49th week of 2011 patent applcation highlights part 56 |
Patent application number | Title | Published |
20110302084 | SYSTEM AND METHOD FOR IMMEDIATE REPLACEMENT OF LOST OR STOLEN CREDIT CARDS/DEBIT CARDS - A method and system for providing uninterrupted access to a credit or debit card account with:
| 2011-12-08 |
20110302085 | METHODS AND SYSTEMS FOR VERIFYING CUSTOMER SUPPLIED FINANCIAL ACCOUNT INFORMATION USING DEBIT AND CREDIT TRANSACTIONS - Embodiment of the invention describe methods and systems for verifying customer supplied financial account information verification using debit and credit transactions. These methods include electronically transmitting an electronic debit and credit transaction to the customer financial account, based on the customer supplied financial account information. The method also includes electronically transmitting a first statement descriptor, as part of at least one of the electronic debit transaction and the electronic credit transaction, that includes a first verification code. The method also includes electronically receiving, from the customer, a second verification code, and comparing, by the computer system, the transmitted first verification code with the received second verification code with respect to each other. The method also includes verifying, by the computer system, the customer supplied financial account information based on the comparison of the verification codes. | 2011-12-08 |
20110302086 | System & Method for Unique Digital Asset Identification and Transaction Management - Digital assets are tracked through the use of digital serial numbers. Systems equipped with the present invention can uniquely identify copies of assets within it. Assets that originate within the system can be uniquely identified even outside the system. The transaction history can be traced by looking up the transaction history associated with an assets' serial number. The serial number applied to an asset is unique to each transaction and can be applied at the time a copy is made. Database entries are created that link each unique serial number to aspects of the transaction. Each serial number can reference details about a particular transaction such as parties involved, date and time of copy, ownership, terms of use, and payment terms. | 2011-12-08 |
20110302087 | COMPREHENSIVE ONLINE FRAUD DETECTION SYSTEM AND METHOD - A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment. | 2011-12-08 |
20110302088 | TOKEN BASED NEW DIGITAL CASH PROTOCOLS - Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital cash token protocols provide strong protection of user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols and digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings. | 2011-12-08 |
20110302089 | ELECTRONIC CREDIT CARD WITH FRAUD PROTECTION - A method for verifying permission to use a payment system such as an electronic credit card, using a hand held communication device such as a smart phone, where the customer presents the communication device to a merchant who extracts account information from the hand held device, and the merchant sends a request for identification verification information to be sent to the hand held communication device directly or to an alternate display. The verification information can be in the form of a photograph, fingerprint, or the like. The merchant can then compare the identification verification data to the customer to determine if the customer is authorized to used the account according to the request. | 2011-12-08 |
20110302090 | Determining a Critical Path in Statistical Project Management - An apparatus for a Gantt chart includes a processing unit which determines a range of dates for an end date for completing a task. The range comprises a first date and a final date. The apparatus includes a display which shows the range of dates for the task completion. A method for a Gantt chart includes the steps of determining a range of dates for an end date for completing a task with a processing unit. The range comprises a first date and a final date. There is the step of showing on a display the range of dates for the task completion. There is the step of showing on a display the range of the end date. An apparatus for establishing a project's performance. A method for establishing a project's performance. | 2011-12-08 |
20110302091 | Auto Repair Estimation System - A system for estimating cost or time to repair a damaged vehicle includes an electronic measuring system that can measure control points of the vehicle and determine whether those control points are out of tolerance (i.e., damaged) even though the damage is not perceptible by the human eye. The system further takes into account various efficiencies and inefficiencies due to extent of damage, type of material, etc. by adding to or subtracting from estimated cost or time. | 2011-12-08 |
20110302092 | SERVICE CENTER SUPPORT - A control unit on a vehicle requests a vehicle service appointment when service is required. Scheduling is performed first with reference to the user's calendar and then by confirmation with the user. | 2011-12-08 |
20110302093 | MITIGATING DISTRIBUTION AND CONSUMPTION OF COUNTERFEIT PRODUCTS - A method, system, and computer usable program product for mitigating distribution or consumption of counterfeit products in a supply chain are provided in the illustrative embodiments. A first set of identifiers is generated to associate with a product to be manufactured. The first set of identifiers includes identifiers corresponding to a customer reference number (CRN), a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The first set of identifiers is associated with the product and a status indicator. The status indicator is set to a first value representative of the product being an original product and the product being available for sale. The first set of identifiers is transmitted to another second application. | 2011-12-08 |
20110302094 | MANUFACTURING AND DISTRIBUTION TO AVOID COUNTERFEIT PRODUCTS - A method, system, and computer usable program product for improved manufacturing and distribution to avoid counterfeit products in a supply chain are provided in the illustrative embodiments. For manufacturing to avoid a counterfeit product, a product to be manufactured is selected. Production volume information is determined, the production volume information including a number of units of the product to be produced. An identifier of a manufacturer of the product, an identifier of the product, and the production volume information are sent and several sets of identifiers are received. Each set of identifiers include identifiers corresponding to a customer reference number (CRN), a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). One set of identifiers is uniquely associated with one unit of the product being produced. A unit of the product is manufactured such that the unit includes a corresponding set of identifiers. | 2011-12-08 |
20110302095 | PRE AND POST PURCHASE IDENTIFICATION OF COUNTERFEIT PRODUCTS - A method, system, and computer usable program product for pre and post purchase identification of counterfeit products in a supply chain are provided in the illustrative embodiments. A customer reference number (CRN) associated with a unit of product is identified. The unit of product has associated therewith a unique set of identifiers including the CRN, a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The CRN is sent to a second application and a message is received from the second application in response to sending the CRN. If the message includes a second CAN that is not the same as the CAN associated with the unit, the unit is determined to be a counterfeit product. | 2011-12-08 |
20110302096 | AUTHENTICATION SERVICE FOR SALES OF GOODS AND SERVICES - An authentication service provides authentication information to help potential buyers determine the legitimacy of an offer to sell a good or service. For example, an authentication service stores registration information that indicates (a) that a particular item was purchased by a particular party, and (b) contact information that indicates a particular address for communicating with the party. When the registered owner of an item wants to sell the item, the owner sends an intent-to-sell message to the authentication service. In response to receiving the intent-to-sell message, the authentication service sends access information to the particular address. The access information specifies a manner of receiving authentication information about the item from the authentication service. The registered owner includes the access information in his or her advertisements for the item. When a potential buyer sees the access information in an advertisement, the potential buyer can obtain the authentication information, directly from the authentication service, using the manner specified in the access information. | 2011-12-08 |
20110302097 | BEHAVIOR-BASED NETWORKS - A networking service that receives information about behaviors of the users, such as behaviors in which a user is engaging now or will engage in the future. The networking service compares the behavior information to identify matches between two or more users. When a match is detected, the networking service may form a network (e.g., a social network) between the two or more users by connecting the users in a network. The users may then communicate in the network, and additional users may be added to the network when those users are determined to be engaging in the behavior. When the networking service detects that the users are no longer engaging in the behaviors on which the match was identified, the networking service may disconnect users from one another or the network, and the networking service may eliminate the network. | 2011-12-08 |
20110302098 | METHOD AND SYSTEM FOR PROVIDING ANSWERS TO USERS OF A MULTI-TENANT DATABASE SYSTEM - Online communities, also referred to as “forums,” are used as a customer support tool along with a repository of useful articles, also referred to as “knowledge base.” Users may navigate between the forum and the knowledge base. Social networks can also be used to access the forum and knowledge base. Forums and knowledge bases that have confidential data may be restricted to employees of a multi-tenant database system. Any of the above embodiments can be used independently or together with any combination of other embodiments. | 2011-12-08 |
20110302099 | APPARATUS, SYSTEM, AND METHOD FOR PROVIDING A SOCIAL NETWORK - An apparatus, system, and method are disclosed for providing a social network. An apparatus for a social network includes an account module, a connection module, and a network visibility module. The account module is configured to manage a plurality of account types, the account types including a first account type, a second account type, and an administrator account type. The connection module allows for the forming of connections between specific accounts wherein the connections are allowed to be formed based on at least the account types of the specific accounts. The network visibility module regulates the amount of details of an account that are visible to other account. The visibility of the details of the account are based on at least the account type of the account. The accounts of different types include permissions that are unequal in relation to each other. Each level of permissions includes limitations at least partially defined by one or more of the connection module and the network visibility module. | 2011-12-08 |
20110302100 | METHOD AND SYSTEM FOR IDENTIFICATION OF TALENT ON THE BASIS OF A TARGET CANDIDATE PROFILE - Embodiments of the invention relate to a system, method and apparatus for identifying at least one candidate from a plurality of candidates based on at least one target candidate profile associated with the at least one target candidate. The method includes identifying at least one candidate from a plurality of candidates based on at least one target candidate profile associated with the at least one target candidate. The method further includes constructing profile images for candidates; representing the at least one candidate profile in a multi-dimensional characteristic space; executing a search of a plurality of candidate profiles associated with the plurality of candidates; and identifying the at least one candidate having the at least one candidate profile almost identical to the at least one target candidate profile. | 2011-12-08 |
20110302101 | Automatic Data Transmission in Response to Content of Electronic Forms Satisfying Criteria - Automatic transmission of information is generated when the content of a posted electronic form matches a predefined criteria. An interface allows the user to create a criterion template to specify the match criterion without requiring the user to have the skills of a professional programmer. The person to be notified and the form and content of the notification can also be defined by the user and can be dependent on the content of the posted form. In one application, individuals associated with an institution of higher learning are automatically notified when a student submits an electronic profile form showing that the student meets a pre-specified criteria. | 2011-12-08 |
20110302102 | COMMUNITY RATING AND RANKING IN ENTERPRISE APPLICATIONS - The present invention is directed to methods and systems which provide a comprehensive rating and ranking of products and services. Furthermore, aspects of the present invention provides a complete review of products and services, as well as rankings of semantic and non-semantic reviews, which provides a “true” reflection of a product and/or service. As such, a calculation of a product/supplier rating based on all of its social entity contexts, is performed. This takes into account factors like, author (of social entity context) credibility, non-semantic (direct) rating, semantic rating calculated from the textual content of the social entity context, the community based credibility of the social entity context, and the like. Then, the community based credibility of a given social entity context is in turn calculated. | 2011-12-08 |
20110302103 | POPULARITY PREDICTION OF USER-GENERATED CONTENT - A method, system, and computer program product for popularity prediction of user-generated content are provided. The method includes measuring the novelty of a user-generated content and predicting the popularity of the user-generated content based on the measured novelty. Predicting the popularity of the user-generated content includes: extracting basic features of the user-generated content; measuring novelty features of the user-generated content; and predicting the popularity based on the basic features and novelty features. Measuring the novelty of a user-generated content includes one or more of: measuring a relative novelty of the user-generated content with respect to the contribution history of the same user in a given time period; measuring a relative novelty of the user-generated content with respect to user-generated content of other users in a given time period; and measuring a relative novelty of the user-generated content with respect to the references by other users to the user-generated content. | 2011-12-08 |
20110302104 | INFORMATION PROVIDING APPARATUS AND INFORMATION PROVIDING METHOD - A rating server is provided with: a rating acquisition unit configured to acquire, from a user who purchased content sold in a plurality of types of sales modes, a rating for the content; a rating collection unit configured to determine, by collecting the rating given by a user on the content having the same title, the degree of the rating for the content based on a title regardless of a difference or a similarity in a sales mode of the content purchased by the user; and a rating information providing unit configured to provide, to an external apparatus, the degree of the rating for the content based on the title as a result of the rating for the content by the user. | 2011-12-08 |
20110302105 | Investor Social Networking Website - A social networking website system for an individual investor to join as a member, to meet online with other investors and discuss investing. The social network facilitates finding and communicating among like-minded individuals by providing the investor with a plurality of searching tools for searching a member profile page, a portfolio, and provides online communication tools such as a chat room, a forum and video posting. The member easily researches important information regarding stocks, commodities, bonds, foreign currency, futures, and other types of financial instruments by entering a ticker symbol that becomes a prefix key linking to an online data synopsis about the investment. The investor social networking system also provides a member a mechanism for placing orders to buy or sell financial instruments through the website. | 2011-12-08 |
20110302106 | STOCK METHOD FOR MEASURING AND ASSIGNING PRECISE MEANING TO MARKET SENTIMENT - A stock method for objectively quantifying the feeling, or market sentiment, of a company's stock (or the market as a whole) in a data-driven and transparent manner that serves as a standardized tool useful to investors and stock market analysts in gauging such items as inflated or deflated price values resulting from varying levels of market sentiment. | 2011-12-08 |
20110302107 | Method and System to Solve Dynamic Multi-Factor Models in Finance - Methods and systems for estimating time-varying factor exposures of either an individual financial instrument or a portfolio of such instruments, through the solution of a constrained multi-criteria dynamic optimization problem, providing an estimation error function and one or more transition error functions to be minimized over a period of time. The factor exposures relay the influence of the factors on the return of the instrument or portfolio. The estimation error function provides the estimation error at each time interval between the return of the asset collection and a sum of products of each factor exposure and its respective factor. Each transition error function provides a transition error of each factor exposure between time intervals. In one embodiment, the constraints can include a budget constraint and non-negativity bounds applying to some or all of the factor exposures. In other embodiments, the method and system can be applied to estimating any time-varying weight that is used in a model, to relay the influence of one or more independent variables on a dependent financial or economic variable, through the solution of a constrained multi-criteria dynamic problem, minimizing estimation error and transition error terms. In other embodiments, the solution of a multi-criteria dynamic problem can be used as part of a method and system to determine structural breakpoints for each factor, and also as part of a method and system for determining optimal parameters to weight the transition error functions and selecting the factors included in the model. | 2011-12-08 |
20110302108 | TRANSFERRING ELECTRIC ENERGY BETWEEN AN ELECTRIC VEHICLE AND A POWER DISTRIBUTION GRID - In order to be able to perform the transfer of electric energy between an electric energy storage device of an electric car and a connection point of an electrical power distribution grid using relatively less effort, particularly with regard to the technical construction of the connection point, the novel method controls the transfer of electric energy between the electric energy storage device of a vehicle and a connection point of an electrical power distribution grid. An electrical connection is produced between the electric energy storage device and the connection point, a communication connection is produced between a communication device associated with the vehicle and a communication service provider, the electric energy is transferred between the electric energy storage device and the connection point during the period of time that the communication connection exists at constant average electrical power, and the transfer of the electric energy and the communication connection are terminated at the same time. | 2011-12-08 |
20110302109 | METHOD AND APPARATUS USEFUL IN REVENUE GENERATION FOR EDUCATIONAL ENTITIES - A method of generating revenue for an educational entity having an athletic department includes providing a display supporting structure erected at an accessible location, and arranging for athletes that have associations with the athletic department of the educational entity to each be presented with an option of having a display element customized to present viewable information on the athlete in exchange for a respective financial contribution. In response to receipt of each financial contribution, the display element is customized to display the athlete information thereon, and then supported on the display supporting structure for viewing by passersby. Revenue can be generated in perpetuity, as new athletes entering and later graduating from the educational institution provide an ongoing source of contributors. | 2011-12-08 |
20110302110 | Computer Systems and Methods for Automatic Generation of Models for a Dataset - A method of automatically generating models from a dataset includes multiple steps. First, a description of a view of a dataset is provided. The description includes multiple fields associated with the dataset. Next, a set of properties is determined for each of the multiple fields. Finally, the description is automatically translated into one or more models based on the respective properties of the multiple fields and a set of predefined heuristics. | 2011-12-08 |
20110302111 | MULTI-LABEL CLASSIFICATION USING A LEARNED COMBINATION OF BASE CLASSIFIERS - Multi-label classification is performed by (i) applying a set of trained base classifiers to an object to generate base classifier label prediction sets comprising subsets of a set of labels; (ii) constructing a set of second level features including at least one second level feature defined by a predetermined combination of two or more of the base classifier label prediction sets; and (iii) applying a second level classifier to label the object with a set of one or more labels comprising a subset of the set of labels, labeling being based on the set of second level features. The multi-label classifier is trained by: (iv) applying operations (i) and (ii) to labeled training objects of a set of labeled training objects to generate training metadata comprising sets of second level features for the labeled training objects; and (v) training the second level classifier using the training metadata. | 2011-12-08 |
20110302112 | FORECASTING THROUGH TIME DOMAIN ANALYSIS - Embodiments include methods, apparatus, and systems for forecasting using a time domain analysis. One embodiment is a computer implemented method that receives plural cycle lengths identified in time series data and builds a model using a time domain analysis of the time series data. The model is used to predict future events or future data points. | 2011-12-08 |
20110302113 | MONITORING RELATIONSHIPS BETWEEN DIGITAL ITEMS ON A COMPUTING APPARATUS - Systems and methods are described herein that facilitate file management on a computing device and/or across multiple computing devices. Actions of a user with respect to digital items on a computing device can be monitored and utilized to build a relationship table, wherein the relationship table comprises identities of digital items and data that describes relationships between particular digital items. Such a relationship table is analyzed to provide a user with information pertaining to relationships between digital items captured in the relationship table. Relationship tables from different devices can be merged to analyze relationships between digital items across devices. | 2011-12-08 |
20110302114 | Systems and Methods For Turbo On-Line One-Class Learning - Methods for one-class learning using support vector machines from a plurality of data batches are provided. A first support vector machine is learned from the plurality of data batches by a processor. A new data batch is received by the processor and is classified by the first support vector machine. If a non-zero loss classification occurs a new support vector machine is trained using the first support vector machine and the new data batch only. Data batches can be discarded if they are represented by the current support vector machine or after being used for training an updated support vector machine. Weighing factors applied to update the first support vector machine depend upon a parameter which is optimized iteratively. Support vectors do not need to be recalculated. A classifier is learned in a number of stages equal to the number of data batches processed on-line. | 2011-12-08 |
20110302115 | METHOD AND DEVICE FOR INFORMATION RETRIEVAL - A method of information retrieval, comprising: determining, using a microprocessor, Q generative models (λ) in accordance with Probabilistic Latent Semantic Indexing (PLSI), said Q generative models being determined in an offline training; receiving a user query (q); choosing, using said microprocessor, N generative models out of the Q generative models, with N≦Q; determining, using said microprocessor, a content item (d) based on said query and a combination of the N generative models. | 2011-12-08 |
20110302116 | DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND PROGRAM - A data processing device including a learning section which expresses user movement history data obtained as learning data as a probability model which expresses activities of a user and learns parameters of the model; a destination and stopover estimation section which estimates a destination node and a stopover node from state nodes of the probability model; a current location estimation section which inputs the user movement history data in the probability model and estimates a current location node which is equivalent to the current location of the user; a searching section which searches for a route from the current location of the user to a destination using information on the estimated destination node and stopover node and the current location node and the probability model obtained by learning; and a calculating section which calculates an arrival probability and a necessary time to the searched destination. | 2011-12-08 |
20110302117 | INTERESTINGNESS RECOMMENDATIONS IN A COMPUTING ADVICE FACILITY - The present disclosure provides a recommendation to a user through a computer-based advice facility, comprising collecting topical information, wherein the collected topical information includes an interestingness aspect; filtering the collected topical information based on the interestingness aspect; determining an interestingness rating from the collected topical information, wherein the determining is through the computer-based advice facility; and providing a user with the recommendation related to the topical information based on the interestingness rating. | 2011-12-08 |
20110302118 | FEATURE SET EMBEDDING FOR INCOMPLETE DATA - Methods and systems for classifying incomplete data are disclosed. In accordance with one method, pairs of features and values are generated based upon feature measurements on the incomplete data. In addition, a transformation function is applied on the pairs of features and values to generate a set of vectors by mapping each of the pairs to a corresponding vector in an embedding space. Further, a hardware processor applies a prediction function to the set of vectors to generate at least one confidence assessment for at least one class that indicates whether the incomplete data is of the at least one class. The method further includes outputting the at least one confidence assessment. | 2011-12-08 |
20110302119 | SELF-ORGANIZING CIRCUITS - A self-organizing electronic system and method that organizes and repairs itself. A number circuit of modules can be embedded in a fabric. Each circuit module can calculate some function of its inputs and produces an output, which is encoded on volatile memory held together by a plasticity rule. The plasticity rule allows circuit modules to converge to any possible functional state defined by the structure of the information being processed. Flow through the system gates energy dissipation of the individual circuit modules. Circuit modules receiving high flow become locked in their functional states while circuit modules receiving little or no flow mutate in search of better configurations. These principles can be utilized to configure the state of any functional element within the system, and can be abstracted to higher levels of organization. Far from expending energy on state configurations, a volatile system only expends energy stabilizing successful configurations. Continuous stabilization coupled with redundancy results in a circuit capable of healing itself from the bottom-up. | 2011-12-08 |
20110302120 | ADDRESSING SCHEME FOR NEURAL MODELING AND BRAIN-BASED DEVICES USING SPECIAL PURPOSE PROCESSOR - A special purpose processor (SPP) can use a Field Programmable Gate Array (FPGA) to model a large number of neural elements. The FPGAs or similar programmable device can have multiple cores doing presynaptic, postsynaptic, and plasticity calculations in parallel. Each core can implement multiple neural elements of the neural model. | 2011-12-08 |
20110302121 | Environment-Responsive People Matching System and Method - An environment-responsive people matching system and method matches people in accordance with inferences of mutual interests based, at least in part, on environmental conditions local to the people being matched. Other behavioral information, proximity, and mobility inferences may also influence the matching. Relationships with varying degree of affinity between matched people may be generated in accordance with the inferences. Explanations for the suggested matches may be delivered to the matched people. | 2011-12-08 |
20110302122 | METHOD AND SYSTEM FOR CONFIGURING RULES FOR EXECUTION - Data-driven rules are eliminated from an application, and replaced with goal-driven rules that formally and completely characterize high-level business concepts, while enabling the resulting goal-driven rules to be executed eagerly using a forward chaining rule engine in a way that preserves the data-driven behavior of the original rules. A computer-implemented method for executing business rules provides a unified rule that encapsulates a goal-oriented rule with triggering information selected from dependencies of the goal-oriented rule. The unified rule may be eagerly executed in response to changes in data specified by the dependencies, or lazily executed in response to a request for the value computed by the rule. | 2011-12-08 |
20110302123 | SYSTEM AND METHOD FOR SCORING STREAM DATA - A feed combine is provided which receives a feed including content from at least one data source. One of a plurality of scoring methods is selected for scoring the content in the feed based on a velocity of the feed. A determination is made as to which content in the feed is appropriate for display by producing a score using the selected scoring method. The scoring method uses a plurality of weighted scoring factors which alter the score based on whether the content includes objectionable material determined in accordance with user-defined criteria. A determination is made as to whether content is to be rendered on at least one rendering device based on a score assigned to the content. | 2011-12-08 |
20110302124 | Mining Topic-Related Aspects From User Generated Content - Described herein is a technology that facilitates efficient automated mining of topic-related aspects of user generated content based on automated analysis of the user generated content. Locations are automatically learned based on dividing documents into document segments, and decomposing the segments into local topics and global topics. Techniques described herein include, for example, computer annotating travelogues with learned tags, performing topic learning to obtain an interest model, and performing location matching based on the interest model. | 2011-12-08 |
20110302125 | SYSTEMS AND METHODS FOR VIRTUAL SUB-METERING - The present inventors devised, among other things, systems and methods for estimating the energy usage of individual appliances based on cumulative household energy usage data and energy consumption profiles of the appliances. One exemplary system receives cumulative or aggregate energy usage for a building or other structure including a set of two or more appliances having different load ratings. Based on the aggregate energy usage and predefined usage profiles for the appliances, the exemplary system estimates individual energy usage of the appliances. In one embodiment, the system estimates individual energy usage of the appliances using a Bayesian estimator and displays the usage estimates, referred to as virtual submeter readings, on a graphical user interface. | 2011-12-08 |
20110302126 | EVALUATION PREDICTING DEVICE, EVALUATION PREDICTING METHOD, AND PROGRAM - Disclosed herein is an evaluation predicting device including: an estimating section configured to define a plurality of first latent vectors, a plurality of second latent vectors, evaluation values, a plurality of first feature vectors, a plurality of second feature vectors, a first projection matrix, and a second projection matrix, express the first latent vectors and the second latent vectors, and perform Bayesian estimation with the first feature vectors, the second feature vectors, and a known the evaluation value as learning data, and calculate a posterior distribution of a parameter group including the first latent vectors, the second latent vectors, the first projection matrix, and the second projection matrix; and a predicting section configured to calculate a distribution of an unknown the evaluation value on a basis of the posterior distribution of the parameter group. | 2011-12-08 |
20110302127 | Method for identifying network similarity by matching neighborhood topology - A method of computing a measure of similarity between nodes of first and second networks is described. In particular, sets of pairwise scores are computed to find nodes in the individual networks that are good matches to one another. Thus, a pairwise score, referred to as R | 2011-12-08 |
20110302128 | SYSTEM AND METHOD FOR DISAMBIGUATING NON-UNIQUE IDENTIFIERS USING INFORMATION OBTAINED FROM DISPARATE COMMUNICATION CHANNELS - The disclosure describes systems and methods for disambiguating a non-unique identifiers of real world entities (RWEs) detected by a computing network by dynamically identifying relationships between RWEs known to the network. The relationships are determined based on social, spatial, temporal and logical information known about the RWEs based on the RWEs previous interactions with the network. These relationships are then used to generate a probability for each RWE that the non-unique identifier identifies that RWE. Based on the probabilities an RWE is selected and the proper network identifier may be used in place of the non-unique identifier. | 2011-12-08 |
20110302129 | SYSTEM AND METHOD FOR TEMPORAL CORRELATION OF OBSERVABLES - According to one embodiment, an electronic device may be configured to perform temporal correlation operations to determine if a plurality of observables correspond to a selected event of interest. The electronic device comprises a memory and a processor. The memory is adapted to store information representing a process template for a selected event, where the process template including a plurality of observation states. The processor is coupled to the memory. The processor is adapted to receive a plurality of observables and to automatically conduct a recursive comparison of time values associated with each of the plurality of observables to timing ranges associated with each observation state to produce a listing that is subsequently used to determine if the plurality of observables are associated with the selected event. | 2011-12-08 |
20110302130 | INTELLIGENT VIDEO INFORMATION RETRIEVAL APPARATUS AND METHOD CAPABLE OF MULTI-DIMENSIONAL VIDEO INDEXING AND RETRIEVAL - Provided is an intelligent video information retrieval apparatus capable of multi-dimensional video indexing and retrieval. The intelligent video information retrieval apparatus includes an event detector configured to detect pieces of event information from footage collected by a plurality of video capture devices, a data mart builder configured to generate a data cube using the detected pieces of event information, and capture time and capture location information related to the pieces of event information, and store and manage the generated data cube, and a video retriever configured to receive an event retrieval condition from a user to retrieve event information corresponding to the received event retrieval condition using the data cube, and output the retrieval result to the user. | 2011-12-08 |
20110302131 | ANALYSIS-PROGRAM STORING RECORDING MEDIUM, ANALYZING APPARATUS, AND ANALYTIC METHOD - An analyzing apparatus extracts a plurality of sequence candidates for communications related to unauthorized access performed between a plurality of information processing apparatuses on a basis of communication histories stored in a storage unit storing the communication histories between the plurality of information processing apparatuses. The apparatus calculates and outputs an evaluation value representing a degree of probability that the respective plurality of sequence candidates are unauthorized accesses on a basis of normality of a transaction which is restorable by a second communication history excluding a first communication history corresponding to each of the plurality of sequence candidates, among the communication histories stored in the storage unit. | 2011-12-08 |
20110302132 | INTEGRATED WORKFLOW AND DATABASE TRANSACTIONS - A computer-implemented method and system to integrate workflow and database transactions is provided. Also provided is a computer readable storage medium that includes a program. The computer-implemented method includes assigning a data structure stored in a database to one or more workflow processes. The computer-implemented method also includes automatically creating an instance of the workflow in response to the data structure being populated with a new record. | 2011-12-08 |
20110302133 | SHARING INFORMATION BETWEEN TENANTS OF A MULTI-TENANT DATABASE - In a method, system, and computer-readable medium having instructions for sharing information between tenants of a multi-tenant database, information is received on a connection between a first tenant of a multi-tenant database and a second tenant and the connection has information on a scope of data from the first tenant shared with the second tenant, data is allowed for a record of the first tenant to be accessible to the second tenant in accordance with the connection, information is received on a file related to the record of the first tenant, and data is allowed from the file to be accessible to the second tenant in accordance with the connection. | 2011-12-08 |
20110302134 | People Matching in Subscription-based Communities - A people matching system and method matches people in computer-implemented communities in which users subscribe to information generated by other users. The computer-generated suggested matches may be based on inferences of mutual interests, as well as on factors such as proximity and environmental conditions. The inferences of mutual interest may be based on behaviors such as subscriptions and physiological responses. Explanations for the suggested matches may be delivered to users. | 2011-12-08 |
20110302135 | MAINTAINING APPLICATIONS THAT ARE OCCASIONALLY CONNECTED TO AN ONLINE SERVICES SYSTEM - In a method for maintaining applications that are occasionally connected to an online services system, metadata describing at least a portion of an online services database is retrieved and the portion of the online services database is authorized for replication at a software application, information for an entity for an application database in accordance with metadata is determined, information is sent for the entity to an application data management service, data for the software application is retrieved from the online services database in accordance with metadata, at least a portion of the data for the software application is sent to the application data management service and the portion of the data for the software application should be synchronized with the online services database, a request for information is received for rendering a component of a user interface, and information is provided for rendering the component of the user interface for the software application | 2011-12-08 |
20110302136 | RECOVERABLE EXECUTION - Systems and methods for providing a one-step API that executes a series of atomic transactions in a database system. In one implementation, each atomic transaction is associated with a forward block of code that effects changes, an undo block of code that reverses the changes made by the forward block, and a state block of code that mimics successful execution of the forward block by setting internal states. In the event of a failure, the forward blocks, undo blocks, and state blocks can be used to roll forward or roll back changes as a whole. In one implementation, a one-step API for replicating data in a database is provided. | 2011-12-08 |
20110302137 | Systems and methods for improving storage efficiency in an information handling system - Systems and methods for improving storage efficiency in an information handling system are provided. In some embodiments, an information handling system including an increased storage efficiency is provided. The information handling system may include a processor associated with a first storage resource and a plurality of second storage resources, where the first storage resource is more reliable than the plurality of second storage resources. The processor may be configured to determine a weight of a file portion, determine a number of copies of the file portion to be stored based at least on the determined weight, and store a copy of the file portion on the first storage resource if the determined number of copies of the file portion is greater than a predetermined storage threshold. | 2011-12-08 |
20110302138 | NETWORK AWARE STORAGE DEVICE - In one embodiment a network attached storage device comprises at least one input/output port, at least one storage media, and a network caching module to receive, in the network attached storage device, a backup request from a computing device communicatively coupled to the network attached storage device, wherein the backup request identifies at least a first file, determine, in the network attached storage device, whether the at least a first file associated with the backup request resides on a storage media in the network attached storage device; and in response to a determination that the at least a first file associated with the backup request resides on a storage media in the network attached storage device executes the backup request against the at least a first file associated with the backup request which reside on a storage media in the network attached storage device, and initiates a remote backup operation to a remote network-based storage device coupled to the network attached storage device. | 2011-12-08 |
20110302139 | METHOD, APPARATUS, PROGRAM AND SYSTEM FOR MIGRATING NAS SYSTEM - In a state where the migration source NAS apparatus is continuously operated, a migration processing program confirms the update date and time of files stored in the migration source NAS apparatus, and migrates only the files that were not updated from a specific time to the start date and time of migration processing. Or, the migration processing program migrates the files stored in the migration source NAS apparatus sequentially from the oldest file. The migration performance is calculated based on the capacity and migration time of the migrated files, and the time required for migrating the non-migrated files is calculated based on the size and migration performance of the non-migrated files. | 2011-12-08 |
20110302140 | FAILOVER SYSTEMS AND METHODS FOR PERFORMING BACKUP OPERATIONS - In certain embodiments, a tiered storage system is disclosed that provides for failover protection during data backup operations. The system can provide for an index, or catalog, for identifying and enabling restoration of backup data located on a storage device. The system further maintains a set of transaction logs generated by media agent modules that identify metadata with respect to individual data chunks of a backup file on the storage device. A copy of the catalog and transaction logs can be stored at a location accessible by each of the media agent modules. In this manner, in case of a failure of one media agent module during backup, the transaction logs and existing catalog can be used by a second media agent module to resume the backup operation without requiring a restart of the backup process. | 2011-12-08 |
20110302141 | SAVE SET BUNDLING FOR STAGING - Backing up data blocks is disclosed, including: receiving an indication that a first backed up data block is to be processed; determining that the first backed up data block and a second backed up data block are related at an application level and are to remain stored together; and processing together the first and second backed up data blocks based at least in part on the determination that the first and second backed up data blocks are related at an application level and are to remain stored together. | 2011-12-08 |
20110302142 | STORAGE SYSTEM FORMAT FOR TRANSACTION SAFE FILE SYSTEM - A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode. | 2011-12-08 |
20110302143 | MULTI-VERSION CONCURRENCY WITH ORDERED TIMESTAMPS - Multiple versions of a set of data objects can be maintained to allow concurrent conflicting access to the objects. Additionally, a range of acceptable timestamps for each transaction in a set of database transactions can be tracked. Conflicting access requests for an object in the set of objects can be detected, and the requests can be made by two or more conflicting transactions in the set of transactions. A range of acceptable timestamps for at least one of the conflicting transactions can be adjusted, such that an order of transaction timestamps can be maintained in accordance with a specified transaction isolation level. Such timestamp range adjustment can frequently permit conflicting read and write accesses to proceed concurrently. When concurrent access cannot be allowed while maintaining such an order of transaction timestamps, in many cases one of the conflicting accesses can be blocked instead of aborting one of the transactions. | 2011-12-08 |
20110302144 | Dynamic Real-Time Reports Based on Social Networks - A system for analyzing social networks includes a memory storing a social network data structure, a correlation engine, a trigger function module, and a reporting module. The social network data structure includes a plurality of attributes, a plurality of nodes, each of the nodes corresponding to an entity and having at least one of the attributes associated with the entity, and at least one connection connecting at least two of the nodes. The system also includes at least one processor, coupled to the memory. The at least one processor is operative to execute the correlation engine to examine at least one of the nodes as a subject node. The subject node is coupled to at least one other one of the nodes, comprising a data node, by at least the at least one connection. The examination by the correlation engine is carried out to determine at least one of the attributes comprising a related attribute of the subject node and the at least one other one of the nodes, comprising the data node. The at least one processor is also operative to execute the trigger function module to determine if the reporting module should be executed to provide the report. Further, responsive to determining that the reporting module should be executed, the at least one processor is operative to execute the reporting module to provide a report indicating a correlation assessment to the subject node, the correlation assessment being related to the at least one related attribute. A method, apparatus, and computer program product are also provided. | 2011-12-08 |
20110302145 | RECOMMENDING LINK PLACEMENT OPPORTUNITIES - Techniques for recommending Web pages or other content sources as candidates for link placement are described. Some embodiments provide a marketing activity support system (“MASS”) configured to recommend candidate Web pages for link placement. Recommending candidate Web pages may include determining multiple Web pages that include or reference one or more keywords that describe some subject matter domain. Recommending candidate Web pages may then further include ranking or ordering at least some of the multiple Web pages based on how many times each of the at least some Web pages references another one of the multiple Web pages. The ordered Web pages may then be presented as recommended candidate sites for link placement. | 2011-12-08 |
20110302146 | DETERMINING QUALITY OF TIER ASSIGNMENTS - Technologies pertaining to computing a tiering policy that defines how digital items are desirable stored across a plurality of different storage tiers are described herein. A data repository that comprises data that is indicative of historic user interaction with a search engine is accessed. Subsequently, a tiering policy for digital items that are retrievable by way of the search engine is computed based at least in part upon the data that is indicative of the historic user interaction with the search engine. Retrieval times for digital items in the data storage tiers differ across the data storage tiers. | 2011-12-08 |
20110302147 | METHODS AND APPARATUS FOR COMPUTING GRAPH SIMILARITY VIA SEQUENCE SIMILARITY - This disclosure describes systems and methods for identifying and correcting anomalies in web graphs. A web graph is transformed into a sequence of tokens via a walk algorithm. The sequence is fingerprinted to form a set of shingles. The singles are compared to shingles for other web graphs in order to determine similarity between web graphs. Actions are then carried out to remove anomalous web graphs and modify parameters governing web mapping in order to decrease the likelihood of future anomalous web graphs being built. | 2011-12-08 |
20110302148 | System and Method for Indexing Food Providers and Use of the Index in Search Engines - Methods, systems and computer readable mediums are provided for indexing network resources. One method includes accessing, using one or more computer systems, a data store of menu items. The method further includes accessing identification information associated with one or more food providers from one or more data sources. One or more network resources are crawled based on the identification information to search for one or more menu items in the data store of menu items associated with corresponding ones of the food providers. Using the one or more computing systems, an index feed is generated, the index feed comprising the identification information of one or more of the food providers, and one or more menu items associated with the identification information of corresponding food providers based on the crawl and search. | 2011-12-08 |
20110302149 | IDENTIFYING DOMINANT CONCEPTS ACROSS MULTIPLE SOURCES - Systems, methods, and computer-storage media for identifying dominant concepts are provided. The system includes a search engine connected to various sources, an entity extraction component, a metabase, and a ranking component. The search engine receives a contextual query and provides results in response to the contextual query. The entity extraction component parses the results and identifies entities included in the results. The metabase provides a distance between the entities included in the results and the query terms included in the contextual query. The ranking component ranks the entities based on the provided distance and selects dominant concepts within the results based on the ranks assigned to entities. | 2011-12-08 |
20110302150 | Data Storage Method for an Electronic Device - To prevent memory cells from being damaged, the present invention provides a data storage method for an electronic device, which comprises dividing a first section of a memory of the electronic device into N blocks, wherein each of the N blocks is corresponding to a sequence number and assigned an index value; rewriting an assigned index value corresponding to an nth block of the N blocks according to index values corresponding to the N blocks; storing an input data in the nth block; and rewriting the nth block by stored data in the (n−1)th block before storing the input data in the nth block when the index values corresponding to the N blocks are not identical such that a number of times of accessing sections of the memory is averaged, to prevent the memory from being damaged; wherein N is an integer greater than or equal to 1, and 1≦n≦N. | 2011-12-08 |
20110302151 | Query Execution Systems and Methods - System, method, and computer program product for processing data are disclosed. The method includes receiving a query for processing of data, wherein the data is stored in a table in a plurality of tables, wherein the table is stored on at least one node within the database system, determining an attribute of the table and another table in the plurality of tables, partitioning one of the table and the another table in the plurality of tables using the determined attribute into a plurality of partitions, and performing a join of at least two partitions of the table and the another table using the determined attribute. The join is performed on a single node in the database system. | 2011-12-08 |
20110302152 | PRESENTING SUPPLEMENTAL CONTENT IN CONTEXT - Techniques that may be used for detecting a primary content (e.g., a web page) that the user is viewing and presenting one or more pieces of supplemental content (e.g., social media data) together with the primary content. The supplemental content presented to the user together with the primary content may be content that is matched to the primary content and therefore detected to be relevant to the user. Detection of primary content and matching to supplemental content may be carried out based on a comparison of entities related to the primary and supplemental content. In some embodiments, an analysis of the primary content for entities may include ordering entities according to significance in the primary content and selecting top entities for comparison. Also, in some embodiments, multiple pieces of supplemental content may be displayed to a user categorized based on entity. | 2011-12-08 |
20110302153 | Service for Aggregating Event Information - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for aggregating event information. In one aspect, a method includes selecting an event from plurality of events based on a query, in which the event is associated with a time frame and one or more event attributes. A document is generated for the event by including a plurality of web resources based on the time frame and one or more of the event attributes, and including a plurality of social network resources that have a semantic similarity to the event. | 2011-12-08 |
20110302154 | MANAGING SEARCHES ON MOBILE DEVICES - This disclosure pertains to solutions, including without limitation, systems, methods, and software programs, that provide the ability to quickly and efficiently search mobile devices for relevant information. An exemplary search server has the ability to communicate (either directly and/or via a host PC) with one or more mobile devices to transmit a search request. The mobile devices, in turn, have a search facility that is configured to perform a search of the contents of the device and return a set of results to the search server. These results then may be presented to a user, who can select one or more of the results. The selected search result(s) then may be downloaded from the device and presented to the user. | 2011-12-08 |
20110302155 | RELATED LINKS RECOMMENDATION - The related links recommendation technique described herein employs combined collaborative filtering to recommend related web pages to users. The technique creates multiple collaborative filters which are combined in order to create a combined collaborative filter to recommend web pages similar to a given web page to a user. One query-based collaborative filter is created by using query search clicks (e.g., user input device selection actions on search results returned in response to a search query). Another user-behavior-based collaborative filter is created by using query search clicks and user clicks while browsing websites (e.g., user input device selection actions while a user is browsing websites). Lastly, another content-based collaborative filter based on similar content of web pages is created by finding web pages with similar content. | 2011-12-08 |
20110302156 | RE-RANKING SEARCH RESULTS BASED ON LEXICAL AND ONTOLOGICAL CONCEPTS - Search result re-ranking is provided by employing a concept graph from a metabase. When a search query is received, a query context of the search query is analyzed to identify dominant concepts for the search query. The dominant concepts are expanded by identifying the dominant concepts within a concept graph and identifying additional concepts having a strong relationship with the dominant concepts within the concept graph. A set of search results for the search query is analyzed to determine strength of relationship of each search result to the expanded concepts. The search results are re-ranked based on the strength of relationship of each search result to the expanded concepts and the strength of relationship of each expanded concept to the dominant concepts. | 2011-12-08 |
20110302157 | COMPARATIVE ENTITY MINING - One or more techniques and systems are disclosed for generating comparative patterns for use in identifying comparators. A set of comparator pairs is extracted from a first comparative pattern in a pattern database that comprises one or more comparative patterns. Questions are retrieved from a question collection using respective comparator pairs to generate comparative questions. Potential comparative patterns are generated from a combination of the comparator pairs and comparative questions, and the potential comparative patterns are evaluated by determining their reliability, in order to generate second comparative patterns for the pattern database. | 2011-12-08 |
20110302158 | INTEREST BASED ROW SELECTION - One embodiment of the invention sets forth a mechanism for recommending genres and associated digital items to a user. Genres that are of interest to the user are determined based on user preferences gathered implicitly or explicitly. The genres are then scored and sorted based on different scoring and sorting techniques. A subset of the scored and sorted genres is then selected for recommending to the user. | 2011-12-08 |
20110302159 | COLLEGE SEARCH SYSTEM - A method and programmed computing system ( | 2011-12-08 |
20110302160 | Predicting User Responses to Invitations in a Social Networking System Based on Keywords in User Profiles - A social networking system selects a subset of keywords from a set of master keywords found in user profiles. The method includes selecting a first and second group of user profiles including one or more keywords and computing the number of occurrences of each of the master keywords in the first and second group of profiles. A value may be computed for each of the master keywords based on a comparison of the number of occurrences in the first group of profiles and the number of occurrences in the second group of profiles. The computed value may be used for selecting the subset of keywords from the master keywords and/or ranking the master keywords. | 2011-12-08 |
20110302161 | METHOD AND SYSTEM FOR PROVIDING A LINK IN AN ELECTRONIC FILE BEING PRESENTED TO A USER - A method for providing a link in an electronic file being presented to a user which includes defining a customized viewpoint for the user. The viewpoint includes a preference for the user that provides an association between a data pattern and a computer network resource. The method also includes generating a request for content, receiving an electronic file in response to the request, and evaluating the electronic file to recognize a match between at least one portion of the electronic file and the data pattern. Upon recognizing a match, the electronic file is modified to include a link to the computer network resource associated with the matching data pattern, and the modified electronic file is presented to the user. Thus, the link included in the electronic file presented to the user is customized for the user, and different users who retrieve the same content can be provided with links to different computer network resources depending on their respective viewpoints. | 2011-12-08 |
20110302162 | Snippet Extraction and Ranking - Described herein is a technology that facilitates efficient automated mining of topic-related aspects of user-generated content based on automated analysis of the user-generated content. Locations are automatically learned based on dividing documents into document segments, and decomposing the segments into local topics and global topics. Techniques are described that facilitate automatically extracting snippets. These techniques include, for example, computer annotating travelogues with learned tags and images, performing topic learning to obtain an interest model, performing location matching based on the interest model, calculating geographic and semantic relevance scores, ranking snippets based on the geographic and semantic relevance scores, and searching snippets with a “location+context term” query. | 2011-12-08 |
20110302163 | SYSTEM AND METHOD FOR CLUSTERING CONTENT ACCORDING TO SIMILARITY - Systems and methods for clustering content according to similarity are provided that identify and group similar content using a set of tags associated with the content. A topic model of a group of content is built, producing a probability distribution of topic membership for the content. Individual items of content are then clustered using a clustering algorithm, and a distance matrix from the probability distribution is built. Based on the distance matrix, individual items of content are labeled as “must-link” or “cannot-link” pairs with the group of content. The topic model is then embedded into successively smaller dimensions using a kernel method, until the clustering is stable with respect to both the behavioral and content domains. | 2011-12-08 |
20110302164 | Order-Independent Stream Query Processing - In a system and method for order-independent stream query processing, one or more input streams of data are received, and the one or more input streams are analyzed to determine data which is older than an already emitted progress indicator. The data which is older than the already emitted progress indicator is partitioned into one or more partitions, and each of the one or more partitions are independently processed using out-of-order processing techniques. A query is received, rewritten and decomposed into one or more sub-queries that produce partial results for each of the one or more partitions, where each of the one or more sub-queries correspond to a partition. A view is also produced that consolidates the partial results for each partition. The partial results are consolidated at a consolidation time specified by the query to produce final results, and the final results are provided. | 2011-12-08 |
20110302165 | CONTENT RECOMMENDATION DEVICE AND CONTENT RECOMMENDATION METHOD - A content recommendation device deciding content to be recommended to a user among a plurality of content items includes: a clustering section creating a cluster set including clusters by clustering use statuses of content of users on the basis of a predetermined index; an effectiveness determining section determining effectiveness of the clustering by evaluating a correlation between the content and the cluster in the cluster set; a popular content deciding section selecting the cluster to which the user who becomes a recommendation partner belongs from the cluster set and deciding the popularity degree of each content item in accordance with the use status of each content item by the users in the cluster; and a recommended content deciding section evaluating the popularity degree of each content item in the cluster to which the user who becomes the recommendation partner belongs by taking into account and estimating the effectiveness of the cluster set therein and deciding the relatively popular content item among the content items as the content item to be recommended. | 2011-12-08 |
20110302166 | SEARCH SYSTEM, SEARCH METHOD, AND PROGRAM - The present invention provides a search system and a search method to make it easy to find out a document required truly among documents of a search result. This search system includes a division unit that divides a document to be searched into a plurality of blocks in accordance with designated division information, a calculation unit that calculates a hash value of each block by applying a hash function to a character string included in each block, a storage unit that stores the calculated hash value together with positional information on the block in the document, and a document grouping unit that fetches, for each document obtained by searching based on the search word, a corresponding hash value from the storage unit | 2011-12-08 |
20110302167 | Systems, Methods and Computer Program Products for Processing Accessory Information - A computer-implemented method according to one embodiment includes, for each of a plurality of accessories: determining a compatibility of an accessory; determining a type of the accessory; and determining features of the accessory. The accessories are associated into logical groups based on the compatibility, type and features thereof. A computer-implemented method according to one embodiment includes obtaining information about accessories; parsing out individual offers corresponding to the accessories; extracting meaningful phrases from the offers; classifying new offers based on the phrases; and outputting a result of the classification. Additional systems, methods and computer program products are also presented. | 2011-12-08 |
20110302168 | GRAPHICAL MODELS FOR REPRESENTING TEXT DOCUMENTS FOR COMPUTER ANALYSIS - In a method for representing a text document with a graphical model, a document including a plurality of ordered words is received and a graph data structure for the document is created. The graph data structure includes a plurality of nodes and edges, with each node representing a distinct word in the document and each edge identifying a number of times two nodes occur within a predetermined distance from each other. The graph data structure is stored in an information repository. | 2011-12-08 |
20110302169 | IDENTIFYING ACTIVITIES USING A HYBRID USER-ACTIVITY MODEL - In a user-activity identification technique, a user's actions are monitored while the user is using a computer. While these user actions are associated with user activities, the user activities are initially unspecified, so the tracked user actions constitute unsupervised data. Then, the tracked user actions are aggregated into subsets (for example, using clustering analysis), and user-activity classifications for the subsets (such as activity labels) are provided by the user, so the subsets constitute supervised data. Subsequently, when additional user actions (which are associated with one or more initially unspecified current user activities) are tracked, they can be associated with one or more of the classified subsets. For example, information about the additional user actions can be mapped in real time (or near real time) to one or more of the subsets using a supervised learning technique. In this way, the one or more current user activities can be identified. | 2011-12-08 |
20110302170 | UTILIZING SEARCH POLICIES TO DETERMINE SEARCH RESULTS - Methods for factoring search and browse policies and content preferences into Web search results are provided. Such search and browse policies and/or content preferences generally are provided by a parent, an employer, or other company representative and specify to whom they apply. Upon receiving a search query from a particular user, it is determined whether one or more search and browse policies and/or content preferences apply to the received search query. Upon determining that one or more search and browse policies and/or content preferences apply to the received search query, at least one of the received search query and any search results determined as satisfying the search query are analyzed in accordance with the one or more applicable search and browse policies and/or content preferences applying to the user. Any necessary modifications are made to the search results before the results are presented to the user. | 2011-12-08 |
20110302171 | Apparatus and Method for the Automatic Discovery of Control Events from the Publication of Documents - A method and system for discovering a control event from electronically published documents and received data streams is provided, in which a computer control program identifies electronically published documents and data stored in a plurality of network servers which potentially contain control events relevant to the control of goods and/or services, the control events identified by reference to user interest identifiers. Identified material is analyzed by a classification program to determine whether control events are present. A control event classification is assigned to documents and received data determined to contain at least one discovered control event, the assigned control event classification and information identifying the associated document and data is stored in a classification database, and a report of discovery of documents and data containing control events is be provided to a user. The report may includes a link to the control event classification and/or its associated document or data. | 2011-12-08 |
20110302172 | TOPICAL SEARCH ENGINES AND QUERY CONTEXT MODELS - Topical search engines can add contextual keywords to an input query to bias results toward a particular topic or domain. In one instance, query context models can be constructed to facilitate topical search. Upon receipt of one or more topic-relevant sites, a plurality of topical queries can identified automatically. Contextual keywords can be identified with respect to the plurality of topical queries as a function of lexical generality, among other things. Subsequently, a query context model, comprising the identified topical queries and related contextual keywords, can be employed to restrict query results to a particular topic. | 2011-12-08 |
20110302173 | OBJECT IDENTIFICATION BY ELECTOR - Techniques for identifying an object are disclosed herein. In one embodiment, an object identification system includes a reference to an object acted on at a first time, an elector, and a elector manager. The elector is configured to provide an appraisal, at a second time, of whether a candidate object is the objected acted on. The elector manager is configured to determine whether the candidate object is object acted on based on a value of the appraisal. | 2011-12-08 |
20110302174 | CROWD-SOURCING FOR GAP FILLING IN SOCIAL NETWORKS - A method, system, and computer program product for gap filling in a social network are provided. The method includes providing details of one or more current online users in a game in which users are scored for their input. A person is selected from candidates for whom additional information is required in a social network, including: weighting candidates who have a strong relationship with a current online user in the game; and weighting candidates for whom there is little existing data in the social network. The method includes identifying the selected person to a current online user; receiving information input by a current online user relating to the selected person; and scoring the information input by a current online user. | 2011-12-08 |
20110302175 | CENTRAL SERVICE PLATFORM AND SERVICES FOR FLEET MAINTENANCE AND MANAGEMENT - A service platform method in a central service platform system for enabling readiness and sustainability services for a fleet of deployed and fielded equipment units, comprising the steps of: receiving condition based operational status data dependent on equipment operational status data and dependent on predetermined relations between said equipment status data and predetermined weighting parameters from an on-board local service platform associated with an equipment unit; | 2011-12-08 |
20110302176 | DOCUMENT RANKING SYSTEM AND METHOD BASED ON CONTRIBUTION SCORING - Disclosed are a document ranking system and method based on contribution scoring. The document ranking system includes: a content score calculating unit for calculating content scores for documents with respect to at least one word contained in the documents, with regard to each such word; a contribution score calculating unit for calculating contribution scores for the documents with respect to jointly occurring words; and a ranking unit for ranking the documents with respect to the at least one word, with regard to each such word, by using the content scores and the contribution scores. | 2011-12-08 |
20110302177 | SEARCH-SORT TOGGLE - A system for facilitating accessing or retrieving desired data via use of graphically displayed search/sort toggle functionality. In an example embodiment, the method includes providing a first user option to toggle between display of a search control and a sort control. Search results are displayed in response to user input provided via the search control. Note that default search results may be initially displayed. A portion of the search results may be displayed simultaneously with one or more controls associated with the first user option. In a more specific embodiment, the example method further includes displaying search results simultaneously with one or more sort controls in response to user selection of the first option when one or more search controls are initially displayed. Hence, display of search and sort controls may be toggled via the first option while any search results are simultaneously displayed along with the controls. Sort controls are adapted to enable a user to specify one or more sort criteria for sorting data, such as retrieved search results. Similarly, search controls enable specification of one or more search criteria or queries. | 2011-12-08 |
20110302178 | SYSTEMS FOR PERFORMING AN EXTERNAL (DISK-BASED) SORT OF A LARGE DATA FILE WHICH TAKE ADVANTAGE OF "PRESORTED" DATA ALREADY PRESENT IN THE INPUT - Systems and programs for improving the efficiency of a sorting process in a computer system are disclosed. Data is provided in an input file external to the central processing unit of the computer system. In one embodiment, the implemented process involves investigating the contents of the input file in order to identify presorted portions thereof; incorporating the identified presorted portions of the input file into a second file external to the central processing unit, performing this step by rearranging directory information, without physically transferring the presorted portions from the input file. In sort processes involving both a string generation phase and a merge phase, the techniques described may be used in either or both phases, as well as in any output phase. Rearrange directory information rather than physically transferring data provides for greater efficiency in disk I/O. | 2011-12-08 |
20110302179 | Using Context to Extract Entities from a Document Collection - Described is using context information obtained from entity mentions in likely relevant documents to extract entity mentions from documents that are ambiguous with respect to their relevance to a domain. A list of entities is input into an entity extraction mechanism, which processes a large collection of documents to determine data (counts) corresponding to frequency of entity mentions. Infrequently mentioned entities are specific entities, while frequently mentioned entities are non-specific (generic or ambiguous) entities. The context surrounding mentions of the specific entities is processed to obtain interesting context terms (words, phrases or both) for the domain. The interesting context terms are then compared against the contexts of non-specific entity mentions to determine whether each non-specific entity mention is relevant to the domain. A result set containing only relevant documents or relevant mentions collection is output. | 2011-12-08 |
20110302180 | COMPUTER RELATIONAL DATABASE METHOD AND SYSTEM HAVING ROLE BASED ACCESS CONTROL - A computer method, system and apparatus control access to secured data in a plurality of databases. A repository is coupled to the databases and has a security runtime subsystem. The repository intercepts a user query of a subject database in the plurality. The security runtime subsystem determines from the intercepted query a user and corresponding user role. Based on user role, the security runtime subsystem automatically modifies the user query to filter out secure data for which the identified user is unauthorized to access but are part of the user query. | 2011-12-08 |
20110302181 | METHOD OF STORING LOGICAL DATA OBJECTS AND SYSTEM THEREOF - Various embodiments for storing a logical object are provided. In one such embodiment, by way of example only, incoming data is divided corresponding to a logical data object into a plurality of independent streams, associating each data chunk of a plurality of obtained data chunks with a corresponding stream among the plurality of independent streams. At least one of the obtained data chunks and derivatives thereof is sequentially accommodated in accordance with an order the obtained chunks are received, while keeping the association with the corresponding streams. A global index is generated as a single meta-data stream accommodated in the logical data object and comprising information common to the plurality of independent streams and related to mapping between data in the logical data object and the obtained data chunks. | 2011-12-08 |
20110302182 | COLLECTING AND ANALYZING USER ACTIVITIES ON MOBILE COMPUTING DEVICES - A mechanism for collecting and analyzing user information available on a mobile computing device is described. Information is retrieved from different components of the mobile computing device and analyzed for relationships therein. Metrics and rules are applied to the information to generate results. The results are displayed or exported to one or more components of the mobile computing device or external devices. | 2011-12-08 |
20110302183 | TRACKING OBJECT FIELDS USING RELOCATABLE OBJECT WATCHPOINTS - A method for managing an object watchpoint during a garbage collection cycle, including identifying an object having a field, where the object is associated with an original object location, where the field is associated with an original field location, and where the object and the field are located in a memory heap of a virtual machine memory, setting, within a debugger, the object watchpoint on the original field location, where the object watchpoint is a memory trap associated with the object, determining, after a relocation of the object by a garbage collector (GC), a new object location associated with the object, determining a new field location of the field based on the new object location, and setting, within the debugger, the object watchpoint on the new field location. | 2011-12-08 |