Infosys Technologies, Ltd. Patent applications |
Patent application number | Title | Published |
20130219374 | SYSTEM AND METHOD FOR AUTOMATED AND OBJECTIVE ASSESSMENT OF PROGRAMMING LANGUAGE CODE - A system and method of evaluating a software program is disclosed. Information of a proposed problem is received from a user via the user interface and a problem profile associated with the proposed problem is created. A master software solution associated with the proposed problem is processed to identify one or more attributes, such as a first identified attribute. One or more first test cases associated with the first identified attribute in the master software solution are generated. An evaluation program including at least the one or more generated first test cases is generated. The generated evaluation program is configured to be applied to at least one submitted software program that is to be evaluated. At least the one or more first test cases is configured to be applied as one or more test inputs to a corresponding attributes in the submitted software program. | 08-22-2013 |
20130113999 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR DETECTING SCENE CHANGES IN A VIDEO - A method, system and computer-readable media for detecting scene changes in a video that includes providing by one or more computing devices a plurality of passes through the video where a plurality of detected scenes from a first pass in a conventional method are identified and a second pass through the detected scenes are provided by the computing device. A plurality of scene boundary differences corresponding to the detected scenes, a fixed average, and a varying average are computed by the computing device. The scene boundary difference is compared with the fixed average and the varying average and if the scene boundary difference is less than the fixed average and the varying average, the detected scenes are combined else the detected scene being an abrupt scene change is determined. The steps of computing a varying average to combining the detected scenes are repeated by the computing device. | 05-09-2013 |
20130007861 | METHODS FOR AUTHENTICATING A USER WITHOUT PERSONAL INFORMATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string. | 01-03-2013 |
20130007198 | METHODS FOR RECOMMENDING PERSONALIZED CONTENT BASED ON PROFILE AND CONTEXT INFORMATION AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device. | 01-03-2013 |
20120317195 | METHOD FOR PROVIDING CONTEXT AWARE ACCESS IN GLOBAL SOFTWARE PROJECT MANAGEMENT - A method and system for managing communication between a plurality of team members are provided. The method includes, at a first agent associated with a team member, receiving inputs from a team member about an event associated with one or more team members. The method further includes sending an event request to agents of one or more team members and receiving responses from them. Based on the responses, the first agent either cancels the event, schedules the event, or reschedules the event. | 12-13-2012 |
20120296688 | METHODS FOR SELECTING ONE OF A PLURALITY OF COMPETING IT-LED INNOVATION PROJECTS AND DEVICES THEREOF - Methods, systems, and computer-readable storage media for selecting one of a plurality of information technology (IT)-led innovation projects include obtaining a plurality of IT-led innovation projects. A selection of one or more research projects for each of the obtained IT-led innovation projects is determined based at least on one or more research project criteria. One of the obtained IT-led innovation projects is selected based at least on the determined selection of one or more research projects for each of the obtained IT-led innovation projects and one or more innovation project criteria. The selection of the one of the obtained IT-led innovation projects is provided. | 11-22-2012 |
20120260235 | RESPONSE SIMULATOR COMPUTING APPARATUSES AND METHODS THEREOF - A method, non-transitory computer readable medium and apparatus that simulates responses includes obtaining one or more requests from two or more different types of interfaces for an application. Each of the one or more obtained requests is parsed to obtain one or more components. A simulated response is fetched based on the parsed one or more components for each of the one or more obtained requests. The fetched simulated response for each of the one or more obtained requests is provided to the corresponding one of the two or more different types of interfaces for the application. This technology provides a simple data driven simulation that is easily deployable and integrated into the existing development environments with customizable plug-in components. | 10-11-2012 |
20120260230 | EARLY ANALYSIS OF SOFTWARE DESIGN DIAGRAMS - Methods, apparatus, and computer-readable media for analyzing the prospective quality of source code produced according to a class representation (e.g., a UML class diagram) are disclosed. According to one embodiment, a class-level representation of a software application is received, one or more object classes of the class-level representation are selected, and a number of quality metrics are calculated for the selected object classes. The quality metrics can be output as a report or used to modify object classes of the class representation to improve the prospective quality of source code produced according to the class representation. | 10-11-2012 |
20120260228 | COMPOSITE APPLICATIONS USING SERVICE COMPONENT ARCHITECTURE MODEL AND OPEN VIRTUALIZATION FORMAT - Composite applications can be created that utilize a plurality of different services across a plurality of different cloud stack layers. The composite applications are defined using the Service Component Architecture (SCA) model. Composite applications can be translated from the SCA model into a format compatible for a virtualization platform, such as the Open Virtualization Format (OVF). Composite applications, as defined in the format compatible for the virtualization platform, can be deployed on the virtualization platform. | 10-11-2012 |
20120260201 | COLLECTION AND ANALYSIS OF SERVICE, PRODUCT AND ENTERPRISE SOFT DATA - Tools and techniques are provided that capture, aggregate, analyze and display soft data relating to an enterprise's services and products, and to the enterprise itself. The soft data comprises customer feedback on services, products and the enterprise, and are based on interactions between enterprise employers and the customers. The soft data comprises quantitative ratings and qualitative comments and is entered by employees at a capture engine. The captured soft data is aggregated and analyzed by an analytics engine, thereby generating aggregate data for use in generating data clouds at a display. Data clouds comprise service, product and enterprise attributes that are weighted according to quantitative rankings and qualitative comments relating to the attributes. Enterprise employees having decision-making authority can request data clouds for display, which can aid the decision makers in making decisions relating to enterprise services and products, and to the enterprise itself. | 10-11-2012 |
20120260089 | SYSTEM AND METHOD FOR SECURING DATA TRANSACTION - A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data. | 10-11-2012 |
20120260079 | FAST BOOTING COMPUTER APPARATUSES AND METHODS THEREOF - A fast booting computer apparatus includes one or more processors and a memory comprising a hard disk drive and a solid state drive coupled to the one or more processors. The one or more processors are configured to execute programmed instructions stored in the memory. The solid state drive is configured to store and provide the programmed instructions for an operating system for execution by the one or more processors when requested. | 10-11-2012 |
20120260019 | ELASTIC PROVISIONING OF RESOURCES VIA DISTRIBUTED VIRTUALIZATION - A multi-layer architecture is provided for elastic provisioning of virtualized computing resources. The multi-layer architecture comprises a physical hardware layer comprising a plurality of physical computing machines, a distributed operating system layer that aggregates and virtualizes the computing resources, and a virtual machine layer that comprises virtual machines provisioned, by the distributed operating system layer, with virtualized computing resources. Elastic provisioning of virtualized computing resources comprising receiving computing resource information of a plurality of physical computing machines, producing virtualized computing resources by aggregating the received computing resource information of the plurality of physical computing machines, and provisioning the virtualized computing resources among a plurality of virtual machines. | 10-11-2012 |
20120259974 | SYSTEM AND METHOD FOR DYNAMIC MODIFICATION OF WEB PAGE CONTENT TO ENSURE CONSISTENT RESPONSE TIME - Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of system constraints. Further, an available time is computed by the middleware for a data response by using one or both of the plurality of the system constraints and a target time. Determining an amount of the data response to be provided to a client based on the available time and converting the data response based on the amount of data response to be provided to the client. | 10-11-2012 |
20120259956 | SYSTEM AND METHOD FOR IMPLEMENTING A DYNAMIC CHANGE IN SERVER OPERATING CONDITION IN A SECURED SERVER NETWORK - A system and method of implementing a dynamic change in a server operating condition in a secured server network. A handling server receives a first request from a network device to access a specific service to be processed by a first application server. The handling server sends a first task to a first application server to process the first request, wherein the first task is stored and scheduled in a task processing queue of the first application server. The handling server receives a stand-by status command from the first application server indicating that it is going into a stand-by mode. The handling server does not send any new tasks to the first application server after receiving the stand-by status command. The handling server receives a first output result associated with the first task from the first application server, wherein the handling server sends the first output result to the network device. | 10-11-2012 |
20120259945 | SYSTEM AND METHOD FOR DYNAMICALLY MODIFYING CONTENT BASED ON USER EXPECTATIONS - Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps. | 10-11-2012 |
20120259913 | SYSTEM AND METHOD FOR IMPLEMENTING A DYNAMIC CHANGE IN SERVER OPERATING CONDITION IN A SECURED SERVER NETWORK - A system and method of implementing a dynamic change in a server operating condition in a secured server network comprises operating an application server, wherein the application server processes a plurality of scheduled tasks on behalf of one or more requesting network devices when in an operating mode. The scheduled tasks are assigned to the application server by a handling server. A stand-by status command sent from the application server to the handling server indicates that the application server's status has changed from the operating mode to a stand-by mode. The handling server accordingly does not schedule any new tasks to the application server when in it is in the stand-by mode. The application server processes all already scheduled tasks and outputs results for the scheduled tasks to the handling server while it is in the stand-by mode. | 10-11-2012 |
20120259869 | SYSTEM AND METHOD FOR IMPLEMENTING A WINDOW SORTING MECHANISM - A system and method of providing a window sorting mechanism comprises receiving an array having a plurality of objects, wherein each object contains a digit. The digits in the received array are unsorted in association with a desired sorting arrangement. A length of the received array is determined, whereby received array is separated into a plurality of sub-arrays based on the length of the received array. An inter sub-array digit sorting process is performed in a first iteration between a first sub-array and a second sub-array to sort digits in correspondingly positioned objects in accordance with a first comparison rule. A first adjacent-object digit sorting process is performed in a second iteration on the first and second sub-arrays using simultaneously sorting windows of a first digit size in accordance with a second comparison rule. A second adjacent-object digit sorting process is then performed in a third iteration on the first and second sub-arrays using sorting windows of a second digit size. | 10-11-2012 |
20120259744 | SYSTEM AND METHOD FOR AUGMENTED REALITY AND SOCIAL NETWORKING ENHANCED RETAIL SHOPPING - An augmented reality system is necessary for providing assistance for the customer in retail purchase decision. The augmented reality system comprising a one data sending module which is configured to send retail product information to the central server module is provided. A central server module configured to receive the retail product information from the data sending server where, the central server module is attached to a processor to process the retail product information. Processing the retail product information at the central server module, wherein the central server module retrieves retail product information from multiple databases which contains the retail product information. A data receiving module configured to receive the retail product information from the central server module. An application server configured to accept input from a user and to share the user details with a social networking platform. | 10-11-2012 |
20120259617 | SYSTEM AND METHOD FOR SLANG SENTIMENT CLASSIFICATION FOR OPINION MINING - The present disclosure describes a method of sentiment oriented slang for opinion mining. With increasing use of internet, many users can submit their review comments directly to the companies which can be automatically processed and summarized with critical issues from time to time and help the company get real time feedback from its customers. The method comprises, receiving at least one document comprising a plurality of sentiment oriented slang. The next step of the method comprises identifying the plurality of sentiment oriented slang in the at least one document. Further, a polarity score of each of a slang word identified is determined and sentiment information is displayed on an output device as an output. | 10-11-2012 |
20120259576 | SYSTEM AND METHOD FOR EFFICIENT TEST CASE GENERATION USING INPUT DEPENDENCY INFORMATION - A system and method for providing an efficient test case generator is disclosed. A test case project is established upon request from a user, via a user interface, to test an item. The test case project includes a plurality of fields and corresponding designated values to be tested. A first set of identified fields of the plurality are received, wherein the first set includes two or more fields identified by the user as having a dependent relationship with at least one another. A first relational field cluster for the first set of related fields and their values is created. A test case generation technique is performed on the first relational field cluster to compute all relevant test conditions for the first relation field cluster. Results of the computed test conditions for the first relational field cluster are displayed to the user via the user interface. | 10-11-2012 |
20120257876 | METHOD AND SYSTEM FOR GENERATING AT LEAST ONE OF: COMIC STRIPS AND STORYBOARDS FROM VIDEOS - A method, a system, and a computer program product code for generating a series of still images from an input video file are provided. The series of still images may include, but are not limited to, a comic strip and a storyboard. The method includes extracting audio and visual frames from the video file. Thereafter, basic units of the video file are identified. The basic units are exposition (beginning), conflict (middle), and resolution (end). Thereafter, key frames are extracted from the basic units based on at least one of audio frames, visual frames, and a combination of the visual frames and the audio frames. Then, the extracted key frames are manipulated to output a series of still images. Subsequently, narration in the form of audio or text is attached to the still images to generate at least one of comic strips and storyboards. | 10-11-2012 |
20120255027 | DETECTING CODE INJECTIONS THROUGH CRYPTOGRAPHIC METHODS - Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding code digest, and based upon a comparison with the code digest received from the server, determines if the received content has been corrupted. The code digest can be signed or supplied with a digital certification for verification that the code digest originated from the server providing the content. | 10-04-2012 |
20120254835 | STRUCTURAL SEARCH OF SOURCE CODE - Techniques and tools are described for searching source code. For example, source code can be indexed, a code structure query can be received, index records that conform to the code structure query can be identified, and code structure query results that correspond to the identified index records conforming to the code structure query can be sent. Also for example, a code structure query can be sent, a list of code structure query results corresponding to index records that conform to the code structure query can be received, at least one of the code structure query results can be selected, based on the selection, a formatted source-code file and a code hierarchy can be received, a code annotation associated with the formatted source-code file can be sent, and an annotation result corresponding to the formatted source-code file can be received. | 10-04-2012 |
20120254826 | ESTIMATION OF WEB ACCESSIBILITY ASSESSMENT AND REMEDIATION EFFORTS - Tools and techniques are described for estimating web accessibility and remediation efforts. One or more web accessibility standards can be indicated to be included in the effort estimate. A user can indicate which individual guidelines are to be included in standard test effort estimates by selecting individual guidelines, sub-guidelines or priority or success criteria levels. Standard test effort estimates are calculated based on test factors associated with the indicated individual guidelines or sub-guidelines. A total test effort estimate is calculated based on the standard test effort estimates and one or more web page counts, and a web accessibility and remediation effort estimate is calculated based on the total test effort estimate. A framework implementing the effort estimation methods can comprise multiple spreadsheets for use within a spreadsheet application running on a computing device. | 10-04-2012 |
20120254665 | GENERATION OF FUNCTIONAL TESTS FOR RE-HOSTED APPLICATIONS - A system and method for generating functional tests to verify code migrated from a first host to a second host. In one embodiment, source code is analyzed in order to generate functional tests that can be used for testing the re-hosted application. In particular, user-input scenarios are extracted from the source code and system output responses are determined based on the user-input scenarios. Functional tests can then be generated using the extracted user-input scenarios and output responses to ensure that the re-hosted application responds in a like manner. | 10-04-2012 |
20120254162 | FACET SUPPORT, CLUSTERING FOR CODE QUERY RESULTS - Techniques and tools are described for refining source-code query results. For example, source-code query results for a query can be generated, semantic clusters of the source-code query results can be generated, and based on a selection of a semantic cluster option, refined source-code query results can be sent. Also, for example, source-code query results can be received, selections of facet values associated with groups of the source-code query results can be sent, and based on selected facet values, a subset of the source-code query results can be received. | 10-04-2012 |
20120254143 | NATURAL LANGUAGE QUERYING WITH CASCADED CONDITIONAL RANDOM FIELDS - A natural language query tool comprising cascaded conditional random fields (CRFs) (e.g., a linear-chain CRF and a skip-chain CRF applied sequentially) processes natural language input to produce output that can be used in database searches. For example, cascaded CRFs extract entities from natural language input that correspond to column names or column values in a database, and identify relationships between the extracted entities. A search engine can execute queries based on output from the cascaded CRFs over an inverted index of a database, which can be based on one or more materialized views of the database. Results can be sorted (e.g., according to relevance scores) and presented in a user interface. | 10-04-2012 |
20120254041 | ONE-TIME CREDIT CARD NUMBERS - Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker. | 10-04-2012 |
20120254002 | CENTRALIZED FINANCIAL MANAGEMENT TOOL AND METHOD OF USE - A system and method of providing a centralized financial management tool which includes a financial application module implemented on a network device. The network device includes a linking interface which operates with the financial application module. The module, via the linking interface, sends requests in the form of messages compliant with a standardized messaging scheme, to receive account information of the user's different accounts from one or more different subscribed financial institutions. The module receives account information of the user's different accounts in the form of messages compliant with the standardized messaging scheme from the subscribed financial institutions. The module compiles and displays the account information for the user's different accounts in a user interface. The compiled account information can be categorized to allow the user to analyze, budget, and seek information from other users and financial advisors as well as perform any other financial management related functions on any of the user's different accounts. | 10-04-2012 |
20120253865 | SYSTEM AND METHOD FOR OPTIMIZING PLANNING PRODUCTION USING FEATURE DRIVEN VALUE APPROXIMATION TECHNIQUES - A system and method is disclosed of implementing a production planning module that is configured to optimize overall costs associated with reconfiguring a production facility during a changeover between to produce a another product family over a plurality of cycles. User input data is received via a user interface and a first state vector is created and is representative of a first product family and a first inventory of items of all product families manufactured at the production facility. A first action vector is created of a first quantity of items to be produced of the first product family in a first current cycle and a second product family to be produced in a second cycle. A first state-action value function is calculated for the first action vector in a first iteration and incorporates a first sampled demand of the first inventory items of the product families, a first inventory cost associated with the first inventory and a first set up cost. A second state vector is created based on the first state vector, the first action vector and the first sampled demand. The second state vector is made of a second inventory of items of all the product families. The method comprises creating a second action vector of a second quantity of items to be produced of the second product family in the second cycle and a third product family to be produced in a third cycle. A second state-action value function is calculated for the second action vector, a second sample demand of items, a second inventory cost associated with production of the second quantity of items and a second set up cost associated with reconfiguration of the production facility from producing the second product family to producing the third product family. A cost optimization result policy is output by minimizing, over all actions vectors, the first state-action value function in the user interface. | 10-04-2012 |
20120253864 | METHODS FOR RECORDING AND TRACKING PROJECTS AND DEVICES THEREOF - A method, non-transitory computer readable medium and apparatus that obtains project data in one or more form fields of one or more remotely located user based interfaces for a project. The obtained project data from the one or more form fields of the one or more remotely located user based interfaces for the project is validated. The validated project data is recorded in a project database for the project directly from each of the one or more remotely located user based interfaces. A project tracking report is generated based on the recorded project data. | 10-04-2012 |
20120253860 | METHODS FOR DECISION MAKING THROUGH CONVEX HULL OPTIMIZATION AND DEVICES THEREOF - Described are methods, systems, and computer-readable storage media for decision making through convex hull optimization. A plurality of key performance indicators (KPIs) are received. A convex hull encompassing the plurality of KPIs is generated. Based at least in part on the generated convex hull and on at least one KPI satisfying a condition, an operating range of one or more other KPIs is determined. Moreover, specific values at which each of the other KPIs may be maintained in order to reach a defined objective are determined. | 10-04-2012 |
20120250106 | METHOD, DEVICE AND SYSTEM FOR UPDATING AN APPLICATION ON A MOBILE DEVICE - The instant disclosure is related to updating an application on a mobile device without using mobile network bandwidth. The mobile device initiates the application to be updated on the mobile device to scan an encoded image of a predetermined pattern from a source. It is followed by decoding of the scanned image to extract information required to update the application. And then, updating the application on the mobile device based on the extracted information. | 10-04-2012 |
20120246610 | ONLINE INTEGRATED DEVELOPMENT ENVIRONMENT WITH CODE ASSIST - An online integrated development environment (IDE) providing code assist is described. A method for providing code assist within the online IDE comprises receiving a request from a client device to access a software development project, storing code assist information related to the software development project, and sending code assist information to the client device. The client device stores the received code assist information and uses it for local code assist operations at the client device. The client device can receive a subset of a database of code assist information stored at a server environment providing the online IDE. The client device accesses the online IDE via a web browser. | 09-27-2012 |
20120245466 | METHOD AND SYSTEM FOR CAPTURING MEDICAL IMAGING DATA - A portable medical image capturing apparatus is disclosed. The apparatus includes a plurality of transducers that are enabled to capture medical imaging data of a patient. The plurality of transducers are placed on an enclosure. The plurality of transducers capture the medical imaging data when the enclosure is held close to the patient. Further, the apparatus includes a communications module to transmit the medical imaging data of the patient to a remote data processing unit. The remote data processing unit is enabled to enhance the captured medical imaging data of the patient. | 09-27-2012 |
20120236740 | NETWORK EMULATION WITH VARYING BANDWIDTH AND/OR ERROR RATE - Network emulation techniques are provided for dynamically varying network bandwidth and/or error rate. Network emulation can be performed by determining a bandwidth range, determining a plurality of specific bandwidth values distributed across the bandwidth range, and dynamically varying available bandwidth among the plurality of specific bandwidth values for a stream of network packets. Transitioning between specific bandwidth values can be performed using a probability jump matrix. Network emulation can also be performed by varying error rates, such as dropped packets, separately or in addition to dynamic bandwidth variation. | 09-20-2012 |
20120233595 | SERVICE DEFINITION DOCUMENT FOR PROVIDING BLENDED SERVICES UTILIZING MULTIPLE SERVICE ENDPOINTS - A service definition document (SDD) framework is provided for defining blended services that utilize multiple service endpoints. The SDD framework can comprise a first category that defines a service endpoint representing a blended service, a second category that defines a plurality of service endpoints utilized by the blended service, and a third category that defines execution of the blended service. Blended services can be provided by creating a model of a blended service and saving a representation of the model of the blended service in a service definition document (SDD) framework. A blended service defined in a SDD framework can be executed by receiving the SDD and executing the blended service as defined by the SDD using a service execution environment (SEE). | 09-13-2012 |
20120233589 | SOFTWARE DEVELOPMENT KIT FOR BLENDED SERVICES - A three-layer architecture is provided for implementing a software development kit (SDK) for developing blended service software applications that utilize multiple service endpoints. The three-layer architecture comprises an application programming interface (API) layer, a core layer, and a communication layer. The API layer provides a set of interfaces for developing blended services that utilize a plurality of service endpoints. The core layer receives commands from the API layer and transforms the received commands for communication with the plurality of service endpoints. The communication layer provides communication adapters for communicating with the plurality of service endpoints. Blended service software applications can be developed using the SDK by receiving a plurality of API commands for a blended service that utilizes a plurality of service endpoints, determining a plurality of worker classes, and providing communication adapters for communicating with the plurality of service endpoints. | 09-13-2012 |
20120233588 | BLENDED SERVICE CREATION, TEST, AND DEPLOYMENT ENVIRONMENT FOR MULTIPLE SERVICE ENDPOINTS - A blended service creation environment is provided for developing blended service software applications that utilize multiple service endpoints. The blended service creation environment comprises a software development kit, a graphical service creation environment, and service endpoint simulators. Blended services can be tested locally using the service endpoint simulators, which simulate communication with actual service endpoints. The graphical service creation environment can be used to create blended services that utilize multiple service endpoints from different service providers. A service definition document can be used to define a blended service and the service definition document can be used to execute the blended service using a service execution environment. | 09-13-2012 |
20120185517 | METHOD AND SYSTEM FOR CONVERTING UBL PROCESS DIAGRAMS TO OWL - The present invention includes a method and a system for creating Web Ontology Language (OWL) ontology from a Universal Business Language (UBL) process diagram. The UBL process diagram includes one or more processes, one or more partitions, one or more activities, one or more objects, an initial node, and a final node. At least one of the processes, the partitions, the activities, and the objects are extracted from the UBL process diagram. A first OWL class, a second OWL class, and a third OWL class are created corresponding to the processes, partitions, and objects, respectively. Thereafter, an object property is created corresponding to each of the activities, the initial node, and the final node. Finally, the first OWL class, the second OWL class, the third OWL class, and each of the created object property are added to obtain the OWL ontology. | 07-19-2012 |
20120176938 | METHOD AND SYSTEM FOR CREATING A VIRTUAL WIRELESS SENSOR NETWORK - A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN. | 07-12-2012 |
20120131090 | DISTRIBUTED REGISTRY FOR DEVICE DISCOVERY USING QUORUM CONSENSUS PROTOCOL - A distributed hierarchical registry provides services, such as registry services, including client device discovery and communication services. The distributed hierarchical registry comprises a plurality of registry groups where a registry group comprises a plurality of registry servers. The registry servers receive client device information, such as status, capability, and usage information, and update other registry servers, in the same registry group and/or in other registry groups, using a quorum consensus protocol. The registry servers also respond to lookup requests from client devices. Registry servers use policies to define parameters such as a number of registry servers that make up a read quorum and the number of registry servers that make up a write quorum. | 05-24-2012 |
20120096434 | SYSTEM AND METHOD FOR DETECTING PREVENTATIVE MAINTENANCE OPERATIONS IN COMPUTER SOURCE CODE - The invention relates to a system and method for identifying occurrences of preventive maintenance on computer source code. The method comprises analyzing source code, defining data sets associated with characteristics of the source code, and applying an operation algorithm to the data sets to thereby identify occurrences of preventive maintenance operations that were carried out on the source code. A first instance of a source code and a second instance of the source code are preferably analyzed, wherein the second instance of the source code is a revised version of the first instance of the source code, a first data set associated with the first instance of the source code and a second data set associated with the second instance of the source code are preferably defined, and the operation algorithm is preferably applied to the first data set and the second data set to thereby identify at least one occurrence of a preventive maintenance operation that was carried out on the source code. | 04-19-2012 |
20120092352 | METHOD AND SYSTEM FOR PERFORMING EVENT-MATCHING WITH A GRAPHICAL PROCESSING UNIT - A computer-implemented method for event matching in a complex event processing system includes receiving, with a computer processing device, a stream of event data; receiving, with a computer processing device, an event list and an access predicate list, wherein the event list includes one or more event data pairs; and identifying, with a graphical processing device, patterns in the stream of event data. | 04-19-2012 |
20120089726 | AUTOMATED SERVICE LEVEL MANAGEMENT OF APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT - Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple levels using a plurality of techniques including automated dynamic application migration. Automated deployment of applications in a cloud computing environment using deployment descriptors comprises receiving values for service level parameters for an application, creating a deployment descriptor based on the parameters, identifying application servers that satisfy the deployment descriptors, and deploying the application to the identified application servers. Automated dynamic migration of applications in a cloud computing environment comprises deciding to migrate an application, obtaining application resource requirements, identifying application server candidates, selecting an application server from one of the candidates, and migrating the application. | 04-12-2012 |
20120077461 | METHOD AND SYSTEM FOR PREAUTHENTICATING A MOBILE NODE - A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers. | 03-29-2012 |
20100293023 | FRAMEWORK FOR DEVELOPING ENTERPRISE SERVICE ARCHITECTURE - The invention provides a framework for developing the architecture of an enterprise information technology (IT) eco-system for an organization. The framework includes a business function appliance module, a core architecture appliance module, and a technology architecture appliance module. The business function appliance module provides one or more functionalities for the business processes of the information technology eco-system. The core architecture appliance module provides one or more functionalities for the deployment and integration of the one or more functionalities provided by business function appliance module across IT processes, based on metadata configuration. The technology architecture appliance module is configured to provide technical operational services for the one or more functionalities provided by the core architecture appliance module based on the metadata. The framework, therefore, provides a metadata-based architecture that enables the business configuration to be defined, stored and managed as an independent layer. | 11-18-2010 |
20100118770 | System and method for transferring data using variance based messaging - A system and method for providing data transfer from a source node to a destination node in a network using variance based messaging is provided. The method comprises the steps of receiving one or more messages by the source node; selecting a plurality of messages to be grouped from the one or more messages, wherein the plurality of messages comprise data with minimum deviation in content; creating an integrated message from the plurality of messages; sending the integrated message from the source node to the destination node; and recreating each message of the plurality of messages at the destination node. | 05-13-2010 |
20100070948 | System and method for improving modularity of large legacy software systems - A system and method for improving modularity of a software source code is provided. The system comprises of a user interface for receiving source code; a source code model extractor for parsing and forming a model of the source code; a source code model database for storing the source code model, refactoring operators, and a record of refactoring changes; a modularity improvement analyzer for reading the source code model and modularity problem diagnosis data and generating a set of prescriptions; an optimal improvement suggestion selector for evaluating and selecting prescriptions; and a refactoring engine for receiving selected prescriptions and applying them on the source code. | 03-18-2010 |
20100005472 | TASK DECOMPOSITION WITH THROTTLED MESSAGE PROCESSING IN A HETEROGENEOUS ENVIRONMENT - Tasks for a business process can be decomposed into subtasks represented by messages. Message processing can be throttled in a heterogeneous environment. For example, message processing at subtask nodes can be individually throttled at the node level by controlling the number of instances of subtask processors for the subtask node. An infrastructure built with framework components can be used for a variety of business process tasks, separating business logic from the framework logic. Thus, intelligent scalability across platform types can be provided for large scale business processes with reduced development time and resources. | 01-07-2010 |
20090319334 | INTEGRATING ENTERPRISE DATA AND SYNDICATED DATA - Enterprise data and syndicated data can be integrated by obtaining enterprise data, obtaining syndicated data from a syndicated data provider, performing various processing on the enterprise and syndicated data such as recast processing, fringe compensation, event identification, and/or event matching, and outputting results. A data integration framework for integrating enterprise data, syndicated data, and/or unstructured data can be provided. The framework can comprise a plurality of data extractors and a data integration module. The data integration module can be configured to perform syndicated data recast processing on the syndicated data, perform fringe compensation processing on the syndicated data, identify consumption events in the processed syndicated data, and match shipment events to consumption events. Results of the matching can be stored and reported. | 12-24-2009 |
20090300061 | System and method for universe generation - A system and method for automatically generating the universe from the documented MS-Excel file is disclosed. The methods for the Generate Universe, Migrate Universe, Update Universe and Document Universe are disclosed. The method helps in reduction of build effort of the project and removes the problem of corruption of the universe file of link being lost. The method provides easy maintenance of the universe versions and multi-user development environments and updating of universe files. | 12-03-2009 |
20090287609 | Method and system for managing projects over a network - A method and system for managing projects on a network platform that enables a buyer to make a buy request for a project on a network platform. The buy request includes various requirements of the project. In response to the buy request, various sellers provide submissions for the project on the network platform. The submissions may be utilized by the buyer of the project. Various sellers can provide the submissions that comply with one or more requirements of the project. The buyer utilizes the submissions to execute the project, based on their compliance with the requirements of the project, and provides compensation to the sellers. | 11-19-2009 |
20090282418 | Method and system for integrated scheduling and replication in a grid computing system - A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system | 11-12-2009 |
20090276263 | Framework for realization of web 2.0 features - A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises. | 11-05-2009 |
20090254916 | ALLOCATING RESOURCES FOR PARALLEL EXECUTION OF QUERY PLANS - Computing resources can be assigned to sub-plans within a query plan to effect parallel execution of the query plan. For example, computing resources in a grid can be represented by nodes, and a shortest path technique can be applied to allocate machines to the sub-plans. Computing resources can be provisionally allocated as the query plan is divided into query plan segments containing one or more sub-plans. Based on provisional allocations to the segments, the computing resources can then be allocated to the sub-plans within respective segments. Multiprocessor computing resources can be supported. The techniques can account for data locality. Both pipelined and partitioned parallelism can be addressed. Described techniques can be particularly suited for efficient execution of bushy query plans in a grid environment. Parallel processing will reduce the overall response time of the query. | 10-08-2009 |
20090254884 | IDENTIFICATION OF TOPICS IN SOURCE CODE - Topics in source code can be identified using Latent Dirichlet Allocation (LDA) by receiving source code, identifying domain specific keywords from the source code, generating a keyword matrix, processing the keyword matrix and the source code using LDA, and outputting a list of topics. The list of topics is output as collections of domain specific keywords. Probabilities of domain specific keywords belonging to their respective topics can also be output. The keyword matrix comprises weighted sums of occurrences of domain specific keywords in the source code. | 10-08-2009 |
20090254877 | CONCEPT-ORIENTED SOFTWARE ENGINEERING SYSTEM AND METHOD FOR IDENTIFYING, EXTRACTING, ORGANIZING, INFERRING AND QUERYING SOFTWARE SYSTEM FACTS - Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software system facts are extracted from artifacts comprising the software system or are provided through explicit definition. Architectures of the software system are recovered from the stored software system facts. Layered views of the recovered architectures are generated. The stored software system facts are checked against architectural rules to ensure architectural compliance of the software system. The impact of proposed changes to the software system is assessed by querying the identified software system facts. | 10-08-2009 |
20090254876 | CONCEPT-ORIENTED SOFTWARE ENGINEERING SYSTEM AND METHOD FOR IDENTIFYING, EXTRACTING, ORGANIZING, INFERRING AND QUERYING SOFTWARE SYSTEM FACTS - Software system facts comprising concepts, concept instances and relationships within the software system are identified and stored in a repository. The software system facts are extracted from artifacts comprising the software system or are provided through explicit definition. Architectures of the software system are recovered from the stored software system facts. Layered views of the recovered architectures are generated. The stored software system facts are checked against architectural rules to ensure architectural compliance of the software system. The impact of proposed changes to the software system is assessed by querying the identified software system facts. | 10-08-2009 |
20090183137 | Method and framework for securing a source code base - A framework for securing a source code base during the development phase of a software development lifecycle is provided. The framework includes an aspect package module and a validator package module. The aspect package module integrates security routines into the source code base. The aspect package module includes a custom interface module and a validator aspect module. The custom interface module includes a function declaration, wherein the custom interface module is implemented by at least one class of the one or more classes. The validator aspect module includes a controller code for controlling the flow of the execution, based on the context for the security validation of the at least one class, wherein one or more security routine integration points are defined in the at least one class. The validator package module validates the at least one class, based on the defined context, by using one or more validation classes. | 07-16-2009 |
20090182730 | Method for semantic based storage and retrieval of information - A method of storing semantically similar documents on proximally located peers in a structured peer to peer overlay network, where each peer is assigned a unique identifier and each document includes one or more words belonging to at least one hierarchical structured collection of words. A method of searching and retrieving documents, corresponding to a search query, from a structured peer to peer overlay network is also provided. | 07-16-2009 |
20090150325 | System and method for root cause analysis of the failure of a manufactured product - A system, method and computer program product for the root cause analysis of the failure of a manufactured product is disclosed. The present invention includes the development of a knowledge model, based on information obtained from historical warranty claim forms and various manufacturing data sources. The invention also includes processing text information in a free-form text that is obtained from warranty claim forms by using text-tagging and annotation techniques. Thereafter, the knowledge model is converted to a Bayesian network. The present invention provides a user interface to select parameters and corresponding instances from current warranty claim forms. The selected parameters and corresponding instances are used as input evidence for the Bayesian network. The present invention facilitates the process of drawing inferences for root cause analysis of the failure of manufactured products and corresponding probabilities. | 06-11-2009 |
20090147937 | System and method for personalized call treatment by using a combination of communication and data services - A system and method for providing personalized call treatment to an incoming call by using a combination of data and communication services is provided. The system comprises a Mashup application for determining a treatment method corresponding to each incoming call based on a called person's profile and one or more predefined rules. The system also comprises a communication services platform and a data services platform coupled with the Mashup application. | 06-11-2009 |
20090144125 | SYSTEM AND METHOD FOR RECONNAISSANCE FOR SPEND MANAGEMENT PROCUREMENT - A system, method and computer program product for providing a procurement solution, including determining a maturity level of a strategic direction, procurement processes, and procurement information technology (IT) landscape of a client; identifying a prescription to a spend management solution product, based on the determined maturity level, procurement processes, and procurement IT landscape of the client; and deploying the spend management solution product for the client based on the identified prescription to the spend management solution product. | 06-04-2009 |
20090133103 | Method and system for data security in an IMS network - A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment. | 05-21-2009 |
20090133002 | Method for benchmarking online business environments - A method to create web 2.0 index for an online business environment includes listing web 2.0 parameters, assigning a value based score to the listed web 2.0 parameters against each online business environment and computing the web 2.0 index for each online business environment. The method can create a benchmark between online business environments based on indicative of the computed web 2.0 indices. The web 2.0 index for an online business environment is the calculated by aggregating the value based scores assigned to individual web 2.0 parameters. The list of web 2.0 parameters for an online business environment captures content index constituents, collaboration index constituents and commerce index constituents. | 05-21-2009 |
20090106037 | ELECTRONIC BOOK LOCATOR - An electronic book locator can be a hand-held or a mounted device for locating or cataloguing books. One or more images of book spines can be processed using character recognition methods to electronically recognize book identification information appearing on the book spine. Locations of books in a book storage area can be determined from images of the books in the book storage area. Determined book locations can be compared to designated locations and misplaced books can be indicated. A book database can be generated based on images of books. Identification information of a target book can be input into a book locator device and a location of the target book can be indicated by the device. | 04-23-2009 |
20090100404 | SOFTWARE PACKAGE IMPLEMENTATION SIZING - Implementation size of a software package implementation can be determined by determining implementation sizes of modules, determining tasks to be implemented, determining a complexity factor, and calculating the implementation size based on the modules, tasks, and complexity factor. Implementation size of a software package implementation can be determined using a sizing framework. The sizing framework can comprise a repository of modules and functionality provided by the modules, a standard album of tasks, effort information for the tasks, and a repository of complexity values. A sizing tool can determine an implementation size of a software package implementation. The sizing tool can comprise user-interface pages for receiving a selection of modules, for receiving a selection of functionality, for receiving a selection of tasks to be implemented for the software package, and for receiving a selection of complexity values. The sizing tool can calculate the implementation size based on the selections. | 04-16-2009 |
20090083325 | SYSTEM AND METHOD FOR END TO END TESTING SOLUTION FOR MIDDLEWARE BASED APPLICATIONS - A method, system and computer program product for testing a Middleware based application, including providing XML or XSD data and generating an XML template from the XML or XSD data, generating a test data template from the XML template, and generating XML values from the test data template. The XML values may be published over a Middleware based application. A query may be built in a application database wherein the data base is in communication with the Middleware based application. The queries may be executed by fetching data from the database. The method, system and computer program product may further include validating test data and subscribing to an application output. After validating the subscribed output against an expected output, a test result may be generated. | 03-26-2009 |
20090030761 | PREDICTING FINANCIAL IMPACT OF BUSINESS FRAMEWORK - The financial impact of the implementation of a business framework can be predicted. Shifted business condition metrics associated with business activities for implementing the business framework can be applied to model financial impact for a business entity. Impact on financial condition according to income statement and balance sheet can be modeled based on financial data for the business entity. Impact can be modeled per activity. Activities can be prioritized based on modeled impact. | 01-29-2009 |
20090019501 | CONTENT LICENSING AND CONDITIONAL ACCESS USING A MOBILE DEVICE - Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted. | 01-15-2009 |
20080312991 | BUYER-SIDE CONSOLIDATION OF COMPATIBLE PURCHASE ORDERS - Systems and methods of buyer-side consolidation of compatible purchase orders are described herein. Purchase orders can be identified for consolidation using spatial and temporal proximity parameters. Purchase orders can be modified by changing a ship date or a delivery date and the changing can be based on a buyer input. Shipments can be consolidated based on the purchase order modifications and less than truckload shipments can be reduced. Consolidated shipments can be associated with different requested delivery dates, different suppliers, and/or different buyers. Buyer-side consolidation of compatible purchase orders can occur before purchase orders are processed by a transportation management system. | 12-18-2008 |
20080307312 | USER INTERFACE DEVELOPMENT TOOLS - A user interface tool can use a repository of user interface elements to create a user interface. One or more of the elements in the repository can be reused within the interface or among multiple interfaces. At least some of the elements have associated behavioral information. The behavioral information can indicate how an element is to function or appear based on, for example, the device or business channel in which the user interface is used. The tool can employ a multi-layer architecture. At least some behaviors of the tool (e.g., which elements from the repository are presented to the user, which actions the user can perform on a user interface) can be dependant on one or more roles of the user. | 12-11-2008 |
20080300851 | System and method for application migration in a grid computing environment - A system and method for assessing performance of a software application migrated to a grid infrastructure is provided. The system comprises a grid code analyzer for generating a directed acyclic graph (DAG) corresponding to the software application by performing static and dynamic analysis; a grid task generator for reducing the DAG generated by the grid code analyzer; and a grid simulator for simulating performance of the software application on one or more predetermined grid infrastructures. The grid simulator accepts the reduced DAG as input and produces performance data as output. | 12-04-2008 |
20080294659 | EFFICIENT XML JOINS - An XML join between XML documents can be performed by comparing XML elements between the XML documents, obtaining join-selection elements from a first XML document, obtaining join-required elements from one or more other XML documents, and performing the XML join using the elements in the first XML document and the join-required elements. The XML documents can be at different locations connected via a network. Where two XML documents are at different locations, the join-selection elements can be transmitted from a first location (of a first XML document) to a second location (of a second XML document). The join-required elements can be obtained at the second location and transmitted back to the first location. The XML join can then be performed at the first location. | 11-27-2008 |
20080263648 | SECURE CONFERENCING OVER IP-BASED NETWORKS - Methods and systems for secure conferencing over an IMS network or other networks include sending request by at least one user to access to an application server. The user is validated using a validation coupon provided by the user equipment followed by identifying and allowing the user equipment to download a valid media client. Conference data is encrypted and transmitted to the user equipment, and processed by the media client. Typically, the encrypted conference data is decrypted by the media client and communicated to a user interface presentation to the user. In some examples, the conference data is validated prior to downloading to the user equipment. | 10-23-2008 |
20080262968 | SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES - Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application. | 10-23-2008 |
20080255895 | System And Method For Generating Data Migration Plan - A system and method for generating a migration plan for migrating data from a first electronic medium to a second electronic medium is provided. The system comprises a migration readiness assessment module for determining a migration recommendation; an effort estimation module for determining a total effort required for migrating data from a first electronic medium to a second electronic medium; and a migration plan generator module for generating a migration plan based on the determined migration recommendation and the total estimated effort. | 10-16-2008 |
20080249825 | INFORMATION TECHNOLOGY MAINTENANCE SYSTEM FRAMEWORK - A strategic framework enables improvements in IT system maintenance by taking IT system information as input and outputting useful metrics and/or proposed modifications to achieve efficiency improvements. The strategic framework also can be described as an IT maintenance system assessment and modification tool. The described framework encompasses strategies for effective IT maintenance and improvement. The framework addresses the effectiveness of IT maintenance by focusing on, for example, technology, operations, human and/or non-human resources, and governance solutions. One or more of these dimensions can be assessed and evaluated, for example, to discover and process useful metric information. From the results of a described IT maintenance system assessment, which provides metrics for evaluating efficiency and improvability of IT maintenance systems, an overall roadmap of solutions can be developed. This can be used to form an end-to-end solution for better IT maintenance and portfolio spending in an organization. | 10-09-2008 |
20080201340 | DECISION TREE CONSTRUCTION VIA FREQUENT PREDICTIVE ITEMSETS AND BEST ATTRIBUTE SPLITS - A decision tree can be constructed via frequent predictive itemsets and best item splits. A hierarchical frequent predictive itemsets tree data structure can be used to construct the decision tree. A bottom-up traversal of the data structure can be used during determination of best item splits. The described technologies can construct decision trees with superior accuracy as compared to conventional greedy decision tree construction approaches. | 08-21-2008 |