Patent application number | Description | Published |
20130007405 | TRANSLATION CACHE PREDICTION - Techniques for client side translation cache prediction are provided. The techniques include obtaining meta data associated with a request, applying a cache prediction model to the meta data to automatically predict one or more translations associated with the request, and storing the one or more translations in a client translation cache. | 01-03-2013 |
20130198761 | Intelligent Dialogue Amongst Competitive User Applications - A method, an apparatus and an article of manufacture for enabling communication between at least two computer applications that is observable to a user. The method includes obtaining a description of functions for each of the at least two computer applications, comparing the description of functions for each of the at least two computer applications, generating a dialog between the at least two applications based on the comparing of the description of functions for each of the at least two computer applications, and making the dialog available to a user. | 08-01-2013 |
20130227701 | Masking Mobile Message Content - A method, an apparatus and an article of manufacture for masking a message on an electronic device. The method includes receiving a message on an electronic device, determining if a message category label is included in the message, mapping the message category to a corresponding masking format if a message category label is included in the message, extracting the content of the message to generate a message category if a message category label is not included in the message, wherein each message category generated corresponds to a masking format, and masking the message on the electronic device by transforming the message into the masking format that corresponds to the message category for the message. | 08-29-2013 |
20140012563 | PROVIDING MULTI-LINGUAL SEARCHING OF MONO-LINGUAL CONTENT - Approaches for translating a transliterated search query are provided. An approach includes: receiving a search query containing a transliterated word; determining a source language corresponding to the transliterated word; converting the transliterated word to a word in the source language; translating the word in the source language to a word in a target language; and performing a search using the word in the target language. | 01-09-2014 |
20140012567 | Text Auto-Correction via N-Grams - An input text string is received that contains characters or words. The input text string can be completed or corrected using contact scores based on n-grams. In addition, a subsequent text string and a preceding text string for the input text string are also identified, again using n-gram scores. A corrected text string is created by inserting the preceding text string before the input text string and appending the subsequent text string after the input text string. | 01-09-2014 |
20140012568 | Text Auto-Correction via N-Grams - An input text string is received that contains characters or words. The input text string can be completed or corrected using contact scores based on n-grams. In addition, a subsequent text string and a preceding text string for the input text string are also identified, again using n-gram scores. A corrected text string is created by inserting the preceding text string before the input text string and appending the subsequent text string after the input text string. | 01-09-2014 |
20140012912 | Controlled Resources Based on Good Behavior - Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters. | 01-09-2014 |
20140013445 | Controlled Resources Based on Good Behavior - Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters. | 01-09-2014 |
20140019697 | CLIPBOARD FOR PROCESSING RECEIVED DATA CONTENT - An embodiment of the invention directed to a method is associated with data content, comprising discrete data portions including first data and second data portions separated from each other in the data content. A copy operation is implemented on data portions so that at least some of the data portions are each copied to a buffer, which include the first and second data portions. A paste operation is carried out to present each of the copied data portions as an input for an output data selection task. Prespecified criteria is used in the output data selection task to select a number of the copied data portions to be selected data for a given purpose, the selected number of copied data portions being less than data portions presented by the paste operation, and the selected copied data portions including the first and second data portions. | 01-16-2014 |
20140019857 | CLIPBOARD FOR PROCESSING RECEIVED DATA CONTENT - An embodiment of the invention directed to a method is associated with data content, comprising discrete data portions including first data and second data portions separated from each other in the data content. A copy operation is implemented on data portions so that at least some of the data portions are each copied to a buffer, which include the first and second data portions. A paste operation is carried out to present each of the copied data portions as an input for an output data selection task. Prespecified criteria is used in the output data selection task to select a number of the copied data portions to be selected data for a given purpose, the selected number of copied data portions being less than data portions presented by the paste operation, and the selected copied data portions including the first and second data portions. | 01-16-2014 |
20140032570 | Discriminative Learning Via Hierarchical Transformations - Techniques for discriminative learning via hierarchical transformations. A method includes obtaining a model of a first set of data, two or more data transformations, and a second set of data, evaluating the two or more data transformations to determine which data transformation will most effectively modify the second set of data to match the model, and selecting the data transformation that will most effectively modify the second set of data to match the model based on the evaluation. | 01-30-2014 |
20140032571 | Discriminative Learning Via Hierarchical Transformations - A system and an article of manufacture for discriminative learning via hierarchical transformations, which includes obtaining a model of a first set of data, two or more data transformations, and a second set of data, evaluating the two or more data transformations to determine which data transformation will most effectively modify the second set of data to match the model, and selecting the data transformation that will most effectively modify the second set of data to match the model based on the evaluation. | 01-30-2014 |
20140119563 | SYSTEM AND METHOD FOR USING BIOMETRICS TO PREDICT AND SELECT MUSIC PREFERENCES - Systems and methods for using biometrics to select music preference are provided. A system for using biometrics to select music preferences for a user in a vehicle, comprises a music selection module electrically coupled to at least one biometric sensor in the vehicle, wherein the at least one biometric sensor senses a characteristic of the user and outputs data for the sensed characteristic to the music selection module, and wherein the music selection module selects a music selection for the user based on the sensed characteristic data, and a controller module electrically coupled to the music selection module to control playing of the music selection, wherein the controller module receives an output including the music selection from the music selection module. | 05-01-2014 |
20140119564 | SYSTEM AND METHOD FOR USING BIOMETRICS TO PREDICT AND SELECT MUSIC PREFERENCES - Systems and methods for using biometrics to select music preference are provided. A system for using biometrics to select music preferences for a user in a vehicle, comprises a music selection module electrically coupled to at least one biometric sensor in the vehicle, wherein the at least one biometric sensor senses a characteristic of the user and outputs data for the sensed characteristic to the music selection module, and wherein the music selection module selects a music selection for the user based on the sensed characteristic data, and a controller module electrically coupled to the music selection module to control playing of the music selection, wherein the controller module receives an output including the music selection from the music selection module. | 05-01-2014 |
20140156176 | MANAGING VEHICLES ON A ROAD NETWORK - A system and method for managing vehicles on a road network can include a processor that performs operations including accessing a matrix of vehicle parameters of a plurality of communicating vehicles on the road network and representing the plurality of communicating vehicles in a graph with a plurality of nodes corresponding to the plurality of communicating vehicles and edges corresponding to the vehicle parameters. The system and method can include partitioning, with a processing device, the graph to reduce disruptions to the road network below a threshold level to support safe and efficient traffic flow and assigning one or more exclusion zones within the road network to each partition of the graph by associating the vehicle parameters for each vehicle. | 06-05-2014 |
20140156177 | MANAGING VEHICLES ON A ROAD NETWORK - A system and method for managing vehicles on a road network can include a processor that performs operations including accessing a matrix of vehicle parameters of a plurality of communicating vehicles on the road network and representing the plurality of communicating vehicles in a graph with a plurality of nodes corresponding to the plurality of communicating vehicles and edges corresponding to the vehicle parameters. The system and method can include partitioning, with a processing device, the graph to reduce disruptions to the road network below a threshold level to support safe and efficient traffic flow and assigning one or more exclusion zones within the road network to each partition of the graph by associating the vehicle parameters for each vehicle. | 06-05-2014 |
20140297783 | UNDOING SENT COMMUNICATIONS - Techniques for managing objects sent in a communication system. For example, a method for managing an object in a communication system comprises the following steps. An object previously sent in the communication system is identified. A first target to which the object was sent is determined. A first agent is deployed to the first target. The first agent is configured to undo the previously sent object at the first target, and determine if the previously sent object was sent from the first target to a second target. When the previously sent object was sent from the first target to the second target, the method deploys a second agent to the second target to undo the previously sent object at the second target. | 10-02-2014 |
20140297786 | UNDOING SENT COMMUNICATIONS - Techniques for managing objects sent in a communication system. For example, an apparatus for managing an object in a communication system is configured to identify an object previously sent in the communication system. A first target to which the object was sent is determined. A first agent is deployed to the first target. The first agent is configured to undo the previously sent object at the first target, and determine if the previously sent object was sent from the first target to a second target. When the previously sent object was sent from the first target to the second target, the apparatus deploys a second agent to the second target to undo the previously sent object at the second target. | 10-02-2014 |
20140317069 | INDEXING OF SIGNIFICANT MEDIA GRANULARS - Identifying significant media granulars may comprise partitioning a media document into one or more media granulars. A score may be assigned to each of the one or more media granulars. The one or more media granulars may be monitored to detect one or more user actions on the one or more media granular. The score associated with a respective one of the media granulars may be updated based on a number of user actions detected on the respective one of the media granulars. A media granular may be identified as being significant based on the score meeting a threshold. | 10-23-2014 |
20140317123 | INDEXING OF SIGNIFICANT MEDIA GRANULARS - Identifying significant media granulars may comprise partitioning a media document into one or more media granulars. A score may be assigned to each of the one or more media granulars. The one or more media granulars may be monitored to detect one or more user actions on the one or more media granular. The score associated with a respective one of the media granulars may be updated based on a number of user actions detected on the respective one of the media granulars. A media granular may be identified as being significant based on the score meeting a threshold. | 10-23-2014 |
20140372538 | SYSTEM AND METHOD FOR GENERATING INTENTIONAL INTERRUPTIONS DURING GATHERINGS - Systems and methods for generating interruptions are provided. A method for generating interruptions, comprises generating a message for one or more recipients, detecting that a computing device is being used for a presentation, concluding, using a processor, that the one or more recipients are in an audience for the presentation, and after concluding that the one or more recipients are in the audience, interrupting the presentation with the message. | 12-18-2014 |
20140372650 | SYSTEM AND METHOD FOR GENERATING INTENTIONAL INTERRUPTIONS DURING GATHERINGS - Systems and methods for generating interruptions are provided. A method for generating interruptions, comprises generating a message for one or more recipients, detecting that a computing device is being used for a presentation, concluding, using a processor, that the one or more recipients are in an audience for the presentation, and after concluding that the one or more recipients are in the audience, interrupting the presentation with the message. | 12-18-2014 |
20150026814 | INVISIBLE INTERFACE FOR MANAGING SECURED DATA TRANSACTIONS - In an exemplary embodiment, a computer-implemented method for secure data transactions includes storing, by a processing device, personal data on a wearable data storage applicable to a body of a user. The wearable data storage is rendered invisible. | 01-22-2015 |
20150058312 | PROVIDING MULTI-LINGUAL SEARCHING OF MONO-LINGUAL CONTENT - Approaches for translating a transliterated search query are provided. An approach includes receiving a search query containing a transliterated word. The approach also includes determining a source language corresponding to the transliterated word. The approach further includes converting the transliterated word to a word in the source language. The approach additionally includes translating the word in the source language to a word in a target language. The approach also includes performing a search using the word in the target language. | 02-26-2015 |
20150058426 | SYSTEM AND METHOD FOR AUTOMATICALLY GENERATING EMAIL SUBJECT LINES - Systems and methods for automatically generating e-mail subject lines are provided. A method for automatic generation of subject lines for electronic mail (email), comprises extracting topics from an email message, computing a sender relevance score for each topic, computing a receiver relevance score for each topic, ranking the topics based on the sender and receiver relevance scores, extracting syntactic units from the email message, ranking the extracted syntactic units from the email message based on the topic ranking, and assigning one or more subject lines to the email message based on the ranking of the syntactic units. | 02-26-2015 |
20150058428 | SYSTEM AND METHOD FOR AUTOMATICALLY GENERATING EMAIL SUBJECT LINES - Systems and methods for automatically generating e-mail subject lines are provided. A method for automatic generation of subject lines for electronic mail (email), comprises extracting topics from an email message, computing a sender relevance score for each topic, computing a receiver relevance score for each topic, ranking the topics based on the sender and receiver relevance scores, extracting syntactic units from the email message, ranking the extracted syntactic units from the email message based on the topic ranking, and assigning one or more subject lines to the email message based on the ranking of the syntactic units. | 02-26-2015 |