Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Ruled-based reasoning system

Subclass of:

706 - Data processing: artificial intelligence

706045000 - KNOWLEDGE PROCESSING SYSTEM

706046000 - Knowledge representation and reasoning technique

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
706048000 Having specific pattern matching or control technique 96
Entries
DocumentTitleDate
20090192969NETWORK OPERATING SYSTEM - Generally described, the present invention is directed to a network operating system that provides more effective ways of leveraging the connectivity of computer networks. In one embodiment, an XML virtual machine is implemented that accepts high-level application code written in an XML programming language as input. Functionality is provided to interpret or translate the application code written in an XML programming language into code that is suitable for execution across computer platforms. Moreover, the XML virtual machine supports the Model View Controller (MVC) design paradigm that facilitates true data abstraction from applications to a common data model. Multi-instance applications, with each instance potentially supporting multiple views, may be created and executed.07-30-2009
20100057661SELF LEARNING METHOD AND SYSTEM TO PROVIDE AN ALTERNATE OR ANCILLARY PRODUCT CHOICE IN RESPONSE TO A PRODUCT SELECTION - A system including: a memory element for storing an artificial intelligence program (AIP); an interface element for receiving, from a wireless communications device (WCD), a first portion of an order; and a processor for generating, using the AIP, an offer in response to items or services in the first portion of the order. The interface element is for transmitting the offer to the WCD and receiving, from the WCD, a second portion of the order. The processor is for modifying, using the AIP, the offer in response to items or services in the first and second portions of the order by adding or modifying items, services, or incentives. The interface element is for transmitting the modified offer to the wireless communications network for transmission to the WCD.03-04-2010
20100082515ENVIRONMENTAL FACTOR BASED VIRTUAL COMMUNICATION SYSTEMS AND METHODS - In an exemplary method, an agent facility associated with an access device and a user is maintained, data representative of one or more rules associated with the user is also maintained, at least one environmental factor of the user is detected, and a predefined action is performed with the agent facility in response to the detected environmental factor and in accordance with at least one of the rules. In another exemplary method, a virtual entity configured to electronically represent one or more traits is maintained, electronic interaction by the virtual entity with at least one user is facilitated, at least one environmental factor of the user is detected; and at least one parameter defining the virtual entity is adjusted in accordance with the at least one detected environmental factor.04-01-2010
20130031043FUZZY LOGIC BASED SYSTEM MONITORING SYSTEM AND METHOD - A bearing monitoring system includes at least one sensor, and a fuzzy logic enabled device operatively connected to the at least one sensor. The fuzzy logic enabled device includes a fuzzy logic rule set that is configured and disposed to determine a component condition based on an input from the at least one sensor.01-31-2013
20130031042Distributed assured network system (DANS) - A computerized method for a distributed assured network system includes a plurality distributed monitoring nodes for sequential feeding the content of respective information sources to a detection agent. The detection agent uses an SPRT-based distributed sequential misbehavior detection scheme to process each MN observation with the probability of a false alarm 01-31-2013
20130212057METHOD AND DEVICE FOR SAVING TRIPLE FOR VERIFYING REASON AND INCREMENTAL REASONING, AND METHOD AND DEVICE FOR REASON-DEPENDENT INDEXING APPROPRIATE FOR SAME - A method and apparatus for storing a triple and an inference dependency indexing apparatus appropriate to the method and system are provided. The method of storing a triple related to an inference method for creating other triples by applying an inference rule to the triple includes: (a) adding a serial number to each of triples and inference rules related to inference and storing the triples and the inference rules into a plurality of triple tables and inference rule tables; (b) indexing a triple inferred by applying the triple and the inference rule, using a serial number of the triple and a serial number of the inference rule related to inference; and (c) creating a triple view which allows accessing the triples physically distributed and stored in a plurality of triple storage units (tables) as if the triples are stored in a virtual storage unit (table).08-15-2013
20130031044DATA QUALITY MANAGEMENT - A data quality management system includes a rules repository configured to store profiling data quality rules, cleansing data quality rules, and linking data that links profiling data quality rules to cleansing data quality rules. The data quality management system also includes a rules management module configured to manage the rules repository. The data quality management system further includes a data quality job management module configured to migrate data quality rules from the rules repository to a data quality processing system and manage a data quality process performed by the data quality processing system using the migrated data quality rules.01-31-2013
20110202491POLICY AND CHARGING RULES NODE EXPIRED MESSAGE HANDLING - Various exemplary embodiments relate to a method and related network node and machine-readable storage medium including a policy and charging rules node (PCRN) receiving a plurality of related service requests from different devices. The PCRN may proceed to generate a policy and charging control (PCC) rule based on at least one service request and other information stored in the PCRN if a mate service request does not arrive during the duration of a waiting timer. If the mate service request arrives subsequent to the expiry of the waiting timer, the PCRN may then generate a subsequent PCC rule to replace the previously generated rule, with the new PCC rule incorporating information from both of the mate service requests.08-18-2011
20110202490COMPLEX ALERT RULES FOR A MEDICAL PERSONNEL ALERT SYSTEM - A method, a system, and a computer-readable medium are provided for generating a complex alert. Values of a plurality of physiological characteristics of a patient are received. The received values are compared to a complex alert rule associated with a medical condition. The complex alert rule includes a plurality of alert rules, wherein each alert rule includes an indicator of a physiological characteristic of a patient associated with the alert rule and a condition priority associated with an urgency of the alert rule. The complex alert rule also includes a trigger rule. The trigger rule includes a plurality of rules wherein each rule includes a number of satisfied alert rules for each value of the condition priority. A number of alert rules of the plurality of alert rules that are satisfied is determined for each condition priority of the complex alert rule based on the comparison. A complex alert is generated if the determined number of alert rules for a condition priority satisfies the trigger rule of the complex alert rule.08-18-2011
20130085978Decision Tree Level Merging - A packet classification system, methods, and corresponding apparatus are provided for enabling packet classification. A processor of a security appliance coupled to a network uses a classifier table having a plurality of rules, the plurality of rules having at least one field, to build a decision tree structure including a plurality of nodes, the plurality of nodes including a subset of the plurality of rules. By merging levels of decision trees, the methods may produce wider, shallower trees that result in shorter search times and reduced memory requirements for storing the trees.04-04-2013
20100076918APPARATUS AND METHOD FOR PERFORMING SERVICE ADAPTATION IN RESPECT OF A MOBILE COMPUTING DEVICE - One embodiment of the invention provides a method and apparatus for performing service adaptation in respect of a mobile computing device. The method includes providing a service adaptation specification as a set of rules, where each rule comprises a rule body containing one or more premises and a rule head containing one or more conclusions that hold if said one or more premises are true. The rules are defined as classes in an ontology. The premises represent adaptation context and the conclusions represent service adaptation decisions. The method further comprises running the rules on a Description Logics reasoner in conjunction with adaptation context relating to the mobile computing device for a requested service to produce one or more service adaptation decisions. The method further comprises adapting the requested service provided to the mobile computing device in accordance with the service adaptation decisions from the description logics reasoner.03-25-2010
20100114809Method of Organizing and Presenting Data in a Table - Methods of analyzing data are provided. An expert system receives input from at least a first source. Data is imported and analyzed by an expert system, wherein the expert system makes at least one first decision, which characterizes the data based on a rule base. The at least one first decision is displayable and modifiable by a first input from a first source. In response to the first input from the first source, the rule base may be re-applied to make at least one second decision, wherein the at least one second decision is different from the at least one first decision, or the at least one first decision may be accepted. The at least one first decision or the at least one second decision is then displayable and modifiable in response to a first input from a second source. In response to the first input from the second source, the rule base is either re-applied to make at least one third decision, wherein the third decision is different from the second decision, or either the first or second decisions are accepted.05-06-2010
20130085977MINIMIZING RULE SETS IN A RULE MANAGEMENT SYSTEM - A method, system and computer program product for minimizing a rule set. A rule set application graph that describes a set of rules including actions and cases is built, whereby each rule defines an action for one or more cases. A rule violation graph for each rule describing the actions and cases not defined for that rule is built. A subset of rules having a reduced number of rules with the same set of actions and cases as the rule set application graph is determined by exploring candidate subsets of the rule set that are sufficient for reproducing the behavior of the original rule set.04-04-2013
20130185242DATA SOURCE FOR PARALLEL INFERENCE - Systems, methods, and other embodiments associated with data sources adapted for parallel inference on triples associated with a semantic model are described. One example method includes creating a source table that is partitioned on triple predicate and stores triples for entailment. The source table may store compact triple identifiers that have been mapped to triple identifiers from the semantic model.07-18-2013
20130036083System and Method for Storing Lookup Request Rules in Multiple Memories - In one embodiment, a system includes a data navigation unit configured to navigate through a data structure stored in a first memory to a first representation of at least one rule. The system further includes at least one rule processing unit configured to a) receive the at least one rule based on the first representation of the at least one rule from a second memory to one of the rule processing unit, and b) processing a key using the at least one rule.02-07-2013
20130036082MULTIPLE IMPUTATION OF MISSING DATA IN MULTI-DIMENSIONAL RETAIL SALES DATA SETS VIA TENSOR FACTORIZATION - A system, method and computer program product provides for multiple imputation of missing data elements in retail data sets used for modeling and decision-support applications based on the multi-dimensional, tensor structure of the data sets, and a fast, scalable scheme is implemented that is suitable for large data sets. The method generates multiple imputations comprising a set of complete data sets each containing one of a plurality of imputed realizations for the missing data values in the original data set, so that the variability in the magnitudes of these missing data values can be captured for subsequent statistical analysis. The method is based on the multi-dimensional structure of the retail data sets incorporating tensor factorization, that in a preferred embodiment can be implemented using fast, scalable imputation methods suitable for large data sets, to obtain multiple complete data sets in which the original missing values are replaced by various imputed values.02-07-2013
20130080368ONLINE FRAUD PREVENTION USING GENETIC ALGORITHM SOLUTION - Online fraud prevention including receiving a rules set to detect fraud, mapping the rules set to a data set, mapping success data to members of the rules set, filtering the members of the rules set, and ordering members of the data set by giving priority to those members of the data set with a greater probability for being fraudulent based upon the success data of each member of the rule set in detecting fraud. Further, a receiver coupled to an application server to receive a rules set to detect fraud, and a server coupled to the application server, to map the rules set to a data set, and to map the success data to each members of the rules set. The server is used to order the various members of the data set by giving priority to those members of the data set with a greatest probability for being fraudulent.03-28-2013
20130041864INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND JUDGMENT RULE CONTROL METHOD - Disclosed is an information processing apparatus, wherein, upon defining an judgment method of determining the timing for presenting information, an appropriate judgment rule can be defined without any need for specialized knowledge, and without putting in much effort in setup work thereof. The information processing apparatus is provided with: an judgment-rule candidate generating unit for generating judgment rule candidates, which are combinations of a plurality of conditions combined on the basis of a rule; a materialization-estimate calculation unit for calculating judgment-rule materialization estimate values that indicate estimates of materialization frequencies for each of the judgment rule candidates, on the basis of a sensor availability rate within a period of time; and an judgment rule selection unit for selecting an judgment rule from among the judgment rule candidates, on the basis of the judgment-rule materialization estimate value and a notification amount that indicates the desired notification frequency of information.02-14-2013
20130041865DEVICE FOR GENERATING SELECTION STRUCTURES, FOR MAKING SELECTIONS ACCORDING TO SELECTION STRUCTURES AND FOR CREATING SELECTION - A real-time system receives a selection structure formed by weighted rules joined by links, each of the weighted rules including a condition part, a conclusion part and a weight. The selection structure is an Algebraic Decision Diagram (ADD) that includes internal nodes, each representing a decision point and terminal nodes, each representing a subset of candidate results having an accumulated weight. In response to a query that specifies a set of conditions, the ADD is traversed by making a series of decisions at decision points of the ADD to reach at least one terminal node having a maximum accumulated weight among terminal nodes that satisfy the set of conditions. The subset of candidate results represented by the at least one terminal node is selected as the output for responding to the query.02-14-2013
20100100520ASSESSING STUDENT PERFORMANCE AND PROVIDING INSTRUCTIONAL MENTORING - A method, apparatus, and computer program product are present for performing a simulation. The simulation is executed. Simulation data is collected while executing the simulation to form collected simulation data. A number of events is generated by applying a first number of rules to the collected simulation data to form a number of generated events. A number of commands is generated as a reaction to the number of generated events by applying a second number of rules to the number of generated events to form a number of simulation commands. The number of simulation commands is sent to the simulation.04-22-2010
20100042573METHOD AND SYSTEM FOR COMMUNICATION BETWEEN A CLIENT SYSTEM AND A SERVER SYSTEM - A method of a server system communicating with a client system. The method includes a passive system monitoring network traffic between the client-server system. The server sending a page response including an agent, e.g., a Javascript that becomes operable on the client system. The agent monitors events on the client side, e.g., DOM events, and communicates these to the server side. A set of rules that define prescribed user events are maintained by the passive system and applied to the monitored network traffic to determine whether a prescribed user event occurred. Responsive to the prescribed user event occurring, an asynchronous message is generated and sent to the agent in response to a received DOM event message, the asynchronous message comprising a command to be executed by the agent to alter the users web application flow at the client in a manner that is substantially transparent to the web application.02-18-2010
20100042572Method for Dynamically Determining a Predetermined Previous Condition of a Rule-based System - A method for dynamically determining a predetermined previous condition of a rule-based system comprising a plurality of rules. Each of the plurality of rules is associated with a transaction and a condition under which the transaction is executed. In one embodiment, the method includes the steps of (a) determining a system condition; (b) determining an immediate previous condition that caused the system condition; (c) setting the immediate previous condition to the system condition; and (d) repeating steps (b) and (c) until the predetermined previous condition is reached.02-18-2010
20100161540Method for Monitoring and Ranking Web Visitors and Soliciting Higher Ranked Visitors to Engage in Live Assistance - A ranking system ranks visitors to a Web site using one or more instances of machine-readable code executable from a digital medium accessible to a Web server. The code tracks visitor behavior while browsing the web site, and a visitor ranking module resident on the digital medium accepts information documented by the one or more instances of machine readable code and assigns rank values to one or more of the visitors. The ranking module ranks visitors at the Web-site based on logic and rules for interpreting visitor behavior and for applies a value to the visitor in real time based on that interpretation, and values applied at or above a preprogrammed level trigger solicitation of the visitor so ranked to engage in interaction including live assistance.06-24-2010
20090157587CONTEXT AWARE SYSTEM AND CONTEXT AWARE METHOD THEREOF - A context aware system and a context aware method thereof perform a reasoning to be aware of contexts in ubiquitous environments. The context aware method includes procedures of modeling a knowledge base describing context information including constraints; classifying the context information described in the knowledge base according to the constraints; filtering fact data having same constraints as input sensor data from the classified context data; storing only rules, which satisfy the filtered fact data and constraints, in an working memory; and inferring a service context by reasoning the stored fact data and rules. The method receives input sensor data, associated with a subject, continuously monitored and serviced by indoor sensors, performs a reasoning based upon the input sensor data, in order to be aware of the present contexts of the subject and also provide, in real-time, a service suitable for the present contexts, thereby promoting the convenience of life.06-18-2009
20090157586OBJECT ORIENTED RULE-BASED SYSTEM AND METHOD - An object oriented rule-based system and method that combines rule-based technology and object-oriented programming in order to provide an efficient approach for adding decision-making and inferencing capabilities to different applications. The rule-based system can include a RETE match algorithm, which can be modified to support pure object-based variable pattern matching. The LHS of a rule base can be compiled into several condition patterns, which includes a transformer integer array in order to record object variables positions. A RETE node can propagate tokens smoothly by asserting the object variable based on inheritance type hierarchy and the rules can be fired when the conditions are satisfied. The object oriented rule system can be utilized to add or remove rules at run time.06-18-2009
20120215730Product Lifecycle Management System Using Partial Solve - Systems, methods, and computer readable mediums. A method includes receiving an input expression including a set of options joined using logical operators. The method includes converting the input expression into an order string. The method includes receiving at least one rule that defines relationships between variants of different option families and receiving a configuration expression that specifies values for some but not all variants of the option families. The method includes producing a conjunctive normal form (CNF) order expression corresponding to the order string, at least one rule, and configuration expression. The method includes performing a partial solve of the order expression, the partial solve producing a result set that describes all possible configurations that correspond to the configuration expression.08-23-2012
20130046720DOMAIN BASED USER MAPPING OF OBJECTS - According to one aspect of the present disclosure, a method and technique for domain based user mapping of objects is disclosed. The method includes: responsive to determining that an operation is being attempted on an object identified with an object identifier, determining a domain identifier associated with a user attempting the operation; determining whether the operation can proceed on the object based on domain isolation rules, the domain isolation rules indicating rules for allowing or disallowing operations to proceed on objects based on object identifiers and domain identifiers; responsive to determining that the operation on the object can proceed based on the domain isolation rules, accessing user mapping rules that map specified users allowed to perform a specified operation to a specified object; and determining whether the operation can proceed on the object by the user based on the user mapping rules.02-21-2013
20130046721CHANGE POINT DETECTION IN CAUSAL MODELING - Structural changes in causal relationship over time may be detected, for example, by a Markov switching vector autoregressive model that detects and infers the structural changes in the causal graphs.02-21-2013
20090125468RULESET OPTIMIZATION THROUGH BLOCKED AND CONCURRENT RULE DISPATCH - Embodiments of the invention provide techniques for optimizing the processing of abstract rules. In general, the results of executing an abstract query may be used as data inputs for processing an abstract rule. In one embodiment, query results may be sorted according to input field values required for processing a deterministic abstract rule. If a record of the sorted query results includes the same input values as a preceding record, then the rule output of the preceding record may be reused, rather than processing the abstract rule again. Accordingly, the demand load placed on a rule engine may be reduced.05-14-2009
20130046723KNOWLEDGE REPRESENTATION SYSTEMS AND METHODS INCORPORATING CUSTOMIZATION - Techniques for analyzing and synthesizing complex knowledge representations (KRs) may utilize an atomic knowledge representation model including an elemental data structure and knowledge processing rules that are machine-readable. The elemental data structure may include a universal kernel and customized modules, which may represent knowledge that is generally applicable to a population and knowledge that is specifically applicable to individual data consumers, respectively.02-21-2013
20130046722MESSAGE CONDUIT SYSTEMS WITH ALGORITHMIC DATA STREAM CONTROL AND METHODS FOR PROCESSING THEREOF - A method for processing messages is provided where at least one algorithmic conduit is defined, and at least one conduit rule for controlling at least one algorithmic conduit is defined. An algorithmic conduit is a persistent connection, controlled by explicit, independent, dynamic rules, and capable of processing messages among data communicators such as devices, systems, or programs. Messages can be monitored, filtered, transformed, correlated, or processed in other ways without modifying the data communicators. A message conduit hub system allows creation and management of algorithmic conduits to serve as active, virtualized links carrying rules-based data streams among configurable endpoints. These “smart” connections are managed using parameters, logic, and other control interfaces for tailoring behavior to a particular application, site, or user. A message conduit hub system may be implemented as a stand-alone device, as part of a larger system, or as an “encapsulation layer” for an existing application.02-21-2013
20100070447CONFIGURING DATA COLLECTION RULES IN A DATA MONITORING SYSTEM - A computer implemented method of adjusting a monitoring system having data collection nodes with instances of templates for collecting data according to data collection rules includes receiving a data propagation path specifying a hierarchy for at least a portion of the templates, the hierarchy specifying a child template, parent templates for the child template, and an order for the parent templates. The method also includes specifying an event data collection rule for the first child template and configuring parent data collection rules for the parent templates accordingly. The parent data collection rules include a data retrieval rule for retrieving event data associated with the event data collection rule or a data aggregation rule for combining the event data associated with the event data collection rule and multiple instances of the child template. The method also includes updating the instances in the data collection nodes.03-18-2010
20110004580ROLE BASED IDENTITY TRACKER - Particular embodiments use roles to determine anomalies in a user's behavior. Different roles may be defined for a business. For example, users that have similar job responsibilities are grouped in a role. Behavior information is then monitored for the plurality of users in the role. This may include transactions or other actions taken by the user. Over time, a profile can be generated for the user based on the monitored behavior. This profile learns the user's behavior. Information for the user's behavior may then be compared to other users' profiles in the same role to determine anomalies in the user's behavior over time. For example, when differences in activities occur for a user as compared to other users with the same role, a message may be generated that indicates that there may be an anomaly in the user's behavior. This alert may then be output.01-06-2011
20090327195ROOT CAUSE ANALYSIS OPTIMIZATION - Root cause analysis is augmented by providing optimized inputs to root cause analysis systems or the like. Such optimized inputs can be generated from causality graphs by creating sub-graphs, finding and removing cycles, and reducing the complexity of the input. Optimization of inputs enables a root cause analysis system to reduce the number of iterative cycles that are required to execute probable cause analysis, among other things. In one instance, cycle removal eliminates perpetuation of errors throughout a system being analyzed.12-31-2009
20090307173SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY ENHANCING AN APPLICATION EXECUTING ON A COMPUTING DEVICE - A system is described that dynamically enhances a software application executing on a computing device without having to change and recompile the original application code. The system includes a staging environment that monitors the execution of the application and indexes each item of graphical and/or audio information generated by the application into a first database. A second database is then populated by manual or automated means with one or more business rules, wherein each business rule is associated with one or more of the objects indexed in the first database. The system further includes a run-time environment that identifies items of graphics and/or audio information as they are generated by the application during run-time, uses the second database to determine if an identified item is associated with a business rule, and, responsive to a determination that an identified item is associated with a business rule, applies the business rule.12-10-2009
20090307172RETROACTIVE POLICY ENFORCEMENT - Disclosed herein is a system and method for enforcement of management policies by automatically trigging action-based processes that are mapped to the management policies. This may occur when: a new management policy is created; a final set of a management policy is modified; a new workflow is added to the management policy; and the membership filter or explicit membership of a set referenced by the management policy's final set is modified.12-10-2009
20090307170VISUALIZATION OF DATA RECORD PHYSICALITY - Systems (and corresponding methodologies) that enable inferences to be drawn from the physicality of electronic information much like that of a visual inspection of physical records are provided. In other words, a user is able to draw inferences from parameters of electronic data such as quantity, regularity, age, condition, type, keywords, title, author, origination date, storage location, etc. The innovation provides a data observation system having a summarization generator component and a rendering component that conveys attributes of electronic data such that inferences and conclusions based upon the physicality of the data.12-10-2009
20090307171Automated Design of Computer System Architecture - In certain embodiments, a method includes accessing a number of target values. Each target value may be associated with a respective design criterion of a computer system. The computer system may be associated with one or more domains. Each domain may be associated with a respective function of the computer system. The method may include determining, based at least in part on a first set of one or more of the number of target values, a respective implementation pattern for each of the one or more domains. The one or more determined implementation patterns may represent a logical architecture for the computer system. The method may include determining a physical architecture for the computer system by determining a respective solution stack for each of the one or more determined implementation patterns based at least in part on a second set of one or more of the plurality of target values.12-10-2009
20100094793PRODUCT DESCRIPTION TRANSFORMATION METHODS AND SYSTEMS - Systems and methods for product description transformation use information about a specific Target Workflow that will be used to execute a job (Process Network), such as print job in a print shop. A knowledge/rule based system can mine facts from the Target Workflow and evaluate those facts using a knowledge base that will infer constraints and other information to be used during the actual transformation step. Differences between what is specified in a Product Description, such as a JDF Intent, and a Target Workflow can be reconciled to produce a workflow to manufacture a product. This information about the Target Workflow along with the information it uses from the JDF Intent (Product Description) is used to produce a Process Network (Workflow Plan/job) consistent with the JDF Intent and Target Workflow.04-15-2010
20120191637CONTEXT-AWARENESS SYSTEM AND METHOD OF FORMING EVENT DATA - A context-awareness system has an event data producer for forming event data from node data including a node value and node information, a context producer, and an event data manager for storing event data formation suppression information and event data conversion rules. The context producer sends the number of entries of event data (the number of inputs) to the event data manager per unit time. The manager sends to the event data producer the event data formation suppression information and event data conversion rules corresponding to the number of inputs. The event data producer forms event data depending on the event data formation suppression information and event data conversion rules corresponding to the number of inputs. Appropriate context information is formed without increasing the amount of resources when data including values related to events are entered in large amount and frequently.07-26-2012
20130073508SYSTEM AND METHOD TO KEEP CONTINUITY OF MEDIA FLOWS FOR A COLLABORATIVE SESSION WITHOUT CONSTANT CONTROLLER(S) INVOLVEMENT - A system of managing collaborative session control when controller is lost or changes to passive-control mode in a data communication network comprising of a control-capable terminal device that can generate and send user preferences on successive controller selection and control policy, a master server device that can make control transfer decisions or take over control upon events, a normal terminal device that can process and response to master server queries on control capacity and its willingness to take over control. These apparatus are connected to each other inside one collaborative session, regardless of their subscriptions. A method of control management of the collaborative session without constant enrollment of controller comprises the steps of sending different types of preferences to master server device; making control transfer or handover decision; and interacting with affected terminals.03-21-2013
20130166490PNEURON DISTRIBUTED ANALYTICS - A method and system for the integration of disparate data stored within an Information Technology infrastructure of a company is provided. The system and method enables holistic, real time control of data discovery, retrieval and analysis. The system combines data mining, retrieval and analytics at the source of the data, thereby solving traditional problems with disparate and distributed data, systems, business processes and analytics across an organization. The system enables a user to configure and target data, then apply rules, workflows and analytics from one central source. This process is accomplished by distributing functions in the form of software pneurons against the existing infrastructure for maximum processing while preserving a robust and extendable suite of definitions. The system uses the existing application, network and hardware assets and enables connection to the native data, maps only the data fields that need to be mapped to carry out the desired analysis, runs the analysis and then returns the data to a central location to be assembled, analyzed, organized and/or reported.06-27-2013
20130060727Identifying Duplication in Decision Trees - A packet classification system, methods, and corresponding apparatus are provided for enabling packet classification. A processor of a security appliance coupled to a network uses a classifier table having a plurality of rules, the plurality of rules having at least one field, to build a decision tree structure including a plurality of nodes, the plurality of nodes including a subset of the plurality of rules. By identifying duplication in decision trees, the methods may produce wider, shallower trees that result in shorter search times and reduced memory requirements for storing the trees.03-07-2013
20090299941METHOD AND SYSTEM FOR ADDING AN ASPECT TRIGGER TO AN ASPECT - A method within a computing execution environment for adding an aspect trigger for an aspect, an aspect being an application level abstraction relevant to a source or service, along with the execution environment, where the method includes defining service aspects; inserting or encapsulating the service aspects as named aspects into an abstraction layer in the computing execution environment; and associating the named aspects with the aspect trigger, wherein the abstraction layer is configured to associate aspect triggers for a plurality of client applications.12-03-2009
20090271355POLICY CHANGE PROCESSING PROGRAM, POLICY CHANGE PROCESSING METHOD, POLICY CHANGE PROCESSING APPARATUS - A policy change processing apparatus is used for controlling a system, and processes a change in a content of a plurality of policies specified so that contents of the policies do not conflict with each other. The policy change processing apparatus includes: a changeable scope storing unit that stores therein a changeable scope for each of the policies, the changeable scope indicating a scope where a policy content is changeable without causing a conflict with any other policies; and a changeable scope determining unit that determines whether a policy content accepted as a change target of a predetermined policy is within the changeable scope of the predetermined policy, the changeable scope being stored in the changeable scope storing unit.10-29-2009
20090271354METHOD AND SYSTEM FOR OBTAINING A COMBINATION OF FAULTY PARTS FROM A DISPERSED PARTS TREE - It is an object of the present invention to find out parts to be a highly possible cause of failure without searching all of part data of all of products. Dispersed parts data on a parts tree are sequentially accessed from a set of known failed products, and part attribute values each having a higher support in the faulty product are extracted. In this process, a subset of parts used in the faulty product is also obtained simultaneously. The part attribute values having higher supports and the subset of parts used in the faulty product are represented as a tree in which a parts type serves as a node. Next, an information gain of a rule that having the two part attribute values is a cause of failure is calculated on two part attribute values having higher supports on the tree of the parts type. This calculation is locally performed on a common parent part of two parts and parts having a certain information gain is outputted as a cause of failure. How to select these two part attributes is performed in such a way that part attributes located closer to each other on the tree are first evaluated, and first found part attributes are made a candidate of a cause of failure.10-29-2009
20090271353METHOD AND DEVICE FOR TAGGING A DOCUMENT - There are disclosed a method and a device for tagging a document. The method includes the steps of acquiring structural information of the document, retrieving a content block list corresponding to a user-input tag, comparing blocks in the structural information with blocks in the content block list, to obtain similar blocks, and annotating the user-input tag at positions, which correspond to the similar blocks, in the document.10-29-2009
20090271352System, Method and Software for Selecting Among Available Connections for Accessing Content from a Remote Server Using a Client Computing Device - A computing device may have one or more physical connections and/or one or more virtual connections to computer network(s). A user of the computing device may desire access to data from a remote server. According to the present disclosure, the performance of accessing the remote server via the one or more physical connections and/or the performance of accessing the remote server via the one or more virtual connections are tested. Based on the test results, and possibly user-defined rules as well, one of the physical or virtual connections is selected for accessing content from the remote server using the computing device. Alternatively, one of the physical or virtual connections can be selected based solely on user-defined rules.10-29-2009
20090271350APPARATUS AND METHOD FOR ADAPTIVELY RECOMMENDING SERVICE, SYSTEM AND METHOD FOR ADAPTIVELY RECOMMENDING SERVICE, APPARATUS AND METHOD FOR RECOMMENDING SERVICE BASED ON USER'S FAVORITE BASE - The present invention relates to an apparatus and method for adaptively recommending service, the apparatus comprises: a semantic analyzing device which analyzes the query from a user semantically; a service selecting device which selects a service which corresponds to the semantically-analyzed query, and updates a service association database according to the selected service; and a service recommending device which searches the service association database according to the selected service to recommend a related service to the user. The present invention also relates to a system and method for adaptively recommending service as well as an apparatus and method for recommending service based on user's favorite base. With the present invention, the data in the service association database can be acquired and adjusted automatically based on the user's service selection history base, thereby enabling provision of associated services for the user. Further, the present invention can recommend service providers to the user based on the user's favorite base and thus provide services with greater flexibility.10-29-2009
20090271349DETERMINING THE DEGREE OF RELEVANCE OF ALERTS IN AN ENTITY RESOLUTION SYSTEM OVER ALERT DISPOSITION LIFECYCLE - An entity resolution system and alert analysis system configured to process inbound identity records and to generate alerts based on relevant identities, entities, conditions, activities, or events is disclosed. One process of resolving identity records and detecting relationships between entities may be performed using a pre-determined or configurable entity resolution rules. Further, the entity resolution system may include an alert analysis system configured to allow analysts to review and analyze alerts, entities, and identities, as well as provide comments or assign a disposition to alerts generated by the entity resolution system. Furthermore, the entity resolution system may be configured to handle duplicate alerts, i.e., one or more identical or near-identical alerts generated using the same entities and/or identities as well as assign a relevance score to the particular entities and identities included in the alert.10-29-2009
20090271348DETERMINING THE DEGREE OF RELEVANCE OF ALERTS IN AN ENTITY RESOLUTION SYSTEM - An entity resolution system and alert analysis system configured to process inbound identity records and to generate alerts based on relevant identities, entities, conditions, activities, or events is disclosed. One process of resolving identity records and detecting relationships between entities may be performed using a pre-determined or configurable entity resolution rules. Further, the entity resolution system may include an alert analysis system configured to allow analysts to review and analyze alerts, entities, and identities, as well as provide comments or assign a disposition to alerts generated by the entity resolution system. Furthermore, the entity resolution system may be configured to handle duplicate alerts, i.e., one or more identical or near-identical alerts generated using the same entities and/or identities as well as assign a relevance score to the particular entities and identities included in the alert.10-29-2009
20100082518SYSTEM CONFIGURATION COMPARISON TO IDENTIFY PROCESS VARIATION - The present subject mater relates computer system configuration and, more particularly, to system configuration comparison to identify process variation. Various embodiments described herein include one or more of systems, methods, software, and data structures to retrieve configuration information from a first system and a second system, apply a set of rules to the configuration information to identify process variants implemented in each of the first and second systems, and output a representation of process variant implementation differences between the first and second systems.04-01-2010
20100082517MULTI-DATABASE, RUNTIME DATABASE QUERY PERFORMANCE MONITORING - A method to monitor database performance includes gathering information from a remote, monitored database related to the monitored database performance during a predetermined time, collecting statistics corresponding to any queries executed during the predetermined time, testing at least one rule against the statistics corresponding to each query, and if the testing results in a rule violation, identifying the query that caused the rule violation. A method to monitor database performance includes gathering statistics related to execution of a query statement, comparing at least one of the statistics against at least one rule to determine if the statistics violates a threshold established by the rule, if the statistic violates the threshold, identifying the query statement as a violating query statement, and repeating the comparing and identifying until all rules have been compared. A system has a local repository and a rules engine to gather information from at least one remote, monitored database, locate query statement executions in the information and to collect statistics with regard to the query execution, and test at least one rule against the statistics to determine if the query statement violates the rule.04-01-2010
20120226647FLIGHT ITINERARY DELAY ESTIMATION - A system includes a processor and a memory communicatively coupled to the processor. The memory stores instructions causing the processor, after execution of the instructions by the processor, to: receive a first flight itinerary of a user; receive condition data and weather forecast data for airports, estimate a likelihood for a delay of the first flight itinerary based on the condition data and the weather forecast data for airports associated with the first flight itinerary, identify a second flight itinerary as an alternative for the first flight itinerary, estimate a likelihood for a delay of the second flight itinerary based on the condition data and the weather forecast data for airports associated with the second flight itinerary, and notify the user of the estimated likelihood for a delay for the first flight itinerary, the second flight itinerary, and the estimated likelihood for a delay for the second flight itinerary.09-06-2012
20110047116UTILIZING PRESENCE IN CONJUNCTION WITH OTHER INFORMATION TO DETERMINE AN APPROPRIATE COMMUNICATIONS MODALITY - Even with SIP and the varied communications options available to users, the monitoring of presence itself may not provide sufficient information to determine a most appropriate contact modality for a communication. Therefore, there is a need for a more complete method of generating a landscape of recent activity from which a preferred communication modality can be determined, with a corresponding solution provided that allows a contactor to contact a contactee via that modality. For example, a network of bearer channels or feeds can be established as input to a presence determination module. The inputs can include not only presence information, but also feeds from one or more blogs, micro blogs, social networking sites, etc., that allow a more complete picture of recent activity to be determined. Based on this input a preferred contact modality can be determined that may enhance the ability of a contactor to contact a contactee.02-24-2011
20130066822Promoting content - Promoting a candidate content item included in a plurality of content items is disclosed. A plurality of user reputation scores is received. For the candidate content item in the plurality of candidate content items, a content reputation score is determined based at least in part on a portion of the received user reputation scores. A determination of whether to promote the candidate content item is made based at least in part on the content reputation score. The candidate content item is promoted if it is determined that the candidate content item should be promoted.03-14-2013
20110022561Method of Organizing and Presenting Data in a Table - Methods of analyzing data are provided. An expert system receives input from at least a first source. Data is imported and analyzed by an expert system, wherein the expert system makes at least one first decision, which characterizes the data based on a rule base. The at least one first decision is displayable and modifiable by a first input from a first source. In response to the first input from the first source, the rule base may be re-applied to make at least one second decision, wherein the at least one second decision is different from the at least one first decision, or the at least one first decision may be accepted. The at least one first decision or the at least one second decision is then displayable and modifiable in response to a first input from a second source. In response to the first input from the second source, the rule base is either re-applied to make at least one third decision, wherein the third decision is different from the second decision, or either the first or second decisions arc accepted.01-27-2011
20120117015METHOD AND APPARATUS FOR PROVIDING RULE-BASED RECOMMENDATIONS - An approach is provided for providing rule-based recommendations. A recommendation platform determines one or more contexts for at least one level of a hierarchy of one or more context parameters. The hierarchy reflects different granularities of the one or more context parameters. The recommendation platform determines to generate at least one rule set based, at least in part, on the one or more contexts and then determines to include the at least one rule set in the hierarchy for generating recommendation information for one or more applications.05-10-2012
20090265296Scalable and Interactive Method of Generating and Modifying Network Configurations to Enforce Compliance with High-Level Requirements - A system and method provides a solution to the problem of applying end-to-end requirements of connectivity, security, reliability and performance to configure a network and ultimately assign network components to the network. All requirements are modeled as constraints and a constraint solver does the resolution Not every constraint to be solved is solved by the model-finder. Instead, we “factor away” subsets of a constraint that can be efficiently solved via a special-purpose constraint solver, such as an SQL/Prolog engine, linear programming system, or even an algorithm, leaving behind a constraint that truly requires the power of model-finding, and that is often efficiently solvable by existing model-finders. Such constraints are compiled into quantifier-free constraints that are Boolean combinations of constraints of two forms x=y and x=c where x, y are variables and c is a constant. Such constraints can be efficiently solved by modern SAT-based model-finders. The system intelligently removes the quantifiers instead of having the model-finder remove the quantifiers. An “unsatisfiability-core” analysis efficiently guides the search for configurations to change to restore consistency.10-22-2009
20090248604RULE MODEL FOR HEALTHCARE INFORMATION - Healthcare information data is managed by, on a computer, maintaining a model of a state of a system based on the healthcare information, receiving a transaction representing a change to the system, determining that the change complies with a rule, and changing the model according to the transaction.10-01-2009
20090192968ENHANCED KNOWLEDGE REPOSITORY - Embodiments of the present invention relate to knowledge representation systems which include a knowledge base in which knowledge is represented in a structured, machine-readable format that encodes meaning.07-30-2009
20080294588Event capture, cross device event correlation, and responsive actions - Correlating security event data according to one or more rules to initiate one or more actions is disclosed. Security event data is received, via an event pipeline, that defines an occurrence of an event. Each type of source of event data may have its own pipeline. Event objects are created from the received security event data, and are gathered into a rules engine. The rules engine includes a plurality of rules. Each rule defines one or more conditions to be met and one or more actions to be taken in response. A rule is evaluated at a frequency over a period of time using data contained within event objects, so to determine whether the one or more conditions defined within the evaluated rule are met. The one or more actions defined by the evaluated rule are initiated whenever the one or more conditions defined by that rule are met.11-27-2008
20080294586Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points - A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.11-27-2008
20080294585Real-Time Business Process Triggering System and Method Using Rfid - Provided is a real-time business process triggering system (RBPTS) using a Radio Frequency Identification (RFID) and a method thereof. The RBPTS is to provides interface to a corporation information system by generating an RFID event proper to a specific domain by giving the RFID data a business meaning to apply the RFID data to a predetermined rule before transmitting the RFID data to the corporation information system, provide a rule modeling function to flexibly managing changes in application field and environment, and provide an RFID related-action related to rule performance, and a method thereof. The RBPTS includes: an RFID middleware adapter for receiving RFID data from an RFID middleware/RFID reader and generating RFID events Extensible Markup Language (XML) document; an event manager for receiving the RFID events XML document from the RFID middleware adapter and generating an event query for inference; a rule manager for generating a result set by performing rule inference on the event query through an inference engine and generating an action list; Web Service arbitrator for communicating through Web Service using an external application and a Simple Object Access Protocol (SOAP); an action manager for performing real-time action by calling the Web Service through the Web Service arbitrator based on the action list; and an event repository for storing and managing registered all RFID event information, rule and action. The RBPTS is applied to maritime freight transportation.11-27-2008
20130166491METHOD AND DEVICE FOR CLASSIFYING A PACKET - Embodiments of the present invention provide a method and a device for classifying a packet, which relates to the field of communications technologies, so as to reduce rule duplication in a classification process and improve classification efficiency. The method for classifying a packet provided by the embodiment of the present invention includes: receiving a packet (06-27-2013
20110055138METHOD AND SYSTEM FOR PROCESSING NETWORK ACTIVITY DATA - An exemplary embodiment of the present invention provides a method of processing network activity data. The method includes receiving network activity data and generating an event based on the network activity data. The method also includes generating a probability based at least in part on Bayesian statistics, the probability corresponding to a likelihood that the event caused or was caused by another event. The method also includes generating an event message corresponding to the event based on the probability.03-03-2011
20120005145CACHING OF RULES - A method of exchanging a rules engine decision tree cache is disclosed. The method provides for provision accepting a command to build a replacement rules engine decision tree cache, replacing the existing cache if the decision tree creation process is successful, retaining the existing cache if the decision tree creation process is not successful, and providing specific error messages in the event that the replacement fails. The method allows an network operator to change the rules for the rule engine without disruption of real-time service and allows for a level of error checking prior to provisioning the new decision tree.01-05-2012
20110106745Semantic Network with Selective Indexing - Indexing overhead in a semantic network is reduced by omitting some links from indexes in semantic network elements in response to one or more omission rules. Inference strategy over the semantic network is modified to prioritize inference strategies in such a way that the impact of the omissions on inference results is minimized.05-05-2011
20120084243Malleable Access Decision Processing And Ordering - An electronic device is provided. The electronic device comprises a memory, a processor, a rules data base stored in the memory, a context data base stored in the memory, and a rules engine stored in the memory. The rules data base comprises a plurality of access rules defined by different stakeholders. The context data base comprises contextual information comprising at least one of a relationship of the electronic device to a communication service plan owner associated with the electronic device, a work schedule associated with a user of the electronic device, a communication service account status, an entertainment service account status, and a gaming service account status. The rules engine application, when executed by the processor, grants access to a requested communication service based on applying the rules stored in the rules data base in accordance with the contextual information.04-05-2012
20110282821Further Improvements in Recommendation Systems - This invention deals with improving recommendation systems. The first embodiment combines rules and recommendations to create automated and intelligent business rules for recommendations. The second embodiment improves recommendations by combining the results of driver products and influencer products, where influencer products only influence the recommendations of the driver products. Influencer products can be related to a specific user. The third embodiment improves recommendations for new items by relating them to original items, such that the sales for the original item is used in the new item when calculating recommendations. The new items may replace the original item, or be a similar item and exist alongside the original item.11-17-2011
20110282820DYNAMIC BACKJUMPING IN CONSTRAINT SATISFACTION PROBLEM SOLVING - A method of performing constraint satisfaction problem (CSP) solving. The method comprises evaluating the nodes of a CSP tree for a TRUE or FALSE state according to a script, wherein the tree models a CSP problem and the script associates rules and corresponding actions with each tree node. During a step of evaluating a specific node, there is dynamically computed a backjump pointer according to a specific rule associated with the specific node, wherein the value of the computed backjump pointer identifies an ancestor node of the tree. Upon a failure to evaluate the node to a TRUE state, the evaluation is restarted at the ancestor node identified by the backjump pointer.11-17-2011
20110078103FRAMEWORK TO SUPPORT APPLICATION CONTEXT AND RULE BASED UI-CONTROL - Embodiments of a method and system provide a rule based user interface control for a software application. At configuration time of an installed software application, the method may provide a design-time environment for defining a rule for a UI element to be displayed in the software application. The rule may affect a value of a property of the UI element and may be persisted in a rule engine. Then at runtime, upon receiving from the software application a request to determine the value of the property, the method may retrieve the rule from the rule engine by a runtime service, evaluate the rule to determine the value for the property and set the value for the property according to the evaluated rule. The set value for the property may be returned to the software application for displaying the UI element.03-31-2011
20100161541SYSTEM AND METHOD FOR GENERATING A CONTEXT ENHANCED WORK OF COMMUNICATION - A system for selecting, managing, sharing and displaying narrative data files in a manner that takes into the account the contextual significance of said narrative data files to a narrative, an author(s) and an audience. A system that is able to place an absolute and relative value upon the significance of a media object is able to assist in stimulating the recollection of the author and audience, thus making every aspect more memorable and enhancing by improving the ease of use and the quality of the final result of the use of the system of this invention.06-24-2010
20090083208SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DATA MINING AND AUTOMATICALLY GENERATING HYPOTHESES FROM DATA REPOSITORIES - Various embodiments of the present invention provide systems, methods, and computer programs for generating a hypothesis. Specifically, some method embodiments include steps for accessing a system for extracting relationships and determining a relationship rule defining a relationship among a plurality of phrases and a plurality of concepts stored in the system for extracting relationships. Such embodiments further provide steps for parsing a plurality of documents in a data repository according to the relationship rule and generating a hypothesis comprising a previously unknown combination of phrases and concepts being at least partially determined from the parsed plurality of documents. Various embodiments also provide a step for presenting the hypothesis to a user so as to indicate the previously unknown combination.03-26-2009
20120290524Immigration application management, apparatus, systems, and methods - Application management apparatus, systems, and methods to process government agency forms and applications such as, for example, immigration forms, petitions and applications to increase the likelihood of acceptance.11-15-2012
20110289039Semantic network clustering influenced by index omissions - Some links are omitted from indexes associated with semantic network elements and clustering is influenced by such omissions.11-24-2011
20090271351RULES ENGINE TEST HARNESS - A system is provided. The system comprises a computer system, a builder component, and a test execution component. When executed by the computer system, the builder component promotes defining a plurality of test cases and a plurality of test scenarios. When executed by the computer system, the text execution component simulates at least one service application, invokes execution of plurality of rules on a rules engine with an input based on one of the test cases defined using the builder component, wherein the rules engine interacts with the simulated service application, and stores the result of the rule execution in a database.10-29-2009
20110289038Visualization of Data Record Physicality - Systems (and corresponding methodologies) that enable inferences to be drawn from the physicality of electronic information much like that of a visual inspection of physical records are provided. In other words, a user is able to draw inferences from parameters of electronic data such as quantity, regularity, age, condition, type, keywords, title, author, origination date, storage location, etc. The innovation provides a data observation system having a summarization generator component and a rendering component that conveys attributes of electronic data such that inferences and conclusions based upon the physicality of the data.11-24-2011
20120016832AUTOMATED DOCUMENT SEPARATION - Systems and methods for automated document separation. The system includes a host device that is configured to communicate with one or more client devices over a network. The host device includes a splitting module, a correction module, a knowledge base, and a document store. The splitting module is configured to perform a multi-level document splitting. Pages are grouped into documents based on, for example, the sender information, the lack of sender information, and whether the sender is known. Following the initial separation, the splitting module performs an automatic correction of the initial document separation based on information stored within the knowledge base. The knowledge base is updated each time a document is processed and a user provides feedback related to whether the documents were successfully separated. Based on the success or failure of a particular document separation, the knowledge base evaluates the modifications made by a user to learn from the errors made during document separation.01-19-2012
20090106181Procedural Constraint Engine - Various systems and methods for integrating procedural logic with a stateless constraint engine are disclosed. One method involves accessing a first set of values generated by a stateless constraint engine based upon a first set of inputs and then accessing a second set of values generated by the stateless constraint engine subsequent to the first set of values and based upon a second set of inputs. The second set of values is validated based upon a procedural constraint. The procedural constraint can include a precondition and a postcondition. The precondition is dependent upon at least one value from the first set of values, and the postcondition is dependent upon at least one value from the second set of values.04-23-2009
20110295788Method and System to Enable Inferencing for Natural Language Queries of Configuration Management Databases - Disclosed are embodiments of systems and methods to derive a semantic network from a CMDB relationship graph which can then be queried in a natural way from a linguistic standpoint (i.e., using natural language queries). Because disclosed embodiments combine natural language queries with an inferencing engine the disclosed systems and methods automatically “connect the dots” between disparate pieces of information and can allow for a richer user experience. In general, CMDB graph relationships can be converted into semantic networks. Once a semantic network is created, queries can be phrased to leverage the inferential relationships between objects in the semantic network.12-01-2011
20110302122METHOD AND SYSTEM FOR CONFIGURING RULES FOR EXECUTION - Data-driven rules are eliminated from an application, and replaced with goal-driven rules that formally and completely characterize high-level business concepts, while enabling the resulting goal-driven rules to be executed eagerly using a forward chaining rule engine in a way that preserves the data-driven behavior of the original rules. A computer-implemented method for executing business rules provides a unified rule that encapsulates a goal-oriented rule with triggering information selected from dependencies of the goal-oriented rule. The unified rule may be eagerly executed in response to changes in data specified by the dependencies, or lazily executed in response to a request for the value computed by the rule.12-08-2011
20090287627POLICY-BASED MANAGMENT IN COMMUNICATIONS NETWORK - A method and system for policy based management in a communication system, comprising at a policy enforcement point (11-19-2009
20100036788Database-based inference engine for RDFS/OWL constructs - An un-indexed, partitioned temporary table and an exchange table are used in the inferencing of semantic data in a relational database system. The exchange table has the same structure as a semantic data table storing the semantic data. In the inferencing process, a new partition is created in the semantic data table. Inference rules are executed on the semantic data table, and any newly inferred semantic data generated is added to the temporary table. Once no new data is generated, the inferred semantic data is copied from the temporary table into the exchange table. Indexes that are the same as indexes for the semantic data table are built for the exchange table. The indexed data in the exchange table is then exchanged into the new partition in the semantic data table. By use of the un-indexed, partitioned temporary table, incremental maintenance of indexes is avoided, thus allowing for greater efficiency.02-11-2010
20090125469LINK DISCOVERY FROM WEB SCRIPTS - A computer-implemented method, a computer system, and computer media for discovering links in scripts are provided. The computer system includes a crawler, a rules engine, and an index that are utilized to store links generated by scripts located in webpages in the index. The crawler traverses a network to locate webpages having scripts. The rules engine parses the located webpages and extracts the scripts based on rules that are satisfied by segments of the extracted scripts. The rules engine evaluates the segments of the extracted scripts to generate links. After the rules engine validates the links, the rules engine transmits the links to the index for storage.05-14-2009
20110218954Thinking system and method - A thinking system and method is provided by the present invention. In the present invention, the “thinking” system is capable of accepting information from outside environment, analyzing the information, requesting additional information, and then resulting the problem. More particularly, the system can make new rules according to the information within the system and the new information received and requested. The rule making process is not controlled by outside command, but by an internal controlling mechanism that can be modified by the outside commands. Further, the system comprises a knowledge structure that can be used by the system for analyzing the inputted information, making request for additional information, making new rules, and solving problems, wherein the knowledge structure comprises element files include direct link information of the elements with other elements of the element files in the knowledge structure.09-08-2011
20090281977CHECKING RULE AND POLICY REPRESENTATION - A computer-performed method of examining policies for a target system of an enterprise system domain. The policies are represented as policy rules, each rule including a condition having binary operator expression(s), each expression referring to one or more policy attributes. For a pair of expressions, the computer(s) obtain sets of sample values sufficient to represent all values assumable by the policy attribute(s) referred to in the pair. The sample values are combined in a mixed-radix enumeration in which each attribute is represented in a corresponding position of each sample value combination and of the enumeration. Using the enumeration, the computer(s) evaluate each expression of the pair relative to each of the sample value combinations to obtain a truth table. Based on the truth table, a relationship between the pair is detected and the user may be notified as to an anomaly in the rules.11-12-2009
20090204561System Configuration Analysis - In accordance with one embodiment, a method for detecting potential problems in the configuration or components of a complex system comprises comparing first configuration data for a first system with second configuration data compiled from analyzing a plurality of systems in a selected population; and reporting anomalies associated with the first system, in response to determining that the first configuration data deviates from components determined to be common to the selected population.08-13-2009
20090125470System and Method for Managing Access Control Lists - Systems and methods consistent with the present invention provide better scheme for updating access control list (ACL) rule entries in a ternary content addressable memory (TCAM). In a firewall, ACL rules are scanned for each packet arriving in a router or switch to determine if a match exists between the packet and any of the patterns. Depending on the pattern matched, the corresponding action may be either to accept or to deny the packet. These rules are stored in a TCAM, and new or updated rules may be added to the TCAM. Systems and methods consistent with the present invention determine whether the new or updated rule has a dependency conflict with existing rules in the TCAM. If not, the rule can be inserted anywhere in the TCAM. Accordingly, the TCAM associated with a firewall's ACL can be updated more quickly and efficiently.05-14-2009
20090313200Immigration application management apparatus, systems, and methods - Application management apparatus, systems, and methods to process government agency forms and applications such as, for example, immigration forms, petitions and applications to increase the likelihood of acceptance.12-17-2009
20090150318Method of Enhancing Expert System Decision Making - Methods of analyzing data are provided. An expert system receives input from at least a first source. Data is imported and analyzed by an expert system, wherein the expert system makes at least one first decision, which characterizes the data based on a rule base. The at least one first decision is displayable and modifiable by a first input from a first source. In response to the first input from the first source, the rule base may be re-applied to make at least one second decision, wherein the at least one second decision is different from the at least one first decision, or the at least one first decision may be accepted. The at least one first decision or the at least one second decision is then displayable and modifiable in response to a first input from a second source. In response to the first input from the second source, the rule base is either re-applied to make at least one third decision, wherein the third decision is different from the second decision, or either the first or second decisions are accepted.06-11-2009
20090150320MULTI-MODULE AUTHENTICATION PLATFORM - Embodiments of the disclosure generally relate to systems and methods for authenticating users of an entity system. In embodiments, an authentication platform receives a request for authentication. The authentication platform interacts with one of several authentication modules to authenticate the user. Each authentication module may use different information or procedures to authenticate the user. If authenticated, the user is allowed access to the system. Having access to two or more authentication modules allows the authentication platform to provide automatically a more robust authentication and alleviates the entity system from needing to integrate the several authentication modules.06-11-2009
20080243749SYSTEM AND METHOD FOR MULTIPLE VOLUME SEGMENTATION - The invention relates to a method of performing oilfield operations for an oilfield, the oilfield having a subterranean formation. The method includes collecting a first volume data set of seismic data and a second volume data set of seismic data, co-rendering a visually-melded scene directly from the first volume data set and the second volume data set, displaying the visually-melded scene comprising a visualized geobody, where the visualized geobody corresponds to a portion of the first volume data set and the second volume data set, and selectively adjusting the oilfield operations based on the visualized geobody.10-02-2008
20080208787Method and system for centralized generation of a business executable using genetic algorithms and rules distributed among multiple hardware devices - A system for generation of business executables using artificial intelligence or rules distributed among multiple hardware devices, including: a memory element of a specially programmed general-purpose computer storing a first rule or an artificial intelligence (AI) program; a generating element, in a processor for the specially programmed computer, arranged to generate at an executable using at least one of the first rule or the AI program; an interface element of the specially programmed computer, arranged to receive a second rule from a first wireless communications device (WCD), or from a general-purpose computer associated with a business entity and to store the second rule in the memory element; and a modifying element, in the processor, arranged to modify the executable using the second rule and to transmit, using the interface element, the modified executable to a wireless communications network for transmission to a second WCD.08-28-2008
20120109870SCALABLE REASONING USING A POLARITY-BASED MODULE - Modularization-based reasoning of reasoning tasks is provided. Performing a reasoning task includes receiving the reasoning task. Symbols in the reasoning task are interpreted to extract a module from the knowledge base. The reasoning task is them performed with the extracted module to obtain a result of the reasoning task.05-03-2012
20120109869RESOURCE ANALYSIS - Various embodiments provide techniques for analyzing resources based on a set of rules to determine problems that may occur during a product (e.g., a software product) development cycle. In accordance with some embodiments, resources can include files, strings, images, text, user interface elements (e.g. controls, radio buttons, and/or windows), and so on. In at least some embodiments, a resource analysis utility (“RAU”) is provided that can load resource files and analyze associated resources according to a set of rules. According to some embodiments, the RAU includes a graphical user interface (“GUI”) that enables resource files to be selected and rules to be selected that are to be used to analyze the resource files. The GUI can also include results of the analysis of the resource files.05-03-2012
20100125541POPUP WINDOW FOR ERROR CORRECTION - Techniques for providing error handling for a configured user interface (UI) which is generated based upon a configuration of a UI template. A set of one or more data variables is identified, wherein the one or more data variables are associated with a violation of a condition of an enterprise resource planning (ERP) system. In an embodiment, popup window data is dynamically generated based on the identified set of one or more data variables, the popup window data describing UI elements to include in a popup window. In another embodiment, a popup window is displayed which provides access to a data variable which by virtue of a configuration of the UI is not accessible in a current view of the UI.05-20-2010
20080201289METHOD AND ARRANGEMENT FOR CONTENT PRIORITIZATION - The invention concerns a method for determining priority of a data item, the data item being sent from at least one first terminal or service associable with the first terminal to a second terminal and evaluated using a set of first rules associable with the sender of a data item and a set of second rules associable with the recipient of a data item. The invention is characterized in that the data item is associated with at least one tag characterizing the data item, weight factor for the data item is maintained using the set of first rules and the value of the at least one tag, the weight factor of the data item is made adjustable by the set of second rules and the data item is rendered on the second terminal using at least the weight factor information. Also an arrangement implementing the method is disclosed.08-21-2008
20110184902 BUSINESS RULE INTEGRATION WITH ENGINEERING APPLICATIONS - The system integrates a business rule engine with an engineering application that performs one or more predetermine functions relating to the monitoring, analyzing or controlling of a physical system. Rule processing requests are transmitted from the engineering application to a rule based service which manages the data retrieval, data insertion, rule engine invocation activities in a two pass design so as to optimize the rule processing performance for online system monitoring and control.07-28-2011
20100082516Modifying a System in Response to Indications of User Frustration - An illustrative frustration processing system modifies the operation of a target system to improve its performance. In one case, the frustration processing system receives express indications that a user is frustrated in the course of interacting with the target system. The frustration processing system responds to these indications by modifying the operation of the target system to reduce the likelihood that the user will be frustrated in the future. The frustration processing system can modify the operation of the target system by applying a policy to the target system. The policy, in turn, is created using a prediction model. The prediction model predicts when a user is likely to be frustrated based on the user's prior indications of frustration.04-01-2010
20090287629Assignments of places - A method of assigning a place to a customer, including the steps of: determining a set of business rules associated with the provision of the place to the customer; determining a set of available places, the or each of the set of available places having one or more attributes; determining one or more customer preferences in respect of the one or more attributes; applying the business rules to define a set of allowed combinations of place and customer; determining a score in relation to the set of allowed combinations of place and customer; selecting the highest scoring allowed combination from the set of allowed combination of place and customer; and assigning the place to the customer based on the highest scoring allowed combination.11-19-2009
20100100518Rules-Based Cross-FSM Transition Triggering - A method for cross-triggering transitions in independent finite state machines is provided. For a given plurality of finite state machine definitions having a plurality of states and a plurality of transitions among the states, two or more independent instances of the plurality of finite state machine definitions are created. In addition, associations between two or more of the independent finite state machine instances are identified. The method uses cross-triggering rules that identify a condition in a first one of the associated independent finite state machine instances that triggers a transition action in a second one of the associated independent finite state machine instances. Each cross-triggering rule is triggered upon an occurrence of the cross-triggering rule condition, and the transition action in the second associated independent finite state machine instance is performed in response to the triggering of the cross-triggering rule.04-22-2010
20100082519UNIQUE INTERFACE IN SERVICE ORIENTED ARCHITECTURE - A service architected logistics solution generates a user interface to a computing system unique for a given user among a multiplicity of users. The interface includes a plurality of services and access to data sources automatically determined from the user's identity. In various aspects, the technique includes not only the interface, but also a computer-implemented method, a program storage medium encoded with instruction that perform such a method when executed, and a computing apparatus programmed to perform such a method.04-01-2010
20090063380DEVICE, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A BEHAIOR OF AN ENTITY - A method for evaluating a behavior of an entity, the method includes: converting a state machine representation of a behavior of an entity to a complex event processing (CEP) representation of the behavior of the entity; wherein the converting comprises defining a transition between multiple states of the state machine representation as a situation; and evaluating the behavior of the entity in response to the CEP representation.03-05-2009
20090048998PROBLEM DETERMINATION RULES PROCESSING - A context-sensitive pre-evaluation analysis of a set of rules is performed based on the circumstance or the current state of a rule clause directed to an infrequently changing condition. A group of multiple-clause rules are identified which each have a clause defining an infrequently changing condition for evaluating a state of a resource. The current state of the resource is monitored. If the identified group of multiple-clause rules, which cannot evaluate as TRUE under the context of the current state the resource, the identified group of multiple-clause rules are excluded from consideration by the rules engine. The rules engine will then encounter fewer rules to evaluate for a solution. The identified group of multiple-clause rules is further analyzed in the context of the infrequently changing condition for the current resource state. State metrics that are defined by clauses of the identified multiple-clause rules, those that cannot evaluate as TRUE, are identified. Those metrics are then also excluded from consideration by the rules engine. Thus, the rules engine will encounter fewer rules and/or event states that cannot be evaluated to a solution. The context-sensitive pre-evaluation analysis of the rules is performed out-of-band as the rules engine traverses the rule.02-19-2009
20090210376ALERT MANAGEMENT SYSTEM AND METHOD - A system and related method for automating alert decision-making in a computer network are disclosed. The system and method act to receive an alert request from an event management system, and then carries out operations using several sets of inference rules, associating the alert request to a generic conceptual data model of alert request and alert resolution. The generic model is specialized to represent the specific environment being monitored. The alert request is enriched with contextual and network information in order to generate one or several alert resolution actions.08-20-2009
20090089237METHOD AND SYSTEM FOR REMOTELY UPDATING DETECTION KNOWLEDGE OF SYSTEMS - A method for remotely updating detection knowledge of a system is presented. The method includes remotely communicating a rule package to the system to incrementally update the knowledge base of the system, wherein the rule package comprises at least one or more rules. Further, the method includes verifying validity of the rule package. The method also includes generating a set of valid rules, a set of invalid rules, or both. In addition, the method includes deploying the set of valid rules. Additionally, the method includes enabling the valid rules. Systems and computer-readable medium that afford functionality of the type defined by this method is also contemplated in conjunction with the present technique.04-02-2009
20080208786RULE-BASED MANAGEMENT OF ADAPTIVE MODELS AND AGENTS - A computer-implemented method described for making a recommendation with respect to a plurality of items using a plurality of adaptive models or agents. The described method includes receiving one or more business rules; receiving a request for a recommendation; receiving attributes relating to the request; activating one or more adaptive agents such that each activated adaptive agent generates one or more recommendations with respect to the items based at least in part on an evaluation of prior outcomes relating to the items; selecting from among the one or more recommendations at least one final recommendation; and displaying the at least one final recommendation to a user. Related apparatus, systems, techniques and articles are also described.08-28-2008
20090281976DEVICE-INFLUENCED TABLE FORMATTING - A server includes a logic subsystem and memory. The memory holds instructions that, when executed by the logic subsystem, cause the logic subsystem to determine if a table is wider than a viewing size of a screen of a requesting device, determine if the table is a data table or a layout table, and format an instance of the table prior to sending that instance of the table to the requesting device. The instance of the table sent to the requesting device is formatted in accordance with a determined viewing size of the screen of the requesting device and in accordance with a determined table type.11-12-2009
20090287628Method and System for Accelerated Stream Processing - Disclosed herein is a method and system for hardware-accelerating various data processing operations in a rule-based decision-making system such as a business rules engine, an event stream processor, and a complex event stream processor. Preferably, incoming data streams are checked against a plurality of rule conditions. Among the data processing operations that are hardware-accelerated include rule condition check operations, filtering operations, and path merging operations. The rule condition check operations generate rule condition check results for the processed data streams, wherein the rule condition check results are indicative of any rule conditions which have been satisfied by the data streams. The generation of such results with a low degree of latency provides enterprises with the ability to perform timely decision-making based on the data present in received data streams.11-19-2009
20090299942METHOD FOR IMPLEMENTING A RULES-BASED ENGINE - Embodiments of the invention provide an RBE that uses a logical abstraction for a set of application rules that allows the rules to be implemented, presented and modified efficiently. For one embodiment, rules logic for implementing a set of application rules is stored. The rules logic is specified by a processing sequence using one or more application factors, each of which has one or more application factor values. A plurality of entries corresponding to each application factor is separately stored. Each entry contains a data point set having one or more data points and a result corresponding to the data point set. Each of the one or more data points of a data point set corresponds to a distinct factor value.12-03-2009
20090299939Distributed Rule Processing for Ubiquitous Computing Environments - Methods and apparatus are provided for distributed rule processing in a sense and respond system. A method for identifying a candidate set of rules is disclosed, comprising the steps of: identifying one or more rules that receive information from one or more sensors to create a first candidate set of rules; evaluating each of the identified rules to identify an initial candidate set of rules, wherein a rule is added to the initial candidate set if a selected device is associated with sensors that are enabled to produce information for the rule being evaluated, if the selected device is enabled to locally provide input information required by the rule being evaluated, and if the rule being evaluated is associated with a group of devices and there are no correlation operators that consume events generated from other devices in the group of devices; and evaluating each rule in the initial candidate set to identify a final candidate set of rules, wherein any rule that receives information from the rule being evaluated is added to the initial candidate set to create the final candidate set if the selected device is enabled to locally satisfy input information required by the rule that receives information and if the rule that receives information is associated with a group of devices and there are no correlation operators that consume events generated from other devices in the group of devices.12-03-2009
20090254506DYNAMIC SERVICE SELECTIONS USING ENHANCED ONTOLOGIES - Embodiments may include a system for generating an enhancement of an ontology. The system may have a memory unit and a processing unit. The memory unit may be configured to provide the ontology and to store the ontology with the enhancement. The processing unit may be configured to identify a service specification, such as a service product or a contract, that may be represented by a class of the ontology. The service specification may describe a capability of a service. The processing unit may be further configured to compute a set of instances that are specified by the service specification and by a requirement specification and to enhance the ontology with a generated class representing the set of instances in case that the set of instances has one or more instances.10-08-2009
20080275835METHOD FOR DECISION SUPPORT LICENSING AND MICROPAYMENTS - A method of increasing the quality of healthcare provided by health care professionals is provided. The method includes providing a computer system comprising a server including a database, downloading a decision support system onto the database, the decision support system includes a plurality of sets of rules, and accessing the plurality of sets of rules and paying for access on a usage basis.11-06-2008
20100138374AUTOMATED DECISION SUPPORT FOR ASSOCIATING AN UNKNOWN BIOLOGICAL SPECIMEN WITH A FAMILY - Three methods of predicting whether an unknown biological specimen of a missing person originates from a member of a particular family comprise an initial automated decision support (ADS) algorithm for determining a list of relatives of the missing person for DNA typing and which typing technologies of available technologies to use for a listed relative. The ADS algorithm may be implemented on computer apparatus including a processor and an associated memory. The ADS method comprises determining a set of relatives of available family member relatives for DNA typing via a processor from a stored list of family member relatives according to one of a rule base, a table of hierarchically stored relatives developed based on discriminatory power or by calculating the discriminatory power for available family relatives to type. The ADS method may further comprise comparing at least one set of DNA typing data for the unknown biological specimen to DNA typing data from biological specimens from the determined set of relatives; calculating by the processor a likelihood function that the person is related to the family; and outputting a decision whether or not the person is related to the family.06-03-2010
20080249973SYSTEM FOR MANAGING MULTI-FIELD CLASSIFICATION RULES RELATING TO INGRESS CONTEXTS AND EGRESS CONTEXTS - The present invention relates to a system for managing a plurality of multi-field classification rules. The system provides a first table that includes a plurality of entries corresponding to a plurality of rules relating to an ingress context and a second table that includes a plurality of entries corresponding to a plurality of rules relating to an egress context. The system also includes a network processor for classifying packets of information, wherein the network processor is programmed to utilize the first table and the second table to identify any rules relating to the ingress context and any one rules relating to the egress context that match a search key.10-09-2008
20080281768Method and System for Conducting a Compliance Audit - In an embodiment of the invention, a method related to conducting a compliance audit, including accessing a database, the database including a rule set formulated from at least one requirement, wherein the database includes a knowledge base, accepting input regarding circumstance data, the circumstance data regarding a subject of the at least one requirement, applying the rule set to the input regarding circumstance data, and generating a compliance audit report based on applying the rule set to the input regarding circumstance data. In addition, other method, system, program product, and apparatus aspects are described in the claims, drawings, or text forming a part of the present disclosure.11-13-2008
20080294587SYSTEM AND METHOD FOR RULE SET VALIDATION - A system, method, and computer program for validating a rule set for applicable checks of a part, comprising querying a validation rule set; correlating a part data to said validation rule set; comparing a part against said part data; and whereby said part is approved at an event, and appropriate means and computer-readable instructions.11-27-2008
20080288433System and Method for Employing Decision Activities for Providing Inferences in a Process Execution Environment - A set of decision activities can be provided to a business process management and design software tool. The tool can be used to define various processes that contain one or more activities linked by transitions. During process design time, a business analyst can identify process-relevant data of the process to be presented to the end users. The relevant data can be rendered to the end users at runtime, along with a set of possible options for the activities in a process instance. Upon receiving a decision of the user, the process instance can follow the selected transition to a different activity. Over time, the system can capture the decisions taken by users and enter the data associated with these decisions into a data classifier. In doing so, the software tool can generate suggestions, provide probabilities, automate and distribute workloads, flag abnormalities and deviations and generally improve process design and management.11-20-2008
20080288434DOMAIN-INDEPENDENT ARCHITECTURE IN A COMMAND AND CONTROL SYSTEM - In one aspect, a command and control (C2) system includes a domain-independent architecture comprising an ontology model. The ontology model includes a resource aspect configured to receive entities specific to a domain, a responsibility aspect configured to receive actions specific to the domain and performed by the entities, a rules aspect configured to receive rules specific to the domain and associated with the actions and a results aspect configured to receive effects specific to the domain and associated with the actions.11-20-2008
20080288431Method and system for monitoring innovation activity - A computer based method for monitoring innovation activity including: accumulating first metadata associated with a first plurality of intellectual knowledge files; extracting a first plurality of patterns from the first plurality of intellectual knowledge files; creating a first plurality of concept spaces, using rules-based processing, the first metadata, and the first patterns; grouping, using rules-based processing, the first metadata, and the first plurality of patterns, the first plurality of intellectual knowledge files into first respective concept spaces in the first plurality of concept spaces; and generating a report, the report correlating the first plurality of intellectual knowledge files and the first respective concept spaces. The steps of accumulating, extracting, creating, grouping, and generating are performed by a general-purpose computer specially programmed to perform the steps of accumulating, extracting, creating, grouping, and generating.11-20-2008
20080288435Context Conflict Resolution and Automatic Context Source Maintenance - Techniques are disclosed for detecting and resolving conflicts in context information from various sources. That information may be used to automatically update one or more context sources and/or to validate or invalidate (until further notice or for a period of time) input from one or more context sources. Or, the updates can be made in response to the user's instructions. Rules are used in preferred embodiments to dictate the conflict resolution approach for individual users. Updating the context source is particularly useful when the source is an electronic calendar. Updates that may be made to the calendar include adding, deleting, or changing scheduled events and/or working hours. Invalidating data from a context source is particularly useful for lost, forgotten, misplaced, or loaned devices. Marking data from a context source as valid is preferably done when harmony among several context sources is detected. Context suppliers may be notified of errors or discrepancies in their context data.11-20-2008
20080288432Device and Method of Fixing Wireless Network Problems - A method is used to fix wireless network problems. The method comprises receiving at least one parameter relating to a wireless network. The method comprises comparing the at least one parameter with a database of problem identities. Each problem identity has a set of criteria. The at least one parameter relates to the set of criteria. The method comprises determining at least one problem with the wireless network based on the comparison of the at least one parameter with the problem identities.11-20-2008
20100036789SOFTWARE FOR FACET CLASSIFICATION AND INFORMATION MANAGEMENT - A semantic infrastructure (SI) system is provided to interface with an information asset management tool, such as a document management system. The SI is a semantic layer that links together structured, unstructured and tacit information. The SI determines a set of valid terms associated with remaining facets based on the term selection for a first facet and in accordance with predefined facet relationships. The present invention links the content of documents to an enterprise view and to a corporate file plan. The SI includes a database storing assets each associated with a plurality of facets. Embodiments of the present invention provide a unified approach, i.e., an approach that can provide file classification, taxonomies, metadata, thesauri and data model functionalities, to better describe and organize information assets using a single database employing a faceted classification system. A stored metadata instance is mapped to an externally supported metadata format.02-11-2010
20080313121Method and System for Managing Enterprise Operations - Disclosed is a method, a system and a computer program product for assisting users in managing operations in an enterprise. An input is received from a user in the enterprise. The input is associated with an exception in an operation. The exception indicates occurrence of a fault in the operation. A corresponding resolution in a case base indicates an action to resolve the exception. Furthermore, at least one case of the set of cases is displayed to the user based on searching the at least one case base, assisting the user in managing the operation by offering at least one resolution to resolve the fault. A knowledge base and management is assembled for a user to gain knowledge about the managing enterprise process environment to support resolution and decision making. A rule base and management is assembled for a user to gain resolution and decision making advice.12-18-2008
20080313122Method and system for generating an offer and transmitting the offer to a wireless communications device - A system for a system for generating and transmitting an offer to a wireless communications device (WCD) in response to an order, including: an interface element, for at least one specially programmed general-purpose computer, arranged to receive an order from a WCD, the order including a first item or service available from a business entity; and an offer element, in a processor for the at least one specially programmed computer. The offer element is arranged to generate, using at least one of a set of rules or an artificial intelligence program stored in a memory unit for the at least one specially programmed computer, an offer in response to the order, the offer including a second item or service available from the business entity; and transmit, using the interface element, a completion message to a wireless communications network for transmission to the WCD, the completion message including the offer.12-18-2008
20120296859MANAGEMENT OF USER EVENTS SCHEDULED DURING A USER ABSENCE PERIOD - User events scheduled during a user absence period are managed by identifying a user absence period and a buffer period on a user calendar. At least one calendaring repository is searched to determine whether there are user events with a due date coming due during the user absence period that were scheduled prior to a user defining the user absence period and a response is made to each located user event. Moreover, at least one calendaring repository is searched to determine whether there are user events with a due date coming due during the buffer period that were scheduled prior to the user defining the buffer period and a response is made to each located user event in a manner differently from responding to user events coming due during the user absence period.11-22-2012
20120296858BEHAVIOR SETS METHOD AND SYSTEM - A behavior sets system facilitates the dynamic generation of field and rule behavior sets for an insurance policy and claims processing computer system. The behavior sets system includes various modules and graphical user interfaces that provide a streamlined mechanism for creating new behavior sets of field and rule behaviors for the insurance processing architecture. The behavior sets system may include various levels of usability that distinguish between an advanced user of the behavior sets system and basic user that uses the generated field and rule behavior sets. The behavior sets system may also include graphical user interfaces directed to adding, editing, removing, or maintaining the behavior of fields and rules for the insurance policy and claims processing computer system.11-22-2012
20090313199DECISION MAKING UNIT FOR AUTONOMOUS PLATFORM - A decision making unit suitable for an autonomous platform. The decision making unit includes a receiving module configured to receive at least one ability request and a preconditioning module configured to precondition the received ability request. A filter is configured to filter the preconditioned ability request. A first generator is configured to generate a set of behaviour instructions associated with the filtered ability request. A priority processor is configured to priority process the filtered ability request. A second generator is configured to generate at least one control signal depending upon the priority processing of the filtered ability request, wherein the control signal includes information about the generated set of behaviour instructions.12-17-2009
20090313196EXTERNAL SCOPING SOURCES TO DETERMINE AFFECTED PEOPLE, SYSTEMS, AND CLASSES OF INFORMATION IN LEGAL MATTERS - When creating exhaustive, affected lists within a request scope, any legal risk due to failure to identify or leverage existing knowledge of a company about custody of evidence related to a legal matter is minimized. Accurate affected lists are constructed for an ongoing or impending litigation. Affected people, systems, or record types are included at first, and the list is modified over time once their exact association to the litigation context is clarified (new ones are added, not required are removed). Automation of data capture eliminates the risk of human error during data entry. Conflict resolution is applied when the same person, system, or record type is identified in the request scope, as part of multiple affiliations and associations. Overlapping lists are automatically merged to enable simple and efficient processing, without having to cull different lists. Affected elements in the request scope that could otherwise be missed are tracked and added. A relevant list of all affected elements based on multiple likely inconsistent sources of knowledge dispersed throughout a company is created, with a high degree of confidence in the context of an ongoing litigation or an impending litigation.12-17-2009
20080313120ENABLING VALIDATION OF DATA STORED ON A SERVER SYSTEM - Enabling validation of data stored on a server system. According to an aspect of the invention, a portion of the data is received at a client system and processed based on a rule to generate a result. The generated result is used to determine the compliance of the received portion of data with a requirement and thus validate the portion of data. According to another aspect, a user is provided a convenient interface to generate rules (including the requirement) for validating data stored on a server system.12-18-2008
20080228687Controlling Computer Storage Systems - Goal-based availability and change management are handled over groups of heterogeneous storage controllers. Probabilistic and deterministic methods are employed to determine the allocation and placement of storage volumes to storage controllers, as well as the degree of data redundancy necessary to achieve data availability goals The probabilistic methods can take into account past observations of controller availability, and operator beliefs, as well as the state of storage controller configuration, in coming up with a probabilistic estimate of future availability.09-18-2008
20080270337RULE PROCESSING SYSTEM - A rule processing apparatus includes modules for defining/entering attributes, enumerations, and/or relationships; packaging the definitions in a reduced canonical form suitable for propositional logic manipulation using zero-suppressed binary decision diagrams (Zdd) to produce a prime Zdd; and/or (iii) executing the rule by applying a series of user inputs to the prime Zdd to determine a result that preferably includes conflict and selection advice to guide the user to satisfaction. Elective events, such as but not limited to the display of messages or the performance of calculations, may optionally be packaged along with the prime rule or components thereof, and presented during execution to help guide the end user to satisfaction or compliancy when choosing among possible selections. The apparatus automates determination of a complex rule having a combinatorial exploded number of rule components, or a combinatorial number of possible outcomes, exceeding computational capacity of present day computing systems.10-30-2008
20100145899Systems and Methods for Distributed Monitoring of Remote Sites - Rules are applied to video surveillance data to detect events. Localization of the events is achieved by decomposing events into distinct components, each of which can, in some embodiments, be defined at different locations and by different users.06-10-2010
20100145898COMPUTER-ASSISTED CREATION OF A CUSTOM TOOTH SET-UP USING FACIAL ANALYSIS - A method for automatic, or semi-automatic, planning of dental treatment for a patient comprises: (a) obtaining data about an area which is to be treated and data about a face of a patient; (b) performing a computer-assisted analysis of the data to determine properties of at least the face of the patient; (c) creating a modified tooth set-up using a set of stored rules which make use of the determined facial properties. A three-dimensional representation simulates the appearance of the modified tooth set-up and the patient's face surrounding the treatment area. The method also determines properties of existing teeth and creates a modified tooth set-up which is also based on the existing teeth of the patient. The method can be implemented as software running on a workstation.06-10-2010
20110270791METHOD AND SYSTEM FOR EVENT PATTERN DETECTION - Data relating to energy management may be collected and stored from one or more sites. This data may be analyzed by a series of rules, and each rule may look for certain patterns in the data over time. Each time a pattern is detected in the data, the rule may create and store an event back into the database. Each event may represent the detection of a specific condition that starts at a specific time and continues for a specific duration. Each rule may also dynamically assign and update a score to each event that indicates its level of importance and persistence. Once the raw data has been analyzed and events have been created that represent basic conditions, a new set of rules may analyze the events themselves, in addition to, or rather than, the raw data. Successive passes of rules can thus detect higher level, broader problems.11-03-2011
20090030866INFORMATION CLASSIFYING APPARATUS, INFORMATION CLASSIFYING METHOD AND COMPUTER READABLE MEDIUM - An information classifying apparatus includes an information receiving section, a rule storing section, a deciding section, a creating condition storing section, a creating section and a storage control section. The rule storing section stores a classifying rule which is a rule for classifying a piece of information. The deciding section decides as to whether a piece of information received by the information receiving section satisfies the stored classifying rule or not. The creating condition storing section stores a creating condition which is a condition for creating the classifying rule. The creating section creates, when the deciding section decides that the piece of information does not satisfy the stored classifying rule, a new classifying rule based on the creating condition stored in the creating condition storing section. The storage control section controls the rule storing section to store the new classifying rule created by the creating section.01-29-2009
20090119241METHODS AND SYSTEMS FOR A DECISION CLIENT - The present invention is directed to a decision client computer application providing a single point for making decisions in a company. The decision client may comprise a centralized tool to connect employees needing decisions on various aspects of their jobs to decision makers, such as managers. The users of the system can be identified by a digital signature. In one embodiment, when the client application receives a request for decision, it routes the request to the person responsible for the decision. Requests can automatically be passed to an alternative decision maker when an employee is out of the office.05-07-2009
20100274750Data Classification Pipeline Including Automatic Classification Rules - Described is a technology in which data items (e.g., files) are processed through an extensible data processing pipeline, including a classification pipeline, to facilitate management of the data items based upon their classifications. A discovery module locates data items to process. An independent classification pipeline obtains metadata (properties) associated with each discovered data item, and one or more classifiers classify the data item based on the metadata. An independent policy module applies policy to each data item based upon its classification. Multiple classifiers may be invoked, based upon various criteria. Predefined ordering of the classifiers, authoritative classifiers and/or an aggregation mechanism handle any classification conflicts. Different types of classifiers may be provided, and each classifier may correspond to automatic classification rules; the classifier may directly change a property, (e.g., set the classification) or return a result to a corresponding rule mechanism for changing a property.10-28-2010
20090138424Method and system for adding processes to print production workflows utilizing asset metadata and automated reasoning - A method and system for adding processes to print production workflows utilizing asset metadata and automated reasoning system is disclosed. The asset metadata can be extracted from the resources associated with a print product description such as PDF files and image and artwork files. The asset metadata can be processed through an automated reasoning system in order to infer additional metadata. The inferred metadata can be utilized to add and parameterize a process node in order to build a more effective and useful process network. The reasoning system can be a rule based reasoning system and/or ontology based reasoning system.05-28-2009
20100005048Detecting duplicate records - A method for finding duplicates by matching group of fields in records is disclosed. The method comprises standardizing data using field specific knowledge base; extracting at least part of one or more related fields of records; applying a matching attribute function to generate keys on the “comparable” field part extracted data; generating record level keys using generated field level keys; clustering the records based on generated record level keys; identifying reference record for each cluster identified; and calculating matching percentage for each record in a cluster with respect to reference record of the cluster. Devices and systems are disclosed that enable the method for finding duplicates.01-07-2010
20090006301MULTI-PLATFORM BUSINESS CALCULATION RULE LANGUAGE AND EXECUTION ENVIRONMENT - Computer-readable storage media, computer-implemented methods, and systems are disclosed for a multi-platform calculation rule language and its environment. A calculation rule, presented in an expression language and specifying one or more functions, is received. The expression language, for a plurality of different platforms, allows each of a plurality of functions to be expressed using a common syntax. A selected platform is identified on which the calculation rule is to be executed. The calculation rule is resolved to the attributes of the data model in the selected platform to apply the calculation rule to the data model. The calculation rule is executed by performing the one or more functions specified in the calculation rule, and the results from executing the calculation rule are reported.01-01-2009
20090177610INFORMATION PROCESSING METHOD AND APPARATUS FOR BUSINESS PROCESS ANALYSIS - An information processing method for a business process analysis includes identifying a processing target field in a record generated in an analysis target system and stored in a data storage; and identifying data representing probability that the processing target field corresponds to a time stamp of an event by using definition data for each field in the record.07-09-2009
20090177609RISK ASSESSMENT IN AN AREA EXTERNAL TO AN AIRPORT - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a security perimeter area surrounding an airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score.07-09-2009
20090177608RISK ASSESSMENT IN A GATE AREA OF AN AIRPORT - A risk assessment method and system. The method includes receiving by an inference engine, first sensor cohort data associated with a first cohort located within a gate area of an airport. The inference engine receives first group technology inferences associated with the first cohort. The inference engine generates first risk cohort inferences based on the first group technology inferences and the first sensor cohort data. The inference engine receives first inference data comprising a first plurality of inferences associated with the first cohort. The inference engine generates second inference data comprising a second plurality of inferences associated with the first cohort. The second inference data is based on the first inference data and the first risk cohort inferences. The inference engine generates a first associated risk level score for the first cohort. The computing system stores the second inference data and the first associated risk level score.07-09-2009
20090063381METHOD AND APPARATUS FOR AUTOMATICALLY EXECUTING RULES IN ENTERPRISE SYSTEMS - One embodiment of the present invention provides an enterprise system that automatically executes a rule associated with an event. During operation, the system receives an event object at the enterprise system. Next, the system creates an intermediate event object based on the event object, wherein the intermediate object is an invocation context for the rule. The system also filters a set of rules with the intermediate event object to obtain a subset of rules. The system then selects a rule that is associated with the event from the subset of rules. Finally, the system executes the rule.03-05-2009
20090055342METHOD AND KNOWLEDGE STRUCTURES FOR REASONING ABOUT CONCEPTS, RELATIONS, AND RULES - A system and method for reasoning about concepts, relations and rules having a semantic network comprising at least one node from a predetermined set of node types, at least one link from a predetermined set of link types, and zero or more rules from a predetermined set of rule types, a subset of the rule types being matching rule types, each node and each link being associated with a set of zero or more rules; a network reasoning data structure having a reasoning type database having at least one regular expression, each of the regular expressions being a class of sequences having at least three node types and two link types, wherein the network reasoning data structure further has a context being a set of rules; and a reasoning engine having an activator for activating one or more activated paths in the semantic network, the set of activated paths having a common starting node in the semantic network, wherein the reasoning engine further has a validator for selecting a subset of the activated paths being valid paths, each rule from the set of rule matching types that is associated with one or more path elements on each valid path being matched by one or more rules in the context and wherein the reasoning engine further has a legal inferencer for selecting a subset of the set of valid paths being legal and valid paths, the legal and valid paths matching at least one of the regular expressions.02-26-2009
20090144216INTRUSION DETECTION SYSTEM ALERTS MECHANISM - A system and method for analyzing Intrusion Detection System (IDS) alert data associated with a computer network is described. The method includes applying first association rules to obtained IDS alert data associated with a computer network and processing the obtained IDS alert data with the first association rules. Analyst feedback data associated with the processed obtained IDS alert data is received, and a training data set from the analyst feedback data is received. New association rules are determined based upon the training data set, and the new association rules are outputted to a display of a computing device. Outputting the new association rules may include outputting patterns within the IDS alert data of false positive alerts. The new association rules may be applied back to the obtained IDS alert data.06-04-2009
20090259612MESSAGE CONDUIT SYSTEMS WITH ALGORITHMIC DATA STREAM CONTROL AND METHODS FOR PROCESSING THEREOF - A method for processing messages is provided where at least one algorithmic conduit is defined, and at least one conduit rule for controlling at least one algorithmic conduit is defined. An algorithmic conduit is a persistent connection, controlled by explicit, independent, dynamic rules, and capable of processing messages among data communicators such as devices, systems, or programs. Messages can be monitored, filtered, transformed, correlated, or processed in other ways without modifying the data communicators. A message conduit hub system allows creation and management of algorithmic conduits to serve as active, virtualized links carrying rules-based data streams among configurable endpoints. These “smart” connections are managed using parameters, logic, and other control interfaces for tailoring behavior to a particular application, site, or user. A message conduit hub system may be implemented as a stand-alone device, as part of a larger system, or as an “encapsulation layer” for an existing application.10-15-2009
20110225113DIVERSE MESSAGE SYNCHRONIZATION - Various exemplary embodiments relate to a method and related network node and machine-readable storage medium relating to the receipt, association, and synchronization of a plurality of messages from diverse sources. Various embodiments relate to a Policy Charging and Rules Node (PCRN) receiving related messages from at least two sources and acquiring a lock associated with the received message's session binding identifier (SBI). The PCRN may use the lock to prioritize the processing of the related requests that share a common SBI. Various embodiments relate to the PCRN rejecting subsequent related requests unless the subsequent request is of a higher priority. Various other embodiments relate to the PCRN waiting for the receipt of the subsequent request before fully processing the first request.09-15-2011
20090024553AUTOMATIC GENERATION OF NEW RULES FOR PROCESSING SYNTHETIC EVENTS USING COMPUTER-BASED LEARNING PROCESSES - A computer implemented method. A first synthetic event is received. The first synthetic event is derived from a first cohort comprising a first set of data and a second cohort comprising a second set of data. The first synthetic event comprises a third set of data representing a result of a mathematical computation on the first and second cohorts. A first rule set is created, the first synthetic event being expected as a result of application of the first rule set to the first cohort and the second cohort. The first rule set is applied to the first cohort and the second cohort to achieve a first result. The first result comprises a second event that is compared to the first synthetic event. A comparison is formed, the comparison comprising additional data that can be used to describe a difference between the second event and the first synthetic event.01-22-2009
20090024551MANAGING VALIDATION MODELS AND RULES TO APPLY TO DATA SETS - Provided are a method, system, and article of manufacture for managing validation models and rules to apply to data sets. A schema definition describing a structure of at least one column in a first data set having a plurality of columns and records providing data for each of the columns is received. At least one model is generated, wherein each model asserts conditions for at least one column in a record of the first data set. The schema definition and the at least one model are stored in a data quality model. Selection is received of a second data set and the data quality model. A determination is made as to whether a structure of the second data set is compatible with the schema definition in the selected data quality model. Each model in the data quality model is applied to the records in the second data set to validate the records in the second data set in response to determining that the structure of the second data set and the schema definition are compatible.01-22-2009
20090024552UNIFIED DEVELOPMENT GUIDELINES - This disclosure relates to creating, facilitating, or otherwise managing unified development guidelines. Software for managing development guidelines can comprise computer readable instructions operable when executed to, in response to a trigger, identify a first guideline rule and a second guideline rule based, at least in part, on the trigger, where the guideline rules are at least partially stored in a central rules repository for a development group and each rule is associated with a validity period. This software then generates a development guideline using the identified first guideline rule and the second guideline rule.01-22-2009
20090198638PRESENCE COMBINING APPARATUS AND PRESENCE COMBINING METHOD - A presence combining apparatus comprising collecting means for collecting the items of presence information managed in formats of the individual presence sources by connecting individually to a plurality of different presence sources that manage items of presence information indicating states of elements; 08-06-2009
20090063383Real-time reasoning system using natural language-like rules - A reasoning system with a reasoning engine that uses a rule set created from a rule representation language that has an English/natural language-like rule syntax and format is discussed. The reasoning system employs a real-time selection algorithm that chooses the rules used to analyze complex data (e.g.: bio-medical research, e-commerce, Customer Relationship Management (CRM), environmental research & engineering, bio-chemical research and product development, Investment and money management, anything related to research and product development) without suffering exponential performance decreases as the complexity of the analysis increases. The use of the rule representation language enables different domain users to review, create and modify rules without requiring the users to possess an advanced knowledge of programming languages.03-05-2009
20090055341Regulatory Survey Automation System (RSAS) - The present invention provides a system, method and computer program product for generating automated reports. Input data from various spreadsheets is consolidated. Thereafter, based on the input data, a set of output values are determined. The output values are then updated in a form that serves as a template for the report. Subsequently, the form is submitted to a recipient.02-26-2009
20090083209MULTI-FIELD CLASSIFICATION DYNAMIC RULES UPDATES - The present invention relates to a method and computer system device for applying a plurality of rules to data packets within a network computer system. A filter rule decision tree is updated by adding or deleting a rule. If deleting a filter rule then the decision tree is provided to a network data plane processor with an incremental delete of the filter rule. If adding a filter rule then either providing an incremental insertion of the filter rule to the decision tree or rebuilding the first decision tree into a second decision tree responsive to comparing a parameter to a threshold. In one embodiment the parameter and thresholds relate to depth values of the tree filter rule chained branches. In another the parameter and thresholds relate to a total count of rule additions since a building of the relevant tree.03-26-2009
20120078833BUSINESS RULES FOR RECOMMENDING ADDITIONAL CAMERA PLACEMENT - Business rules may be defined for camera placement in a video surveillance system, such as a system monitoring an airport. The business rules may be logical rules having an if-then format. For example, the if portion of the business rule may include a category, a surveillance area, and a business case for a proposed location. The then portion of the business rule may specify a recommendation to install an additional security camera in the video surveillance system at the proposed location. The recommendation may be calculated using a spreadsheet. The business rules provide justification for recommending a new camera placement and provide sound reasoning to assist in decision making when considering new camera locations in a video surveillance system.03-29-2012
20120078832EXPLOITATION OF TRANSITION RULE SHARING BASED ON SHORT STATE TAGS TO IMPROVE THE STORAGE EFFICIENCY - A mechanism is provided with an address generator that is operative to receive a current state vector and a current input value, and the address generator is operative to generate a memory address corresponding to a transition rule in response to the current state vector and the current input value. A transition rule memory includes a memory addresses, and the memory address is a location in the transition rule memory. The transition rule is a transition rule vector that includes a short state tag field. The short state tag field includes fewer bits than the current state vector.03-29-2012
20090210373SYSTEM ARCHITECTURE AND PROCESS FOR SEAMLESS ADAPTATION TO CONTEXT AWARE BEHAVIOR MODELS - A surveillance system implements an architecture and process to support real-time abnormal behavior assessment operations in a distributed scalable sensor network. An automated behavior model builder generates behavior models from sensor data. A plurality of abnormal behavior scoring engines operating concurrently to generate abnormal behavior assessment models by scoring the behavior models. An execution performance manager performs fast switching of behavior models for the abnormal behavior scoring engines. The execution performance manager performs detection of abnormal behavior score distribution characteristic deviation by comparing a current abnormal behavior assessment model to a pre-recorded abnormal behavior assessment model. The execution performance manager selects a pre-recorded behavior model for the abnormal behavior scoring engines when the deviation exceeds a predetermined threshold.08-20-2009
20090210375METHODOLOGY AND COMPUTER PROGRAM PRODUCT FOR EFFECTING RULE EVALUATION IN POLICY BASED DATA MANAGEMENT - The invention relates to a system and method for providing efficient policy rule updates in policy-based data management. More particularly, the invention relates to a system and method for restraining the size of the set of data objects to be examined after a policy rule evaluation.08-20-2009
20090210374METHODOLOGY AND COMPUTER PROGRAM PRODUCT FOR EFFECTING RULE EVALUATION IN POLICY BASED DATA MANAGEMENT - The invention relates to a system and method for providing efficient policy rule updates in policy-based data management. More particularly, the invention relates to a system and method for restraining the size of the set of data objects to be examined after a policy rule evaluation.08-20-2009
20090222395SYSTEMS, METHODS, AND SOFTWARE FOR ENTITY EXTRACTION AND RESOLUTION COUPLED WITH EVENT AND RELATIONSHIP EXTRACTION - For automated text processing, the inventors devised, among other things, an exemplary system that includes an entity tagger, an entity resolver, a text segment classifier, and a relationship extractor. The entity tagger receives an input text segment, and tags named entities with the segment as being a person, company, or place. The entity resolver accesses authority files, and associates the persons and companies named in the text segment with specific entries in the files. The text segment classifier determines whether the text segment includes a relationship event, such as job-change event or merger and acquisition event, and if an event is detected, the relationship extractor determines the event role of entities named in the segment. For example, the extractor determines for a merger and acquisition event, which named company was the acquirer and which was acquired.09-03-2009
20090106180HEALTH METER - Techniques for indicating the status or health of a software system in a simple and summarized manner. In one embodiment, a health meter is displayed that displays a status value indicating the status or health of the software system. The status or health of the system as indicated by the health meter may be based upon one or more characteristics or perspectives (or components) of the system, such as performance, resource utilization, reliability, availability, scalability, and status values computed for the components.04-23-2009
20090106182DATA FLOW ANALZYING APPARATUS, DATA FLOW ANALYZING METHOD AND DATA FLOW ANALYZING PROGRAM - A data flow analyzing apparatus includes an analysis rule storage which stores analysis rules having definitions of data types, a data flow analyzer which performs data flow analysis on an analysis target program as a target of analysis by using the analysis rules stored in the analysis rule storage to thereby output unsafe data-including procedures as detected points, an analysis rule candidate generator which generates candidates of analysis rules based on the detected points, and an analysis rule candidate output which outputs the analysis rule candidates generated by the analysis rule candidate generator to a predetermined output.04-23-2009
20090204562CONFIGURABLE MULTI-LINGUAL ADVISORY SYSTEM AND METHOD THEREOF - The present invention provides a configurable multi-lingual advisory system (08-13-2009
20090204560METHOD FOR DETERMINING VALIDITY OF COMMAND AND SYSTEM THEREOF - Provided is a method of determining command line validity, including: a step of maintaining a block network address database including block network address information; a step of receiving a command line from a terminal of a user; a step of extracting network address information included in the command line; a step of determining whether the network address information is the block network address information, with reference to the block network address database; a step of generating log information associated with the command line in case that the network address information is not the block network address information as the result of the determination, in which the log information comprises at least one of the network address information included in the command line, input time point information with respect to the input time point of the command line, and request content information; a step of recording the log information in a log database; and a step of determining the validity of the command line by using the log information.08-13-2009
20090210372RULE-BASED PROGRAMMING LANGUAGES FOR ENTITIES IN ENVIRONMENTS - A rule-based programming language may be devised for programming an entity in an environment. Computer systems may therefore be configured to program the entity with at least one rule comprising at least zero language conditions representing an action condition, at least one language verb representing an action, and at least zero language verb parameters representing an action object. The computer system may also be configured to facilitate entry by a user of a rule set according to the rule-based programming language by receiving user selections of language conditions, language verbs, and language verb parameters. By facilitating the programming by users of entities within environments, the computer system may facilitate individuals (such as non-technical individuals, aspiring programmers, and children) in understanding programming concepts, encourage the development of experience with computer programming, and permit the generation of useful computer programs by non-proficient programmers.08-20-2009
20100274751EXPERT SYSTEM FOR INSULIN PUMP THERAPY - An apparatus comprising a controller. The controller includes an input/output (I/O) module and a rule module. The I/O module is configured to present a question for a patient when communicatively coupled to a user interface and receive patient information in response to the question via the user interface. The rule module is configured to apply a rule to the patient information and generate a suggested insulin pump setting from application of the rule. Other devices, systems, and methods are disclosed.10-28-2010
20090259613Knowledge Re-Use for Call Routing - A method is described for semantic classification in human-machine dialog applications, for example, call routing. Utterances in a new training corpus of a new semantic classification application are tagged using a pre-existing semantic classifier and associated pre-existing classification tags trained for an earlier semantic classification application.10-15-2009
20090259611Rule-Based Content Request Handling - An embodiment of a method includes receiving a content request including a first set of attribute values, using at least one of the attribute values from the first set of attribute values to determine a second set of attribute values, traversing a hierarchy of decision nodes, wherein each decision node implements business logic based on one of the attribute values from the first set of attribute values or the second set of attribute values, and generating a decision from a last node in the hierarchy, wherein the decision dictates how to respond to the content request.10-15-2009
20100161543Constructing an Agent in a First Execution Environment Using Canonical Rules - A method, computer readable medium and system for constructing an agent in a first execution environment that utilizes a set of canonical rules, comprising requesting a canonical rule set for an agent, supplying the agent with the rule set and requesting compilation of the rule set.06-24-2010
20100161542DETECTING ENTITY RELEVANCE DUE TO A MULTIPLICITY OF DISTINCT VALUES FOR AN ATTRIBUTE TYPE - Techniques are disclosed for providing multiple value detection rules used to determine whether an entity is relevant due to multiple distinct values for an attribute type of the entity in an entity resolution system. Generally, the multiple value detection rules may be applied to attribute types of an entity. When a rule is violated because too many distinct values exist for a particular attribute type, an alert may be generated. Once the alert is generated, additional rules may be applied or skipped. In one embodiment, a rule may be named and given a description.06-24-2010
20090259614METHOD AND EXPERT SYSTEM FOR VALUATING AN OBJECT - A method for valuating an object is disclosed, which includes an expert system that determines a value for a rule from the features of the object, weights the value with a weight from [0, 1] and valuates the object based on the value with a rule editor for defining rules for the valuation with one respective weight from [0, 1]; a rule module for determining a value per rule from the features and a valuation module are also disclosed for valuating the object based on the values, wherein the valuation module weights each value determined for a rule with the weight associated with the rule; and in a simplified manner, the expert system determines temporal progressions of the weight in an evolutionary algorithm, commencing with a start value, and selects a limit of the weight as a new weight, when the weight is converging, and the evolution module determines temporal progressions of at least one weight in an evolutionary algorithm selecting a new weight based on a converging behavior of the characteristics.10-15-2009
20100262572INCORPORATING REPRESENTATIONAL AUTHENTICITY INTO VIRTUAL WORLD INTERACTIONS - A system that incorporates representational authenticity into virtual world interactions can include user representational authenticity data and a virtual world computing system. The user representational authenticity data can be used to describe the physical characteristics of a human user. The physical characteristics can be quantified utilizing standardized measurement techniques. The virtual world computing system can be configured to adjudicate the conduction of interactions performed by a virtual representation of the human user within the virtual world environment utilizing the user representational authenticity data.10-14-2010
20100185576METHODS FOR AUTOMATED EDDY CURRENT NON-DESTRUCTIVE TESTING ANALYSIS - A system and method for precisely detecting tubing flaws using a computer architecture that combines scalable processing power with an extensible array of detection and classification possibilities involving eddy current data analysis, as well as detection algorithms for pinpointing exact tubing regions and wherein these regions can be further divided into manageable segments for flaw analysis. Multiple classification tools utilized to discriminate detection and to precisely assign proper report codes to detect flaws repeatedly and accurately.07-22-2010
20100262573LOGGING AND ANALYZING COMPUTER USER'S CONTEXT DATA - A facility for logging context attributes is described. For each of a set of selected context attributes, the facility, determines a target frequency with which values of the selected context attribute are to be logged. For each of the set of selected context attributes, the facility obtains values of the selected context attribute at a frequency approximating the target frequency determined for the selected context attribute. Then, for each obtained context attribute value, the facility writes the obtained value to a storage device in a manner that identifies its context attribute.10-14-2010
20100191690FRAMEWORK FOR DELTA ANALYSIS DURING AUTOMATED BUILDS - A Delta Framework program (DF) automatically detects and prevents breaking scenarios during an automated software build by identifying a build artifact from a list of build artifacts in a repository; comparing the build artifact to a current software build; identifying a delta between the build artifact and the current software build; determining whether the delta has a link to a rule in the rules database; responsive to the artifact having a link to a rule, determining whether the rule identifies a breaking scenario; responsive to the rule identifying the breaking scenario, taking an action specified by the rule.07-29-2010
20120197833ALERT MANAGEMENT SYSTEM AND METHOD - A system and related method for automating alert decision-making in a computer network are disclosed. The system and method act to receive an alert request from an event management system, and then carries out operations using several sets of inference rules, associating the alert request to a generic conceptual data model of alert request and alert resolution. The generic model is specialized to represent the specific environment being monitored. The alert request is enriched with contextual and network information in order to generate one or several alert resolution actions.08-02-2012
20100217736Decision support method and apparatus for chaotic or multi-parameter situations - A scoring or alarm method for obtaining scores or alarms of multi-parameter situations comprises obtaining momentary values of parameters; and transforming the measured values into alarms, by: for each parameter defining a variation range; setting internal boundaries at any of substantially continuous locations along each variation range, said boundaries defining a plurality of internal regions within said variation ranges; allowing for user or rule input to configure and reconfigure said internal regions; providing scoring to respective ones of said internal regions; allowing for user or rule input to configure and reconfigure said scoring; defining a variation range of a total derived from said measured momentary values and associated internal region scores; providing at least one conversion rule for converting an internal region score currently associated with a measured input into a contribution to said total; allowing for user input to configure and reconfigure said at least one conversion rule; and providing an alarm according to an alarm rule associated with regions of said variation range of said total.08-26-2010
20100223222DECISION-MAKING METHOD, DECISION-MAKING SYSTEM, AND POLICY DECISION FUNCTION - A decision-making method, a decision-making system, and a PDF are disclosed herein. The decision-making method comprises: receiving application session data that carries access network data and access user data; and making policy and charging decisions according to the application session data. Through the decision-making method, decision-making system, and PDF, the application session data comprises access network data and access user data of the UE so that the PCRF can uniquely determine a user according to the access network data or the access user data and the IP address allocated by the network to the UE, and make policy and charging decisions.09-02-2010
20100217738DECISION SUPPORT METHOD AND APPARATUS FOR CHAOTIC OR MULTI-PARAMETER SITUATIONS - Body condition characterization apparatus comprises: measurement inputs for obtaining momentary values of different medical parameters; a baseline unit operative to modify the momentary values in relation to a first baseline, and a second baseline, the first baseline being an absolute baseline and the second baseline being a previously obtained momentary value; a transformation unit to selectively transform the modified momentary values into a body state characterization, comprising: an input scale for each parameter defining a variation range of the parameter; a boundary input module, that sets internal boundaries at locations along each input scale to define regions within the variation ranges, the regions being user modified; a scoring module providing scores to the input scale regions, and allowing reconfiguring of the scoring; a totalizer scale, defining a variation range of a total derived from the measured momentary values and associated input scale region scores; and an input scale to totalizer converter comprising a conversion rule for converting input scale region scores into a contribution to the total, thus allowing for user input to reconfigure the at least one conversion rule; thereby to provide a total characterizing a current body state.08-26-2010
20100161539SYSTEM AND METHOD FOR ANALYZING TICKETS - A system and method for analyzing tickets including an input configured to receive data associated with one or more tickets, one or more modules configured to analyze the received data, and an output configured to output the processed data. Each of the one or more tickets may be associated to at least one issue associated with at least one of a product and service. Analyzing the received data may include calibrating the one or more modules based on the received data and processing the data based on the calibration. The output may output the processed data for optimizing the at least one product and service and/or transmit the processed data into the input for further analysis at the one or more modules.06-24-2010
20100161538Device for user input - An electronic device receives text inputs. The device predicts the user's intended input by analyzing text previously and subsequently entered. The device compares the previous and subsequent input to the current input to ensure that the inputs are compatible. The device may also be capable of comparing previous input to predict current input. The device also may contain a keyboard designed to minimize user input error. Examples to which this invention applies include predictive text and autocorrect features of word processors and mobile phones.06-24-2010
20100217740SYSTEM FOR ENTERPRISE WIDE MANAGEMENT WORKBENCH AND METHOD THEREOF - A system for managing and reporting data from a plurality of data sources for at least one user is disclosed. The plurality of data sources contain data related to one or more undertakings of the at least one user. The system includes a data collection module that collects data from the plurality of data sources. Further, the system includes a processor that processes collected data to form a set of analytical data. Furthermore, the system includes a user interface to display the set of analytical data to the at least one user in the form of a report. The set of analytical data display a current state of the data collected from the plurality of data sources.08-26-2010
20100217741METHOD AND SYSTEM TO ANALYZE RULES - A method and system to analyze rules is described. The system receives a query and applies a first plurality of rules to the query to identify a second plurality of rules that respectively identify at least one matching keyword in the query. Next, the system counts the first plurality of rules to identify a total quantity of rules applied to the query and further counts the second plurality of rules to identify a second quantity of rules that respectively identify at least one matching keyword in the query. Finally, the system determines a percentage of coverage for the query based on the total quantity of rules and the second quantity of rules.08-26-2010
20090076998Method and system for automatically adding new class definitions to a classification system - A method and system for automatically classifying a product description into a product type based on a classification system is disclosed. Real product descriptions representing a given product type can be compared with a pre-defined set of characteristics that are relevant to the classification system. The relevant information regarding the classification system is extracted from each of the real product descriptions. The extracted information can then be coalesced and transformed into a new set of classification rules for a new product type. The new classification rules can be used to automatically classify the product descriptions that represent the new product type. The classification system can be a rule based classification system and/or semantic web classification system.03-19-2009
20090076997RECOMMENDER SYSTEM WITH AD-HOC, DYNAMIC MODEL COMPOSITION - One embodiment of the present invention provides recommender system for generating a recommendation of an item by combining a set of utility models adaptively to facilitate a decision-making process. The system includes a utility model database containing the set of utility models and a query module for receiving at least one query about the item from a querying entity. The system also includes a rule engine to specify a subset of utility models to be applied to the item and to specify a weight function of the specified utility models. Further included in the system is a set generator coupled to the utility model database, the query module, and the rule engine. The set generator computes a set of ratings by applying each of the utility model in the subset to the item and generates an overall rating for the item based on the weight function. The system further a communication module to return the overall rating.03-19-2009
20100241604NOTIFICATION-BASED FORWARD CHAINING - In an embodiment, a computer system determines that a first rule in a ruleset comprising a plurality of rules is to be executed, where the first rule includes a condition and an action that is to be performed when the first rule's condition is met. The computer system dynamically modifies the first rule's condition to include a portion of software code configured to monitor and receive notifications from a data-change notification system. The computer system executes the dynamically modified first rule and executes a second rule in the ruleset. The computer system receives a notification from the data-change notification system indicating that execution of the second rule's action has modified data values being monitored by the first rule's software code portion and that, as a result of the modification, the first rule is to be re-executed. The computer system also re-executes the first rule based on the received notification.09-23-2010
20100241605METHOD AND DEVICE FOR IDENTIFYING TRAFFIC-RELEVANT INFORMATION - A device is arranged to carry out a method for identifying traffic-relevant information in a moving vehicle, wherein image data of a visual sensor and map data of a navigation system are each pre-evaluated for the identification and the results of the pre-evaluation are combined and interpreted. The image and map data is scanned for traffic-relevant information and compacted to relevant image and map data in a first and second scene interpretations, and the relevant image and map data is supplied to a rule engine and to a state machine for interpreting the image and map data. The rule engine evaluates the image and map data and transmits an action to be executed to the state machine which carries out a transition in its state space including pre-defined states and outputs information which is assigned to the state or to the transition.09-23-2010
20100241603POLICY PROCESSOR FOR CONFIGURATION MANAGEMENT - A policy processor is described that may be used to implement a system for managing the configuration of assets in a distributed computing network, such as an enterprise network. The policy processor resides on a managed node in the distributed computing network and operates to receive, evaluate and enact policies issued by one or more policy authorities in the distributed computing network. The policy processor utilizes a conflict resolution model to determine which policy rules included within the policies should be put into effect and which should not.09-23-2010
20100250480IDENTIFYING SIMILAR FILES IN AN ENVIRONMENT HAVING MULTIPLE CLIENT COMPUTERS - To identify similar files in an environment having multiple client computers, a first client computer receives, from a coordinator computer, a request to find files located at the first client computer that are similar to at least one comparison file, wherein the request has also been sent to other client computers by the coordinator computer to request that the other client computers also find files that are similar to the at least one comparison file. In response to the request, the first client computer compares signatures of the files located at the first client computer with a signature of the at least one comparison file to identify at least a subset of the files located at the first client computer that are similar to the at least one comparison file according to a comparison metric. The first client computer sends, to the coordinator computer, a response relating to the comparing.09-30-2010
20100235312CREATING AN ALBUM - A system for creating an album is disclosed. In one embodiment, the system includes an image input configured to receive related images, an image memory coupled to image input, an image processor coupled to image memory, and an album output coupled to image processor. The image processor is configured to use game play with users to assign metadata labels to the related images and assign album layout rules based upon the story schema and metadata labels.09-16-2010
20100211538ALARM DEFINING DEVICE AND ALARM DEFINING METHOD - An alarm defining device includes a rule input accepting section which accepts an input of an attribute rule, and an attribute defining section which defines an attribute for each alarm status in a plant according to the rule accepted by the rule input accepting section.08-19-2010
20100100519DEVICES, METHODS, AND COMPUTER-READABLE MEDIA FOR PROVIDING CALENDAR-BASED COMMUNICATION SYSTEM SERVICES - Devices, methods and computer-readable media for providing calendar-based communication system services. Data for providing calendar-based communication system services is stored. The data is classified. Policy rules are applied to identify candidate actions. the identified candidate actions are checked for feasibility. The identified candidate actions verified as being feasible are implemented. The candidate actions may include suggestions for the user, marketing material tailored to the user, and network actions selected for the user.04-22-2010
20100114810METHODS AND SYSTEMS FOR MONITORING MACHINERY - A method and system for operating a facility having a plurality of equipment combinations wherein each equipment combination is operating interactively with at least one of another of the plurality of equipment combination is provided. The method includes receiving, in real-time, for each of the plurality of equipment combinations, a plurality of measured process parameters, determining at least one derived quantity from the plurality of measured process parameters, and recommending a change to an equipment operation based on the measured process parameters and the derived quantities.05-06-2010
20120143809LAZILY ENABLED TRUTH MAINTENANCE IN RULE ENGINES - Some embodiments of a method to lazily enable truth maintenance in a rule engine have been presented. A rule engine can enable truth maintenance on an object type basis. In response to a working memory action involving a particular object type, the rule engine may check a truth maintenance parameter of the object type involved to determine if truth maintenance for the object type has to be enabled. If so, the rule engine may enable truth maintenance for the object type.06-07-2012
20100198768SYSTEM AND METHODS FOR OPTIMIZING USER INTERACTION IN WEB-RELATED ACTIVITIES - A method and apparatus is disclosed herein for facilitating user interaction in web-related activities. In one embodiment, the method comprises monitoring a user's current interaction with a browser, predicting a task a user is likely to take based on a current interaction context associated with the user's current interaction and one or more rules previously generated based on one or more previously recorded browser interactions, and generating, based on the prediction, and displaying a user interface component with the browser, the user interface component selectable by the user and representing an interaction (or a sequence of interactions) that the user can select to occur.08-05-2010
20090327197SYSTEM AND METHOD FOR DYNAMIC PROFILING OF USER IN ONE-TO-ONE APPLICATIONS AND FOR VALIDATION OF USER RULES - A system and method for generating and validating a user profile (12-31-2009
20100191691Method for computer-aided decision-making system and method that utilizes product, services and/or venue values and personality value matching, incorporating groups and outside values - A computer-aided decision-making system and method that is applicable to a variety of applications such as, but not limited to, Booking and Reservations systems or Automated Real Estate services or Broker Monitoring systems. The computer-aided decision-making system provides immediate, useful, and relevant information to a person in a decision-making context, overcoming problems that do not allow one to see all the possibilities while making decisions, and enabling consumer purchases, or management guidance, in an on-line sales environment. This system is also able to quantify the concept of “Fun, Risk or other Human concepts” that were otherwise unable to be quantified earlier. The system allows for the creation and evaluation of individuals and groups as well as the incorporation of outside values/standards, as opposed to just internal values/standards, that may have an application to the Product, Service or Venue.07-29-2010
20090327198SYSTEM AND METHOD FOR APPLYING RULE SETS AND RULE INTERACTIONS - Described is a system and method for determining relationships between a plurality of existing rules in a rule set, wherein the relationships include cause interactions and effect interactions among the existing rules, creating a representation of the relationships including the cause interactions and effect interactions, receiving a new rule to be inserted into the rule set and determining if a conflict is created by insertion of the new rule in the rule set.12-31-2009
20090327196Data Logging in Graph-Based Computations - At least one rule specification is received for a graph-based computation having data processing components connected by linking elements representing data flows. The rule specification defines rules that are each associated with one or more rule cases that specify criteria for determining one or more output values that depend on input data. A transform is generated for at least one data processing component in the graph-based computation based on the received rule specification, including providing an interface for configuring characteristics of a log associated with the generated transform. At least one data flow is transformed using the generated transform, including: tracing execution of the data processing components in the graph-based computation at run time, generating log information based on the traced execution according to the configured log characteristics, and storing or outputting the generated log information.12-31-2009
20090327194TRANSFORMING A LIST OF VALUES BASED ON A CONFIGURABLE RULE - A method and system for transforming a starting list into a selection list by employing a configurable rule. Parameters of an item being processed by an application are received. A starting list of elements is generated. Each starting list element specifies a corresponding function performed by the application. A rule set of a set of rule sets stored in a rule set table is identified. The rule set table associates the rule set with values that specify corresponding functions performed by the software application. The rule set is identified by a determination that the associated values comprise a maximal subset of the starting list elements. A rule stored in a rule database table is identified based on the rule set and the parameters. The rule is applied to generate a selection list comprising a proper subset of the starting list. The selection list is displayed on a display device.12-31-2009
20090327192AUTOMATIC CATEGORIZATION OF EMAIL IN A MAIL SYSTEM - A sender-driven framework for enhancing the categorization of emails, wherein the sender is able to create or define rules that refine or augment those at the receiver's end. Particularly, the sender is enabled, in accordance with at least one embodiment of the present invention, to add information relating to the context of an email, which can help streamline categorization at the receiver's end.12-31-2009
20090327193APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR FILTERING MEDIA FILES - An apparatus, method and computer program product are provided for filtering media files for inclusion in a user's profile. A user may define rules to prevent certain media files from being included in his/her profile and, if desired, to redirect the media files to another individual's profile. The recommendation service, itself, may further generate rules to be used to filter the media files. When a media file that meets one of the rules defined by the user, or automatically by the service, is consumed in association with the user's account, a reference associated with the media file may, depending upon the requirements of the rule, be placed into a temporary folder, from which the user may delete the reference or redirect it to his or her own, or another's, profile.12-31-2009
20100191692TARGETED CONTENT DELIVERY MECHANISM BASED ON NETWORK APPLICATION DATA - A system and method are provided for delivering targeted content to a subscriber coupled to a service provider network. Network application data generated by the subscriber is received and processed by a network application element deployed in the service provider network associated with a network identifier of the subscriber's computing device. The network application data is generated from user interaction with a server coupled to the service provider network or through a public communication network. The network application data is converted to web events associated with the network identifier. The web events are filtered to remove irrelevant data from received web events. A subscriber profile can then be generated base upon the filtered web events associated with the subscriber. Targeted content can then be delivered to the subscriber based upon the subscriber's profile.07-29-2010
20090222394ENHANCED CALL-BACK SERVICE - An enhanced call-back service, in which a local rule engine is caused to be capable of invoking a rule defined at an external rule engine, and a function provided by the local rule engine is exposed as a call-back service. At the call-back service and from the external rule engine, a request to interact with the function is received, and, using the call-back service, an interaction is provided between the external rule engine and the function.09-03-2009
20090187523Adaptive method and system with automatic scanner installation - A self-adaptive resource management method (07-23-2009
20120143810RULES ENGINE WITH DATABASE TRIGGERING - An automated facilities management system has the ability to predict occupant behavior by identifying recurring patterns in the way that people use buildings and comparing them with environmental characteristics. This technology is not limited to human behavior patterns, but extends to any mechanical systems or data points that tend to vary in recurring patterns. The data processing is carried out by rules engines triggered by relational database modifications.06-07-2012
20090319464Method For Message Suppression In Rule Based Expert System - One exemplary method for message suppression comprises: providing first and second rules, each having one or more preconditions and a conclusion, wherein the first rule also has a suppressed-by attribute and at least one of the second preconditions is suppressing; evaluating the one or more first and second preconditions; identifying the first rule as true or false; displaying the message of the second rule if all of the second preconditions are met; identifying the first rule as suppressed if the second rule is named in the suppressed-by attribute; and inhibiting the message display of the suppressed rule or routing the message to second display. The system can comprise: a database containing knowledge of the production unit; a user interface, and at least one precondition, a suppressed by attribute, and one or more rules each having a conclusion and at least one suppressing precondition; an inference engine; and a display.12-24-2009
20090319463Color Scheme and Style Controller System - A presenter and a style controller are provided that can be used to create a graphical user interface that have uniform characteristics throughout an application. The graphical user interface can be made from various controls that includes rules for various characteristics. The controls can include a button, a list, and text controls for the graphical interface that contain rules for various characteristics, such as font color, font size, foreground color and background color, and others. This way a graphical user interface can be worked on by any number of designers but still maintain uniform characteristics throughout the application.12-24-2009
20090319461DETERMINING SATISFIABILITY OF A FUNCTION WITH ARBITRARY DOMAIN CONSTRAINTS - A function can be represented as a canonical decision diagram structure. Each vertex of the diagram is associated with a respective function variable. The vertices include at least one vertex that represents a domain of more than two values for the variable associated with the vertex. The decision diagram is used to evaluate the function to determine whether the function is satisfiable or unsatisfiable for given values of the variables.12-24-2009
20090319460COMMUNICATION METHOD - Initially a method for communication between a management information system, in which a field content is stored, and an execution system are disclosed, wherein the field content in Job Definition Format is transmitted from the management information system to the execution system, then a method for communication between a source system, in which a field content is stored in a file in Job Definition Format, and an executing system, wherein the field content in Job Definition Format is transmitted by the source system to the execution system, and eventually a communication module, through which a field content in Job Definition Format can be transmitted to an execution system, wherein in order to simplify communications between management information systems or source systems and execution systems in job format, and to render them less error prone, the field content is initially adapted according to a rule specified for the management information system, or the source system, and the execution system is adapted to specified rules and subsequently transmitted to the execution system, or the field content is adapted according to such method before transmission.12-24-2009
20090150319Analytic Model and Systems for Business Activity Monitoring - Methods, systems, and computer program products for monitoring, aggregating, and correlating business events in real time and acting on the results with near zero latency, wherein each event is processed in the first order relative to the event density, are described herein. In an embodiment, the method operates by receiving historical values comprising keys and data fields at an analytic model. Rules associated with actions are applied to the historical values. Actions including updating data are executed pursuant to the rules, and then the method determines whether additional rules are to be applied; and performs actions associated with these additional rules until there are no remaining rules to apply. The method stores updated data in a database.06-11-2009
20090144217System and methods for managing rules - A method of automatically determining firing priority in a plurality of rules. The method includes the steps of determining a level of dependency of each rule; and generating a hierarchy of rules in response to the level of dependency of each rule, wherein the firing priority corresponds to the hierarchy of rules. In another embodiment, the method further includes the step of determining if the hierarchy results in an inconsistency. In another embodiment, the method further comprises the step of determining if the hierarchy results in a loop. In yet another embodiment, the step of determining a level of dependency of each rule is performed in response to an initial event.06-04-2009
20090112787Automated natural language formula translator and data evaluator - A method is provided wherein natural-language formulas are translated to obtain structured expressions or rules. When a query is received requiring analysis of data, the rules are evaluated to obtain a solution. The evaluation includes: obtaining the solution from a stack of existing solutions; searching a database of rule definitions if the solution is not available from the stack; calculating a solution using an explicit definition for each rule and the data, if the explicit definition is available for a given rule; calculating a solution using an implicit definition for each rule and the data, if the explicit definition is not available; and determining a best solution according to a predefined priority of data types. The solution is then supplied to an output format, such as a spreadsheet. The rules are received from a plurality of files, include descriptive variable names, and are applied to all cells in the spreadsheet.04-30-2009
20090112786METHOD AND SYSTEM FOR INFORMATION HANDLING SYSTEM DIAGNOSIS, RULES, AND ACTIONS - In an information handling system, IHS problem diagnosis and repair includes receiving configuration items of the IHS from a configuration management database, collecting a set of rules and corresponding actions relating to the configuration items of the IHS, the set of rules and corresponding actions collected from an expert system, collecting a prioritization of the set of rules and corresponding actions, filtering the set of rules and corresponding actions per the prioritization and for preferences, and sending the set of rules and corresponding actions to the IHS.04-30-2009
20110071972GROUP COMPOSITING ALGORITHMS FOR PRESENCE - Systems and methods presented herein construct groups and determine the presence for the groups. The groups can be constructed based on business logic. A set of components can model a group from the business logic, can establish a membership for the group, can determine one or more rules that govern presence determination for the membership, and can provide the group model, membership information, and the one or more rules to a rules engine. The rules engine can evaluate presence within the group model based on the membership and the one or more rules. The group presence can then be provided to one or more entities, applications, or workflows that subscribe to the rules engine for the group presence.03-24-2011
20120123989DASHBOARD EVALUATOR - A dashboard evaluator is disclosed. The dashboard evaluator evaluates a dashboard design for its effectiveness in providing the information. The dashboard evaluator determines a level of compliance with dashboard design principles. The design principles may be tailored to a specific purpose and/or user.05-17-2012
20110113000IMAGE SPRITE OPTIMIZATION SYSTEM AND METHOD - A method of determining whether a sprite will be generated determines a probability of a first page module being displayed on a web page together with a second page module, and if the probability exceeds a predetermined threshold, generates the sprite based on a first image within the first page module and a second image within the second page module, a rule indicating that the sprite contains the first image and the second image, and a style sheet code associated with the sprite.05-12-2011
20100306153RULE BASED MULTIMEDIA COMMUNICATION SYSTEM ON WEB PAGES - A computer implemented process to provide on-line customer service includes rendering a web site page to be browsed by a visitor; collecting information on visitor activities on the web site page; collecting browser parameters for the visitor; applying a rule set to the collected information and browser parameters to select a customer service agent to the visitor; and initiating multi-media communication request to link the visitor to the selected customer service agent based on the rule set while the visitor is browsing the web site page.12-02-2010
20100306154METHODS AND SYSTEMS FOR CREATING, ACCESSING, AND COMMUNICATING CONTENT - Methods and systems for creating, accessing, and communicating content are described. The systems comprise a single platform that allows multiple coordinated communication channels with a single user device (or user system) or multiple user devices (or user systems) at the same time. The platforms contains a browser for communicating with a communications network, multiple types of servers for handling different communications between the platform and a user device external to the platform, a database for storing content, a speech engine for converting text to speech, for converting speech to text, or both, and a configuration engine for configuring the applications that users will use during interaction with the platform. The platform can accordingly communicate with a user (or a user system) using any desired number (or combination) of communication channels. Other embodiments are described.12-02-2010
20100306152Method and Host Device for Enforcing a Rule Associated with a Media File - The embodiments described herein generally relate to a method and host device for enforcing a rule associated with a media file. In one embodiment, an observer module determines that a media player is attempting to play a media file. Before allowing the media player to play the media file, the observer module determines if the media file is associated with a rule that specifies an action to be taken if a playback event is detected. If it is determined that the media file is associated with a rule, the observer module observes playback of the media file to detect if the playback event specified in the rule occurred and takes the action specified in the rule if the playback event is detected.12-02-2010
20090037360Auto-Triggered Incremental Execution of Object Business Rules in Database Applications - A method for applying business rules to data stored in a table of a database. The method includes creating a plurality of maps wherein each map comprises a list of business rules that are triggered by a change of data stored in the table of the database. In one aspect, responsive to a given business rule being modified, an old version of the modified business rule is removed from the plurality of maps, and a new version of the modified business rule is re-registered within the plurality of maps, the new version of the modified rule is then automatically applied to data stored in the table of the database.02-05-2009
20090037361SYSTEM AND METHOD FOR GLOBAL LOAD BALANCING OF REQUESTS FOR CONTENT - The present invention is directed towards systems and methods for directing a user request for content over a network to a given content server on the basis of one or more rules. The method of the present invention comprises receiving a request for content form a user, the request for content including a profile of the user identifying one or more characteristics associated with the user. One or more rules are retrieved for identifying a content server to which a request for content is to be delivered, the one or more rules including at least one of business rules, network rules, and user profile rules. The one or more retrieved rules are applied to the request for content to identify a content server to which the request for content is to be delivered and the request for content is delivered to the identified content server.02-05-2009
20090037359METHOD AND SYSTEM FOR ENFORCING RULE SELECTION ON USER INBOXES - A method and system for enforcing rule selection on user email inboxes include an inbox monitor and administrative rules at an email server. The inbox monitor includes a first agent for identifying inactive user inboxes from email messages stored at the email database, and a second agent for identifying, from the inactive user inboxes identified by the first agent, user inboxes without appropriate user rules activated. For each user inbox identified by the second agent, administrative rules are applied to the user inbox if the user inbox has been inactive for at least a predetermined period of time. If the user inbox has not been inactive for at least the predetermined period of time, a notification message is sent to a user associated with the user inbox. The notification message informs the user that administrative rules will be applied to the user inbox if appropriate user rules are not activated.02-05-2009
20130138596METHOD AND APPARATUS FOR AUTHORING TASK - An apparatus for authoring a task includes a scenario extracted information input unit configured to receive data, an event, and behavior information that are extracted from a task scenario; and a partial behavior information generator configured to extract and write partial behavior rules/sequences based on the received data, event, and behavior information. Further, the apparatus includes an overall behavior information generator configured to set relationship between the written partial behavior rules/sequences and integrate the partial behavior rules/sequences according to the set relationship to write overall behavior rules/sequences; and a task conversion unit configured to convert the written overall behavior rules/sequences into a task which a robot and/or an intelligent agent may execute.05-30-2013
20110119220RULE-BASED VALIDATION OF WEBSITES - An automated website analysis system includes mechanisms for automatically auditing a website to validate that the scanned web page information conforms to validation rules. In one implementation, an auditing system requests web pages of an identified website pursuant to validating at least a portion of each requested web page. Embodiments include scanning page code of at least one of the web pages to identify scanned web page information, including a page tag. The scanned web page information is validated to determine whether is conforms to at least one validation rule by validating variables of the page tag against validation rules, including a vendor validation rule. Results of the validation are reported.05-19-2011
20100325079METHOD AND APPARATUS FOR EMPLOYING RULES TO FILTER STREAMING DATA - Content filtering of data containers is based on defining content types, receiving identifiers of a set of rules applicable to each content type, and determining dependence of at least one rule on other rules. The identifiers are sorted into rule strata where rules within each rule stratum are independent of each other and rules within each rule stratum beyond a first stratum depend on at least one rule of at least one preceding rule stratum. Upon receiving a data container of multiple components from a network, a content type is determined for each component. Rules of rule strata specific to a content type of a component are applied starting with rules of a first rule stratum and proceeding sequentially to selected rules of succeeding rule strata. An apparatus for content filtering stores processor-executable instructions for arranging rules in rule strata and sequentially applies successive rules to data containers.12-23-2010
20100325078DEVICE AND METHOD FOR RECOGNIZING EMOTION AND INTENTION OF A USER - A user intention recognition device and method are provided. The user intention recognition device may be used by a person who is not able to appropriately express their emotion and intention, such as a disabled person, a patient, and the like. The user intention recognition device may determine an emotion of the user based on the communication information of the user, and also, may determine an intention of the user based on the emotion and biometric information of the user. The user intention recognizing device may provide an appropriate output corresponding to the determined intention of the user.12-23-2010
20100325077COMPUTER, OPERATION RULE APPLICATION METHOD AND OPERATING SYSTEM - Provided is an operating system enabling, in an application formed of a plurality of programs including a library program, a rule to be applied that enables determination whether to allow processing of a system call called by the application.12-23-2010
20100325076System and Method for Interactive Knowledge Visualization - In accordance with the teachings of the present invention, a system and method for interactive knowledge visualization are provided. In a particular embodiment, a method for interactive knowledge visualization includes receiving, at a knowledge visualization server, a request for one or more visualizations; retrieving data associated with the one or more visualizations from one or more databases; converting the data associated with the one or more visualizations into visualization data, wherein the visualization data is operable to be converted by a client into the one or more visualizations; transmitting, to a first client and a second client, the visualization data; receiving, at the knowledge visualization server, a modification request from the first client, the modification request indicating a desired modification to at least one of the one or more visualizations; modifying, in response to the modification request, the visualization data associated with the one or more visualizations; and transmitting, to the first client and second client, the modified visualization data.12-23-2010
20110016074METHOD AND SYSTEM FOR ENCAPSULATION AND RE-USE OF MODELS - A method and system are provided for encapsulation and re-use of a model. A modeling platform creates a governance contract governing the exportation and modification of elements of the model by other models. In response to a request to import at least one element of the model into a second model, the modeling platform exports the requested at least one element by reference only if the element has a governance setting that allows for exportation. In response to a request to modify at least one imported element of the model in the second model, the modeling platform determines the governance setting for the element. Then, the modeling platform modifies the element by composing the modification in the second model only if the element has a governance setting that allows modification.01-20-2011
20110010325APPLICATION OF NORMATIVE RULES IN A VIRTUAL UNIVERSE - The present invention teaches methods for applying an avatar behavior rule within a virtual universe environment. An avatar behavior rule and a violation threshold for the rule are defined for a virtual universe environment. The behavior of a collective plurality of avatars within the virtual universe is monitored for compliance with the rule, including determining an amount of compliance with the rule and comparing the compliance amount with the violation threshold. If the compliance amount exceeds the violation threshold, then the rule or the violation threshold is revised until the monitored behavior of the collective plurality of avatars within the virtual universe is in compliance with the rule, and in effect does not exceed the violation threshold. Service methods, articles of manufacture comprising a computer readable program, systems, articles and programmable devices for performing one or more method and/or process elements of the current invention are also provided.01-13-2011
20110022559BROWSER PREVIEW - In general, embodiments of the invention relate to systems, methods, and computer program products for previewing, in a safe environment, a given web page that is or may be conducting dangerous or fraudulent activity, including malware distribution and phishing activity. More particularly, embodiments of the invention relate to previewing a given web page in a safe environment by obtaining and breaking down the source code behind the given web page and constructing a preview of the web page without any potentially harmful images, scripts, executables, and/or the like.01-27-2011
20110029473MATCH ENGINE FOR DETECTION OF MULTI-PATTERN RULES - Methods, systems and computer program products are disclosed for detecting patterns in a data stream that match multi-pattern rules. One embodiment of the invention provides a method of recognizing a specified group of patterns in a data stream. The method comprises identifying a rule for said specified group of patterns in the data stream, and using a first array of finite state machines to scan the data stream for at least some of the patterns in the specified group. For patterns in the specified group that are found in the data stream by the first array of finite state machines, pattern identifiers are sent to a second array of finite state machines. The second array of finite state machines determines if the specified group of patterns is in the data stream in accordance with the identified rule by, at least in part, using said pattern identifiers.02-03-2011
20110029472Method and Apparatus for Run-Time User Control of System-Generated Content - Methods and apparatus are provided for run-time user control of system-generated content. A user is presented with the system-generated content and can configure one or more rules at run-time. The rules identify one or more automated actions to perform upon the system-generated content when one or more conditions are satisfied. The automated actions are executed upon the system-generated content when the one or more conditions are satisfied. The exemplary automated actions may comprise transform, retrieve, update and alert. The conditions can specify, for example, when to perform the automated actions. Active tags may optionally be attached to or embedded directly in the system-generated content or in a document containing the system-generated content. Tools are optionally provided to allow a user to manage active tags.02-03-2011
20110035348SYSTEM FOR AUTOMATED INTEGRATION OF EVENTS - A system for automated integration of events, configured for use in a building with a network system, includes a plurality of surveillance systems, a processing center connected to the surveillance systems through the network system and a user device connected to the processing center through the network system. The surveillance systems are adapted to monitor various kinds of irregular events occurring in the building and the surroundings thereof and output corresponding event messages through the network system. The processing center receives the event messages in a preset receiving mode and further classifies and analyzes the event messages. The user device allows users to input filtering conditions and enables the processing center to integrate the classified and analyzed event messages according to the input filtering conditions so as to generate composite filtered messages to be displayed on the user device, thereby achieving efficient acquisition and integration of the event messages.02-10-2011
20100153326RULES BASED FETCHING OF OPERATING PLATFORM STATUS - Embodiments of the present invention provide a method, system and computer program product for rules based fetching of operating platform state. In an embodiment of the invention, a method for rules based fetching of operating platform state can be provided. The method can include loading a rule specifying a rule handler programmed to fetch state information for a designated operating platform and parsing the rule to identify the rule handler and a corresponding code interpreter for the rule requisite to interpreting the rule handler to fetch the state information. The method further can include directing an interpretation of the rule handler by the identified code interpreter for the rule to fetch the state information. Finally, the method can include encapsulating the state information once fetched in an information object.06-17-2010
20090313197APPLICATION CUSTOMIZABLE TO ENABLE ADMINISTRATORS OF LOYALTY PROGRAMS TO CONTROL COMMUNICATIONS TO MEMBERS - Application customizable to enable administrators of various reward/loyalty programs to control communications to members. In one embodiment, an administrator is enabled to configure various rules corresponding to an event with the application of the rules to a member information identifying which ones of multiple contents is to be sent to which of the members using which one of different channels. The rules are then stored in a non-volatile memory. On identifying the occurrence of the event, the rules, and the member information are examined to determine that a first and a second content are to be sent respectively to a first and a second member using a first and second channel. Accordingly, the first content is sent to the first member using the first channel and the second content is sent to the second member using the second channel.12-17-2009
20090313201METHOD AND SYSTEM FOR CAPTURING BUSINESS RULES FOR AUTOMATED DECISION PROCESSION - A rule packaging system and method to define and/or package parameters, attributes, enumerations of a prime rule in a reduced canonical form suitable for propositional logic manipulation using, for example, zero-suppressed binary decision diagrams. The reduced form of the prime rule is subsequently used by applying a series of user inputs to determine a result that preferably includes conflict and selection advice to guide the user to satisfaction. Elective events, such as but not limited to the display of messages or the performance of calculations, may optionally be packaged along with the prime rule or components thereof, and presented during execution to help guide an end user to satisfaction or compliancy when choosing among possible configuration parameters. The apparatus automates determination of a complex rule having a combinatorial exploded number of rule components, or a combinatorial number of possible outcomes, exceeding computational capacity of present day computing systems.12-17-2009
20090099994Enhanced Rule Engine - An enhanced rule engine, in which a rule-evaluated result that is received from an external rule engine based on a context transmitted to the external rule engine for evaluation by the rule and on a schema document serializing an automatically generated vocabulary transmitted to the external rule engine is output. The schema document defines the business rule based on a context description and a result description included in the vocabulary, and the context and the result are respectively specified according to the context description and the result description.04-16-2009
20090099993METHOD AND APPARATUS FOR IDENTIFYING AND EXTRACTING MEANING IN DOCUMENTS - Systems and methods are provided for an expert search engine. In one embodiment, a method may employ a computer based system to define a meaning taxonomy including one or more meaning loaded entities, associate documents to the meaning taxonomy based on a set of expert rules and the syntactic structures included in the documents and provide the results to a user. In another embodiment, a system includes interfaces for meaning taxonomy, expert rule and search criteria information. The information provided by these interfaces is then used to determine how a set of documents maps to meaning taxonomy to assist the user in locating documents that are most interesting from a meaning perspective and to provide a user with an interface to navigate the meaning taxonomy as it applies to the set of documents.04-16-2009
20110078105Method for personalizing chat bots - A system and method for automatically building chat bot content from scripts of conversations. A script is parsed into query-response pairs, so that a computerized device may be programmed to give the same responses when given similar queries. Each query is converted into canonical form and then matched against patterns, as in prior art chat bots. The response is then linked to the matched pattern. A new chat bot is constructed out of the canonical form conversions and the set of pattern-response links. The chat bot is further improved by adding interactive human conversations, provided that those conversations are rated highly. The resulting chat bot can run on a computer server that responds to public queries, and the server can also display context-sensitive advertisements.03-31-2011
20110093424Heat Flow Model for Building Fault Detection and Diagnosis - Systems and methods are described that provide a Heat Flow Model (HFM) graph modeling methodology. Embodiments automatically translate formal HVAC system descriptions from a Building Information Model (BIM) into HFM graphs, and compile the graphs into executable FDD systems. During an engineering phase, a user interface is used to enter parameters, conditions, and switches not found in the BIM. During a runtime phase, real-time data from an HVAC control system is input to the generated FDD system (HFM graph) for fault detection and diagnosis.04-21-2011
20100017354INTERPRETING A PLURALITY OF M-DIMENSIONAL ATTRIBUTE VECTORS ASSIGNED TO A PLURALITY OF LOCATIONS IN AN N-DIMENSIONAL INTERPRETATION SPACE - A method for interpreting a plurality of m-dimensional attribute vectors (m01-21-2010
20090240644DATA PROCESSING METHOD FOR CONTROLLING A NETWORK - The present invention relates to identifying patterns of change in system operating parameters which may be used to identify unexpected operational conditions and to trigger an appropriate alert or action. The present invention provides a method (09-24-2009
20090048999APPLICATION PROCESSING AND DECISION SYSTEMS AND PROCESSES - The present invention relates to application processing and decisioning systems and processes. One embodiment of the invention includes a method for automating decisioning for a credit request associated with an applicant. The method includes providing a user computer interface adapted to receive information associated with an applicant, and further adapted to display and receive information associated with at least one decision rule. The method also includes receiving information associated with an applicant through the user computer interface; receiving information associated with the applicant from at least one data source; and receiving a selection of information associated with a plurality of decision rules through the user computer interface. Furthermore, the method includes receiving a selection of rule flow information associated with the plurality of decision rules through the user computer interface; generating a plurality of decision rules based at least in part on the information associated with the applicant, based at least in part on the information associated with the applicant from at least one data source, and based at least in part on the selection of information associated with a plurality of decision rules, wherein an outcome associated with the at least one decision rule can be obtained; and based in part on at least the rule flow information, displaying at least a portion of the plurality of decision rules through the user computer interface.02-19-2009
20090313198Methods and systems for performing root cause analysis - A root cause analysis engine uses event durations and gradual deletion of events to improve analysis accuracy and reduce the number of required calculations. Matching ratios of relevant rules are recalculated every time notification of an event is received. The calculation results are held in a rule memory in the analysis engine. Each event has a valid duration, and when the duration has expired, that event is deleted from the rule memory. Events held in the rule memory can be deleted without affecting other events held in the rule memory. The analysis engine can then re-calculate the matching ratio of each rule by only performing the re-calculation with respect to affected rules related to the deleted event. The calculation cost can be reduced because analysis engine processes events incrementally or decrementally. Analysis engine can determine the most possible conclusion even if one or more condition elements were not true.12-17-2009
20120246105SYSTEMS AND METHODS FOR USER CUSTOMIZATION OF CLINICAL DATA OBJECTS USING A CLINICAL MODELING LANGUAGE - Certain examples provide systems, methods, and apparatus to model clinical data objects in a content-based clinical system. An example system includes a processor and a memory to implement a constraint definition language processor to define a detailed clinical model to express a clinical concept as a standardized and reusable set of clinical knowledge. The constraint definition language processor is to use a compiled, context-free constraint definition language to define the detailed clinical model as a compiled object. The constraint definition language processor is to provide the compiled object as content for at least one of a clinical content database and a clinical information system. Content represents one or more parameters to instruct a clinical application.09-27-2012
20090216701Propagation of don't cares for efficient theory combination - Relevancy propagation for efficient theory combination is described. In one implementation, an efficient SMT solver dynamically applies relevancy propagation to limit propagation of unnecessary constraints in a DPLL-based solver. This provides a drastic increase in speed and performance over conventional DPLL-based solvers. The relevancy propagation is guided by relevancy rules, which in one implementation emulate Tableau rules for limiting constraint propagation, while maintaining the performance of efficient DPLL-based solvers. An exemplary solver propagates truth assignments to constraints of a formula, and tracks which truth assignments are relevant for determining satisfiability of the formula. The solver propagates truth assignments that were marked relevant to a theory solver, while avoiding propagation of irrelevant truth assignments. The efficient SMT solver provides a drastic reduction in search space covered during quantifier instantiation and offers profound acceleration during bit-vectors reasoning.08-27-2009
20100070448SYSTEM AND METHOD FOR KNOWLEDGE RETRIEVAL, MANAGEMENT, DELIVERY AND PRESENTATION - The present invention is directed to an integrated implementation framework and resulting medium for knowledge retrieval, management, delivery and presentation. The system includes a first server component that is responsible for adding and maintaining domain-specific semantic information and a second server component that hosts semantic and other knowledge for use by the first server component that work together to provide context and time-sensitive semantic information retrieval services to clients operating a presentation platform via a communication medium. Within the system, all objects or events in a given hierarchy are active Agents semantically related to each other and representing queries (comprised of underlying action code) that return data objects for presentation to the client according to a predetermined and customizable theme or “Skin.” This system provides various means for the client to customize and “blend” Agents and the underlying related queries to optimize the presentation of the resulting information. The present invention is directed to a framework or medium for knowledge retrieval, management, delivery and/or presentation. The system maintains semantic information and other knowledge to provide retrieval services to clients via a communication medium. Within the system, objects or events in a hierarchy are semantically related to each other, and agents implementing queries return data objects for presentation to the client according to a semantically influenced or determined theme. This system provides various means for the client to customize agents and/or the underlying related queries to optimize the presentation of the resulting information.03-18-2010
20100063951COMMUNICATION MANAGEMENT SYSTEM AND COMMUNICATION MANAGEMENT METHOD - In a communication management system, a communication control apparatus includes: a first communication control unit which acquires communication data from an upstream network and provides the communication data to a search circuit; a rule database which stores a rule for extracting specific communication data among communication data; a search circuit which acquires communication data and searches the rule database to check if the communication data complies with a rule stored in the database; a process execution circuit functioning as an output unit which, when there is detected communication data complying with a rule stored in the rule database, replicates the communication data and outputs the replica; and a second communication control unit which transmits communication data to a downstream network.03-11-2010
20110082826Satisfiability Techniques for Detecting Missing Cases in Incomplete Business Rule Projects - A method, computer program product, and system for detecting a missing case of a fixed scope among a plurality of business rules of unrestricted forms are disclosed. According to one or more embodiments, the described detecting includes building a rules inhibition graph for the plurality of business rules representing a constraint model comprising a plurality of nodes and describing a plurality of cases which make the plurality of business rules non-applicable; labeling the rules inhibition graph with values satisfying constraints of the constraint model by search and inference, and determining a missing case when a consistent labeling satisfying the constraints of the constraint model is obtained. Using one or more of the described embodiments missing cases which may result from unforeseen interactions of overlapping tests over an a priori unknown number of attributes among arbitrary business rules may be detected.04-07-2011
20110082827Operation and Method for Prediction and Management of the Validity of Subject Reported Data - A system for developing and implementing empirically derived algorithms to generate decision rules to predict invalidity of subject reported data and fraud with research protocols in surveys allows for the identification of complex patterns of variables that detect or predict subject invalidity of subject reported data and fraud with the research protocol in the survey. The present invention may also be used to monitor invalidity of subject reported data within a research protocol to determine preferred actions to be performed. Optionally, the invention may provide a spectrum of invalidity, from minor invalidity needing only corrective feedback, to significant invalidity requiring subject removal from the survey. The algorithms and decision rules can also be domain-specific, such as detecting invalidity or fraud among subjects in a workplace satisfaction survey, or demographically specific, such as taking into account gender or age. The algorithms and decision rules may be optimized for the specific sample of subjects being studied.04-07-2011
20110099139Standard Based Mapping of Industry Vertical Model to Legacy Environments - A standard based mapping of industry vertical models to legacy environments to suggest points of enterprise application integration. A representation of a first domain comprising industry model instance data is generated in a standard-based format from an enterprise industry model. A representation in the standard-based format of a second domain comprising legacy data is generated from the legacy environment. A set of inference rules is applied against the representation of enterprise industry model instance data and the representation of legacy data. One or more candidate legacy assets in the representation of legacy data capable of implementing an aspect of the enterprise industry model are identified. The identified one or candidate legacy assets for implementing the aspect of the enterprise industry model are then recommended to a user.04-28-2011
20110078104METHOD AND APPARATUS OF CONSTRAINT VERIFICATION IN DISTRIBUTED INFORMATION SPACES - An approach is provided for verification of information consistency in distributed information spaces using binary decision diagrams. A binary decision diagram construction platform constructs an augmented binary decision diagram for the information based on the logical rules defined in an ontology and transmit the diagram to the server managing information sharing. The server uses the type constraints and the cardinality constrains encoded in the diagram to verify consistency of information in information spaces. Therefore, even if the managing server has no access to the ontology, information consistency constraints can be transmitted to the server over the communication network in the form of binary decision diagrams and the information consistency can be verified locally without having to transmit the whole information space over the network to be verified in a remote location.03-31-2011
20110153538Rule-based Processing in Different Layers - In an embodiment, a method is provided for processing rules within a layer of an application. In this method, a rule defining a condition and a functionality associated with the condition is received at runtime of the layer. This functionality is provided by the layer. Using a microprocessor, a fulfillment of the condition is identified and the functionality is executed based on this identification.06-23-2011
20110153536Computer-Implemented Systems And Methods For Dynamic Model Switching Simulation Of Risk Factors - Computer-implemented systems and methods are provided for implementing a dynamic model switching simulator that generates a plurality of simulations. A system and method generates a simulation comprising predictions over a plurality of time periods. Generating a simulation includes generating a first time period prediction using a first model of a first model type. Generating the plurality of subsequent time period predictions includes evaluating the model switching rule to identify whether to switch models for a subsequent time period prediction, generating the subsequent time period prediction using the first model if a switch of models is not identified, and generating the subsequent time period prediction using a second model of a second model type otherwise.06-23-2011
20110071975Deriving a Hierarchical Event Based Database Having Action Triggers Based on Inferred Probabilities - Inferring a probability of a first inference absent from a database at which a query regarding the inference is received. The query is used as a frame of reference for the search. The database returns a probability of the correctness of the first inference based on the query and on the data. An action trigger is executed responsive to at least one of a) the probability of the first inference exceeding a first pre-selected value, b) a significance of the inference exceeding a second pre-selected value, c) a rate of change in the probability of the first inference exceeding a third pre-selected value, d) an amount of change in the probability of the first inference exceeding a fourth pre-selected value, and e) combinations thereof. At least one of the probability of the first inference and the action trigger is stored in the database.03-24-2011
20110071974PROPERTY EXTRACTION APPARATUS AND METHOD - According to one embodiment, a property extraction apparatus includes a state transition machine conversion unit, storage unit, state transition machine contraction unit, and property conversion unit. The state transition machine conversion unit converts an input property into a state transition machine configured by a plurality of transition functions expressed using a plurality of transition labels. The storage unit stores contraction rules that allow to remove a non-input transition. The state transition machine contraction unit contracts the state transition machine by converting a transition label corresponding to a signal to be ignored into a non-input transition in the state transition machine in accordance with contraction instruction information which represents the signal to be ignored, and rewriting the transition functions by applying the contraction rules that allow to remove the non-input transition. The property conversion unit which converts the state transition machine after the contraction processing into an output property.03-24-2011
20110071973Content summarizing and search method and system - The present invention relates to a system and method for information process using artificially constructed apparatus. In one preferred embodiment of the present invention, if the task for the system of the present invention is to summarize document content, the thinking mode will first analyze the identification information of the element files for words (or phrases) in the document to identify key words (or phrases), then the key words (or phrases) will be analyzed to establish links between key words (phrases). By the frequency of appearances of the key words (or phrases), in combination of the appearances of other key words (or phrases) that are related to the key words, the most important key word (or phrase) or key words (or phrases) can be obtained. Thus the document can be summarized by the most important key word (or phrase) or key words (or phrases) as the topic (or topics) of the document.03-24-2011
20120136822KEY PERFORMANCE INDICATOR FEEDBACK IN RULE-BASED SYSTEM - Fitness of rules in a rule-based system is evaluated in an interactive rule, data, and modeling environment that allows a user to receive immediate feedback on fitness of the overall rule set, as well as the fitness of individual rules, and to see how modifications being made by the user with a rule authoring interface are impacting that fitness. This feedback may be used to improve the set of rules with which the rule-based system operates. Simulations on the rule set run in the background, using a representative input data set to exercise the rule set, and fitness is calculated using a fitness function or predictive model. One or more charts showing resulting indicators are preferably displayed within the rule authoring environment, giving the user immediate feedback on the likely impact of the changes he or she is making.05-31-2012
20120136821USING LEFT AND RIGHT UNLINKING SIMULTANEOUSLY - Some embodiments of using left and right unlinking simultaneously by an exemplary rule engine have been presented. A rule engine can create a network having a number of nodes to evaluate a set of rules in a knowledge base. The rule engine may initialize a session to be processed using the network to allow each of the nodes to be logically left unlinked and logically right unlinked at the same time during the session.05-31-2012
20120136820METHOD TO REDUCE CHURN FROM EXCESSIVE UNLINKING - Some embodiments of a method to reduce churn caused by excessive linking and unlinking have been presented. A rule engine can create a network having a number of nodes to evaluate a set of rules in a knowledge base. The rule engine may unlink a node in the network in response to an input of the node becoming empty in a session. The rule engine may then wait a predetermined period of time before allowing the node to be unlinked again during the session.05-31-2012
20110060713METHOD AND SYSTEM FOR MANAGEMENT OF SECURITY RULE SET - There are provided a method of automated managing two or more security rule-sets and a system thereof. The method comprises: obtaining data characterizing a first rule-set and a second rule-set; automated recognizing all possible combinations of values in the first and the second rule-sets; automated verifying each combination of values in the second rule-set against the first rule-set; calculating one or more values characterizing the differences in allowable and rejectable traffic in the first rule-set and the second rule-set; automated comparing the calculated values and/or derivatives thereof with a predefined threshold; and automated classifying the relationship between the first rule-set and the second rule-set in accordance with comparison results. The method may further comprise obtaining a connectivity request; automated verifying each combination of values in the connectivity request against the first rule-set and the second rule-set; and automated classifying the second rule-set with regard to the connectivity request, wherein the second rule-set comprises extra allowable traffic resulting from amending the first rule set.03-10-2011
20110060712METHOD AND SYSTEM FOR DESIGN CHECK KNOWLEDGE CONSTRUCTION - Disclosed is a design check knowledge construction system that adequately improves the quality of check knowledge and fully enhances the quality of a product, which is a final target to be checked. The system includes a check target knowledge definition section and a word association section. The check target knowledge definition section generates check target knowledge definition data, which is obtained by defining check target knowledge (check knowledge) that serves as a target field to be checked, in accordance with the relationship between a word group and words in the word group and with reference to technological ontology concerning technological basic intelligence input from a user input/output section. The word association section extracts a word group from a document data group associated with the word group in the check target knowledge definition data and associates words in the word group with each other in accordance with the document data group including a plurality of document data based on knowledge content concerning technological history information stored in a document data database.03-10-2011
20100306155SYSTEM AND METHOD FOR VALIDATING SIGNATORY INFORMATION AND ASSIGNING CONFIDENCE RATING - A data analysis system includes a database including a plurality of official records, a user interface for receiving a signatory information, a processor in communication with the database and the user interface, wherein the processor compares the signatory information and a number of the official records based upon an instruction set and assigns a confidence factor to the signatory information in response to the comparison of the signatory information and the number of the official records.12-02-2010
20120150787Addition of Plan-Generation Models and Expertise by Crowd Contributorst - The subject disclosure is directed towards a web service that maintains a set of models used to generate plans, such as vacation plans, in which the set of models includes models that are authored by crowd contributors via the service. The models include rules, constraints and/or equations, and may be text based and declarative such that any author can edit an existing model or combination of existing models into a new model. Users can access the models to generate a plan according to user parameters, view a presentation of that plan, and interact to provide new parameters to the model and/or with objects in the plan to modify the plan and view a presentation of the modified plan.06-14-2012
20110153537Methods, Systems, and Products for Estimating Answers to Questions - Methods, systems, and products answer questions using heuristics. A question and an input are received. A set of heuristic rules is retrieved, and the question is answered by evaluating an accuracy of each heuristic rule. Multiple accuracies from the set of heuristic rules are combined to produce a confidence level for the answer to the question.06-23-2011
20090006300System for Detecting and Evaluating Operation-Dependent Processes and/or Components in Automated Production and Test Sequences01-01-2009
20100100521DIAGNOSTIC SYSTEM - The present invention provides a diagnostic system that diagnoses a diagnostic object by applying a diagnostic rule to data measured on the diagnostic object wherein an object of the present invention is to allow the diagnostic rule to be updated based on a variety of diagnostic' case data. Each of multiple diagnostic devices 04-22-2010
20120203728SYSTEM AND METHOD FOR MANAGING MOBILE WORKERS - A system manages mobile workers and includes a plurality of clients and a server. A database includes a plurality of target objects that are classified corresponding to facilities assets to be worked on by a mobile worker and attributes of each target object, including any tasks to be performed on target objects. A rule engine determines algorithms based on a utility function for partitioned jobs wherein different algorithms are selected and used for different partitions to schedule jobs and mobile workers in selected different regions. An algorithm is selected based on a weighted sum that is calculated from a possible number of work schedules, jobs and mobile workers for each partition. A selected policy for a job environment determines how mobile workers, jobs and work schedules are partitioned. A plurality of system agents automate supervision.08-09-2012
20120203727METHOD AND APPARATUS FOR INFORMATION SURVEYING - An information resource manager initilizes a set of one or more predicates, where each predicate represents at least one of a property, attribute, trait, characteristic, function, relation, relationship, measurement, constraint, semantic property, action, coding sequence, objective, goal, and criteria. One or more facts are identified that satisfy each of the predicates, where at least one entity of the facts satisfies all predicates in the set of predicates. The one or more facts are grouped by a point of evidence to generate one or more groups of facts. The one or more groups of facts are sorted based on a number of predicates that have been satisfied. One or more duplicate groups of facts are rejected from the one or more groups of facts. One of group containment and group domination of the one or more groups of facts is designated as a partial order of the predicate lattice.08-09-2012
20090276386Control of Real Time Services - A real time monitoring and control system (11-05-2009
20080243748Rule set partitioning based packet classification method for Internet - The present invention provides a rule set partitioning based packet classification method for Internet. The method comprising: performing Horizontal Cut for the rule set, determining the field for partitioning a rule layer based on a target algorithm and selecting the partition manner of the Horizontal Cut, performing Horizontal Cut according to the selected partition manner of the Horizontal Cut, thereby obtaining more than one rule layers, each rule layer being a Horizontal subset, combining the rule layers to obtain a plurality of Horizontal subsets according to the total number of the pre-designated Horizontal subsets and a predefined principle, wherein the total number of said combined plurality of Horizontal subsets equals to the total number of said pre-designated Horizontal subsets; performing Vertical Cut in each of the Horizontal subsets; then forming a Hash table that can index the Vertical subsets, so that it can be used in a lookup; and realizing rule storage in each Vertical subset respectively according to the target algorithm.10-02-2008
20090012926QUESTION ANSWERING DEVICE, QUESTION ANSWERING METHOD, AND QUESTION ANSWERING PROGRAM - A question-answering device, a question-answering method, and a question-answering program that can obtain an answer to an inputted query with high probability are described. A score calculation element 01-08-2009
20090125471Event detection and method and system - An event detection method is disclosed. At least one most adaptable life cycle model is generated according to at least one historical event data, at least one nutrition growing function, and at least one firing point rule. Event data is received and a strength value thereof is calculated according to a life cycle model corresponding to the event data. It is determined whether an event firing point is achieved according to the strength value variation. If the event firing point is achieved, an event corresponding to the event data is sent. The event detection method enhances the ability of event tracking and development so event firing is more accurate to fit real event occurring situations, realize event evolution, and filter false alarms.05-14-2009
20080222071System and method for automatic distribution and storage of digital media - In general, aspects of the invention relate to the automatic distribution and storage of digital media. Specifically, the invention relates to the automatic distribution and storage of digital media in the home environment. In one embodiment, a system and method are provided for retrieving data objects from sources like digital media input devices and sending those objects to destination digital media input devices.09-11-2008
20080222070ENHANCED RULE EXECUTION IN EXPERT SYSTEMS - A method for detection is presented. The method includes extracting data based upon one or more predefined rules. Further, the method includes preprocessing the extracted data based on the predefined rules to generate one or more rule groups. The method also includes instantiating one or more inference engines based on the generated rule groups. Additionally, the method includes processing the extracted data by a corresponding inference engine based on the predefined rules to generate processed data. Systems and computer-readable medium that afford functionality of the type defined by this method is also contemplated in conjunction with the present technique.09-11-2008
20080256012DYNAMICALLY GENERATING AND DELIVERING INFORMATION IN RESPONSE TO THE OCCURRENCE OF AN EVENT - A facility for generating information in response to the occurrence of events is described. The facility detects the occurrence of one of a plurality of defined events. The facility matches the detected event occurrence against a set of scenarios. Each scenario specifies one or more matching rules, content, and a set of recipients. The facility aggregates the content specified by the subset of the set of scenarios whose matching rules are satisfied by the event occurrence for the recipients specified by this subset of scenarios.10-16-2008
20110055139PERFORMANCE EVALUATING APPARATUS, PERFORMANCE EVALUATING METHOD, AND PROGRAM - A performance evaluating apparatus for a rule is provided, which is capable of evaluating a business value of a rule applied to the operation and management of an information system through autonomous control. The performance evaluating apparatus for a rule collects, respectively before activation processing that is prescribed by a rule and after completion of the execution of the processing, a rule execution history and a system state information indicating a state of a monitored information system that is necessary for calculation of the business value. The business value is calculated from the collected system state information and rule execution history by a given calculation formula.03-03-2011
20110055137EFFICIENT BINARY PROTOCOL MARSHALLING FOR RULE ENGINE SESSIONS - Some embodiments of efficient binary protocol marshalling for rule engine sessions have been presented. In one embodiment, a set of marshalling plug-ins is provided to a rule engine. Each of the set of marshalling plug-ins is customized for a type of user objects. In response to encountering a user object, the rule engine selects a marshalling plug-in out of the set of marshalling plug-ins based on a type of the user object to marshall in or to marshall out the user object.03-03-2011
20110055136Relocation Between Virtual Environments Based Upon Promotional and Alert Conditions - Awards of value are awarded to residents of a virtual universe for consenting to be teleported in response to invitations for teleportation. The consent can he made conditional upon any of a variety of circumstances which can be specified by a resident of the virtual universe for a corresponding avatar and which form rules for auto-teleportation. These conditions can be stored and searched and avatar and location status monitored and compared to the conditions to control issuance of invitations to increase the likelihood that an invitation will be automatically accepted. A delay before acceptance is also preferably provided to provide for graceful conclusion or termination of current avatar activity.03-03-2011
20110055135Deferred Teleportation or Relocation in Virtual Worlds - A user of a virtual universe system is provided with the option of deferring a response to an invitation for an avatar to be relocated (including relocation by performing a (exportation operation) by providing for selective storage of received invitations in a queue with a priority determined based on one or more rules which can preferably be developed by conversion from an invitation. Status of issuers of invitations can be monitored or the issuers polled and the current status can be displayed to a user to determine actions to be taken in manipulating priority in the queue. The user is also provided with the capability of editing priority of stored invitations including the ability to accept, reject or forward the invitation or convert the invitation to a landmark. Invitations having similarities may be grouped in accordance with any desired metadata contained in the invitation. Rules can also be set from the virtual universe system independently of a user in regard to priority and thus provides a new form of advertising.03-03-2011
20110022560SEMANTIC WEB TECHNOLOGIES IN SYSTEM AUTOMATION - A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.01-27-2011
20110119219METHOD AND APPARATUS FOR ANALYZING SYSTEM EVENTS - An apparatus and an associated method facilitate analysis of events associated with a network system. Event occurrence items are compared with event rules of an event rule set to determine whether the items are potentially significant. If considered to be potentially significant, a scorer assigns a score to the event occurrence item to provide a relative indication of the potential significance of the event occurrence item.05-19-2011
20110125697SOCIAL MEDIA CONTACT CENTER DIALOG SYSTEM - A communication system for conducting an interaction with customers using social media is provided. The communication system can include a social media gateway and a dialog system. The social media gateway can receive messages from social media networks and translate those messages into a form readable and usable by the dialog system. The dialog system, in turn, accepts the social media messages and associates those messages with one or more dialog structures. A dialog structure includes a set of executable rules that allow the dialog system to automatically respond to the social media message or refer that message to an appropriate human agent. With the social media gateway and the dialog system, the communication system is operable to interact with customers across different social media networks.05-26-2011
20110125696DATA SOURCE FOR PARALLEL INFERENCE - Systems, methods, and other embodiments associated with data sources adapted for parallel inference on triples associated with a semantic model are described. One example method includes creating a source table that stores triples for entailment in a manner that is adapted for parallel inference. The source table may be partitioned by triple predicate or may store compact triple identifiers that have been mapped to triple identifiers from the semantic model.05-26-2011
20080319936Engineering expert system - An expert system aids engineering personnel working in a manufacturing or other industrial environment by answering questions relating to machines, processes, systems or other elements of the environment. Users can interact with the system using kiosks in the relevant areas of the plant to enter queries and receive answers. A user can enter a query in a natural language format, which the system parses for keywords or keyterms. The system can use a backward chaining method to reach a solution, based upon the user's answer to further questions that the system asks the user.12-25-2008
20120310873INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus configured to create a schedule to be presented to a user includes an estimation unit and a creation unit. The estimation unit is configured to estimate whether or not the user acts in accordance with a first schedule including a task to do for accomplishing a preset aim. The creation unit is configured to create, when estimated that the user does not act in accordance with the first schedule, a new second schedule for accomplishing the aim from a state of the user who acts without following the first schedule.12-06-2012
20100121807DETERMINING A MEAL AND/OR MEAL PLAN - Methods, systems, apparatus and computer-readable mediums, storing sets of instructions, provide for determining at least one meal combination including receiving, at a server, information identifying at least one food item; accessing, from a storage, device, a set of meal combination rules; applying, at the server, the accessed set of meal combination rules to a plurality of food items; determining, at the server, at least one meal combination including a plurality of food items including the food item identified by the received information; and transmitting the determined at least one meal combination from the server to a computing device for display. Alternatively, methods, systems, apparatus and computer-readable mediums, storing sets of instructions, provide for generating a meal plan, including accessing a set of meal plan rules; applying the set of meal plan rules to a plurality of food items; determining a plurality of meal combinations, each of the plurality of meal combinations including a plurality of food items, based on the applied set of rules; and transmitting the determined plurality of meal combinations from a server device to a computing device.05-13-2010
20100121806Method and System of Knowledge Component Based Engineering Design - The present invention relates to an engineering design method and a system of implementing same. In one embodiment, the method includes a construction process of knowledge components and a design process based on the knowledge components. The knowledge components pack universal modules in the standard forms. Accordingly, the knowledge components are independent from design layouts or design processes of products, and reusable in different projects and platforms. The design process integrates a variety of software platforms via a uniform environment and calls the knowledge components to complete the engineering designs. Further, the design process defines a data relation and an execution relation of the knowledge components and establishes a relationship between the knowledge components without programming. The universal module comprises at least operations, methods, rules and/or flows of an engineering design process and engineering analysis process.05-13-2010
20100121805SYSTEMS AND METHODS INVOLVING RULE ENGINES - A method for monitoring a system comprising, receiving a first data asset from the system, receiving a configuration file, determining whether the configuration file includes the first data asset and an associated first rule engine logic identifier, running a first rule engine associated with the first rule engine logic identifier responsive to determining that the configuration file includes the first data asset and the associated first rule engine logic identifier, sending the first data asset to the first rule engine, receiving a first result from the first rule engine, and sending the first result to a display for presentation to a user.05-13-2010
20110137844Avatar-Based Technical Networking System - A virtual technical networking architecture is disclosed that allows a user to locate resources, seek expertise and collaborate with identified experts located within a virtual city in order to mentor, teach and resolve problems or fill a need. The virtual city offers a gaming technology environment to users, wherein the users and experts are depicted as avatars within the virtual city and different levels of expertise and different affiliations are identified by different avatar accessories. The virtual city connects users for learning and problem resolution and also recognizes the accomplishments of experts and memorializes these accomplishments in the virtual city. Accordingly, an entire city of experts in a wide variety of fields can be built, that brings large groups of people and resources together for intellectual capital and knowledge management. The virtual city can then be used to educate, train and disseminate information.06-09-2011
20110055134DYNAMIC RESOURCE-BASED WEB SERVICE EVALUATION - Systems and other embodiments associated with a resource-based web service are described. One example system comprises exploration logic configured to dynamically determine a configuration for a resource-based web service. The example system also comprises evaluation logic configured to test the configuration according to a testing policy. A result is acquired by testing the configuration according to the testing policy. Additionally, the system comprises control logic configured to control a user interface to report the result.03-03-2011
20110178972CREATING SNAPSHOTS OF DATA USING A SELECTED ONE OF DIFFERENT SNAPSHOT ALGORITHMS - In a storage system, snapshots of data are created according to a snapshot algorithm in response to writes. The snapshot algorithm is selected from among a plurality of different snapshot algorithms according to one or more criteria.07-21-2011
20110178971PORTABLE DATA MANAGEMENT - Embodiments for methods, systems, and computer program products for creating and managing a portable data rule using an electronic computing device are presented including: causing the electronic computing device to create a rule definition including, defining an expression by a user, where the expression defines a logic of a rule, causing the electronic computing device to parse the expression into a logical variable associated with the expression, causing the electronic computing device to identify the logical variable, and causing the electronic computing device to store the rule definition, where the rule definition includes the expression and the logical variable. In some embodiments, the causing the electronic computing device to identify the logical variable includes: causing the electronic computing device to return a name of the logical variable; and causing the electronic computing device to return an expected type of the logical variable.07-21-2011
20100217739Global Adaptation Atlas And Method Of Creating Same - A method and system that provides an “atlas” on global adaptation providing mapping, analysis, and reporting for scientists and decision-makers, of the best-available science on climate impacts and up-to-date information on adaptation projects. The atlas may be web-based. A method of displaying climate change data includes: collecting existing climate data; consolidating the collected data by designed attribute categories; filtering the collected data by attribute(s); presenting climate data to a user based on selected attribute categories; and archiving climate data.08-26-2010
20100217737Method and system for business rules management - computer software and method for managing business rules that can include creating a business rule and storing it on a disk or in a database or rule archive. The rules can be expressed in natural language, keywords, equations, or any other form. The invention also includes the ability to search for rules, edit rules and validate rules according to business various business rule patterns or predetermined validation criteria. As stated, rules can be created from keywords or expressed directly in natural language. There is no need to parse a rule for content since whether a rule can actually be coded can be decided by a coding group. Rules can be marked active or inactive and edited rules can be marked with version tracking. An optional feature of the invention is to send a message to everyone in an organization affected by a rule when it has been changed. Rules can be created and placed into one or more logical hierarchies organized in any arbitrary way including starting from an organization or company root node. The hierarchy can contain domains, packages and rules.08-26-2010
20090299940RULE-BASED SYSTEM FOR CLIENT-SIDE QUALITY-OF-SERVICE TRACKING AND REPORTING - Server-side control of client-side quality-of-service tracking is provided. When an event occurs at a client, a measurement client collects event parameters and generates aggregated measurement data in accordance with aggregation rules that are provided to the measurement client from a server-side measurement service. The measurement client periodically reports the aggregated measurement data to the measurement service for storage and analysis.12-03-2009
20090299938RULES ENGINE FOR ASPECT SERVICES - A service request is received from a client, the service request being directed to a web application, wherein a core concern of the web application is configured to perform a core operation upon receiving the service request. The service request is compared to a plurality of rules by a rules engine. If the service request satisfies a criterion specified in a first rule, an aspect service identified in the rule is initiated, wherein the aspect service performs an additional operation before or after the core operation is performed, and wherein the additional operation adds functionality to the core concern.12-03-2009
20090299937Method and system for detecting and managing peer-to-peer traffic over a data network - The present invention relates to a method and system for detecting and managing Peer-To-Peer traffic over a data network. The system comprises: (a) a file identifier unit for searching the P2P network according to search criteria, and retrieving identifiers of files that are shared over said P2P network; (b) an enabler for receiving from said file identifier unit said found identifiers, and: (b.1.) for each identifier found, searching said P2P network and finding network addresses related to computers that contain in their shared storage at least a portion of the file corresponding to said identifier; and (b.2.) analyzing the list of said found identifiers and corresponding network addresses, and assigning to each found network address one or more actions according to predefined rules; and (c) a network management device connected to said data network for receiving from said enabler each network address, associated with said one or more actions, and applying to said each address corresponding one or more actions.12-03-2009
20090292664SERVICE MANAGEMENT SYSTEM AND METHOD OF OPERATION THEREOF - A service management system and method. In one embodiment, the service management system includes: (1) a service description repository configured to contain service descriptions that define services in terms of a set of systems and devices that assume roles based on at least one of capabilities and attributes thereof and (2) a service management engine coupled to the service description repository and configured to employ the service description repository and at least one of the systems to deliver a service corresponding to at least one of the service descriptions via at least one of the devices.11-26-2009
20090292663FUZZY RULE HANDLING - A method to add expression level fuzzy rule processing capability to existing crisp rule engine without requiring extensive modifications to such rule engine. A system and computer implemented method receive a data set at a crisp rule engine. If the data set involves a fuzzy rule, a callback to a fuzzy rule broker is done. The fuzzy rule broker selects one of multiple tailored processing modules for processing the fuzzy rule. The result of processing the fuzzy rule may be converted to a crisp result and returned to the crisp rule engine.11-26-2009
20100057660OPERATION MANAGEMENT DEVICE, OPERATION MANAGEMENT METHOD, AND OPERATION MANAGEMENT PROGRAM - An operation management apparatus decides that newly-generated event data and previously-existing predictive event data match if the attribute values of the event data match the attribute values of the predictive event data excluding reference values. In such a case, the apparatus identifies individual filter information whose attribute values excluding reference values match the attribute values of the event data, and substitutes the attribute values of the event data for variables in each piece of individual filter information belonging to a group to which the individual filter information belongs, thereby generating predictive event data for each piece of individual filter information. The apparatus decides whether or not each piece of event data that is associated in a predictive event index with the group to which the individual filter information that matches the event data used for generating the predictive event data belongs satisfies the individual filter information of operation rule information corresponding to the group, and if satisfies, performs processing defined by the operation rule information.03-04-2010
20100030718COMPLIANCE RULES ANALYTICS ENGINE - The present invention relates to compliance rules analytics systems and methods for facilitating compliance, such as the compliance of an investment portfolio or a set of investment portfolios, with a rule or a set of rules.02-04-2010
20100023470KNOWLEDGE BASED ENCODING OF DATA - Methods, apparatuses, and articles of manufacture for receiving data from one or more processes, receiving or deriving a knowledge representation describing the data, which may include one or more finite automata, determining a plurality of values for encoding the data, said determining based at least in part on the knowledge representation of the data, which may include one or more finite automata, and generating the plurality of encoding values to encode the data, are described herein.01-28-2010
20100023473TAILOR-MADE FORCE FIELDS FOR CRYSTAL STRUCTURE PREDICTION - A general procedure is presented to derive force field parameters for molecules in the crystalline state on a case by case basis. The force filed parameters are fitted to accurate energies and forces generated by means of a hybrid method that combines DFT calculations with an empirical van der Waals correction. The mathematical structure of the force field, the generation of reference data, the choice of the figure of merit, the optimization algorithm and the parameter refinement strategy are discussed in detail.01-28-2010
20100023472System and Method for a Reactive and Personalized Exposure of Mobile End-User Context to a Third Party - A system and method for a reactive and personalized exposure of user context to a third party comprises information sources, a context discovery module providing the user context based on the information sources, an identification module obtaining an identity of the third party, a personalization engine, and a rendering system rendering and forwarding a reply to the third party, wherein if the identification module obtains the identity, the personalization engine creates a personalized message in accordance with the user context and the identity and the reply is the personalized message, and if the identification module does not find the identity, the reply is a generic message. The context discovery module and the identification module can each comprise an inferencing engine. The inferencing engine can be associated with a policy engine. Policy engines can be associated with each module and/or engine. The personalization engine can comprise a database of special messages.01-28-2010
20100023471METHOD AND SYSTEM FOR VALIDATING XML DOCUMENT - At least one XML document to be validated is parsed, and XML data in the at least one XML document is represented as data objects in at least one data object model in a memory. At least one rule document is parsed and a rule object model is created in the memory. At least part of the data objects are extracted from the at least one data object model and at least part of rule objects are extracted from the rule object model. Validation is performed in a corresponding execution context for the extracted at least part of the data objects based upon the extracted at least part of the rule objects.01-28-2010
20090048997METHOD AND APPARATUS FOR RULE-BASED MASKING OF DATA - An approach is provided for de-personalizing data. Content from a data source is retrieved in response to a request by a user. A rule for masking data (e.g., web data) is determined, wherein the rule is specified in a profile associated with the user. A search, within the content, for data that satisfy the rule is performed. The data that satisfy the rule is masked. The content is then modified with the masked data for delivery to the user.02-19-2009
20080306894Computer-implemented methods and systems for identifying and reporting deviations from standards and policies for contracts, agreements and other business documents - A computer-implemented method may include steps of providing a plurality of business document templates; providing a plurality of deviation rules and associating at least some of the plurality of deviation rules with each of the business document templates; storing the plurality of business document templates and the associated plurality of deviation rules; generating a business document (such as a contract, for example) based upon one of the stored plurality of business document templates, the generated business document including a plurality of clauses and business document terms; retrieving the plurality of deviation rules associated with the business document template upon which the business document is based and applying the retrieved plurality of deviation rules against the generated business document; identifying all business document terms of the business document that do not conform to one or more of the applied plurality of deviation rules, and generating a report that includes at least the identified non-conforming business document terms.12-11-2008
20090171880SYSTEM AND METHOD FOR CLASSIFYING AND DEFINING RELATIONSHIPS BETWEEN PRODUCT INFORMATION DATA - A system and method for classifying and defining relationships between product information data is provided. The method classifies the product information data to two different data types. Each data type includes a plurality of items. The items of each of the two types are arranged in a product information tree. The items of all the product information trees are associated to construct a new tree for showing the relationships of the product information data.07-02-2009
20090171879Systems and/or methods for prediction and/or root cause analysis of events based on business activity monitoring related data - In certain example embodiments of this invention, there is provided systems and/or methods for processing BAM-related data to predict when events of interest are about to happen and/or to identify the root causes of, or at least data correlated with, such events of interest. In certain example embodiments, key performance indicators (KPIs) are gathered and gardened. The gardening process may identify KPI values of interest (e.g., based on a Z-factor analysis thereof across one or more collection intervals). The gardened KPIs may be processed using a time-series transform (e.g., a Fast Fourier Transform), matched to one of a plurality of predefined waveforms, and fed into a dynamic Naïve Bayesian Network (NBN) for prediction. The gardened data also may be used to determine the relevance of the KPI for root causes of problems (e.g., based on a chi-square analysis).07-02-2009
20110320394Creation and Revision of Network Object Graph Topology for a Network Performance Management System - An embodiment of the invention comprises, providing an initial object graph to a database, the initial object graph being generated by applying a set of rules to resources included in a resource set at a specified time, or by revising a previous object graph at the previous time, the resource set at the specified time comprising an initial resource set. The method includes providing the initial object graph to a working memory, maintained in separation from the database; discovering a changed fact associated with one of the resources of the initial resource set; and upon discovering the changed fact, determining modifications required by the changed fact to the initial object graph. If modifications are required, the initial object graph is revised in the working memory to include such modifications. The same revisions are then made to the initial object graph in the system database.12-29-2011
20120209800BUSINESS RULES - Aspects of the subject matter described herein relate to business rules. In aspects, an interface is described that allows a user to enter, update, and delete business rules. Once entered, the business rules may be validated and translated into other forms including a form that is executable by a computer system.08-16-2012
20120047101DETECTING DISALLOWED COMBINATIONS OF DATA WITHIN A PROCESSING ELEMENT - Techniques are described for detecting disallowed combinations of data within a processing element. Embodiments of the invention may generally receive data to be processed using the processing element and determine whether the received data and a current working state violate one or more rules describing disallowed combinations of data. If a disallowed combination is detected, embodiments of the invention may handle the processing of the received data in an alternate way that prevents disallowed combinations of data within the processing element.02-23-2012
20090248603DECISION SERVICE FOR APPLICATIONS - A decision service is described that provides a decision making process for an application. The decision service includes a runtime interface, a resolver interface, and an inference engine. The runtime interface is configured to receive a request from an application to generate a decision. The resolver interface is configured to invoke one or more fact resolver modules to determine corresponding fact values. The inference engine is configured to communicate with the resolver interface to determine a plurality of fact values, and to compare the determined plurality of fact values to one or more rows of a decision table to determine a matched row. The decision provided by the decision service is a conclusion corresponding with the matched row of the decision table.10-01-2009
20120005144OPTIMIZATION OF RULE ENTITIES - A method of optimizing a rules engine rule set is disclosed. The method provides for identifying groups of rule conditions within a rule table that are repetitive; determining a hash function that will effectively summarize in a condensed form the set of criteria, operations and values that distinguish the group for each respective group of the identified groups; calculating hash values per the hash functions for each row of the rule table; storing the derived hash functions, the calculated hash values, and the original rule in memory when loading; and then at run time when the rule engine is invoked: calculating the hash values using the respective hash functions associated with the rule table using the attributes provided at invocation; and skipping all rows whose hash values are different from the calculated invocation hash values. The method of optimizing rule entities is particularly useful for overcoming the longer calculation times associated with un-optimized rule tables known in the art.01-05-2012
20120005146RULE BASED AUTOMATION - Techniques for rule-based automation of an application are disclosed herein. In one embodiment, a system includes an event processor, a rule engine, and a plurality of rules. The event processor is configured to detect events affecting execution of an application being monitored by the automation system. Each rule is configured to analyze at least one of the detected events and to provide a result of the analysis that is further analyzed by a different one of the rules. The rule engine is coupled to the event processor and the plurality of rules. The rule engine is configured to apply each rule to at least one of the detected events based on a value of the rule that determines an event type that the rule is configured to analyze.01-05-2012
20090192967DISCOVERING SOCIAL RELATIONSHIPS FROM PERSONAL PHOTO COLLECTIONS - A method of categorizing the relationship of individuals from a collection of photos taken in multiple sets of events includes: searching the photo collection to identify individuals in the photo collection, determining the gender and age range of the identified individuals; and using the identified individuals, their occurrences and co-occurrences, their gender, and their ages to infer social relationships between the individuals based on a set of rules.07-30-2009
20120011095RULE BASED, PROACTIVE WEB BROWSING - Method and apparatus for rule-based, proactive web browsing are provided. A set of rules is determined and stored in computer data storage, where each rule in the set of rules is a proactive browsing rule that indicates a web page. The occurrence of an event represented by event information is detected. In response to detecting the occurrence of the event, the set of rules is evaluated based on the event information to determine whether any rules are satisfied. While a web browser is in use, a determination is made that a particular rule is satisfied. In response to determining that the particular rule is satisfied, the web browser is automatically redirected to directly access a particular web page that is indicated in the particular rule.01-12-2012
20090063384METHOD OF APPLYING USER-DEFINED INFERENCE RULE USING FUNCTION OF SEARCHING KNOWLEDGE BASE AND KNOWLEDGE BASE MANAGEMENT SYSTEM THEREFOR - The user-defined inference rule is created using a knowledge base search language that is basically provided in a knowledge base management system. Accordingly, the user-defined inference rule is a knowledge base search statement and is processed using a function of searching a knowledge base as a base function of the knowledge base management system. The user-defined inference rule is applied by including a knowledge base search process and a search result in the knowledge base, when the knowledge base is changed. The user-defined inference rule is managed by a user-defined inference rule manager. The user-defined inference rule manager monitors a change in the knowledge base to determine when the user-defined inference rule is applied, executes the user-defined inference rule to obtain the execution result, and includes the execution result in the knowledge base.03-05-2009
20120023055System and method for multi-source semantic content exploration on a TV receiver set - The present invention refers to the field of metadata enhancement system for broadcast televisions program, in particular to provide to the customer more information about a current, past or future broadcast. It concerns a method to enhance transmitted contents, said method starting from the metadata to populate a knowledge database. This method is based on a iterative process to fetch information from open Internet using as search criteria the result of the previous search. The data in the knowledge database are organized in data triple. According to one embodiment, the iterative process is stops when the returned data are related to another content.01-26-2012
20120023056Contextual Decision Logic Elicitation - The present invention is a method of creating decision logic. A first set of rules for the decision logic is received. The user is queried for data and this data is stored in a memory. A first decision is generated for a user based at least in part on the data. Input is received from the user for editing the first set of rules to create a new set of rules for the decision logic in the context of data. A final decision is generated derived at least in part from the data using the new set of rules.01-26-2012
20120059784Editing and Compiling Business Rules - A component in a graph-based computation having data processing components connected by linking elements representing data flows is updated by receiving a rule specification, generating a transform for transforming data based on the rule specification, associating the transform with a component in the graph-based computation, and in response to determining that a new rule specification has been received or an existing rule specification has been edited, updating the transform associated with the component in the graph-based computation according to the new or edited rule specification. A computation is tested by receiving a rule specification including a set of rule cases, receiving a set of test cases, each test case containing a value for one or more of the potential inputs, and for each test case, identifying one of the rule cases that will generate an output given the input values of the test case.03-08-2012
20120072386Intelligent Plant Development Library Environment - An intelligent plant development library environment is presented. Contemplated environments comprise an EPC knowledge system capable of incorporating know-how of one or more construction firms in the form of assembly objects. Assembly objects represent construction components (e.g., bolts, cable trays, pipes, processing units, deliverables, etc.) that can be incorporated into a plant design. Assembly objects are stored in an assembly database and include available contexts considered relevant to the assembly objects. An inference engine is utilized to derive a specified context related to a plant design from one or more design tools. The inference engine applies rule sets to infer which assembly objects to instantiate as construction objects. The inference engine can further configure the design tools to incorporate the instantiated construction objects into a plant construction project model. Example rule sets include forward chaining rules, backward chaining rules, case-based reasoning rules, inductive reasoning rules, or abductive reasoning rules.03-22-2012
20090063382Pluggable dialects for a rule engine - Some embodiments of pluggable dialects for a rule engine have been presented. In one embodiment, a rule file substantially written in a rule language is compiled. The rule file may include a set of rules, each rule having one or more semantic code blocks written in a dialect different from the rule language. The compiled rule file is input to a core engine of a rule engine for execution.03-05-2009
20120317068Method For Generating Rules and Parameters for Assessing Relevance of Information Derived From Internet Traffic - A method is disclosed for generating a set of optimal rules and parameters for use by an evaluation engine on a volume of information extracted from a stream of IP packets associated with a web browsing session conducted over a network in order to filter user-initiated traffic flowing across the network from non-user-initiated traffic. Deep packet inspection is performed to extract the volume of information from the stream that conforms to at least one discrimination criteria. An initial iteration of application of the evaluation engine to the volume is performed by selecting initial discrimination criteria and rules for generating the filtered results and a distance between the filtered results and known actual user-initiated traffic is measured. Subsequent iterations of application of the evaluation engine to the volume are performed by changing the discrimination criteria and/or rules until there is no significant improvement in the measured distance.12-13-2012
20100094794STIMULI BASED INTELLIGENT ELECTRONIC SYSTEM - Stimuli based intelligent electronic system. The intelligent electronic system includes a sensing module which receives at least one transient stimulus. A rule and action module then checks one or more rules for the at least one transient stimulus and updates content list dynamically. Further, the intelligent electronic system includes a play module which plays contents based on updated content list.04-15-2010
20120123990Method And Device For The Quality Analysis Of System Models05-17-2012
20090132456APPLYING RULESET LIMITING CRITERIA FOR AFFIRMING RULE INPUTS AND OUTPUTS - Embodiments of the invention provide techniques for processing abstract rules with limiting criteria. In one embodiment, limiting criteria may specify requirements for characteristics of sets of input or output values of processing abstract rules. For example, limiting criteria may specify requirements for statistical validity of a set of input values, such as a minimum record count. In one aspect, limiting criteria may include input criteria applied to input data prior to being processed in a rule engine. In another aspect, limiting criteria may include output criteria applied to an output of a rule engine. In the event that limiting criteria are not satisfied, the processing of the abstract rule may be terminated.05-21-2009
20120166378FORWARD CHAINING AS AN ORCHESTRATION MECHANISM FOR ANALYTICS - A method and system of using a forward chaining application on a computing device to monitor a semantic storage system and invoke computations on scientific data according to declarative rules, while capturing operational provenance data stored alongside the scientific data where all data is stored in a semantic graph is disclosed and described. As the provenance data is stored with the data as nodes in the semantic graph, it will stay with the data and may be searched and queried using the same methods as searching the underlying data.06-28-2012
20120166377METHOD AND APPARATUS FOR PROVIDING RECOMMENDATIONS BASED ON A RECOMMENDATION MODEL AND A CONTEXT-BASED RULE - An approach is provided for providing recommendations based on a recommendation model and a context-based rule. A recommendation platform receives a request for generating at least one recommendation, the request including at least one user identifier, at least one application identifier, or a combination thereof. Next, the recommendation platform determines at least one recommendation model associated with the at least one user identifier, the at least one application identifier, or a combination thereof. Then, the recommendation platform determines at least one context-based recommendation rule. Then, the recommendation platform processes and/or facilitates a processing of the at least one recommendation model, the at least one context-based recommendation rule, or a combination thereof for generating the at least one recommendation.06-28-2012
20120221503SYSTEMS AND METHODS FOR GENERATING INTERPOLATION DATA TEMPLATE TO NORMALIZE ANALYTIC RUNS - Embodiments relate to systems and methods for generating an interpolation data template to normalize analytic runs. A database can store sets of operational data, such as financial, medical, climate or other information. For given data, a portion of the input data can be known or predetermined, while for a second portion can be unknown and subject to interpolation. The interpolation engine can generate a conformal interpolation function and interpolated input sets that map to a set of target output data. In aspects, an interpolation history database can stores results of a variety of interpolation studies or results, from which a set of interpolation templates can be derived. The templates can reflect trends or patterns discovered or displayed in the historical interpolation results, for instance, to produce expected values for different variables based on averages, thresholds, or other criteria applied to the historical results. New interpolation studies can apply data-selected templates chosen to match their operative data, and produce normalized data as the interpolation results themselves, or provide a starting point for further interpolation processing.08-30-2012
20120271786Efficiently Determining Boolean Satisfiability with Lazy Constraints - A mechanism is provided for efficiently determining Boolean satisfiability (SAT) using lazy constraints. A determination is made as to whether a SAT problem is satisfied without constraints in a list of constraints. Responsive to the SAT problem being satisfied without constraints, a set of variable assignments that are determined in satisfying the SAT problem without constraints are fixed. For each constraint in the list of constraints, a determination is made as to whether the SAT problem with the constraint results in the set of variable assignments remaining constant. Responsive to the SAT problem with the constraint resulting in the set of variable assignments remaining constant, the constraint is added to a list of non-affecting constraints and a satisfied result is returned.10-25-2012
20120317069THROUGHPUT SUSTAINING SUPPORT SYSTEM, DEVICE, METHOD, AND PROGRAM - A throughput sustaining support system (device) according to the present invention has: a throughput sustaining decision unit which decides whether or not throughput can be sustained without exceeding a throughput expected value in a server system based on correspondence data between a throughput value of the server system and a surplus amount of a system resource measured using the expected throughput value which is the throughput value expected upon the number of requests in advance for the server system and pattern data which indicates a pattern of a processing request matching an operating situation of the server system; and a decision result output unit which outputs a decision result as to whether or not the throughput can be sustained without exceeding the expected throughput value decided by the throughput sustaining decision unit.12-13-2012
20100205134RULE BASED PROCESSING SYSTEM AND METHOD FOR IDENTIFYING EVENTS - The present invention generally relates to a computerized system and method for creating, optimizing, and using a rules processing system that evaluates multiple rules against facts and events and detects, identifies, reacts to, and reports on events of interest. Events of interest may pertain to any subject matter, and in an embodiment, relate to securities (e.g., stocks, bonds, etc.) transactions. The system and method of the present invention also identifies patterns in large data sets using dynamically changing rules, and as a result, makes the processing and use of rules more efficient.08-12-2010
20100153327DECLARATIVE NETWORK ACCESS CONTROL - A system and method for declarative network access control are provided. The system includes an interpreter, a rules engine, a storage device, and a processor. The interpreter transforms sentences in a declarative network access control language to rules. The rules engine evaluates the rules to produce actions for providing access control to a network at a point of access. The storage device stores instructions for the interpreter, the rules and the rules engine and the processor executes those instructions.06-17-2010
20110184901Integrated Security Event Management System - An integrated security event management system (ISEMS) is disclosed and is based on service-oriented architecture (SOA) and includes one or more computers connected to one or more service-providing devices. At least one of the computers comprises one or more modules that are adapted to perform the following tasks: tasks to dynamically discover the service-providing devices and their services within a transit security domain in about real-time; tasks to acquire asynchronous state information notifications in about real-time from the discovered services; tasks to determine one or more Boolean outcomes from the asynchronous state information in about real-time via a configurable rules engine; and tasks to evaluate the one or more Boolean outcomes in about real-time via a configurable policy engine to determine state changes of one or more security policies.07-28-2011
20100174672METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODCUT FOR IMPLEMENTING EXPERT ASSESSMENT OF A PRODUCT - Disclosed are method(s), system(s), and computer program product(s) for implementing expert assessment of a product. Some embodiments are directed at improved methods, systems, and computer program product form implementing expert assessment of product fixes/patches or upgrade. In some embodiments, the method or the system identifies or receives information regarding a client system on which the product runs and a reasoning rule for the expert assessment; analyzes the received or identified information based upon the reasoning rule; and determines the expert assessment based on the result of the act of analyzing the information. In some embodiments, the method or the system further comprises optimizing the expert assessment based on other information; determining whether the determination of the expert assessment is deterministic; and determining whether or not there exists a conflict in the expert assessment.07-08-2010
20120215733SEMANTIC WEB TECHNOLOGIES IN SYSTEM AUTOMATION - A method includes maintaining descriptions of a plurality of information technology resources in a computer-readable storage medium. The method includes maintaining a plurality of evaluation strategies, wherein the evaluation strategies associate a plurality of rules with forms of changes to the plurality of information technology resources. Responsive to detecting a command to change a first property of the set of properties of a first information technology resource of the plurality of information technology resources, the method determines that a first of the evaluation strategies associates at least one of the plurality of rules with a form of the change to the first property of the first information technology resource. Also, responsive to detecting the command, the method evaluates the at least one of the plurality of rules and performs the operation of the at least one rule.08-23-2012
20120215732RULE AUTHORING FOR EVENTS IN A GRID ENVIRONMENT - A rules engine can be initialized as part of an object grid, wherein the rules engine is executable code executing using computer resources. The rules engine updates a business mapper. The rules engine receives a business rule definition to form a business rule. The rules engine determines business terms are present in the business rule. The rules engine converts the business terms to technical terms based on the business mapper, responsive to a determination that business terms are present. The rules engine determines that the business rule comprises a temporal rule. The rules engine receives rule criteria, wherein the rule criteria is at least one selected from the group consisting of frequency, delay and timing dependency, responsive to the determination that the business rule is a temporal rule. The rules engine stores the business rule to the rules engine. The rules engine publishes the business rule to a publish-subscribe topic.08-23-2012
20120215731DETECTING MISSING CASES IN INCOMPLETE BUSINESS RULE PROJECTS - A missing case of a fixed scope can be detected among a plurality of business rules of unrestricted forms. According to one or more embodiments, the described detecting includes building a rules inhibition graph for the plurality of business rules representing a constraint model comprising a plurality of nodes and describing a plurality of cases which make the plurality of business rules non-applicable; labeling the rules inhibition graph with values satisfying constraints of the constraint model by search and inference and determining a missing case when a consistent labeling satisfying the constraints of the constraint model is obtained. Using one or more of the described embodiments missing cases which may result from unforeseen interactions of overlapping tests over an a priori unknown number of attributes among arbitrary business rules may be detected.08-23-2012
20100049687System and method for information sharing across security boundaries - A system and method for sharing information across security boundaries including a server for sharing information between networks. The method for includes receiving data structured as semantic statements, retrieving a set of rules and ontology, processing a semantic statement from data with rules and ontology, determining whether the semantic statement is consistent with rules and ontology, and determining a fact that gives rise to an inconsistency if the semantic statement is inconsistent. The method further includes removing the fact that gives rise to the inconsistency and releasing data when the semantic statement is consistent with rules and ontology.02-25-2010
20100049686METHODS AND APPARATUS FOR VISUAL RECOMMENDATION BASED ON USER BEHAVIOR - Methods and apparatus are disclosed for dynamically recommending one or more visualizations for a given task based on user behavior, such as a user's interaction pattern with a current visualization. An alternate visualization type is provided to a user by observing actions of the user with a current visualization type; determining if one or more predefined action patterns is detected in the observed actions, wherein at least one of the predefined action patterns has a predefined associated alternate visualization type; and providing the alternate visualization type to the user when the associated predefined action pattern is detected. The one or more predefined action patterns may be defined by one or more rules or an example-based method.02-25-2010
20100010954DEVICE AND METHOD OF PROCESSING RULES BASED ON WEB SERVICES - Provided is a device for storing a rule describing an event, a condition to be satisfied by the event, and an action to be executed when the condition is satisfied and executing the action of the rule in an expended structure for using web services so as to effectively process the web services in various devices as well as a computer. In addition, a global rule manager for inspecting the validity of the rule when the rule is stored and executed is provided. Accordingly, the web services can be effectively used in a ubiquitous environment.01-14-2010
20100010951CHARACTER OUTFIT AUTOCONFIGURATION DEVICE, CHARACTER OUTFIT AUTOCONFIGURATION METHOD, AND CHARACTER OUTFIT AUTOCONFIGURATION PROGRAM - Provided is a character outfit autoconfiguration device capable of configuring outfit for a character matched with a content of a scenario without requiring specification of outfit by a user or using user environment information. The character outfit autoconfiguration device (01-14-2010
20100010955Molecule Fragmentation Scheme and Method for Designing New Molecules - Group based QSAR method (G-QSAR) is reported which uses descriptors evaluated only for the substituent groups or molecular fragments rather than whole molecule for generating QSAR. In addition, cross terms are calculated from product of descriptors at different substituent sites or fragments and used as descriptors to improve the QSAR models. This method provides QSAR models with predictive ability similar or better to conventional methods and in addition provides hints for sites or fragments of improvement in the molecules. The descriptor ranges for substituents or fragments are used to search for new groups/fragments leading to design of novel molecules with improved activity/property.01-14-2010
20100010953Method and Apparatus for Generating Context-Aware Generic Workflow Applications - A method and apparatus for generating context-aware generic workflow applications is provided. The apparatus comprises: one or more generic workflow functional modules deployed on one or more workflow nodes of a workflow; a context-aware configuration storage device configured to store context-aware configuration data including context-aware logics; a context obtaining module configured, in response to the execution of the workflow on a workflow node, to obtain the current context of the workflow execution; a context-aware logic management module configured to retrieve context-aware logics matching the current context in the context-aware configuration data stored in the context-aware configuration storage device; wherein a relevant workflow functional module in the one or more generic workflow functional modules is configured to execute relevant operations according to the matched context-aware logics, thus generating a context-aware generic workflow application. The apparatus and method of the invention can generate generic workflow applications applicable to various workflows and contexts, which saves the developing and testing costs of workflow applications.01-14-2010
20100010952METHODS AND SYSTEMS FOR TARGET VALUE PATH IDENTIFICATION - Target value search methods and systems are presented for solving a target value path problem to identify a path or paths in a graph in which a connection graph is created and upper and lower bound values are determined for each node in the connection graph, and a first best search is performed to identify a path or paths from a starting node to a goal node having a path value closest to the target value.01-14-2010
20120226648MANAGING LOCAL ENVIRONMENT USING DATA TRAFFIC INFORMATION - A method for managing a local environment using data traffic information is provided in the illustrative embodiments. According to the invention, an data traffic on a data network associated with the local environment is monitored at a networking device. The local environment includes one or more devices. A device from the one or more devices is controllable using the data network. A condition in the local environment is inferred from the data traffic. An action to cause a change in the local environment is determined. A command corresponding to the action is sent to a subset of devices in the set of devices in the local environment to perform the action.09-06-2012
20100293127Controlled Constraint Sharing in Parallel Problem Solvers - Controlled constraint sharing in parallel problem solvers is described. In embodiments, constraint sharing in a problem solver is controlled by comparing a total number of shared constraints obtained in a time interval to a target, and regulating the subsequent number of shared constraints obtained from other problem solvers accordingly. Embodiments describe how the regulation of the subsequent number of shared constraints can be achieved by controlling the size of constraints shared by other problem solvers. Embodiments describe how an additive increase/multiplicative decrease algorithm can be used to determine the size of constraints to be exchanged. Embodiments also describe how the utility of the shared constraints can be determined, and used to control the size of constraints shared by other problem solvers. In embodiments, the problem solver is a Boolean satisfiability problem solver.11-18-2010
20120185423CASCADING DEFINITION AND SUPPORT OF EDI RULES - Electronic data interchange (EDI) documents are validated by creating an inventory of all rules, dynamically adjusting the inventory based upon entity specific rules derived from a plurality of companion guides, determining a profile containing pointers to select rules in the inventory for each companion guide and storing the profile for each companion guide in a storage. A runtime checker can then be used to check a received EDI document with a corresponding rule set, forward the EDI document if the EDI document matches its current rule set and return the EDI document if the EDI document does not match its current rule set. EDI rules may be enforced, for example, by determining entity-specific rules from corresponding companion guides, by expressing each rule in a neutral and machine readable format, by classifying the rules and/or by creating an inventory of rules and pointers to entity-specific rules.07-19-2012
20120185422Node similarity for component substitution - Systems and methods of determining node similarity for component substitution. An example of a method may be carried out by program code stored on non-transient computer-readable medium and executed by a processor. The method includes estimating a normalized similarity metric between the plurality of nodes in the system tree and nodes in other trees. The method also includes assigning a similarity score to each compared node using at least one of: domain based rules, attribute based similarity metrics, and machine learning. The method also includes combining results for cluster analysis.07-19-2012
20100005049INFORMATION EXTRACTION RULE MAKING SUPPORT SYSTEM, INFORMATION EXTRACTION RULE MAKING SUPPORT METHOD, AND INFORMATION EXTRACTION RULE MAKING SUPPORT PROGRAM - A information extraction rule making support system comprises: a storage section for storing an extraction object document, which is an electronic document of an information extraction object; an input unit for inputting a plurality of extraction rules, which are rules used to extract information from said extraction object document; an information extraction section for respectively deriving extraction results matching each of said extraction rules from said extraction object document stored by said storage section, using each of said extraction rules inputted by said input means; and a rule relation creating section for creating a rule relation network indicating a relation between each of said extraction rules by analyzing an overlapping relation or including relation between extraction results derived by said information extraction section and linking each of said extraction rules based on the result of the analysis.01-07-2010
20090319462METHOD AND SYSTEM FOR CUSTOMIZATION OF A GRAPHICAL USER INTERFACE (GUI) OF A COMMUNICATION DEVICE IN A COMMUNICATION NETWORK - A method and system is provided for customization of a graphical user interface (GUI) of a communication device in a communication network. The method includes customization of the GUI of the communication device based on one or more of user preferences and user interaction patterns pertaining to a plurality of services accessed by a user of the communication device. The method further comprises customization of the GUI of the communication device based on a predefined set of rules.12-24-2009
20120084244CLAIMS ISSUANCE RULE GENERATION PIPELINE - A pipeline that includes at least an initialization stage, a processing stage, and a publication stage. The initialization stage acquires a set of globally sourced claims that can be used by any issuance statement. The processing stage manipulates a set of one or more user task specific claims that are derived from the set of one or more globally source claims. The set of one or more user task specific claims are manipulated by generating a set of one or more temporary claims. The processing stage generates the set of one or more temporary claims by applying issuance statements to the set of one or more user task specific claims. A publication stage then issues the set of one or more temporary claim in an issuance format.04-05-2012
20120259806User as a Service - Techniques are disclosed for allowing a user to configure profiles to permit interactions with the user based upon varying factors, such as location, mood, time, who the user is with, who is trying to communicate with the user, and other factors. By using a dynamic user profile, the user obtains more control over how and when other people may interact with the user, and how the user interacts with other people.10-11-2012
20120226649Content delivery network (CDN) cold content handling - A method of content delivery in a content delivery network (CDN), where the CDN is deployed, operated and managed by a content delivery network service provider (CDNSP). The CDN comprises a set of content servers and a domain name system (DNS). For a given content provider, a determination is first made whether the content provider has “cold content” delivery requirements by evaluating one or more factors that include: total content size, size of content objects expected to be served, uniqueness of content, total number of content objects, and a percentage of the total content size that is expected to account for a given percentage of traffic. Upon a determination that the content provider has cold content delivery requirements, a subset of the CDN content servers are configured to implement a set of one or handling rules for managing delivery of the cold content from the CDN content servers.09-06-2012
20120265722EXPERT SYSTEM FOR INSULIN PUMP THERAPY - An apparatus comprising a controller. The controller includes an input/output (I/O) module and a rule module. The I/O module is configured to present a question for a patient when communicatively coupled to a user interface and receive patient information in response to the question via the user interface. The rule module is configured to apply a rule to the patient information and generate a suggested insulin pump setting from application of the rule. Other devices, systems, and methods are disclosed.10-18-2012
20120233107Efficient Management Of Data Quality For Streaming Event Data - Implementations of the present disclosure include methods for managing data quality for event data. In some implementations, methods include receiving, at one or more computing devices, a plurality of events, each event comprising event data and being generated by an event source in response to a real-world activity, processing, using the one or more computing devices, the plurality of events using one or more complex event processing (CEP) rules to generate a complex event, in response to generating the complex event, annotating the complex event with quality information corresponding to each of the plurality of events to provide a quality-enriched event, and publishing the quality-enriched event.09-13-2012
20080301079Method and apparatus to define a ruleflow - Some embodiments of a method and an apparatus to define ruleflows for a rule engine have been presented. In one embodiment, a graphical user interface (GUI) is generated to allow a user to graphically specify an execution order of some rules. Then the rule engine is used to execute the rules according to the execution order. The rules may include one or more rule sets, where each rule set contains one or more rules.12-04-2008
20080301078Method and apparatus to abstract away rule languages - Some embodiments of a method and an apparatus to abstract away rule languages from a rule engine have been presented. In one embodiment, rules written in a first rule language are parsed into descriptor classes, which are used to model concepts that can be expressed in a rule engine. An intermediate structure is generated from the parsed rules. The intermediate structure is input to a core of the rule engine, which is operable to execute the rules.12-04-2008
20080301080METHOD FOR RULE COMPLIANCE SITUATION CHECKING AND RELATED CHECKING SYSTEM - A method for rule compliance situation checking is provided. The method in one aspect, includes the steps of: a) building a rule model for predefined rules and building a business operational model for business processes; b) normalizing vocabularies in the rule model and the business operational model; c) checking whether the rule model is satisfied by the business operational model; and d) outputting a report on checking results. The present invention also provides a corresponding system for rule compliance checking. The rule compliance checking of the present invention allows users to perform fast and effective automatic checking of rule compliance, avoid interference of man-made factors in checking process to a great extent and thus guarantee veracity of checking results.12-04-2008
20120239605Information Processing Systems, Reasoning Modules, And Reasoning System Design Methods - Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.09-20-2012
20110010326RULE ANALYSIS TOOL - Some embodiments of a rule analysis tool have been presented. In one embodiment, a user interface of a rule analysis tool receives a set of one or more user-written rules from a user. The rule analysis tool, running on a server, applies a set of one or more predefined evaluation rules to the user-written rules to evaluate the user-written rules. The predefined evaluation rules may include a logic rule, a meta-rule, etc. In some embodiments, an output module of the rule analysis tool generates an evaluation report on the set of one or more user-written rules.01-13-2011
20110047118SECURE VIRTUAL PRIVATE NETWORK UTILIZING A DIAGNOSTICS POLICY AND DIAGNOSTICS ENGINE TO ESTABLISH A SECURE NETWORK CONNECTION - A secure virtual private network (VPN) is described herein. The secure VPN implements standard VPN software with diagnostics to ensure a client device coupling to the VPN is secure. The diagnostics include a policy, a library and an engine where the policy determines what the requirements are for permitting the client device to couple to the VPN. The library stores programs for checking if the client device has any problems. The engine gathers information related to the client device and executes the programs stored within the library. When a user attempts to couple to the VPN with a client device, the server initiates the policy, library and engine to check for issues, and then the user is informed of the issues and/or a mechanism automatically fixes the issues. After the client device is verified as secure, it is able to couple to the VPN for data transfers.02-24-2011
20110047117SELECTIVE CONTENT BLOCK OF POSTS TO SOCIAL NETWORK - Mechanisms are provided herein which are directed toward monitoring a user's interaction with a website when the user is utilizing an enterprise device to conduct the interaction. The monitoring of the interaction can lead to the generation of one or more automated responses to control the interaction in accordance with enterprise policy or rules. The types of interactions which can be controlled include interactions where the user is attempting to post data on the website.02-24-2011
20110047115Expert System Integrated with Remote Performance Management - The disclosure relates to troubleshooting process issues using an Expert System. Remote Performance Management (RPM) data based on Distributed Control System (DCS) information is transmitted to an Expert System and subsequently translated. The Expert System determines a solution along with an associated confidence level. The Expert System may prioritize the solution an in so doing, signal the DCS to automatically implement the transmitted solution.02-24-2011
20100169261Instantiating a Solution - Among other disclosed subject matter, a system for instantiating at least one solution includes a plurality of preconfigured templates representing operating systems and business systems and comprising preconfigured system images and data images, each of the preconfigured templates adapted for use in instantiating an instantiation system in any of multiple pools isolated from each other. The system includes an infrastructure service for customizing and configuring the instantiation system in one of the pools as instantiated using any of the preconfigured templates. The system includes a virtualization allocator that allocates the instantiation system to a selection from among physical servers and virtual servers.07-01-2010
20120278269METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING EXPERT ASSESSMENT OF A PRODUCT - Disclosed are method(s), system(s), and computer program product(s) for implementing expert assessment of a product. Some embodiments are directed at improved methods, systems, and computer program product form implementing expert assessment of product fixes/patches or upgrade. In some embodiments, the method or the system identifies or receives information regarding a client system on which the product runs and a reasoning rule for the expert assessment; analyzes the received or identified information based upon the reasoning rule; and determines the expert assessment based on the result of the act of analyzing the information. In some embodiments, the method or the system further comprises optimizing the expert assessment based on other information; determining whether the determination of the expert assessment is deterministic; and determining whether or not there exists a conflict in the expert assessment.11-01-2012
20120089550METHODS AND SYSTEMS FOR PERFORMING EMAIL MANAGEMENT CUSTOMIZATIONS IN A MULTI-TENANT DATABASE SYSTEM - An email object is provided in a multi-tenant database system that can be related to multiple people (e.g., contact, lead, user) or any object represented for storage in the multi-tenant database system via sharing relationships. The email object follows a sharing model such that an email inherits the sharing model or attributes of a parent record specified via sharing relationships. In various aspects, a sharing model provides users with a true value of a multi-tenant database system as users are more informed about communications concerning people or other objects represented for storage in the multi-tenant database system.04-12-2012
20120089549RULE AUTHORING FOR EVENTS IN A GRID ENVIRONMENT - A rules engine can be initialized as part of an object grid, wherein the rules engine is executable code executing using computer resources. The rules engine updates a business mapper. The rules engine receives a business rule definition to form a business rule. The rules engine determines business terms are present in the business rule. The rules engine converts the business terms to technical terms based on the business mapper, responsive to a determination that business terms are present. The rules engine determines that the business rule comprises a temporal rule. The rules engine receives rule criteria, wherein the rule criteria is at least one selected from the group consisting of frequency, delay and timing dependency, responsive to the determination that the business rule is a temporal rule. The rules engine stores the business rule to the rules engine. The rules engine publishes the business rule to a publish-subscribe topic.04-12-2012
20110276531SYSTEM AND METHOD FOR VALIDATION OF TRANSACTION DATA - A system and a method for validation of transaction data are disclosed. A rules engine in the system and the method is used to quickly and accurately deduce whether or not a transaction is a candidate for flagging with additional identification data, and a loyalty engine is used to quickly and accurately track and manage an entity relating to a transaction. In the system and the method, through compression and optimization, separate logical rules originally built are combined into an aggregate of compressed rules shared across a plurality of validations, such that the aggregate of compressed rules in the rules engine and the loyalty engine operates in memories of computing machines hosting servers. The system creates modularity and nimbleness with an internal instancing system and a dynamic routing node to multiple active instances. The multiple active instances of the rules engine and the loyalty engine support real-time updates and thus facilitate higher uptime capacities.11-10-2011
20110276529PCRF INCOMPLETE NOTIFICATION PROCESSING - Various exemplary embodiments relate to a method and related network node and machine-readable storage medium including one or more of the following: receiving a message at the PCRN, the message comprising at least one content element; inferring a message type of the message based on the at least one content element; and responding to the message based on the message type of the message and the at least one content element of the message. Inferring a message type may include applying a set of inference rules to content elements of the message to determine a message type. Various exemplary embodiments further include validating a message received at the PCRN, receiving an incomplete message at the PCRN, and inferring a value of a missing element of an incomplete message. Incomplete messages may include messages where the missing element is a message type element that indicates the type of the message.11-10-2011
20120330875STRUCTURE INDEX - The present invention relates to a method for answering a query (12-27-2012
20120095951METHODS AND SYSTEMS FOR MODIFYING A KNOWLEDGE BASE SYSTEM - In one embodiment, a query is received at a knowledge base system via a communications link and a new rule is generated in response to an indication that a rule library of the knowledge base system does not include a rule associated with the query. A synthetic document descriptor is received and a value associated with the synthetic document descriptor is stored at an action identifier of the new rule. The new rule is then stored at the rule library. The new rule has a condition identifier field and an action identifier field, and the condition identifier field of the new rule has a value associated with the query. The synthetic document descriptor includes a first reference to a portion of a first document and a second reference to a portion of a second document.04-19-2012
20120095950SYSTEMS AND METHODS FOR IMPLEMENTING BUSINESS RULES DESIGNED WITH CLOUD COMPUTING - Systems and methods presented herein may involve locally executing rules (e.g., business rules) that are designed in a remote computing cloud. Systems and methods may include receiving a file representing modified rules from the remote computing cloud and compiling the file locally for integration into a local system. By separating the design and execution phases of the rules, new versions of the rule design application(s) may be utilized in the remote cloud to design local rules without upgrading or otherwise changing the applications that implement the rules on the local system.04-19-2012
20120095949KNOWLEDGE BASED METHOD AND SYSTEM FOR LOCAL COMMERCE - A system and method that utilizes knowledge representation system to express relationships among consumers, between consumers and businesses, within a specific business, and across businesses. The system and method supports defining which businesses consumers patronize, which locations they prefer, and what products and services they intend to secure from what businesses. The system can supports defining how businesses are structured, what businesses are similar, and how businesses relate both to consumers and to other businesses. By combining this consumer knowledge and business knowledge the system enables a number of mutually compatible applications across a matrix of consumer and business interactions (consumer-to-consumer, consumer-to-business, and business-to-business.)04-19-2012
20120330876METHODS AND SYSTEMS FOR GENERATING MEDICAL REPORTS - Disclosed is a networked database-driven system for facilitating the generation by multiple users of reports containing frequently occurring, repetitive, or predictable elements, through the system making predictions or suggestions regarding elements to insert into or changes to make to a currently edited report in progress by one user, through the use of user-defined report elements and user-defined relations between those elements, as well as the system's drawing upon collected data regarding prior reports and report elements entered into the system by previous report authors and inclusion or exclusion decisions made by previous report authors regarding those elements in relation to other report elements.12-27-2012
20120330877EFFICIENT BINARY PROTOCOL MARSHALLING FOR RULE ENGINE SESSIONS - Some embodiments of efficient binary protocol marshalling for rule engine sessions have been presented. In one embodiment, a set of marshalling plug-ins is provided to a rule engine. Each of the set of marshalling plug-ins is customized for a type of user objects. In response to encountering a user object, the rule engine selects a marshalling plug-in out of the set of marshalling plug-ins based on a type of the user object to marshall in or to marshall out the user object.12-27-2012
20110282822SYSTEM FOR SELECTING AN ITEM OF DATA REPRESENTING A PARAMETER OF THE AIR, ENGINE CONTROL SYSTEM, AIRCRAFT COMPRISING SUCH SYSTEMS AND ASSOCIATED METHOD - A system and method for selecting a datum representative of an air parameter, including a plurality of sources each capable of delivering a datum representative of a measured value of the parameter. The system includes: a mechanism for determining, for at least some sources, a number of other sources from the plurality of sources in agreement with a source in question; and a mechanism for selecting the datum selected from the data delivered by the sources for which the determined agreement number is the maximum. An engine control system, or an aircraft can include such a system or implement such a method.11-17-2011
20120101972DETECTION OF IRREGULARITY IN FOOD MANUFACTURING BY USING CONVERSION PATTERN - Irregular food manufacturing detection by using conversion pattern in one aspect generates one or more rules associated with amount of resources used to manufacture a food product, collects data associated with a selected manufacturing process of the food product at a selected manufacturer and determines whether the collected data complies with the generated one or more rules. Irregularity may be identified if the collected data does not comply with the generated one or more rules.04-26-2012
20120290523Enterprise Product Management System and Method - A comprehensive enterprise product management system to effectuate efficient product time to market. The system includes a process model and a data model. The process model consists of entities that represent typical concepts in a trade setting and relationships among these entities. The data model represents the complexity of a product, including defining the entities that comprise the product and the relationship among these entities. The process model and the data model accommodate the dynamic characteristics associated with both product definition and channels of trade.11-15-2012
20090055340Analysis of software conflicts - Conflicts among programs are detected, and advice is given based on the detected conflicts. A set of conflict rules defines what constitutes a conflict, and a set of advice rules defines what advice is to be given in response to a conflict that has been detected. The conflict rules may be provided by a different party from the action rules, so the decision as to what constitutes a conflict can be made separately from the decision as to what advice should be given when a conflict is detected.02-26-2009
20100198769PROCESSING DATA USING VECTOR FIELDS - Disclosed is a method including receiving a rule having at least one rule case for producing an output value based on one or more input values, generating a transform for receiving data from an input dataset and transforming the data based on the rule including producing a first series of values for at least one output variable in an output dataset, at least one value in the first series of values including a second series of values, and providing an output field corresponding to the at least one output variable in the output dataset for storing the second series of values.08-05-2010
20130013548SYSTEM AND METHOD FOR PROVIDING CONFIGURABLE SECURITY MONITORING UTILIZING AN INTEGRATED INFORMATION SYSTEM - A system and method for implementing an integrated information system are provided. A premises server is in communication with a variety of information sources that produce monitoring data for a premises. The premises server collects, presents, and transmits the monitoring device data to a central server capable of processing data from multiple premises servers. The central server receives the data and traverses one or more logical rule sets to determine whether the inputted data violates the rules. Based on an evaluation of the rules, the central server generates outputs in the form of communication to one or more authorized users via a variety of communication mediums and devices and/or the instigation of a variety of acts corresponding to the evaluation of the rules.01-10-2013
20130018836PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS - Artificial intelligence engine that receives data related to at least one of at least one available network of a mobile communication environment and system data of a mobile device in the mobile communication environment. The artificial intelligence engine includes a rules engine that receives a currently configured set including at least one rule, the at least one rule includes at least one condition and at least one action. The at least one condition includes at least one predicate and at least one condition state, and the rules engine is structured to evaluate the at least one condition and the at least one predicate. Further, a triggering device triggers the at least one action in accordance with the evaluation of the at least one condition and the at least one predicate.01-17-2013
20110161273RIBONUCLEIC ACID IDENTIFICATION APPARATUS, RIBONUCLEIC ACID IDENTIFICATION METHOD, PROGRAM AND RIBONUCLEIC ACID IDENTIFICATION SYSTEM - Disclosed are an apparatus for the identification of a ribonucleic acid, whereby not only the molecular weights of digestion products, from which nothing but the nucleic acid residue composition can be understood, but also nucleic acid residue sequence data is obtained from a product ion mass set and thus the identification reliability for the individual digestion products can be remarkably improved; a method for the identification of a ribonucleic acid; and a program and system for the identification of a ribonucleic acid. The method as described above comprises: searching for nucleic acid sequence database by using a fragment mass set indicating the molecular weights and inner structural data of individual oligonucleotides that are obtained by tandem mass spectrometry on digested oligonucleotides formed by chemically or enzymatically cleaving a ribonucleic acid; scoring candidate sequences; among candidate sequences showing the highest scores, referring those showing scores exceeding the threshold as identified sequences; and using these identified sequences in mapping on nucleic acid sequence database including genomic sequences.06-30-2011
20110161272INTERFACE FOR CREATING AND EDITING BOOLEAN LOGIC - Boolean graphs and complex non-intuitive editors for authoring complex nested Boolean expressions can result in erroneous evaluation results by relying exclusively on the ability of an author of the Boolean expression to accurately incorporate operands into the Boolean expression to achieve the desired result. Functionality for analyzing the effect of operator changes can be incorporated into an intuitive graphical user interface for authoring the Boolean expression. The impact of the operator changes can be determined based on a position of the operator in the Boolean expression. Multiple evaluation orders for evaluating the operators and their associated operands can also be identified and presented to the programmer to resolve ambiguities, that may arise while evaluating the Boolean expression. The organization of the Boolean expression can be graphically depicted to reflect an evaluation order of the operators and their associated operands that comprise the Boolean expression.06-30-2011
20080256013ALGORITHMIC TRADING - Systems and methods of evaluating rules. Other embodiments are also described.10-16-2008
20110246408Rules Engine for Enterprise System - An example embodiment provides a process relating to an inference engine for enterprise systems and enterprise contracts. In the example, the inference engine receives a fact and stores it in an input queue. Then the inference engine retrieves the fact from the input queue and routes the fact to a schedule queue on the basis of the fact's processing schedule and a condition that is part of a rule. The inference engine retrieves the fact from the schedule queue in accordance with the processing schedule and routes the fact to a rule executer on the basis of the fact's contents. The rule executer applies an action to the fact, where the action is also part of the rule and the action transforms the fact or creates new facts. Then the inference engine routes the transformed fact or new facts to the input queue and possibly to a persistent storage device.10-06-2011
20110246407SYSTEM AND METHOD FOR HYBRID RETE REASONING BASED ON IN-MEMORY AND DBMS - A system and method for hybrid Rete reasoning based on memory and DBMS are provided. The system for hybrid Rete reasoning based on memory and DBMS includes a reasoning rule type classification means for classifying an input reasoning rule as one of one or more types. A network generation means generates a network depending on the classified reasoning rule type. A network execution means derives extended triples by applying a predetermined triple to the generated network.10-06-2011
20110264615LOCATION SOURCE DETERMINATION - The subject matter disclosed herein relates to systems, methods, etc. for location source determination. For example implementations, a method is described in which a request for a location of a user that is associated with a logical identifier is obtained. A determination may be made as to which type(s) of information (e.g., geographical information, calendar information, online information, etc.) is (are) to be used to obtain a location of the user based at least in part on one or more rules that are associated with the user. Other example implementations are described herein.10-27-2011
20080222072Analysing Documents - The text of a document is received and stored, it is analysed according to predetermined rules to identify pitfalls and features of the document, and a graphic displaying the pitfalls and features is created and displayed.09-11-2008
20130179389PROCESSOR FOR SITUATIONAL ANALYSIS - The present invention relates to a data-processing device, characterized in that it includes, in combination: a memory (07-11-2013
20130144829TRANSFORMATION OF A SOURCE MODEL TO A TARGET MODEL - An aspect of the invention includes transforming a source model to a target model. A source model is received and a transformation specification that includes a set of rules is accessed. Each rule includes a pattern description and a production component. The pattern description includes a pattern in the source model and the production component includes an algorithm for generating an output in the target model from the pattern. For each expression in the source model, the expression is decomposed into sub-expressions, matching rules in the transformation specification for the expression and the sub-expressions are detected, one of the matching rules having the most specific pattern description is selected, and the production component of the selected rule is executed to generate the output in the target model. The target model is created from the generated output.06-06-2013
20130173521KNOWLEDGE BASE FOR SERVICE TICKETING SYSTEM - A knowledge base system integrates with one or more ticketing systems. In accordance with some embodiments, the knowledge base system allows support technicians to apply articles to service tickets such that uniform resource locators for the articles are stored with the other data of the service ticket and can be seen when viewing a user interface that displays service ticket data. In accordance with some embodiments, the support technician can store an article in a service ticket without viewing the article if the support technician has previously viewed the current version of the article. If the support technician has not viewed the current version of the article, the knowledge base system requires the support technician to view the article before it can be applied to a service ticket.07-04-2013
20130173522SYSTEM AND METHOD FOR APPLYING DISTINGUISHING INDICIA TO LANGUAGE IN A MODEL - The present invention is a system to apply distinguishing indicia to language in a model includes a logic analyzer and a plurality of rules utilized by the system and the logic analyzer will utilize the rules to interpret written text to be read by a computer. The a logic display component will present the rules and a formal model controller that will read the written text and pass the written text to the logic analyzer, the formal model controller displays a result using the logic display component. The rules include a plurality of Boolean operators, a plurality of ASCII operators, a plurality of Latinate, a HTML URL underscore style, a plurality of XML operators, a plurality of colors, a plurality of shapes and a plurality of different types of brackets.07-04-2013
20120254090RULES EXECUTION PLATFORM SYSTEM AND METHOD - Methods, mediums, and systems are described for providing a platform coupled to one or more rules engines. The platform may provide runtime rule services to one or more applications. Different rules engines may be used for different types of rules, such as calculations, decisions, process control, transformation, and validation. Rules engines can be added, removed, and reassigned to the platform. When the platform receives a request for services from an application, the platform selects one of the rules engines to handle the request and instructs the selected rules engine to execute the rule. The rules engine may be selected automatically. The platform may be implemented through a service-oriented architecture.10-04-2012
20120254089Vector throttling to control resource use in computer systems - Embodiments of the invention relate to building a distributed reverse semantic index. In one general embodiment a plurality of documents are received with each document having at least one defined rule and or semantic. The documents are distributed among a plurality of nodes of a system. The documents are processed in a generally parallel fashion. Processing the documents includes processing text data of each of the document and breaking each document into fields to index the text data to create index data by deferring how to categorize the text data based upon the defined rule and or semantics. The indexed data is combined back together to create an indexer-agnostic semantic index including a plurality of the semantic index shards and to semantically classify the documents based on the index shards into groups based on document type to create the distributed reverse semantic index.10-04-2012
20080215519METHOD AND DATA PROCESSING SYSTEM FOR THE CONTROLLED QUERY OF STRUCTURED SAVED INFORMATION - A method for the controlled querying of information stored in a structured format in a data processing system using a dialog system includes: providing at least one first ontology configured to store information in a structured format; and providing at least one input grammar in the dialog system configured to analyze user inputs as a function of the at least one first ontology.09-04-2008
20080215518Filtering Rule Analysis Method and System - A filtering rule analysis system for analyzing the rules of a packet filtering process that is set in network devices includes: a rule storage for storing sets of rules for which an order of priority has been established; a matrix generator for generating matrix spatial data that contains information of the order of priority and that indicates the correspondence relation between a minimum region identified by starting points and end points of ranges of packet attributes described in each rule as the condition of application of that rule and those rules; and an overlap analyzer for referring to the matrix spatial data to analyze overlap between the rules.09-04-2008
20080215517Rule Based System and Method - A rule based computerised method is disclosed of developing and/or implementing and/or administering rule based systems such as legislation and/or policy and/or other rule sets, the method including:—developing a computerised database containing a set of rules in accordance with which the rule based system can be developed, written in and delivered; wherein the rules are:—written in natural spoken language to express the individual grammatical units constituting the rules, constrained in being written in accordance with defined constraints to limit the number of logical formats in which the rules can be expressed, and explicit in being written in a manner to avoid implicit meanings; whereby the rules are expressed in a logical format readily understandable to both humans and computers.09-04-2008
20130179388Method, System and Program Product for Intelligent Prediction of Industrial Gas Turbine Maintenance Workscope - A computer-implemented maintenance/repair workscope development tool uses one or more sources of gas turbine engine/fleet operational condition data, gas turbine engine/fleet historical data and gas turbine engine/fleet specific information, including other historical, statistical and maintenance/engineering records data to develop a recommended maintenance/repair workscope. A method, system and program product are described for producing a recommended maintenance/repair workscope for individual machines and/or machines on a fleet level. Relevant domain knowledge/information models along with appropriate application rules defining maintenance/repair requirements are predetermined and maintained in a network accessible database/repository. A rules/reasoner engine is used to develop logical inferences and make intelligent workscope choices based upon user input situational data, operational condition data stored in data/information databases and the predetermined knowledge/information models and rules. A disclosed non-limiting example workscope prediction/recommendation tool develops quantitative recommendations for the type of work needed to be performed to an individual gas turbine engine or an entire fleet.07-11-2013
20130103632COMPOSITE PRODUCTION RULES - A method for forming and using a composite production rule may include compiling, by a computer system, a decision table or a decision tree to generate a composite production rule. The method may also include generating the composite production rule and selecting, by the computer system, an algorithm for compiling the composite production rule. The method may additionally include compiling, by the computer system, the composite production rule into an executable program based on pattern matching of the selected algorithm. The method may further include executing, by the computer system, the composite production rule to provide an output based on the composite production rule.04-25-2013
20130103630FUZZY INFERENCE METHODS, AND APPARATUSES, SYSTEMS AND APPARATUS USING SUCH INFERENCE APPARATUS - A health monitoring system for complex networked apparatus includes a number of neuro-fuzzy inference apparatuses feeding inference results into a data fusion hierarchy. At each level in the hierarchy, fuzzy inference is applied to generate a desired output signal by processing selected input signals in accordance with a knowledge base defining fuzzy membership functions and fuzzy inference rules defined in advance. The knowledge base includes alternative definitions of membership functions and/or inference rules. The apparatus selects which definition to use according to environmental or other conditions, and predetermined selection criteria.04-25-2013
20130103631PROCEDURAL CONSTRAINT ENGINE FOR PRODUCT CONFIGURATION - Various systems and methods for integrating procedural logic with a stateless constraint engine are disclosed. One method involves accessing a first set of values generated by a stateless constraint engine based upon a first set of inputs and then accessing a second set of values generated by the stateless constraint engine subsequent to the first set of values and based upon a second set of inputs. The second set of values is validated based upon a procedural constraint. The procedural constraint can include a precondition and a postcondition. The precondition is dependent upon at least one value from the first set of values, and the postcondition is dependent upon at least one value from the second set of values.04-25-2013
20130124446DETECTING DISALLOWED COMBINATIONS OF DATA WITHIN A PROCESSING ELEMENT - Techniques are described for detecting disallowed combinations of data within a processing element. Embodiments of the invention may generally receive data to be processed using the processing element and determine whether the received data and a current working state violate one or more rules describing disallowed combinations of data. If a disallowed combination is detected, embodiments of the invention may handle the processing of the received data in an alternate way that prevents disallowed combinations of data within the processing element.05-16-2013
20110276530MANAGED OBJECT SUPPORT - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining, at a policy and charging rules node, that the policy and charging rules node should perform a policy decision; comparing a criteria portion of at least one rule of a plurality of rules to a set of context information; identifying a rule of the plurality of rules that matches the set of context information; determining that a result portion of the identified rule includes a reference to a first managed object; and using the first managed object as at least part of a result of the policy decision.11-10-2011
20130132322SCALABLE, RULE-BASED PROCESSING - A system, method and computer program product for scalable, rule-based processing, including an automaton builder for constructing automatons corresponding to trigger rules and word lists that are employed by the trigger rules, and a rule evaluator for evaluating any of the trigger rules with respect to an input document by selecting any of the automatons to evaluate a given one of the trigger rules, parsing the input document using the selected automatons, determining whether conditions of the given trigger rule are met, and identifying any actions that are associated with the given trigger rule.05-23-2013
20130132324APPLICATION OF NORMATIVE RULES IN A VIRTUAL UNIVERSE - The present invention teaches methods for applying an avatar behavior rule within a virtual universe environment. An avatar behavior rule and a violation threshold for the rule are defined for a virtual universe environment. The behavior of a collective plurality of avatars within the virtual universe is monitored for compliance with the rule, including determining an amount of compliance with the rule and comparing the compliance amount with the violation threshold. If the compliance amount does not exceed the violation threshold but avatars are complaining that the monitored behavior of another of the avatars is at an objectionable level, then the rule or the violation threshold is revised until the monitored behavior of the collective plurality of avatars within the virtual universe exceeds the revised violation threshold, or none of the avatars is complaining.05-23-2013
20130132323SYSTEMS AND METHODS FOR RISK STRATIFICATION OF PATIENT POPULATIONS - A statistical processing system includes a server operably configured with program instructions implementing a plurality of statistical models to at least one of (a) predict a health outcome based on questionnaire responses, (b) assist a patient's choice of therapeutic modality based on questionnaire responses, and (c) assess a health risk or status based on questionnaire responses. Also provided is a research agency communicating with the server and contracted to provide the statistical models using a visual interface communicated by the server. The server is configured to analyze requests received from users relating to a plurality of said statistical models to reduce redundancy in requests for patient data.05-23-2013
20080208785USER INTERFACE METHODS AND APPARATUS FOR RULES PROCESSING - The invention provides, in one aspect, a user interface method that includes processing one or more BPM or other rules with a rules engine executing on a server digital data processor. The rules engine generates, for presentation on a client device, a user interface having one or more display, input or other elements specified by those rules. Related aspects of the invention provide methods as described above in which the rules engine generates the user interface dynamically, e.g., selecting and/or configuring the elements that make up that interface concurrently with the client-server session during which the interface (e.g., web page or other user interface paradigm) is requested by, transmitted to, and/or presented by the client device. Further aspects of the invention provide such a method, where the rules engine generates the interface, e.g., web page, with embedded BPM or other rules that are executed by the client device and that support automated decision-making, e.g., in the manner of rules executed by the rules engine itself.08-28-2008
20080201288METHOD, SYSTEM AND PROGRAM PRODUCT FOR IDENTIFYING CACHING OPPORTUNITIES - A method, system and program product for identifying caching opportunities is provided. The method includes identifying one or more data sources stored on a database system that are utilized by an application, establishing a pre-set read-update ratio threshold for data accessed from a data source, and tracking the read-update ratio threshold for data accessed from the data source, such that exceeding the pre-set read-update ratio threshold for the data accessed identifies a caching opportunity. The method further includes defining an action to be taken when the pre-set read-update ratio threshold for the data accessed from the data source has been exceeded and taking the action defined when the pre-set read-update ratio threshold for the data accessed from the data source has been exceeded. The action defined includes either advising a user of an opportunity to cache the data accessed or automatically caching the data accessed from the data source.08-21-2008
20100287131SYSTEM AND METHOD FOR DYNAMIC MULTI-PLATFORM HANDLER ASSIGNMENT - According to one embodiment, an intelligent contact handler management system can proxy contact inquiry requests, aggregate contact handler availability, capability and expertise and dynamically select, reserve and assign an optimal contact handler from a group of contact handlers to the contact inquiry. An intermediate communications proxy mediates customer inquiry requests and manages communications between a central contract management server and a plurality of communication sub-systems in communication with contact handlers. Community derived expertise information is used to select a contact handler.11-11-2010
20100287130SIGNAL MANAGEMENT SYSTEM FOR BUILDING SYSTEMS - A system and approach for efficient algorithmic signal management for buildings. When a set of signals is received, attributes of the signals may be extracted from a database. The attributes of the signals may be matched against the rule conditions in the database. The matches may be compared to the rules to find the rules which have all of the conditions satisfied. These rules may be executed to modify the further processing of the signals. A signal for instance may be an alarm.11-11-2010
20110238608METHOD AND APPARATUS FOR PROVIDING PERSONALIZED INFORMATION RESOURCE RECOMMENDATION BASED ON GROUP BEHAVIORS - An approach is provided for suggesting information resources based on context, preferences, and group behavior of a community, culture, country, or combination thereof that the user belongs to. A recommendation application applies one or more rules to select a weight value for tokens within a language topology based upon group behaviors of a community, culture, country, or combination thereof that a user belongs to. The recommendation application adjusts semantic structures of a plurality of information resources based upon the weighted topology. The recommendation application suggests one or more of the information resources to the user based, at least in part, on the adjusted semantic structures.09-29-2011
20130151456SYSTEM AND METHOD OF MATCHING CONTENT ITEMS AND CONSUMERS - A matching between content items and consumers is discloses. More particularly, items and consumers are matched using a matching approach that uses capacity constraints associated with each consumer, capacity constraints associated with each item, and relationship weights, each relationship weight representing a similarity between a consumer and an item. Edges representing the relationships between consumers and items can be selected using an iterative selection that includes a matching approach that permits capacity constraints. Alternatively, edges can be selected using an iterative approach that allows a solution to be identified prior to completion of the selection processing.06-13-2013
20130151457Method and Arrangement for Content Prioritization - The invention concerns a method for determining priority of a data item, the data item being sent from at least one first terminal or service associable with the first terminal to a second terminal and evaluated using a set of first rules associable with the sender of a data item and a set of second rules associable with the recipient of a data item. The invention is characterized in that the data item is associated with at least one tag characterizing the data item, weight factor for the data item is maintained using the set of first rules and the value of the at least one tag, the weight factor of the data item is made adjustable by the set of second rules and the data item is rendered on the second terminal using at least the weight factor information. Also an arrangement implementing the method is disclosed.06-13-2013
20130151458Method and Apparatus for Accelerated Data Quality Checking - Disclosed herein is a method and apparatus for hardware-accelerating various data quality checking operations. Incoming data streams can be processed with respect to a plurality of data quality check operations using offload engines (e.g., reconfigurable logic such as field programmable gate arrays (FPGAs)). Accelerated data quality checking can be highly advantageous for use in connection with Extract, Transfer, and Load (ETL) systems.06-13-2013
20100318487SELF-LEARNING INTEGRITY MANAGEMENT SYSTEM AND RELATED METHODS - An integrity management system predicts abnormalities in complex systems before they occur based upon the prior history of abnormalities within the complex system. A topology of the nodes of a complex system is generated and data is collected from the system based on predetermined metrics. In combination with dynamic thresholding, fingerprints of the relevant nodes within a complex system at various time intervals prior to the occurrence of the abnormality are captured and weighted. The fingerprints can then be applied to real-time data provide alerts of potential abnormality prior to their actual occurrence.12-16-2010
20100318486SYSTEM AND METHOD FOR AUTOMATING PROACTIVE COMMUNICATION - A system and method for automating proactive communication. The information for the desired contacts may be accepted from a user. A selection of contact communication frequency preferences may be received from a user. An automatic communication to one of the desired contacts may be initiated. The user may be allowed to cancel the automatic communication, in response to receiving a notification that the communication is about to begin. A response indicative of the communication status may be received. Rules and preferences may be optimized based upon the received response.12-16-2010
20120284221METHODS AND APPARATUS FOR ANALYZING SYSTEM EVENTS - Apparatus and methods facilitate analysis of events associated with a plurality of computer systems. Event occurrence items are compared with event rules of event rule sets associated with each computer system to determine whether the items are potentially significant as determined by matching with the event rule sets. A scorer associated with each computer system assigns a score to each event occurrence item to provide a relative indication of the potential significance of the event occurrence item. An interface is used to query the scored event occurrence items from each of the plurality of computer systems.11-08-2012
20120284220ADAPTIVE TIMELOG SYSTEM - An adaptive time log system that includes computer based systems and methods for monitoring, recording categorizing and reporting user activity on a timeline basis is provided.11-08-2012
20130159238Custom Rule Based Determination of Pricing Information - Determining a pricing information for an instance of an application program comprises: receiving a software discovery result for the application program instance; receiving at least one custom rule associated with an application program indicated in the software discovery result; evaluating, by a rule engine, one or more conditions of the received at least one custom rule on one or more parameter values of the received software discovery result; and in dependence on a result of the evaluation, processing the at least one custom rule, the processing comprising determining the pricing information for the application program instance.06-20-2013
20130159237METHOD FOR RULE-BASED CONTEXT ACQUISITION - Methods and systems for rule-based context acquisition are disclosed herein. The method includes accepting a request for target context from an application at a context acquisition system and identifying context rules relating to the target context using a rule-based inference cache. The method also includes determining an inferred value of the target context based on previously-acquired contexts and the context rules. If the inferred value of the target context cannot be determined, the method further includes executing a first step of a sensing plan for acquiring an inferred value of the target context using a rule-based acquisition planner, as well as executing any of a number of subsequent steps of the sensing plan until the inferred value of the target context is obtained.06-20-2013
20130185243ALERT MANAGEMENT SYSTEM AND METHOD - A system and related method for automating alert decision-making in a computer network are disclosed. The system and method act to receive an alert request from an event management system, and then carries out operations using several sets of inference rules, associating the alert request to a generic conceptual data model of alert request and alert resolution. The generic model is specialized to represent the specific environment being monitored. The alert request is enriched with contextual and network information in order to generate one or several alert resolution actions.07-18-2013
20130185240Rule-Based Binding - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for rule-based binding. In one aspect, a method includes receiving first input to a graphical user interface (GUI) associating a property of a data model presented in the GUI with a data view component of a document presented in the GUI, wherein a change to a value of the data view component is reflected in a value of the property in the data model when the document is used in a workflow, and wherein the workflow is a logical sequence of documents, including the document, that is processed according to the logical sequence such that values for one or more data view components associated with the documents are received.07-18-2013
20130185241DYNAMIC DETERMINATION OF NEEDED AGENT RULES - A method for updating rule statistics in an execution environment by an agent that utilizes a rule engine, comprising collecting an activation statistic when a rule is activated, collecting a firing statistic when a rule is fired; and storing the activation statistic and the firing statistic in a rule history once processing by the rule engine is complete.07-18-2013
20130191316USING THE SOFTWARE AND HARDWARE CONFIGURATIONS OF A NETWORKED COMPUTER TO INFER THE USER'S DEMOGRAPHIC - System information relating to the hardware and software configuration of a networked client computer is used by a server from which the client computer has requested information to infer demographic characteristics of the user of the client computer. The system information provided to the server gathered from the use of network browser software by the client computer is used by the server to add customized content to the information requested by the client computer. Inferring demographic characteristics of the user involves application of predetermined demographics inference rules stored by the server to the client computer configuration information provided by the client.07-25-2013
20110320395Optimization of Multi-channel Commerce - Content provided by a decision engine system is described. Content, stored in a server system, is provided to a plurality of display units at a plurality of touch point devices. One or more features are determined to optimize the content provided to the plurality of display units. The content is updated syndicated across the plurality of display units at the plurality of touch point devices based on the determination.12-29-2011
20110320396SYSTEMS AND METHODS FOR ANALYZING AND SYNTHESIZING COMPLEX KNOWLEDGE REPRESENTATIONS - Techniques for analyzing and synthesizing complex knowledge representations (KRs) may utilize an atomic knowledge representation model including both an elemental data structure and knowledge processing rules stored as machine-readable data and/or programming instructions. One or more of the knowledge processing rules may be applied to analyze an input complex KR to deconstruct its complex concepts and/or concept relationships to elemental concepts and/or concept relationships to be included in the elemental data structure. One or more of the knowledge processing rules may be applied to synthesize an output complex KR from the stored elemental data structure in accordance with an input context. Multiple input complex KRs of various types may be analyzed and deconstructed to populate the elemental data structure, and input complex KRs may be transformed through the elemental data structure to output complex KRs of different types, providing semantic interoperability to KRs of different types and/or KR models.12-29-2011
20120005147INFORMATION LEAK FILE DETECTION APPARATUS AND METHOD AND PROGRAM THEREOF - A technique for collecting information concerning those files distributed on a file sharing network and for detecting an information leak file to take corrective measures is provided. Supervised information is generated by adding as attributes a file type, a speech-part appearance frequency of words making up a file name and a result of human-made judgment as to whether a file being inspected is the information leak file to key information collected from the file sharing network. Next, the supervised information is input to a decision tree leaning algorithm, thereby causing it to learn an information leak file judgment rule and then derive a decision tree for use in information leak file judgment. Thereafter, this decision tree is used to detect the information leak file from key information flowing on the file sharing network, followed by alert transmission and key information invalidation, thereby preventing damage expansion.01-05-2012
20120016831SIMULATION AND TEST FRAMEWORK FOR A RULE ENGINE - Some embodiments of a simulation and test framework for a rule engine have been presented. In one embodiment, a simulator runs a simulation in a time-aware environment. A rule engine, coupled to the simulator, may execute a set of business logic in response to the simulation in order to test behavior of the business logic. The business logic may include rules, workflow, and event processing.01-19-2012
20120030160METHOD AND SYSTEM FOR PROVIDING DECISION MAKING BASED ON SENSE AND RESPOND - According to an embodiment, the present invention provides a method for providing automated decision in response to one or more responses. The method includes providing, at a computer system, a user interface for receiving input from a user. The method also includes detecting a first event. The method further includes receiving a first set of attributes associated with the first event. Also, the method includes processing the first set of attributes. The method additionally includes analyzing the first set of attributes using at least pattern recognition. The method includes determining a first context for the first event based at least on the first set of attributes.02-02-2012
20130198127SYSTEMS AND METHODS FOR MANAGING WIDE AREA NETWORKS - Systems and methods described herein provide automatic generation of one or more application fingerprints which may be used to identify and recommend one or more technologies and/or technical instructions for use within a WAN environment. Input data describing and an application fingerprint for one or more applications currently used within a network environment, such as a WAN environment, is received and executed against a set of rules by a rules engine. Based on the results, one or more recommendations may be provided that identifies various technologies and/or technical procedures the network manager may implement and/or perform.08-01-2013
20130198128CONTEXT-AWARE APPARATUS AND METHOD FOR IMPROVING REASONING EFFICIENCY THEREOF - Techniques for reasoning in a context-aware apparatus are provided. The context-aware apparatus includes least an input, an input selector, and a reasoning component. The information selector selects input information that satisfies a particular condition from among the information received by the input of the context-aware apparatus. The reasoning component performs context-aware reasoning based on the selected input information that satisfies the particular condition.08-01-2013
20130204828System and Method for Enhanced, Flexible Mail Address Validation and Hygiene - A method for reformatting and updating mailing addresses in a mailing address database to maximize postal rate discounts while enforcing a set of business rules dictating the circumstances under which individual mailing addresses may be changed and for setting a disposition status for each mailing address based on the application of the business rules and the outcome of process to reformat and update the mailing addresses.08-08-2013
20130204830System and Method for Efficiently Generating Association Rules - A data processing system processes data sets (such as low-resolution transaction data) into high-resolution data sets by mapping generic information into attribute-based specific information that may be processed to identify frequent sets therein. When association rules are generated from such frequent sets, the complexity and/or quantity of such rules may be managed by removing redundancies from the rules, such as by removing rules providing only trivial associations, removing rules having only a part group as the consequent, modifying rules to remove redundant antecedent items and/or filtering subsumed rules from the generated rule set that do not provide sufficient lift to meet an adjustable specialization lift threshold requirement.08-08-2013
20130204829PSEUDO MESSAGE RECOGNITION BASED ON ONTOLOGY REASONING - In some examples, a method for recognizing a pseudo message is described. The method may include receiving a message intended for a recipient having an associated recipient Ontology. The method may also include semantically analyzing content of the message to determine whether the content is inconsistent with any rules in the recipient Ontology. The method may also include, upon a determination that the content is inconsistent with a rule in the recipient Ontology, authenticating the message as a pseudo message.08-08-2013
20120084246DECISION-MAKING METHOD, DECISION-MAKING SYSTEM, AND POLICY DECISION FUNCTION - A decision-making method, a decision-making system, and a PDF are disclosed herein. The decision-making method comprises: receiving application session data that carries access network data and access user data; and making policy and charging decisions according to the application session data. Through the decision-making method, decision-making system, and PDF, the application session data comprises access network data and access user data of the UE so that the PCRF can uniquely determine a user according to the access network data or the access user data and the IP address allocated by the network to the UE, and make policy and charging decisions.04-05-2012
20120084245POSITIONALLY DEPENDENT PATTERN CHECKING IN CHARACTER STRINGS USING DETERMINISTIC FINITE AUTOMATA - An apparatus including logic to receive a data packet comprising a string of characters, said apparatus having a plurality of states and at least one state for every character position in the string of characters; logic to examine the string of characters for matches with a plurality of predefined values, beginning with an initial character; and logic to execute forward exit transitions from any of the plurality of states based upon the examination of the characters, wherein a current state of the apparatus represents a count of a number of characters from the initial character of the string of characters.04-05-2012
20130212058System and Method for Making Decisions Using Network-Guided Decision Trees With Multivariate Splits - Disclosed herein is a system and method for splitting data using graph theory with more precision than traditional decision trees, but less work than an exhaustive listing of all possible groups. Accordingly, a set of attributes is found for which corresponding data gives a highest score, the score being a function of data attributes, such as count and purity.08-15-2013

Patent applications in class Ruled-based reasoning system

Patent applications in all subclasses Ruled-based reasoning system