed for finding the optimal solution to maximize total net margin, for the assignment of vehicles (e.g., especially vessels) in an available fleet to perform a set of voyages to transport cargo comprising one or more bulk products during a planning period, as well as an apparatus and method employing the same. The fleet can include term vehicles and spot vehicles. The vehicles, voyages, and cargos can be heterogeneous. In one embodiment, the vehicles are crude carrier vessels and the bulk products are different grades of crude oil. To increase speed, the model is broken into linear programming and mixed integer (linear) programming problems. The model can be run on a real-time basis to support complex scheduling operations. | 2011-09-22 |
20110231336 | FORECASTING PRODUCT/SERVICE REALIZATION PROFILES - Past realization profiles can be used to predict future realization profiles using a similarity rubric that emphasizes relationships between the past realization profiles. That similarity rubric might involve techniques including manifold characterization of past realization profiles; predictive modeling; and/or matrix factorization. Realization profiles might be related to business projects and track features such as ongoing resource expenditure, revenues realized, or percentage project completion. Realization profiles might relate to other applications such as effectiveness of medical treatment. | 2011-09-22 |
20110231337 | COMPUTER MANAGED RETIREMENT FUND AND METHOD FOR GENERATING INCREASED REVENUE STREAM - A retirement fund program managed by computer software requiring an initial fixed investment and producing an ever increasing revenue stream to a group of participant investors organized by life expectancy and grouped into an investment partnership. A financial portfolio is created from the monies invested by each investor and is used to manage high quality securities to generate income for the partnership. Periodically, the surviving members of the partnership are entitled to receive the revenue generated from the portfolio, which statistically will increase as fewer participant investors survive. The partnership can purchase term life insurance on each participant investor, so that the initial investment can be returned to the estate of a participant investor if the participant investor becomes deceased during the program. Upon termination of the program, all remaining assets will be distributed pro rata among the living participant investors of the investment partnership. | 2011-09-22 |
20110231338 | Generating And Providing Information About Expected Future Prices of Assets - Data are received that represents current prices of options on a given asset. An estimate is derived from the data of a corresponding implied probability distribution of the price of the asset at a future time. Information about the probability distribution is made available within a time frame that is useful to investors, for example, promptly after the current option price information becomes available. | 2011-09-22 |
20110231339 | SYSTEM AND METHOD FOR MANAGING AND EVALUATING NETWORK COMMODITIES PURCHASING - Comparison values are calculated for evaluating a commercial transaction. A request for quote received from a buyer agent includes a product specification data set that identifies items that differ in accordance with at least one parameter. Price data sets received from seller agents identify items and prices in response to the product specification data set. At least one of the price data sets identifies an item having a different parameter value as compared to the item in another price data set. A comparison value for each price data set is generated by determining a price total from the price data set and calculating a summed market price total by summing market price totals for each of the items. Calculating market price totals includes obtaining metric data indicative of market prices. The summed market price total is compared to the price total for the price data set to generate the comparison value. | 2011-09-22 |
20110231340 | Systems, methods, and media for automatically controlling trade executions based on percentage of volume trading rates - Systems, methods, and media for automatically controlling trade executions based on percentage of volume trading rates are provided. In some embodiments, systems for automatically controlling trade executions based on percentage of volume trading rates, are provided, the systems comprising at least one processor that: determines a market impact relationship for each of a plurality of positions included in a portfolio; determines a risk model associated with the portfolio; solves for a percentage of volume trading rate for each of the plurality of positions included in the portfolio based on the market impact relationship and the risk model; and causes trades to be executed in at least one of the plurality of positions included in the portfolio at the percentage of volume trading rate corresponding to the at least one of the plurality of positions. | 2011-09-22 |
20110231341 | Substantial Equity Content Trust Preferred ("SECTRS") - A hybrid financial instrument, based on the traditional trust proffered structure, is designed to be more equity-like than debt-like. The financial instrument is designed to have permanence, ongoing payments, and loss absorption characteristics that meet rating agency requirements for favorable equity-like treatment. | 2011-09-22 |
20110231342 | ELECTRICITY USAGE PLANNER - A device for aiding in planning electricity usage in areas that use time of day electricity rates is provided. The device consists of a compact digital electricity cost indicator that displays the current time, day, date, applicable cost structure such as season, weekend, or holiday, and current cost of electricity, and a retractable electricity rate card for quick visualization of electricity rates throughout the day. | 2011-09-22 |
20110231343 | Method utilizing private bifurcated counter-balancing risk pools to reduce a public sanitation authority's financial and legal liability caused by defective, privately-owned sewer lateral service lines - A public/private sector cooperative method, and interrelated steps, utilizing a private third-party indemnification pool structure, coupled with a bifurcated, counterbalancing environmental risk pool, to create a community-wide, public inspection program, and a privately-funded maintenance, repair, rehabilitation methodology for inflow/infiltration defective, privately-owned sewer lateral lines, revealed through sewer emergencies or discovered during public inspections. The methodology and steps designed to reduce the financial, legal, public safety, health and environmental risks defective privately-owned sewer lateral service lines create and impose upon public sewer authorities, who have no, or limited, financial or legal jurisdiction over private sewer lines. The pools share counter-balancing risks under defined circumstances and are interchangeable with a variety of funding mechanisms, including but not limited to insurance, reinsurance, reserves, bifurcated premiums, bifurcated fees, corporate guarantees, grants, gifts, contractual liability policies, loss reserves, retrospective profit sharing, experience rated dividends, risk retention, or other similar funding and insuring vehicles. | 2011-09-22 |
20110231344 | Continuous Gift Card - A method of providing a gift card having a value to a user, comprising determining the products or services to be included, determining terms, determining a value for the products or services, determining whether to allow the user to use all of the offer, specifying a selection of the products or services available, aggregating the maximum total value of the offer; preparing the card, the card have a listing of the products and services, the selection of the products or services available, and the maximum total value of the offer, and sending the card to the user. The user selects choices from the selection of the products or services in the offer up to the maximum total value of the offer. | 2011-09-22 |
20110231345 | Textile Marking & Textile Ownership Registration - The present invention relates to the field of textile marking and textile ownership registration. More specifically, the present invention relates to a method of marking a textile model insignia onto a textile article and a method of textile ownership registration with the help of a textile ownership ID or a textile ID. An object of the present invention is to indicate the price range of a textile article by displaying a textile model insignia. Another object of the present invention is to enable textile ownership registration with the display of a textile ownership ID or a textile ID. | 2011-09-22 |
20110231346 | AUTOMATED LEGAL EVALUATION USING BAYESIAN NETWORK OVER A COMMUNICATIONS NETWORK - A method for legal knowledge modeling and automated legal evaluation, such as for online, questionnaire-based legal analysis, is provided. Information, such as facts and characteristics of a legal situation or legal scenario, as it relates to a legal conclusion or a legal result, in addition to the probabilities of such conclusions or results, are modeled in a Bayesian Network. The Bayesian Network may comprise instantiable nodes, fault nodes, intermediary nodes, a utility node and decision nodes. The Bayesian network is automatically updated on a periodic basis to reflect new legislation or court decisions. Using Bayesian inference, the conditional probability of a legal conclusion based on a user's answers to a questionnaire may be determined. These conditional probabilities are modified upon the input of evidence, which is typically in the form of answers to a dynamic set of questions designed to identify a legal conclusion or a legal result. | 2011-09-22 |
20110231347 | Named Entity Recognition in Query - Named Entity Recognition in Query (NERQ) involves detection of a named entity in a given query and classification of the named entity into one or more predefined classes. The predefined classes may be based on a predefined taxonomy. A probabilistic approach may be taken to detecting and classifying named entities in queries, the approach using either query log data or click through data and Weakly Supervised Latent Dirichlet Allocation (WS-LDA) to construct and train a topic model. | 2011-09-22 |
20110231348 | Regularized Dual Averaging Method for Stochastic and Online Learning - Described is a technology by which a learned mechanism is developed by solving a minimization problem by using regularized dual averaging methods to provide regularized stochastic learning and online optimization. An objective function sums a loss function of the learning task and a regularization term. The regularized dual averaging methods exploit the regularization structure in an online learning environment, in a manner that obtains desired regularization effects, e.g., sparsity under L1-regularization. | 2011-09-22 |
20110231349 | SYSTEMS AND METHODS OF COGNITIVE PATTERNS KNOWLEDGE GENERATION - A processor based system and method of generating cognitive pattern knowledge of a sensory input is disclosed. The method comprising the steps of receiving sensory input to create at least one concrete pattern, receiving at least one abstract pattern comprising abstract segments and vertically blending the concrete pattern with the abstract pattern by selectively projecting abstract segments to create a vertically blended pattern whereby the vertically blended pattern represents cognitive pattern knowledge of the sensory input. In some embodiments, the systems and methods further comprise creating a measure of a degree of vertical blending and when the measure of the degree of vertical blending exceeds a threshold, horizontally blending at least two abstract patterns to create a horizontally blended abstract pattern. | 2011-09-22 |
20110231350 | ACTIVE METRIC LEARNING DEVICE, ACTIVE METRIC LEARNING METHOD, AND ACTIVE METRIC LEARNING PROGRAM - An active metric learning device includes a metric application data analysis unit, a metric optimization unit, and an attribute clustering unit. The metric application data analysis unit is formed with a metric applying module for calculating the distance between data to be analyzed, a data analyzing module for analyzing the data using a predetermined function and the distances between the data to be analyzed and outputting the result of the data analysis, and an analysis result storage unit for storing the result of the data analysis. The metric optimization unit is formed with a feedback converting module for creating side information according to the command of feedback from the user and a metric learning module for generating a metric matrix optimized under a predetermined condition using the created side information. The attribute clustering unit clusters the metric matrix optimized by the metric optimization unit and structuralizes the attributes. | 2011-09-22 |
20110231351 | Feedback in Group Based Hierarchical Temporal Memory System - A Hierarchical Temporal Memory (HTM) network has at least first nodes and a second node at a higher level than the first nodes. The second node provides an inter-node feedback signal to the first nodes for grouping patterns and sequences (or co-occurrences) in input data received at the first nodes at the first nodes. The second node collects forward signals from the first nodes; and thus, the second node has information about the grouping of the patterns and sequences (or co-occurrences) at the first nodes. The second node provides inter-node feedback signals to the first nodes based on which the first nodes may perform the grouping of the patterns and sequences (or co-occurrences) at the first nodes. | 2011-09-22 |
20110231352 | Validation Mechanisms for Simulations of Complex Systems - A method of and apparatus and software for validating a computer model of a complex system comprising eliciting information regarding the complex system from one or more human experts, determining from the elicited information a set of variables and a set of constraints on those variables regarding the complex system, automatically by computer examining output of the computer model to locate violations of determined constraints, and generating output establishing any located violations. | 2011-09-22 |
20110231353 | ARTIFICIAL INTELLIGENCE APPLICATION IN HUMAN MACHINE INTERFACE FOR ADVANCED INFORMATION PROCESSING AND TASK MANAGING - Methods and software provided for an AI application system that process user's needs through an intelligent user-system interface process. The user-system interface starts from user initial request, followed by system analysis to process with its algorithm, then question user to further clarify the request and refine it into specific request needs, details and categories, then collect, analyze and judge relative information, proceed to guide user find the most appropriate answer for the needs, together with other latest news and community/other users' feedback on this subject, and have the capabilities of assisting user executing the task needs. Thus greatly enhance the usability and efficiency of the artificial intelligence application to the world in information age. | 2011-09-22 |
20110231354 | TRANSPORT MANAGEMENT SYSTEM - A car pooling transport management system ( | 2011-09-22 |
20110231355 | INTELLIGENT UBIQUITOUS-CITY MIDDLEWARE APPARATUS AND THE U-CITY SYSTEM HAVING THE SAME - An intelligent U-City middleware apparatus and the U-City adopting the same are disclosed. The intelligent U-City middleware apparatus provides intelligent service based on context-awareness and a variety of intelligent ubiquitous convergence services for the applications of U-City. It is composed of four layers: Common Device Interface Layer, Context-aware Computing Layer, Ubiquitous Core Computing Layer and Common Application Interface Layer. The layers cooperate to give intelligent ubiquitous convergence services and provide the advantages of layered architecture. | 2011-09-22 |
20110231356 | FlexSCAPE: Data Driven Hypothesis Testing and Generation System - The present invention relates to a method for generating hypotheses automatically from graphical models built directly from data. The method of the present invention links three key scientific concepts to enable hypothesis generation from data driven hypothesis-models: including the use of information theory based measures to identify informative feature subsets within the data; the automatic generation of graphical models from the informative data subsets identified from step one; and the application of optimization methods to graphical models to enable hypothesis generation. The integration of these three concepts can enable scalable approaches to hypothesis generation from large, complex data environments. The use of graphical models as the model representation can allow prior knowledge to be effectively integrated into the modeling environment. | 2011-09-22 |
20110231357 | INTER-FACILITY MOVEMENT ESTIMATION APPARATUS, METHOD AND PROGRAM - In general, embodiments provide an inter-facility movement estimation apparatus including: a movement map which stores location information about facilities and movement times therebetween; a positioning unit which obtains user's location information when starting a movement; a movement candidate list which stores given movement path candidates; a movement situation estimating unit which estimates a user's movement situation; a movement path estimating unit which selects, whenever the movement situation is changed, estimated movement path candidates from the given movement path candidates based on the nearest facility and the user's movement situation; and an adjusting unit which changes the likelihoods of the estimated movement path candidates, wherein one of the estimated movement path candidates having a highest likelihood thereamong is specified as an actual movement path of the user. | 2011-09-22 |
20110231358 | Method and apparatus for loading data files into a data-warehouse system - Date-warehouse systems are populated using an enhanced Extraction-Load-Transform (ETL) process and system by employing three ideas: Out-of-order-fill ETL, relative-ordering index (ROI), and dependent queries. Out-of-order-fill ETL allows a data warehouse to accept the loading of data files in any order, and does not require the loading of any previous backup data files in order to provide some functionality to end users under the view that some functionality or data access is better than none at all. Dependent queries are processes that use defined data structures for use in constructing, extracting, and validating each record to be written in said data-warehouse system in order to ensure that referential integrity is maintained and that no orphaned data is pushed into the data warehouse. Finally, ROI is a process wherein a value is determined, based on the constraints of the source data, which indicates the relative newness of the data. | 2011-09-22 |
20110231359 | SYNCHRONIZATION OF RELATIONAL DATABASES WITH OLAP CUBES - A method of synchronizing a source system that stores its records in a relational database and defines its own application level security with an OLAP cube, in which the structure of the relational database and cube is modelled to an intermediate representation for the purpose of comparing both structures; the differences between the two models are identified and used to modify the structure of the cube; the modified structure of the cube is used to generate a script for retrieving data from the relational database for insertion into the cube, after which the script is run and the data is inserted into the modified cube. A unique identifier is used for each item in the base system and each system is tagged with the same identifier in the cube. | 2011-09-22 |
20110231360 | Persistent flow method to define transformation of metrics packages into a data store suitable for analysis by visualization - A persistent flow provides a contract for delivering certain measures in a format which can be interactively analyzed along certain dimensions. It defines how a large number of metrics packages may be transformed into one or more hypercubes within a datamart. In particular a Carrier IQ persistent flow defines the dimensions along which key performance indicators may be displayed interactively in at least one dashboard with analytic tool controls. A persistent flow is stateful to incrementally process metrics packages over multiple collection periods which are not correlated with the times the metrics are recorded at the device. A flow defines the measures to be derived from metrics and the attributes of the measures of interest in a study. A flow defines enrichments that may be determined by examining measures from apparently independent sources and uses reference files to decode status records. A persistent flow provides an up-to-date view in the datamart by being run on a regular schedule to combine the most recently received data with previous intermediate results, thereby improving performance and avoiding staleness. | 2011-09-22 |
20110231361 | CONSOLIDATED SECURITY APPLICATION DASHBOARD - A consolidated security application dashboard system is described wherein a plurality of endpoint systems include visibility agents that collect status and event attributes/metrics from a plurality of security applications and upload the information to datamarts on a backend server. The backend server aggregates and processed the security application attributes/metrics to enable configurable dashboards to present summary and detailed information to IT users about the security metrics relating to a group of endpoints. | 2011-09-22 |
20110231362 | EXTENSIBLE DATA DEDUPLICATION SYSTEM AND METHOD - A system and method for data deduplication is presented. A deduplication system includes a plurality of data deduplication nodes; and a data deduplication control node communicatively coupled to the plurality of data deduplication nodes. The deduplication control node performs the operations of performing data deduplication operations at a deduplication system having one or more deduplication nodes at which deduplication data blocks are stored; monitoring a performance characteristic of the deduplication system; and adding an additional deduplication node to the deduplication system when the performance characteristic indicates performance of the system below a predetermined minimum. | 2011-09-22 |
20110231363 | SYSTEM AND METHOD FOR GENERATING AND UPDATING INFORMATION OF CONNECTIONS BETWEEN AND AMONG NODES OF SOCIAL NETWORK - A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module. | 2011-09-22 |
20110231364 | ID MANAGEMENT METHOD, ID MANAGEMENT SYSTEM, AND COMPUTER-READABLE RECORDING MEDIUM - Provided is an information processing apparatus | 2011-09-22 |
20110231365 | CONTAINMENT AGNOSTIC, N-ARY ROOTS LEVERAGED MODEL SYNCHRONIZATION - A technique for annotating and synchronizing on a device is provided. A client root model of fragments is marked with annotations in response to triggers received by an application of the device. Marking the client root model of the fragments with annotations includes at least: in response to the any of the fragments being extracted out and flagged, marking the client root model with annotations; in response to binding any of the fragments to a source, marking the client root model of the fragments with annotations and marking the client root model as flagged; and in response to sharing in any the of fragments, marking the client root model with annotations. | 2011-09-22 |
20110231366 | REMOTE DATA MIRRORING SYSTEM - A method for data protection includes accepting data for storage from one or more data sources ( | 2011-09-22 |
20110231367 | System and method for backing up data - A hash-optimized backup system and method takes data blocks and generates a probabilistically unique digital fingerprint of the content of each data block using a substantially collision-free algorithm. The process compares the generated fingerprint to a database of stored fingerprints and, if the generated fingerprint matches a stored fingerprint, the data block is determined to already have been backed up, and therefore does not need to be backed up again. Only if the generated fingerprint does not match a stored fingerprint is the data block backed up, at which point the generated fingerprint is added to the database of stored fingerprints. Because the algorithm is substantially collision-free, there is no need to compare actual data content if there is a hash-value match. The process can also be used to audit software license compliance, inventory software, and detect computer-file tampering such as viruses and malware. | 2011-09-22 |
20110231368 | ERROR TRACKING METHOD AND SYSTEM - Data storage services are provided for clients for backup of data objects from the clients. A data object is sent to a first location in a first storage device. A determination is made if the data object was successfully stored at the first location, and if so, meta data corresponding with the data object is stored, wherein the meta data includes first path information on a first data path of the data object to the first location. The data object is migrated from the first location to a second location in a second storage device. A determination is made if the data object was successfully stored at the second location, and if so, second path information on a second data path of the data object is added to the second location to the meta data corresponding with the data object, to update the meta data. | 2011-09-22 |
20110231369 | STORAGE CONTROLLER FOR MIRRORING DATA WRITTEN TO CACHE MEMORY AREA - A first controller has a first CM area having a plurality of first sub-areas, and a second controller has a second CM area having a plurality of second sub-areas. The first controller stores first data in any of the first sub-areas, and in addition, stores a mirror of the first data (first mirror data) in any of the second sub-areas. The first controller manages a pair (an association relationship) of the storage-destination first sub-area of the first data and the storage-destination second sub-area of the first mirror data. Similarly, the second controller stores second data in any of the second sub-areas, and in addition, stores a mirror of the second data (second mirror data) in any of the first sub-areas. The second controller manages a pair (an association relationship) of the storage-destination second sub-area of the second data and the storage-destination first sub-area of the second mirror data. | 2011-09-22 |
20110231370 | Mechanism for Unioning File Systems Using Fall-Through Directory Entries - A mechanism for unioning file systems using fall-through directory entries is disclosed. A method of embodiments of the invention includes receiving a request to open a directory of a union file system, processing directory entries of the directory for whiteouts and duplicates, copying the processed directory entries to disk storage, and flagging the copied entries from a lower level file system as fall-through entries. | 2011-09-22 |
20110231371 | METHOD, SYSTEM AND APPARATUS FOR ARCHIVING DATA - A method, server and mobile electronic device for archiving data are provided. The server determines that an amount of the data managed by the server meets a threshold condition and in response transmits a message to the mobile electronic device associated with the data, the message indicative that the threshold condition has been met. The mobile electronic device responds to the message with a response indicative that the data is to be archived. The response triggers the server to cause at least a portion of the data to be archived, thereby increasing memory available for storing further data. | 2011-09-22 |
20110231372 | Adaptive Archive Data Management - In one embodiment, input is received from a user defining a classification and an analytic for the classification. Multiple classifications and analytics may be defined by a user. A definition of relevance parameters is determined that characterize the classification and a set of analytics measures associated with the analytic. The definition may be for the classification. Unstructured data and structured data are analyzed based on the definition of the relevance parameters to determine relevant data in the unstructured data and the structured data. The relevant data being data that is determined to be relevant to the classification defined by the user. An index of the terms from the relevant data is determined. The index is useable by an analytics tool to provide results for queries of the unstructured data and structured data. The query may be used within the classification such that targeted results are provided using the index and the relevant data to the classification. Thus, queries from different classifications may be performed efficiently using data determined to be relevant to the classification. | 2011-09-22 |
20110231373 | Taxonomy Mapping - Systems and methods for mapping extension taxonomy elements to a standard base taxonomy and thereafter making use thereof are provided. According to one embodiment, a list of base taxonomy elements is displayed on a display device. A taxonomy map is also displayed on the display device. The taxonomy map includes information regarding one or more extended taxonomy elements of a reporting entity that are not mapped to any base taxonomy elements. Responsive to one or more user input events corresponding to a selection of a base taxonomy element and corresponding to a request to map an extended taxonomy element to the selected base taxonomy element, the compatibility of the selected base taxonomy element with the extended taxonomy element is validated. If the compatibility is affirmed, then an association is formed between the extended taxonomy element and the selected base taxonomy element. | 2011-09-22 |
20110231374 | Highly Scalable and Distributed Data De-Duplication - This disclosure relates to systems and methods for both maintaining referential integrity within a data storage system, and freeing unused storage in the system, without the need to maintain reference counts to the blocks of storage used to represent and store the data. | 2011-09-22 |
20110231375 | SPACE RECOVERY WITH STORAGE MANAGEMENT COUPLED WITH A DEDUPLICATING STORAGE SYSTEM - Provided are techniques for space recovery with storage management coupled with a deduplicating storage system. A notification is received that one or more data objects have been logically deleted by deleting metadata about the one or more data objects, wherein the notification provides storage locations within one or more logical storage volumes corresponding to the deleted one or more data objects, wherein each of the one or more data objects are divided into one or more extents. In response to determining that a sparse file represents the one or more logical storage volumes, physical space is deallocated by nulling out space in the sparse file corresponding to each of the one or more extents. | 2011-09-22 |
20110231376 | METHOD FOR PROCESSING DATA IN TREE FORM AND DEVICE FOR PROCESSING DATA - The data processing method reversibly processing data information input to a data processing device by a processing unit including a data volume reducing unit reducing a data volume of the data information, and a developing unit reconstructing data information reduced in the data volume reducing unit. The processing unit is structured by overlaying processing layers formed of a plurality of cells. The data volume reducing unit performs unit processing on each of the plurality of cells having the data information. The unit processing performs identification processing by a weight according to equivalence and distance of data from a cell group adjacent to the cells, and reduces the cells by each of the processing layers in an order from a lower layer to an upper layer of the processing layers until a data position existing on a time axis of the cells stops to thereby reduces the data volume. | 2011-09-22 |
20110231377 | METHOD OF MANAGING STORAGE AND RETRIEVAL OF DATA OBJECTS - A technique for managing storage of a data object in a storage device involves receiving the data object (A) to store in the storage device, where the data object has an indicator bit pattern (P). Successive compression data transformations are applied to data object A to obtain respective corresponding compressed data objects, and one of these compressed data objects is selected, such that the selected compressed data object (C) has the shortest length with respect to the remaining compressed data objects. Compression information (I) is then associated with the compression data transformation used to generate data object C, and a threshold value T is calculated at least partly from the length of compression information I. If length (C)+T.gtoreq.length (A), then the indicator bit pattern of data object A is reset and the data object A is written to the storage device. If length (C)+T2011-09-22 | |
20110231378 | METHOD AND SYSTEM FOR SECURITY OF FILE INPUT AND OUTPUT OF APPLICATION PROGRAMS - Provided herein is a method and system for the security of the file input and output of application programs. At a security process running step, an application program and an security process are executed independent of a main process of the application program. The security process is connected to a filter driver to control the filter driver. At an event generation step, the filter driver checks an event being processed by the application program, stops the processing of the event, and transfers event information regarding the event to the security process. At a control policy checking step, the security process compares the event information with a corresponding security control policy, and transfers the determination of the comparison to the filter driver. At an execution step, the filter driver continues the following processing of the corresponding event in conformity with the determination of the security process. | 2011-09-22 |
20110231379 | SEARCH ENGINE INFERENCE BASED VIRTUAL ASSISTANCE - Techniques described herein generally relate to real time inference based systems. Example embodiments may set forth devices, methods, and computer programs related to search engine inference based virtual assistance. One example method may include a computing device adapted to receive text as input and a computer processor arranged to determine at least one inference regarding subject matter of the text based on one or more web searches of one or more terms within the text. The inference(s) may then be automatically displayed upon the inference(s) being determined. The text may be automatically received as input from a voice-to-text converter as voice-to-text conversion producing the text is occurring. | 2011-09-22 |
20110231380 | SESSION BASED CLICK FEATURES FOR RECENCY RANKING - In one embodiment, access one or more query chains, wherein each one of the query chains comprises two or more search queries, {q | 2011-09-22 |
20110231381 | SOFTWARE AGENT FOR MONITORING CONTENT RELEVANCE - A reputation monitoring system provides a software process that runs continuously to identify content that is fast moving and deserving of attention by an organizational representative. The system includes a software agent designed to proactively alert subscribers to potentially concerning movements of a content item within search result rankings. The agent tracks a threshold number of search results over time, and utilizes additional contextual services to determine whether to deliver an alert to subscribers. It is not uncommon for negative items to be written about an individual or organization on the web. There is significant value in being able to identify when negative items are written and if they are gaining notoriety. The reputation monitoring system provides a solution by monitoring search results. | 2011-09-22 |
20110231382 | METHODS AND APPARATUS FOR ANALYZING INFORMATION TO IDENTIFY ENTITIES OF SIGNIFICANCE - Embodiments include methods for analyzing information performed by a data analysis system. The method includes parsing data from one or more data sources, resulting in parsed data, forming a plurality of chains of terms from the parsed data, and determining a significance score for an entity identified in one or more of the chains based, at least in part, on one or more positions of the entity within the one or more chains. Embodiments of the method may be used to identify entities of significance (e.g., in a group, organization or social network). | 2011-09-22 |
20110231383 | SYSTEMS AND METHODS FOR USER INTERACTIVE SOCIAL METASEARCHING - A searching system may include a primary server with interfaces for communication with databases or with underlying search engines. The primary server may be adapted to receive a search query from a client under instructions from a user; and retrieve search results and transmit the results as a response to the client. The primary server may be adapted to store search data sets of relevant results for queries by users who are member of the set. The primary server may be adapted to select a search data set of which the user for the query is a member, and to use said search data set in providing the response to the query. The primary server may be adapted to download data concerning the selected search data set to the user. The primary server may be adapted to automatically update the search data set according to the results selected by the user. | 2011-09-22 |
20110231384 | EVOLUTIONARY TAGGER - The invention is a process, system, workflow system for data retrieval processes, software, Web Site, service and SaaS (Software as a Service) created to support a data retrieval process from various document types to custom or preset retrieval data structures. The program supports manual, automatic and semiautomatic data retrieval using its internal features or external add-ons. It links data points in the structure to the corresponding data points in the document, stores documents, structures and links between them and outputs results in various formats. Links between a document and a retrieval data structure are established either automatically or manually by the user. After all required links are set, results can be retrieved from the program as an XML (Extensible Markup Language) structure with required data or as a PDF (Portable Document Format) or HTML (Hypertext Format Language), in MS Office formats and others containing a/the retrieval data structure, the original document or both with links between corresponding data points. | 2011-09-22 |
20110231385 | OBJECT ORIENTED DATA AND METADATA BASED SEARCH - An object oriented search mechanism extracts structural metadata and data based on type of document contents and data sources connected to the documents. Relationships between textual and non-textual elements within documents as well as metadata associated with the elements and data sources are utilized to generate a unified object model with the addition of semantic information derived from metadata and taxonomy, which are used to enhance search indexing, ranking of search results, and dynamic adjustment of result rendering user interface with fine tuned relevancy. Additional data from data sources connected to the documents may also be used to unlock hidden data such as data that has been filtered out in an original document. | 2011-09-22 |
20110231386 | INDEXING AND SEARCHING EMPLOYING VIRTUAL DOCUMENTS - Relationships between linked and/or embedded documents as well as documents sharing data source(s) are captured and rendered through virtual documents. Virtual documents are created representing linked/embedded documents and data sources associated with a relevant document. Relationships between real and virtual documents are preserved and rendered along with search results providing a user a comprehensive picture of search results. | 2011-09-22 |
20110231387 | ENGAGING CONTENT PROVISION - A model is created and from seed trivia facts will create a database of pruned and ranked trivia facts and associated trigger terms. Search, email, or other information provider systems are configured to detect usage of the trigger terms and provide relevant trivia facts in response to the usage. | 2011-09-22 |
20110231388 | E-BOOK READ APPARATUS AND OPERATION THEREOF - An operation method for an e-book is provided that links to an index database of the e-book, wherein the index database has a plurality of index objects and a plurality of index information corresponding to each of index objects. In addition, the index formation shows page numbers of a plurality of pages having the index objects in the e-book. Then, a plurality of briefs of the pages recorded in each of index information are obtained, and added in to corresponding index information for rebuilding index database. When one of index objects is selected on an index screen, the updated index information of the selected index object is showed on the index screen by the present invention. | 2011-09-22 |
20110231389 | ADAPTIVE ROW-BATCH PROCESSING OF DATABASE DATA - Architecture that provides for greater interoperability between column stores and row stores by leveraging the advantages both have to offer. The architecture operates automatically (e.g., dynamically) to move between row oriented processing mode and batch processing mode, and the combination thereof, when it is more beneficial to run in one mode relative to the other mode, or both modes. The auto-switching of data processing between batch and row oriented mode occurs during the execution of a single query. The architecture can automatically modify an operator in the query tree and/or remove an operator if desired at runtime for more efficient processing. This approach also accounts for memory constraints for either of row or column processing. | 2011-09-22 |
20110231390 | SESSION BASED CLICK FEATURES FOR RECENCY RANKING - In one embodiment, access one or more query-resource pairs, wherein for each one of the query-resource pairs comprising one of one or more search queries and one of one or more network resources, the one search query is recency-sensitive with respect to a particular time period, and the one network resource is identified for the one search query, and a resource-view count and a resource-click count associated with each one of the query-resource pairs; and construct one or more first click features using the resource-view counts and the resource-click counts associated with the query-resource pairs. To construct one of the first click features in connection with one of the query-resource pairs comprises determine a only-resource-click count associated with the one query-resource pair; and calculate a ratio between the only-resource-click count and the resource-view count associated with the one query-resource pair as the one first click feature. | 2011-09-22 |
20110231391 | PROJECT MANAGEMENT DATABASE AND METHOD OF MANAGING PROJECT RELATED INFORMATION - A database, and method of using the same, are provided for managing professional services projects. Professional services practices typically employ distributed proprietary applications which complicate the ready transfer of data between and among applications. The database of the present invention is preferably built on an ODBC-compliant platform, such as Lotus Notes and operates in conjunction with an SQL database server and supplied to an ODBC-compliant database in Lotus Notes. The data is stored in portable format in the Lotus Notes database, providing an easily accessible data warehouse for the professional services practice. | 2011-09-22 |
20110231392 | Unified Search Interface - Methods, systems, and computer program products feature determining a plurality of search result items responsive to a search query. A plurality of search modes are identified based on the query or the plurality of search result items or both. Each search mode is associated with a respective collection of records. The plurality of search result items are provided to a user with an indication of each search mode in the plurality of search modes. User input selecting a first search mode is received, where the first search mode is one of the plurality of search modes. One or more mode-specific search result items are determined based on the search query, where each mode-specific search result item is from the collection of records that is associated with the first search mode. The one or more mode-specific search result items are provided to the user. | 2011-09-22 |
20110231393 | Determining Presence Of A User In An Online Environment - Disclosed herein is a computer implemented method and system for determining presence of a first user by a second user in an online environment. The first user provides the first user's profile information and characteristic information. The first user marks keywords in the characteristic information. The first user marks the keywords based on inference of second user's knowledge about the first user. The marked keywords are categorized into predefined categories. The second user provides search words. The search words are compared with the characteristic information and the keywords to find matches. The matches are weighted. Search indexes are generated for the weighted matches based on a predetermined criterion. The weighted matches with the generated search indexes are provided to the second user. The selected profile information corresponding to the predefined categories comprising the categorized keywords for which the weighted matches have high search indexes, is displayed to the second user. | 2011-09-22 |
20110231394 | BOOTSTRAP AND ADAPT A DOCUMENT SEARCH ENGINE - Architecture that employs a modeling technique based on language modeling to estimate a probability of a document matching the user need as expressed in the query. The modeling technique is based on the data mining results that various portions of a document (e.g., body, title, URL, anchor text, user queries) use different styles of human languages. Thus, the results based on a language can be adapted individually to match the language of query. Since the approach is based on adaptation, the framework also provides a natural means to progressively revise the model as user data are collected. Different styles of languages in a document can be recognized and adapted individually. Background language models are also employed that offer a fallback approach in case the document has incomplete fields of data, and can utilize topical or semantic hierarchy of the knowledge domain. | 2011-09-22 |
20110231395 | PRESENTING ANSWERS - Systems, methods, and computer-storage media for presenting answers are provided. The system includes a search engine to receive user queries and contexts, a query understanding component to provide results, and an answer generator to present answers to the user queries. The answers may include a link to a browser that provides a graph, table, or cluster for the results, where nodes of the graph are associated with a confidence level. | 2011-09-22 |
20110231396 | SYSTEM AND METHOD FOR PROVIDING PREDICTIVE CONTACTS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing predictive contacts. A system configured to practice the method first analyzes a communication history and a current usage context of a user. Based on the analysis, the system ranks contacts that the user is likely to communicate with from a list of contacts to yield ranked contacts. The system identifies a respective motive for ranking each contact, and presents a predictive list of contacts based at least in part on the ranked contacts, wherein each ranked contact in the predictive list of contacts includes at least part of the respective motive. The system can update the predictive list of contacts in real time as the current usage context changes. The communication history can include, for example, emails, instant messages, phone calls, video conferences, and calendar events. The motive can include a user interaction history with a particular contact. | 2011-09-22 |
20110231397 | METHOD AND SYSTEM FOR COMPILING A UNIQUE SAMPLE CODE FOR A DIGITAL SAMPLE - Methods for providing a digital sample with a unique sample code. Methods for gaining access to a digital sample provided with a unique sample code. Computer-readable media with computer-executable instructions and compiled sample codes for accessing digital samples, including physical embodiment of codes such as bar codes or other visually perceptible, radio frequency identification (RFID) codes. Databases comprising one or a multiple such sample codes. Systems for compiling a unique sample code and systems for handling a user's request for gaining access to a digital sample provided with a sample code. User devices with resources to use sample codes and obtain access to corresponding digital samples. | 2011-09-22 |
20110231398 | Single Repository Manifestation Of A Multi-Repository System - Techniques are provided for manifesting a multiple repository system as a single repository to an application that is designed to use a single repository. According to one aspect, a particular container, which is used by the application to store data, is identified. One or more additional containers are created in one or more different repositories. Each of the additional containers is formatted to store the data that the application stores in the particular container. A construct is created. The construct is associated with the particular container's identifier. The construct causes information from the particular container and each of the additional containers to be combined to answer database commands that reference the particular container's identifier. As a result, data stored in a single repository can be distributed among multiple repositories, and the unmodified application can continue to access that data as though the data was stored in the single repository. | 2011-09-22 |
20110231399 | Clustering Method and System - The present disclosure discloses a method and system for clustering. The method includes: vectorizing a plurality of readable files to obtain a plurality of file vectors corresponding to the multiple readable files; extracting a total characteristic vector based on the file vectors; and clustering the readable files based on a ranking result of a respective similarity degree between the total characteristic vector and each of the file vectors. The present disclosure also provides a method and system for clustering webpages. An application of the methods or systems described in the present disclosure reduces the number of times of comparison of similarity degrees between file vectors, and further reduces the resulting burden on system resources. This advantageously results in reduced usage of CPU and memory, reduced run time of clustering and improved performance of clustering. | 2011-09-22 |
20110231400 | Method of Editing Document and Document Managerial System and Electronic Device Using the Same - Disclosed herein are a document manipulating method, a document managerial system, and an electronic device using the same. The electronic device includes the system, an activating unit, a determining unit and a placing unit. The system includes at least one label of a searchable and classifiable format, a database accessible by the electronic device, and a searching and classifying engine. The method includes the steps of activating a document, determining a labeling location and a labeling size within the document, placing the label at the labeling location to record a document description, and saving the label and a part of the document in the database. | 2011-09-22 |
20110231401 | ENABLING CATEGORY-BASED FILTERING - A category may be associated, in a personal information manager (PIM) application, with a data item by associating a category pattern with the data item. Where the PIM application already associates keyword patterns with data items for enabling keyword searching, the category pattern may have a format of an ordered plurality of elements that satisfies at least one rule for the format of the keyword patterns. Optionally, the first element of the ordered plurality of elements may be an element predetermined to be specific to pluralities of elements associated with categories. Advantageously, this approach to the association of a category with a data item allows for the association of more than one category with a single data item. Such an allowance provides for more accurate synchronization with a PIM application on a desktop that also allows the association of more than one category with a data item. Given the allowance of the association of multiple categories with a single data item, the user may filter a list of data items by one or more categories. | 2011-09-22 |
20110231402 | SYSTEMS AND METHODS FOR CATEGORIZING NETWORK TRAFFIC CONTENT - A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability of accuracy associated with the first characterization, and categorizing the network traffic content based at least in part on the first characterization and the first probability of accuracy. A method for use in a process to categorize network traffic content includes obtaining a plurality of data, each of the plurality of data representing a probability of accuracy of a characterization of network traffic content, and associating each of the plurality of data with a technique for characterizing network traffic content. A method for categorizing network traffic content includes determining a characterization of the network traffic content, determining a weight value associated with the characterization, and categorizing network traffic content based at least in part on the characterization of the network traffic content and the weight value. | 2011-09-22 |
20110231403 | SCALABLE INDEX BUILD TECHNIQUES FOR COLUMN STORES - Architecture that includes an index creation algorithm that utilizes available resources and dynamically adjusts to successfully scale with increased resources and be able to do so for any data distribution. The resources can be processing resources, memory, and/or input/output, for example. A finer level of granularity, called a segment, is utilized to process tuples in a partition while creating an index. The segment also aligns with compression techniques for the index. By choosing an appropriate size for a segment and using load balancing the overall time for index creation can be reduced. Each segment can then be processed by a single thread thereby limiting segment skew. Skew is further limited by breaking down the work done by a thread into parallelizable stages. | 2011-09-22 |
20110231404 | File storage and retrieval method - A file storage and retrieval method or technique for processing alpha numeric information that has particular advantages when accessing data in a database on a computer. The retrieval technique uses the ASCII values of characters in a search string concatenated together to form a numeric value which serves as the index to the data itself or to the index which holds the computer address of the location of the data. This technique allows data to be accessed with only one access when searching for a word or phrase within a database and lends itself for use on static storage systems of the future as well as on current disk based systems. | 2011-09-22 |
20110231405 | Data Structures for Collaborative Filtering Systems - Data structures for collaborative filtering systems are described. In an embodiment sketches which extremely concisely represent a list of items that a user has rated are created and stored for use by a collaborative filtering system to recommend items. For example, the sketches are created by using several versions of a cryptographic hash function to permute the item list and store a minimal value from each permutation in the sketch together with a user rating. In examples the sketches are used to compute estimates of similarity measures between pairs of users such as rank correlations including Spearman's Rho and Kendall's Tau. For example, the similarity measures are used by a collaborative filtering system to accurately and efficiently recommend items to users. For example the sketches are so concise that massive amounts of data can be taken into account in order to give high quality recommendations in a practical manner. | 2011-09-22 |
20110231406 | MULTICAST ADDRESS SEARCH INCLUDING MULTIPLE SEARCH MODES - An information handling system (IHS) includes a network adapter having a hardware address store that stores multicast addresses and a device driver that stores multicast addresses in a software address store. When there is no more storage space available in the hardware address store for multicast addresses, the device driver stores multicast addresses in the software address store. When the IHS receives a multicast information packet, the network adapter searches the hardware address store for a multicast address corresponding to that multicast information packet. If the search of the hardware address store does not find that multicast address, then the device driver searches the software address store for that multicast address. The IHS may prioritize the multicast addresses in the hardware address store and the software address store on a most frequently used basis, a most recently used basis or a most popular basis. For example, the hardware address store may store addresses that are more frequently used than those in the software address store. | 2011-09-22 |
20110231407 | DYNAMIC CONTACTS LIST MANAGEMENT - Contacts lists are dynamically managed in association with communication and collaboration applications and devices. Automated and user defined factors are determined based on information from various resources such as user profile, contact information, past communication information, application/device types, and comparable ones. Factors may be weighted and employed to prioritize contacts lists under different circumstances. Prioritized contacts lists may be provided to a user, stored, updated, or otherwise processed. | 2011-09-22 |
20110231408 | PRIVACY PROTECTION DEVICE, PRIVACY PROTECTION METHOD, AND LIFE LOG MANAGEMENT SYSTEM - A privacy protection device includes an attribute update frequency management unit configured to calculate and record therein an update frequency of each attribute included in a life log of a user in response to storing of the life log; a static attribute extraction unit configured to calculate a threshold value of a change frequency on the basis of a static attribute, an attribute the update frequency of which is less than or equal to the calculated threshold value of the change frequency, the update frequency being recorded by the attribute update frequency management unit; and a notification request reception unit configured to extract the number of users satisfying the notification condition of the notification request, accept the registration of the notification request from the service provider when the extracted number of users exceeds the limit number of persons. | 2011-09-22 |
20110231409 | SYSTEM AND METHOD FOR PREDICTING MEETING SUBJECTS, LOGISTICS, AND RESOURCES - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for predicting the subject, logistics, and resources of associated with a communication event. Predictions and suggestions can occur prior to, during, or in response to communication events. The user can confirm the prediction or suggestion via user input such as a click or a voice command. The system can analyze past behavior patterns with respect to the subject, logistics and resources of communication events, followed by preparing ranked listings of which subjects, logistics, and resources are most likely to be used in a given situation. The predicted logistics may then include people to invite, time and date of the meeting, its duration, location, and anything else useful in helping potential participants gather together. The resources may include files attached, files used, communication event minutes, recordings made, Internet browsers and other programs which may be utilized by the user. | 2011-09-22 |
20110231410 | MARKETING SURVEY IMPORT SYSTEMS AND METHODS - Tabular survey data may be automatically imported into a marketing database, including determining a multi-factor score for each column of data. The multi-factor score rates a relative likelihood that a given column represents survey question and/or survey response data, as opposed to respondent-identifying data. | 2011-09-22 |