14th week of 2010 patent applcation highlights part 49 |
Patent application number | Title | Published |
20100088223 | Preauthorized Electronic Fund Transfer For Future Cash Advances - Methods of providing a loan are presented. Short term loans (e.g., payday loans) can not be rolled over automatically. Still, a roll over of a short term loan can be simulated. A lender server can be configured to provide a new loan application to a borrower. The borrower can submit the new loan application along with an electronic signature representing an authorization for one or more electronic fund transfers to payback the initial loan or to deposit new funds, less possible applicable fees, into an account of the borrower. Furthermore, the initial loan can be paid back by coordinating a payroll deduction with the employer of the borrower. | 2010-04-08 |
20100088224 | NATIONAL FORCLOSURE INTERVENTION AND PREVENTION METHODS AND FUTURE LENDING MODEL - Systems and methods are provided herein that provide for national foreclosure invention and prevention. | 2010-04-08 |
20100088225 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING ELECTRONIC VALUE CERTIFICATES - A method, apparatus, and computer program product are provided, which may provide electronic value certificates. An apparatus may include a processor configured to access a moblet template from a moblet template provider. The processor may also be configured to customize the moblet template to define a moblet. The processor may further be configured to add value to the moblet. The processor may additionally be configured to provide the moblet to a remote device. The processor may also be configured to receive an update to the moblet. Corresponding methods and computer program products are also provided. | 2010-04-08 |
20100088226 | System and Method to Facilitate Charitable Giving - The invention comprises a process, design, and conceptualization of a global philanthropic fundraising effort, centered around a special day of recognition for each individual citizen in the USA and worldwide. The funds derived from pledges are to be used for charitable giving for such needs as Global AIDS and World Hunger. The invention enables a website and toll-free phone system that allows an individual to highlight the recognition of a person's special celebration with a nominal gift of giving back to the less fortunate and those in the world who are in most desperate need by making a monetary pledge to a charitable organization. In return, the pledge person or designated recipient will receive a personalized E-GRAM or recorded telephone call from an important, nationally or internationally known, celebrity. | 2010-04-08 |
20100088227 | Secure Financial Transactions - a primary account number (“PAN”) of a conventional credit or debit account with a bank or other financial institution is emulated or simulated, which incorporates, in encrypted form, the actual account number. The simulated PAN may also incorporate an amount to be debited from that account. Thus, an account number and an amount are encrypted and mapped into a string of digits which appears to be a valid PAN. The actual account number and the transaction amount are thus embedded in the simulated PAN. The simulated PAN is then processed by existing financial transacting infrastructure, with the issuing bank knowing that it is not a PAN and that the appropriate digits are to be decrypted to provide the embedded account number and the embedded amount. In one application, a transactor wishing to effect a financial transaction, generates a simulated PAN and supplies it to a supplier of goods or services from whom he wishes to purchase said goods or services. The supplier enters the simulated PAN and the amount of the transaction in a conventional way. This data is then transmitted to an acquiring bank, which onwardly transmits it to the issuing bank for authorisation. The issuing bank then extracts the embedded account number and embedded amount, checks that the embedded amount and the supplied amount are the same (as well as other conventional checks), and if they are the same authorizes the transaction. Those skilled in the art will appreciate that, in most instances, a transactor is required to provide an expiry date and a card verification value (“CVV”). Either or both of these could also be simulated and used to encrypt information | 2010-04-08 |
20100088228 | Method and System For Dual Layer Authentication For Electronic Payment Request In Online Transactions - Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established. | 2010-04-08 |
20100088229 | VALUE MANAGEMENT METHOD IN A PREPAID DEVICE - A method to secure a prepaid device for access to audio/video content having the possibility of reimbursement of the unused balance upon presentation of the aforementioned device to a control center by managing an account value in the prepaid device, the prepaid device including an identifier unique to each device and a control value, the method comprising: receiving of a request to modify the account value by an amount; calculating a new account value by modifying the account value by the amount, determining a number of steps, the number of steps being determined according to a function expressing the modification of the new account value relative to the account value; and modifying the control value by executing at least one one-way function on said control value a number of times equal to the number of steps. | 2010-04-08 |
20100088230 | Method of authorizing automated banking machine use responsive to user data read from data bearing records - An automated banking machine operates responsive to data read from data bearing records, such as user cards, to cause machine user authorization and financial transfers. Account data read from a user card is associated in a data store with a server address, where a document is located. The document includes machine instructions for displaying a customer interface uniquely associated with the particular banking institution where the user holds the account. The customer interface includes user-selectable transaction options. The arrangement enables the customer interface of the user's home bank, with which the user is familiar, to also be automatically displayed to the user when the user operates automated banking machines of other banks. | 2010-04-08 |
20100088231 | METHOD FOR PERFORMING A DIGITAL CASH TRANSACTION - A method for performing a digital monetary transaction between a payer and payee comprising the steps of receiving a digital-cash value requested to be withdrawn from an account of a payer; generating a digital-cash code that is associated with the requested digital-cash value and communicating the digital-cash code to the payer; receiving the digital-cash value and the digital-cash code from a payee requesting to deposit the amount specified by the digital-cash value; comparing the received digital-cash value and the digital-cash code to confirm an association; and transferring funds of the amount specified by the digital-cash value to the payee. A system including a central digital-cash system and a network interface preferably can preferably operate the method. | 2010-04-08 |
20100088232 | VERIFICATION MONITOR FOR CRITICAL TEST RESULT DELIVERY SYSTEMS - A system and method for verification monitoring of a critical test result management (CTRM) system is provided. In one embodiment, the method includes receiving test result metadata pertaining to test result messages provided to a CTRM system by a diagnostic test facility, verifying compliance of the diagnostic test facility with prescribed usage of the CTRM system using the test result metadata, and sending a message to an interested party regarding whether or not compliance of the diagnostic test facility has been verified. | 2010-04-08 |
20100088233 | ELECTRONIC DATA VAULT PROVIDING BIOMETRICALLY PROTECTED ELECTRONIC SIGNATURES - An eVault system securely stores personal data and documents for citizens and allows controlled access by citizens and optionally by service providers. The eVault may be adapted to allow processes involving the documents to be carried out in a secure and paperless fashion. Documents are certified, and biometric matching is used for security. On effecting a match with a biometric identifier presented by a user, the user is allowed access to his personal eVault and to access a personal cryptographic key stored therein. One or more of these personal keys may be securely applied within the eVault to generate an electronic signature, amongst other functions. | 2010-04-08 |
20100088234 | UNIFIED ANALYTICS ACROSS A DISTRIBUTED COMPUTING SERVICES INFRASTRUCTURE - Methods and systems for providing unified analytics across a distributed computing services infrastructure are disclosed. Embodiments include providing an application identifier for an application created by a developer and, during an execution of the application, collecting and storing analytic data with an association with the application identifier and an authenticated developer identifier. Other embodiments may include collecting and storing analytic data with the association further including an authenticated user identifier and/or a device identifier for a device of a user-defined group or mesh. Access mechanisms, report generation, and billing based on the analytic data and associated application identifier are also disclosed. The disclosed methods and systems allow for unified reporting and correlation of analytic data across multiple services of a distributed computing services infrastructure. | 2010-04-08 |
20100088235 | SYSTEM AND METHOD FOR MEDIA CONTENT DISTRIBUTION - The present disclosure provides a system and method for media content distribution. In one exemplary embodiment, a method is provided and includes receiving a request from a user for a replacement copy of a specific media content. The request includes an indication from the user that they have an original copy of the specific media content. Media validation information is received from the user to validate the original copy of the specific media content. The replacement copy of the specific media content is provided to the user based on the media validation information. In one embodiment, providing the replacement copy of the specific media content to the user based on the media validation information comprises conditioning a payment action for the replacement copy based on the media validation information. | 2010-04-08 |
20100088236 | SECURE SOFTWARE SERVICE SYSTEMS AND METHODS - In one embodiment the present invention includes a method of performing a secure transaction in a software system, such as a software service system, for example. Embodiments of the invention include encoding symmetric keys for securing transactions between a service consumer and service provider. Asymmetric keys are also used for providing additional security during transactions. In one embodiment, license tokens and capability tokens are encoded and passed between a service consumer and service provider for allowing a consumer secure access to authorized services. | 2010-04-08 |
20100088237 | METHODS AND SYSTEMS FOR USING PHYSICAL PAYMENT CARDS IN SECURE E-COMMERCE TRANSACTIONS - Pursuant to some embodiments, methods, systems, apparatus, computer program code and means for conducting an online transaction by a user operating a computer are provided which include identifying, at the computer, that the user has selected a secure payment option during a transaction with a merchant. The computer is caused to enter a private session. During the private session, payment card data from a physical payment card held by the user is received, and the payment card data is forwarded to a payment provider to cause the payment provider to provide substitute payment card details to the merchant to complete the transaction. | 2010-04-08 |
20100088238 | Method and system utilizing an interactive, descending, sale-price meter used to optimize negotiation-free, sales offers - A method and system to determine a fair sales price for items displayed on an advertising space with connectivity to the internet. This method and system facilitates negotiation free, transactions (like, but not limited to, real-estate sales) regulated by a unique fluctuating, regressive, digitally displayed sale price in an interactive, electronic advertising space utilizing a database. The system includes algorithms that are hosted on a server such that space is provided for property owners and prospective buyers to determine an acceptable offer on advertised property. Set parameters, which regulate the sale price amount displayed on the property's advertisement. This interactive, digital/graphic, sale-price display which regressively descends at varying rates, as manipulated by the property listing representative registered with the system, until the displayed sale price is selected by a buyer. Once the buyer offer is submitted, the host application stops further price deductions and accepts the offer for closing. | 2010-04-08 |
20100088239 | Collaborative Negotiation Methods, Systems, and Apparatuses for Extended Commerce - A round of negotiation for an item is initiated between a plurality of bidders at a plurality of client nodes and a host processing node. A price bid for the item is received from each of the plurality of bidders. At least one negotiation parameter is received from at least one of the plurality of bidders. The negotiation parameter is associated with the item. A total cost value is determined based on an active negotiation term, the price bid, and the negotiation parameter for each of the plurality of bidders. | 2010-04-08 |
20100088240 | CONSTRUCTION COST ESTIMATING AND SCHEDULING SYSTEM AND METHOD - A computer system for determining an escalated estimated project cost and an estimated schedule for a project including a plurality of activities having a plurality of cost items. The computer system is operable to determine: a critical path for the project based on the amount of critical days to include on the critical path for each activity, a pre-escalation cost for each cost item of each activity, a pre-escalation cost for each activity, a pre-escalation total project cost, a cost escalation for each activity, a cost escalation for the project, and an escalated estimated cost of the project, and the computer system is operable to generate a report of the pre-escalation total project cost, the escalated estimated project cost, and the estimated project schedule based on the critical path. | 2010-04-08 |
20100088241 | INTEGRATED SYSTEM FOR MONITORING WORK FLOW IN AN ORGANIZATION - A method of controlling workflow through a variety of departments in the organization each of which has different functions and responsibilities with regard to the completion of a program or project. The method, and program by which the method is implemented, monitors work related activities to assist personnel in coordinating the workflow within each department with that in the other departments. The program by which the method is implemented is designed to manage workflow activities and govern them in such a way that mistakes are substantially eliminated. This is accomplished by eliminating the need for repetitive entries of the same information, thus minimizing the workload of managing information within each department. | 2010-04-08 |
20100088242 | METHOD FOR MORTGAGE FRAUD DETECTION - A method of detection of fraud in a mortgage application: in a computer system, maintaining a database of sales prices of real properties in a geographic area where the property is located; obtaining a valuation history for the property; obtaining historical sales data for similar properties in the geographic area; computing price ratios using these valuation histories; computing a distortion index based on the price ratios, the distortion index indicating the likelihood of a fraudulent valuation. | 2010-04-08 |
20100088243 | System and Method for Selecting and Protecting Intellectual Property Assets - The present invention relates to systems and methods for intellectual property asset selection and protection. In an embodiment, an intellectual property selection system receives from an innovator an innovation submission describing an innovation. An intellectual property protection system receives at least a portion of the innovation submission and manages obtaining an intellectual property legal right related to the innovation. An intellectual property asset management system receives and stores at least one of an innovation description and an intellectual property legal right description, where the innovation description is based at least in part on the at least a portion of the innovation submission and the intellectual property legal right description is based at least in part on the intellectual property legal right. | 2010-04-08 |
20100088244 | System and Method for Developing and Implementing Intellectual Property Marketing - The present invention relates to methods for the development and implementation of intellectual property marketing. A targeted innovation to fulfill an internal need is developed. Actions are taken to legally protect the targeted innovation as an intellectual property asset. The intellectual property asset is analyzed to determine a marketing assessment. A decision is made whether to market the intellectual property asset based at least in part on the marketing assessment. If the marketing assessment meets a predetermined threshold, the intellectual property asset is marketed. | 2010-04-08 |
20100088245 | SYSTEMS AND METHODS FOR DEVELOPING STUDIES SUCH AS CLINICAL TRIALS - Systems and methods are described for developing studies such as clinical trials, including computer-assisted recruitment or selection of patients, clinical trial investigators, facilities, or clinical trial study sites. In certain examples, computer-processing of physician records scores physicians potential investigators, as determined from at least one physician characteristic, and the physician's proximity to the nearest clinical trial study site. Clinical trial study sites are also scored. In certain examples, at least one physician characteristic is used to score potential clinical trial study sites. Processes for engaging physicians and their patients in clinical trial studies are also described. Suitable patients can be contacted through their physicians or other caregivers to participate in the clinical trial study. | 2010-04-08 |
20100088246 | SYSTEM FOR, AND METHOD OF, MANAGING A SOCIAL NETWORK - A system for, and method of, managing multiple communications between a plurality of users in a social network wherein a first user sends a request to initiate a communication exchange with a second user. The system restricts the maximum number of pending unanswered requests by a user. The system encourages selectivity in solicitation. | 2010-04-08 |
20100088247 | CONSTRUCTION PAYMENT MANAGEMENT SYSTEM AND METHOD WITH DOCUMENT TRACKING FEATURES - A system and method of managing a construction payment process involving a plurality of participants associated with the construction project and at least one document to be transferred between at least two participants of the plurality participants during the course of the construction project. One method can include assigning at least one enforcement action to the at least one document wherein the enforcement action is automatically effected if the document is not transferred between the at least two participants. | 2010-04-08 |
20100088248 | TARIFF MANAGEMENT CONFIGURATION AUTOMATION - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating a new tariff and/or billing configuration for a tariff and/or billing plan on a computer based system using an entity framework for an hierarchical arrangement of entities, the hierarchical arrangement representing a tariff and/or billing configuration, with each entity representing one or more characteristics of the configuration. One method provides that the entity framework is populated by copying an existing entity and/or by generating a new entity. | 2010-04-08 |
20100088249 | Trade Risk Management - Disclosed herein is a computer implemented method and system for managing financial risk involved in trading of multiple financial instruments between multiple counterparties. A risk profile is determined for each of the counterparties based on transaction data provided by the counterparties. The transaction data relates to trading of the financial instruments. Individual prices for multiple predefined maturity periods of the financial instruments are provided by the counterparties based on the risk profile. A consensus price is created for each of the predefined maturity periods based on the individual prices. The created consensus price is compared with each of the individual prices provided by each of the counterparties. The financial risk is computed for each of the counterparties based on multiple predefined parameters and the comparison. The computed financial risk of each of the counterparties is modified by each of the counterparties for the management of the financial risk. | 2010-04-08 |
20100088250 | Auction Method and Platform - A computer system and method evaluates and auctions financial instruments on a networked auction platform. The auction platform may be accessed via the Internet. Auction participants that have provided required participant information are registered in a database, and may include one or more registered sellers and registered buyers. An inventory of a registered seller's financial instruments is received and stored via the auction platform. An auction event is initiated the inventoried financial instruments in response to an auction request. Direct, integrated access is provided to a data and analytics tool that provides cash flow modeling that allows investment cash flow analysis and assessment of underlying risk of default based upon assumptions input by a registered buyer and past performance data. The cash flow analysis and risk assessment may be used by the registered buyer to determine a bid price or bid range for the financial instrument, or a decision not to bid may be made. | 2010-04-08 |
20100088251 | Business Process Diagram (BPD) component analysis - Systems, methods, and other embodiments associated with business process diagram (BPD) component analysis are described. One example method includes accessing a BPD having a BPD component for which a mapping to a business process execution language (BPEL) component is to be automatically produced by a computer. The example method may also include detecting a join gateway in the BPD. The example method may also include manipulating the mapping to identify that resolution of the join gateway is to be determined by gateway resolution upon determining that the join gateway is not going to receive a loop back edge. | 2010-04-08 |
20100088252 | METHODS OF PROVIDING LONG-TERM NUTRITION - A method for providing long-term tube fed nutrition to at least a majority of patients requiring same comprising the steps of providing a line of tube-fed nutrition products that are designed to provide long-term nutritional requirements of at least certain patient populations, the patient population selected from the group consisting of: elderly, maintenance, cancer, digestive pathologies, pediatric, and cystic fibrosis. | 2010-04-08 |
20100088253 | System And Method For Tracking Future Endowment Gifts - A method for an organization to monitor the projected amount and date of receipt of an endowment bequest comprising a benefactor, through an associated agent, entering into a financial instrument bequeathing a set percentage of the instrument's proceeds, a third party entering into a database the value of the financial instrument, the percentage of the bequest assigned to the not-for-profit and the age of the benefactor; the third party calculating the value of the endowment gift based upon the current value of the financial instrument and the percentage bequeathed to the not-for-profit organization at the actuarially computed date of death of the benefactor; the third party advising the not-for-profit organization on a regularly scheduled basis of the current value of the pooled endowment gift and the projected date of receipt of the gift; the third party alerting the not-for-profit organization of a change in the status of the benefactor's financial instrument. | 2010-04-08 |
20100088254 | SELF-LEARNING METHOD FOR KEYWORD BASED HUMAN MACHINE INTERACTION AND PORTABLE NAVIGATION DEVICE - A self-learning method for keyword based human machine interaction is disclosed. At least one of a plurality of keywords predetermined in a database is selected and a priority score of the selected keyword is updated and a weighted factor is generated for the selected keyword. A weighted score and the weighted factor of the selected keyword are transmitted to the keywords related to the selected keyword. The selected keyword is pushed to a keyword buffer and linkage strengths between the keywords in the keyword buffer are strengthened. When a keyword has been stored in the keyword buffer for over a predetermined reset time period, a reset operation is performed to remove the keyword from the keyword buffer. | 2010-04-08 |
20100088255 | METHOD AND SYSTEM FOR DETERMINING THE ACCURACY OF DNA BASE IDENTIFICATIONS - Embodiments disclosed herein relate to a method and system for determining the accuracy of DNA base identifications, based at least partly on sampling characteristics of subsets within training data sets. | 2010-04-08 |
20100088256 | Method and monitoring system for the rule-based monitoring of a service-oriented architecture - The present invention concerns a method for the rule-based monitoring of a component (C | 2010-04-08 |
20100088257 | Systems and Methods for Generating Predicates and Assertions - Systems and methods for deriving a predicate by constructing a logic formula from information recorded during test execution, optimizing the logic formula and computing the logical implication of the optimized logic formula. Systems and methods for deriving an assertion from a logical implication by substituting each predicate in the logical implication with corresponding design elements from a hardware design description, inserting the design elements into a target template, inserting a context-sensitive input of the target template based on design elements in the hardware design description and creating an instance name for an instantiation of the target template. Systems and methods for generating a set of clauses that are implied by a disjunctive normal formula of a set of cubes. | 2010-04-08 |
20100088258 | DYNAMIC INTELLIGENT OBJECTS - An contextual artificial intelligence system is disclosed. Intelligent business objects enable dynamic data object interaction and encapsulation of user context. Data is rationalized and data objects evolve by way of an artificial intelligence assisted process of self-discovery. Significant data is identified based upon factors such as cost, revenue and outcome and contextually significant result sets are automatically generated for users. | 2010-04-08 |
20100088259 | METHOD FOR SELECTING INFORMATION - In the method of the invention, information is selected in a processing unit. The end result to be achieved is final feature information to be used for performing a task. In the method, input information to the processing unit is treated with the intention to find useful information from the input information in view of the task. The input information consists of a primary input and a context representing general information related to the task to be performed. Feature information representing characteristics of the input information is formed from the input data, the values of the feature information being further processed on the basis of their utility. The method is mainly characterized in that a preliminary prediction is formed from a first context of a set of input information by means of first parameters and in that the first primary input of the set of input data is preprocessed by forming calculation results by means of second parameters. The utility of the information resulting from the foregoing steps is estimated by combining said prediction and the calculation results in such a way that useful characteristics are selected from the calculation results on the basis of the prediction and the feature information is formed by strengthening useful characteristics and by weakening other characteristics. Then, the second parameters are modified in such a way that the step, wherein the primary input data was preprocesed, would have given the calculation results corresponding to the feature information obtained in the estimation step. Thereafter, a subsequent context of a set of input data and subsequent primary data are processed and the foregoing steps are repeated for each element of input information in order to end up with the final feature information. | 2010-04-08 |
20100088260 | PARAMETER CONTROLLING APPARATUS AND MULTISTAGE COLLATION APPARATUS - A parameter controlling apparatus calculates similarity variation distribution of different data and that of identical data. The parameter controlling apparatus creates a collation break-off rate function and an error probability function based on the similarity variation distribution of the different data and that of the identical data, respectively, and creates a total collation time function and a total error probability function based on the collation break-off rate function and the error probability function. The parameter controlling apparatus creates a constraint equation based on the total collation time function, the total error probability function, total collation time constraint parameters, and total error probability constraint parameters. The parameter controlling apparatus calculates a parameter group that optimizes an objective function constituted by the collation break-off rate function, the error probability function, the total collation time function, and the total error probability function among combinations of parameters that satisfy the constraint equation. | 2010-04-08 |
20100088261 | Method and system for fully automated energy curtailment - Fully automated demand response may be implemented at end users, in accordance with terms agreed to by end users to reduce energy demand during demand response events. Demand reduction actions to implement the objectives of a demand response event at the end users may be determined, desirably using artificial intelligence and neural networks, based on energy demand curtailment objectives of the demand response event, hierarchy(ies) of demand reduction actions for respective demand response events ordered to minimize undesired impact at the end users, and monitoring data received from, or relating to implementing energy demand curtailment at, the end users. In addition, demand reduction actions may be automatically implemented at end users in the absence of a demand response event, to implement energy demand curtailment according to criteria of end users, where the demand reduction actions are determined based on monitoring data and a hierarchy(ies) of demand reduction actions and using artificial intelligence and neural networks. | 2010-04-08 |
20100088262 | EMULATED BRAIN - An emulated intelligence system includes an input for receiving information in the form of a query and a parsing system for parsing the query into grammatical elements. A database of individual concepts is included, each concept defining relationships between the concept and other concepts in the database. A conceptualizing system defines a list of related concepts associated with each of the parsed elements of the query and the embodied relationships associated therewith and a volition system then determines if additional concepts are associated with an action that may be associated with pre-stored criteria. An action system is then provided for defining an action to be taken based upon the relationships defined by the conceptualizing system. | 2010-04-08 |
20100088263 | Method for Computer-Aided Learning of a Neural Network and Neural Network - There is described a method for computer-aided learning of a neural network, with a plurality of neurons in which the neurons of the neural network are divided into at least two layers, comprising a first layer and a second layer crosslinked with the first layer. In the first layer input information is respectively represented by one or more characteristic values from one or several characteristics, wherein every characteristic value comprises one or more neurons of the first layer. A plurality of categories is stored in the second layer, wherein every category comprises one or more neurons of the second layer. For one or several pieces of input information, respectively at least one category in the second layer is assigned to the characteristic values of the input information in the first layer. Input information is entered into the first layer and subsequently at least one state variable of the neural network is determined and compared to the at least one category of this input information assigned in a preceding step. The crosslinking between the first and second layer is changed depending on the comparison result from a preceding step. | 2010-04-08 |
20100088264 | SYSTEMS AND METHODS FOR TREATING DIAGNOSING AND PREDICTING THE OCCURRENCE OF A MEDICAL CONDITION - Methods and systems are provided that use clinical information, molecular information and computer-generated morphometric information in a predictive model for predicting the occurrence (e.g., recurrence) of a medical condition, for example, cancer. In an embodiment, a model that predicts prostate cancer recurrence is provided, where the model is based on features including one or more (e.g., all) of biopsy Gleason score, seminal vesicle invasion, extracapsular extension, preoperative PSA, dominant prostatectomy Gleason grade, the relative area of AR+ epithelial nuclei, a morphometric measurement of epithelial nuclei, and a morphometric measurement of epithelial cytoplasm. In another embodiment, a model that predicts clinical failure post-prostatectomy is provided, wherein the model is based on features including one or more (e.g., all) of dominant prostatectomy Gleason grade, lymph node invasion status, one or more morphometric measurements of lumen, a morphometric measurement of cytoplasm, and average intensity of AR in AR+/AMACR− epithelial nuclei. | 2010-04-08 |
20100088265 | METHOD, SYSTEM, AND APPARATUS FOR DETERMINING A PREDICTED RATING - Embodiments of the invention can incorporate a method and interface to accomplish one or more of the following three processes: input, analysis, and output. With respect to input, the user(s) identifier(s), item(s) identifier(s), and user(s)-item(s) rating data | 2010-04-08 |
20100088266 | RULES BASE SYSTEMS AND METHODS WITH CIRCUMSTANCE TRANSLATION - The invention provides, in one aspect, a method of finding a rule in a rules base that includes a plurality of rule entries, each having a rule and an associated objective and one or more associated circumstances. A rule finder accesses the rules base in response to a request, with a specified objective and with specified circumstances, by searching the rules base for a matching entry. Where the search fails, the rule finder searches one or more translation tables for entries having first circumstances matching those specified in the request that resulted in the failure. If found, the rule finder repeats the search of the rules base with the specified objective and with a second (or “map-to”) circumstances from matching entries in the translation tables. The rule finder can return, e.g., to an application program that issued the request, a rule found during that repeat search of the rules base. | 2010-04-08 |
20100088267 | GRAPHICAL MODEL FOR DATA VALIDATION - Data may be received from the source and based on training; a confidence level may be determined that a specific element in the data is correctly assigned to a master category given that the source assigned the data to one of the plurality of assigned source categories. If the confidence level meets a threshold, the element may be stored in the assigned master category and if the confidence level does not meet a threshold, the element may be stored for reassignment. | 2010-04-08 |
20100088268 | ENCRYPTION OF DATA FRAGMENTS IN A PEER-TO-PEER DATA BACKUP AND ARCHIVAL NETWORK - Embodiments of the present invention address deficiencies of the art in respect to data backup and archival tools and provide a method, system and computer program product for securing fragments in a peer-to-peer data backup and archival network. In an embodiment of the invention, a method for securing fragments in a peer-to-peer data backup and archival network can include partitioning a file into multiple, different fragments in a byte stream for storage in a peer-to-peer data backup and archival network, encrypting each of the fragments in the byte stream individually, and storing the encrypted fragments for the byte stream in different peer hosts in the peer-to-peer data backup and archival network. | 2010-04-08 |
20100088269 | DISPERSAL AND RETRIEVAL OF DATA FRAGMENTS IN A PEER-TO-PEER DATA BACKUP AND ARCHIVAL NETWORK - Embodiments of the present invention address deficiencies of the art in respect to data backup and archival tools and provide a method, system and computer program product for the dispersal and retrieval of fragments in a peer-to-peer data backup and archival network. In an embodiment of the invention, a method for the dispersal and retrieval of fragments in a peer-to-peer data backup and archival network can include partitioning a file into multiple, different fragments for storage in a peer-to-peer data backup and archival network, selecting different peer hosts in the peer-to-peer data backup and archival network to store different ones of the fragments, and storing each of the fragments in at least one of the selected different peer hosts. Optionally, the fragments can be encrypted before storage in the different peer hosts. | 2010-04-08 |
20100088270 | DATA VERSIONING CONCEPT INCLUDING TIME DEPENDENCY AND ACTIVE AND INACTIVE STATES - A method and a system are described that involve data versioning with time dependency and active and inactive states. In one embodiment, the method includes creating a first version of an object in an application, wherein the application supports a versioning mode. The versioning mode maintains a set of versions of an object. The method further includes activating the first version of the object at a first timestamp and activating a second version of the object at a second timestamp in the versioning mode switched on. The first timestamp and the second timestamp define a validity period of the first version. Finally, the first version of the object is provided upon a request, wherein the request includes a timestamp in the validity period of the first version. | 2010-04-08 |
20100088271 | HSM TWO-WAY ORPHAN RECONCILIATION FOR EXTREMELY LARGE FILE SYSTEMS - One aspect of the present invention provides an operation for recovering lost space and maintaining data consistency in a storage environment by providing a two-way orphan reconciliation method for extremely large file systems, such as a Hierarchical Storage Management (HSM) system which manages billions of files. This highly scalable and parallelizable orphan identification process may be used in a HSM controlled environment to enable the execution of a two-way file orphan check. In one embodiment, this orphan check identifies file system client orphans and server object orphans in a single pass by comparing a queue containing a list of migrated files on a storage repository server with a queue containing a list of stub files on a file system. If the queue elements do not match, a file system orphan or server object orphan can appropriately be identified. | 2010-04-08 |
20100088272 | SYSTEMS AND METHODS OF MANAGING LOCATION OF MEDIA IN A STORAGE SYSTEM - A system and method for operating a storage library. The system comprises a management server, a media agent connected to the management server, a library connected to the media agent and a database connected to the management server. The management server controls the media agent to monitor for the addition or removal of a piece of media in the library. When the media agent determines that the piece of media has been added to the library or removed from the library, the media agent causes the library to read a media label stored as data on the piece of media, the media label including an identifier identifying the piece of media. When a backup or restore is performed, the system checks the media label to ensure that the correct media is being used. Inventory procedures are disclosed. Media labels are stored in a database along with an indication of the corresponding slot where the media is stored, a time when the label was put on the medium, and a confidence parameter indicating how confident the system is that the particular medium is stored in the respective slot. | 2010-04-08 |
20100088273 | REAL-TIME VISUALIZATION OF USER CONSUMPTION OF MEDIA ITEMS - A computer implemented method for displaying real-time computer mediated user consumption data, comprising: accessing consumption data corresponding to real-time computer mediated user consumption behavior; parsing the consumption data to identify one or more events comprising one or more instances of consumption data and wherein each event is associated with a user; adding the events to an event stack comprising a predetermined stack limit; and storing the consumption data for each event in a data structure configured to correlate related consumption data and provide a temporal context to the stored consumption data wherein addition of graphical symbols to a visualization display is responsive to the arrangement of the consumption data in the data structure. | 2010-04-08 |
20100088274 | SYSTEM AND METHOD FOR SYNCHRONIZING A REPOSITORY WITH A DECLARATIVE DEFINTION - The subject disclosure relates to a method and system for synchronizing a repository with a declarative definition. The method and system includes receiving the declarative definition in which the declarative definition represents a constraint-based execution model. A script is also created that translates the declarative definition into machine code. At least one function is then performed on the repository in which the script provides instructions for the at least one function. | 2010-04-08 |
20100088275 | Information processing apparatus, information processing method, information processing program, information providing apparatus, information providing method, information providing program and information processing system - An information processing apparatus acquires and transmits content identification information stored in the storage unit to the other apparatus, determines whether the information processing apparatus has received the content analysis results from the other apparatus and if it is determined that the content analysis result acquisition unit has received the content analysis results from the other apparatus, causes the storage unit to store the content analysis results and if it is determined that the information processing apparatus has not received the content analysis results from the other apparatus, perform processing to obtain content analysis results by analyzing the content data stored in the storage unit to cause the storage unit to store the content analysis results by associating with the content data stored in the storage unit and also perform processing to transmit the content analysis results to the other apparatus. | 2010-04-08 |
20100088276 | SYSTEM AND METHOD FOR IMPLEMENTING PERSONALIZATION AND MAPPING IN A NETWORK-BASED ADDRESS BOOK - A system and method for implementing personalization, mapping and status management in a network-based address book. A subscription function (SF) subscribes to personal contact information of specific users to personal contact card (PCC) servers and receives updates to the contact information of the subscribed user(s). The SF retrieves the personalization rule document of subscribing user and applies personalization rules to the updated contact information. The personalized contact information is handed over to a data synchronization (DS) client so that the DS client may synchronize the information with the address book of the subscribing user in a converged address book (CAB) server. The personalized contact information of the subscribed contacts is propagated to other devices or web portals. A new or existing attribute/parameter may be provided and/or used for each contact entry for use in uniquely identifying each contact. The SF may maintain a document outlining the status of entries in the address book. All of the contact entries (with all or a subset of contact information) of an address book may be synchronized between the DS client coupled with the SF and a CAB server at the beginning and later when there is a change in the address book. | 2010-04-08 |
20100088277 | OBJECT DEDUPLICATION AND APPLICATION AWARE SNAPSHOTS - Embodiments deploy delayering techniques, and the relationships between successive versions of a rich-media file become apparent. With this, modified rich-media files suddenly present far smaller storage overhead as compared to traditional application-unaware snapshot and versioning implementations. Optimized file data is stored in suitcases. As a file is versioned, each new version of the file is placed in the same suitcase as the previous version, allowing embodiments to employ correlation techniques to enhance optimization savings. | 2010-04-08 |
20100088278 | Network file update mechanism with integrity assurance - An approach is provided that receives a file request and maintains a set of file versions of the requested file on a network-accessible storage media. The file versions are retrieved from the network accessible storage media along with expected hash values corresponding to each of the file versions. The retrieved file versions are stored in a second nonvolatile storage media, such as a local nonvolatile storage. File versions are selected from newest to oldest. When a file version is selected, a hash value is computed for the file and this hash value is compared to the expected hash value that corresponds to the selected file version. The first (newest) file version with a hash value that matches the expected hash value is selected and returned to the requestor. | 2010-04-08 |
20100088279 | INFORMATION PROCESSING APPARATUS AND OPERATION METHOD THEREOF - An information processing apparatus includes a remote copying processing part | 2010-04-08 |
20100088280 | COMPUTER SYSTEM FOR HIERARCHICALLY MANAGING A JOURNAL AND METHOD THEREFOR - Provided is technology in which a first storage system includes a first logical volume and a second logical volume, the second logical volume stores therein a first differential data item representing a differential between data that was stored in the first logical volume at a first time instant and data that was stored in the first logical volume at a second time instant being later than the first time instant, a second storage system includes a third logical volume, the first storage system transmits the first differential data item to the second storage system, the second storage system stores the first differential data item into the third logical volume, the first storage system deletes the first differential data item from the second logical volume, and the computer system retains management information set for associating the first logical volume with the third logical volume storing therein the first differential data item. | 2010-04-08 |
20100088281 | Zero Downtime Maintenance Using A Mirror Approach - The subject matter disclosed herein provides methods and apparatus, including computer program products, for providing software updates. In one aspect there is provided a method. The method may include copying an application to a shadow system, the application used to upgrade the shadow system rather than a production system; copying data from the production system to the shadow system; selecting whether to lock changes to data in the production system or record changes to the data in the production system; recording one or more changes to data in the production system, the changes recorded in a container, when record changes has been selected; migrating recorded data in the container to the shadow system, so that the shadow system and production system are in a similar data state; and using the shadow system, upgraded with the application and at least one of data copied from the production system and recorded data from the container, for production rather than the production system. Related systems, apparatus, methods, and/or articles are also described. | 2010-04-08 |
20100088282 | INFORMATION PROCESSING APPARATUS, AND OPERATION METHOD OF STORAGE SYSTEM - A server apparatus performs data I/O processing on a P-VOL in response to a request from a client apparatus and includes a file system which receives data write and read requests in units of files from the client apparatus. The server apparatus stores, into a D-VOL, differential data generated by updating the P-VOL, and manages a snapshot management table wherein a block address of the D-VOL storing the acquired differential data is registered. When a remaining capacity of a storage area of the D-VOL becomes equal to or less than a predetermined threshold value, the server apparatus enables a block of the D-VOL which had stored therein the differential data on a certain predetermined file, to be used as a storage area for newly acquired differential data. | 2010-04-08 |
20100088283 | SYSTEM AND METHOD FOR MANAGING DATABASE APPLICATIONS - The subject disclosure relates to a method and system for managing a database application. The method and system include receiving a deployment package, which includes deployed objects of a declarative execution model and defining a plurality of data structures extracted from the deployment package such that at least one data structure populates an extended catalog. The deployed objects are then stored in a manner consistent with the plurality of data structures. | 2010-04-08 |
20100088284 | ARCHIVING SYSTEM FOR MASSIVE DATABASES USING PRE-COMPUTED DATA LIFECYCLES - An enterprise management system includes transaction/analytic applications and an archiving system in which data object lifecycles are pre-computed when the data object is created by the transaction application or analytic application. Having pre-computed the data lifecycle via the transaction/analytic applications, an archiving system need not re-determine whether the criteria for archiving are met. When the archiving system is initiated, the archiving system may identify the data objects having lifecycle dates that match the current date and archive them directly. | 2010-04-08 |
20100088285 | NDMA SCALABLE ARCHIVE HARDWARE/SOFTWARE ARCHITECTURE FOR LOAD BALANCING, INDEPENDENT PROCESSING, AND QUERYING OF RECORDS - A system for storing NDMA data is scalable to handle extreme amounts of data. The system allows components to be added or deleted to meet current demands. The system processes data in independent steps, providing processor level independence for every subcomponent. The system uses parallel processing and multithreading within load balancers that direct data traffic to other nodes and within all processes on the nodes themselves. The system utilizes host lists to determine where data should be directed and to determine which functions are activated on each node. Data is stored in queues which are persisted at each processing step. | 2010-04-08 |
20100088286 | DEPLOYMENT MANAGER FOR MASTER DATA MANAGEMENT - A method, apparatus, and article of manufacture provide the ability to deploy a data management application to a target computer system. Metadata for a master data management (MDM) application is stored in a deployment database. The metadata is representative of business rules and process workflows that manage business data from multiple sources and a model definition for a model for a central business database. Configuration settings for the MDM application are stored in the deployment database. The metadata and configuration settings are retrieved from the deployment database. Installation instructions of the MDM application are confirmed based on input into a graphical user interface. The master data management application is installed on the target computer system based on the installation instructions, metadata, and configuration settings. | 2010-04-08 |
20100088287 | INFORMATION SYSTEM, METHOD AND RECORDING MEDIUM HAVING PROGRAM RECORDED THEREON RELATING TO COLLECTIVELY REGISTERED DATA - An information system has a primary and a secondary system. The primary system includes a unit for processing data on a record; a unit for recording a processing result in a log; a unit for transferring the log recorded to the secondary system; a unit for collectively registering data of a plurality of records; a unit for notifying a collective registration log indicating execution of collectively registering the data; and a unit for transferring the collectively registered data. The secondary system includes a unit for acquiring a log; a unit for processing data on a record basis in a secondary database according to the acquired log; a unit for acquiring the data of the plurality of records to be collectively registered, if the acquired log is the collective registration log; and a unit for collectively reflecting, the data of the plurality of records to be collectively registered. | 2010-04-08 |
20100088288 | Apparatus and Method for Resolving Security Association Database Update Coherency in High-Speed Systems Having Multiple Security Channels - An apparatus and method for updating security association database entries in a system having multiple security channels by selectively granting access to the entries by a plurality of the multiple security channels that may need to update the same entry using a first-come, first-served scheme. The apparatus includes a controller circuit that functions to carry out the method which, for each of the multiple security channels, includes determining whether another of the security channels has a higher priority to access a particular security association database entry. If no other channel has a higher priority, then the channel requesting access to the entry retrieves it from its address location, modifies it, and writes the modified entry back to its address location. The controller prevents other channels from simultaneously, or substantially simultaneously, retrieving and modifying the same entry. | 2010-04-08 |
20100088289 | TRANSITIONING CLONE DATA MAPS AND SYNCHRONIZING WITH A DATA QUERY - Methods, systems, and computer-readable media are disclosed for transitioning clones and clone data access maps in response to node or media failure without blocking queries. In a system, a data request interface is configured to receive a query to access data at a storage device. Data management logic is configured to access clone state information of a plurality of clones including clones in a static state and clones in a transitory state. The data management logic is further configured to process the query to access the data according to the dynamic clone data access map, with functional correctness maintained. | 2010-04-08 |
20100088290 | USER-SPECIFIC CONTACT APPARATUS AND METHOD - An apparatus and method are disclosed for detecting online activity by a user and contacting the user in conjunction with a preferred response plan. | 2010-04-08 |
20100088291 | METHOD, SYSTEM AND COMPUTER-USABLE MEDIUM FOR EARLY NOTIFICATION OF A PENDING DIGITAL VIDEO RECORDER DELETION EVENT - A method, system and computer-usable medium for early notification of a pending deletion event by a digital playback device. Programs associated with the digital playback device can be scheduled for deletion in advance by a digital playback device interface manually and/or automatically. A deletion event can be notified through a remote delivery by analyzing scheduled recordings and hard drive space if the digital playback device recognizes a recording is close to the deletion event. The notification of the deletion event can be enabled by configuring a number of notification options maintained for each user profile by the digital playback device at a predefined time. The deletion event can be modified through the remote means, which allows a user to send information back to the digital playback device after a deletion notification is received. The deleted files can be moved to a deleted programs folder from which the program can be recovered and the recording can be irrevocably removed after a time period. | 2010-04-08 |
20100088292 | Collaborative Transcoding - A method of collaborative transcoding includes discovering capabilities of devices within a network; exchanging information about content stored within the network; anticipating a request for a content item in a target format; identifying a location of the content item by referencing the information about content stored within the network; and, if the content item is not in the target format, selecting a the device within the network to transcode the content into the target format. A system for collaborative transcoding includes a network, the network comprising a first networked device and at least one other networked device, the first networked device receiving a request for a content item in a target format; a shared content history; the shared content history comprising a list of content available on the network, the first networked device searching the shared content history to determine if another networked device can provide the content item; a capability list comprising a native format and transcoding capabilities of the networked devices, the first networked device searching the capability list to determine if any the networked device is configured to transcode the content item from a source format to a target format. | 2010-04-08 |
20100088293 | APPARATUS, METHODS AND COMPUTER PRODUCTS FOR SELECTION OF CONTENT BASED ON TRANSCRIPT SEARCHES - An apparatus, methods, and computer program products for selection of content. The content search method includes receiving a search request having search data including search terms, utilizing the search request to query against databases comprising transcripts of programs yet to be released, and returning results to the search request. | 2010-04-08 |
20100088294 | INFORMATION PROCESSING METHOD AND SYSTEM OF THE SAME - An information processing method is implemented by an information processing system. The system has a media file generator, a GPS recorder and a data processing system. The data processing system obtains media files and creation times from the media file generator and geographical items from the GPS recorder. Since each geographical item includes a recording time, a geographical coordinate, speed and heading, the data processing system simulates a continuous track in time sequence. The data processing system matches the creation time of each media file to the corresponding time on a time base of the continuous track and then determines the corresponding geographical coordinate of each media file to the geographical coordinate of the continuous track corresponding to the matched time. | 2010-04-08 |
20100088295 | CO-LOCATION VISUAL PATTERN MINING FOR NEAR-DUPLICATE IMAGE RETRIEVAL - Described is a technology in which image near-duplicate retrieval is performed using similarities between patterns of query image words and patterns of database image words. In general, the image retrieval problems resulting from visual polysemy are reduced by using such visual patterns. Visual word vectors and visual pattern vectors are determined for the query image and a database image. These four vectors are used to determine similarity between the database image and the query image. The similarity scores may be used for ranking and/or re-ranking the database image similarity to the query image relative to other database images' similarity scores. Also described is expanding a query visual word of the query image to a set of visual words that are visual synonyms with the query visual word, to help reduce image retrieval problems resulting from visual synonymy. | 2010-04-08 |
20100088296 | SYSTEM AND METHOD FOR ORGANIZING DATA TO FACILITATE DATA DEDUPLICATION - A technique for organizing data to facilitate data deduplication includes dividing a block-based set of data into multiple “chunks”, where the chunk boundaries are independent of the block boundaries (due to the hashing algorithm). Metadata of the data set, such as block pointers for locating the data, are stored in a tree structure that includes multiple levels, each of which includes at least one node. The lowest level of the tree includes multiple nodes that each contain chunk metadata relating to the chunks of the data set. In each node of the lowest level of the buffer tree, the chunk metadata contained therein identifies at least one of the chunks. The chunks (user-level data) are stored in one or more system files that are separate from the buffer tree and not visible to the user. | 2010-04-08 |
20100088297 | PACKAGING AND BULK TRANSFER OF FILES AND METADATA FOR SYNCHRONIZATION - An arrangement for packaging and transferring files such as content items and metadata in synchronization operations. Files are packaged in a concatenated fashion in order to optimize usage of the transfer channel, while maintaining an ability to keep track of how many files have been transferred. Metadata associated with the files may be sent in a single package in advance of sending the files. The metadata may be compressed using both a custom mechanism that takes into account predictable commonalities inherent in metadata for multimedia files, as well as standard compression techniques. | 2010-04-08 |
20100088298 | SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR OPTIMIZATION OF MULTIPLE PARALLEL JOIN OPERATIONS ON SKEWED DATA - A system, method, and computer-readable medium that facilitate management of data skew during a parallel multiple join operation are provided. Portions of tables involved in the join operation are distributed among a plurality of processing modules, and each of the processing modules is provided with a list of skewed values of a join column of a larger table involved in the join operation. Each of the processing modules scans the rows of first and second tables distributed to the processing modules and compares values of the join columns of both tables with the list of skewed values. Rows of a larger table having non-skewed values in the join column are redistributed, and rows of the larger table having skewed values in the join column are maintained locally at the processing modules. Rows of the smaller table that have non-skewed values in the join column are redistributed, and rows of the smaller table that have skewed values in the join column are duplicated among the processing modules. Rows of a third table involved in the join operation are redistributed based on the join attribute value of the rows. A local join data set is then generated by each of the processing modules, and the parallel join is completed by merging each of the processing module's local join data set. | 2010-04-08 |
20100088299 | AUTONOMIC SUMMARIZATION OF CONTENT - Autonomic summarization of content may include receiving information regarding an action, generating metadata content related to the action, storing the metadata content, and performing a search of the stored metadata content to find information on the performed action. Also included is an apparatus for autonomic summarization of content including a summarization engine, the summarization configured to autonomically generate meta data related to an activity, a repository, the repository configured to store the generated meta data, and a processor, the processor configured to receive a query and use the query to search for meta data associated with the activity. | 2010-04-08 |
20100088300 | RESOURCE TRACKING - Clients may subscribe to resources for the purpose of receiving notifications of changes in the resource (e.g., a file is added to a shared folder). Storing subscriptions within persistent storage provides data security in the event of a service failure, at the cost of high latency in accessing subscription data. An efficient method for tracking a resource is provided herein. A subscription service creates subscriptions and monitors resources for a client. Upon a subscribed resource change, a notification service stores a notification of the change into a queue associated with the client. Efficient resource tracking is achieved because notification and subscription data is stored in low latency soft memory. The notification service is configured to detect a failure in the notification service and/or subscription service. In the event a service fails, the client provides a recovery mechanism by resubscribing to resources the client is interested in. | 2010-04-08 |
20100088301 | SYNCHRONIZATION OF UDDI REGISTRIES AND SERVICE REGISTRIES - A first UDDI registry is queried for at least one entity contained within the first UDDI registry. At least one attribute of the at least one entity contained within the first UDDI registry is compared with an entity attribute record associated with a service registry. If the at least one attribute of the at least one entity contained within the first UDDI registry is different from the entity attribute record associated with the service registry, an updated entity attribute record is generated based upon, at least in part, a difference between the at least one attribute and the entity attribute record. | 2010-04-08 |
20100088302 | ASSOCIATING SYSTEM REQUESTS WITH SMS USER RESPONSES - A messaging system can initiate a communication with one or more users through via cell phone text messages, for example using the short message service protocol. These systems often need a way to correlate user responses with system requests or queries. This problem can present challenges because the email mailbox metaphor used by cell phone user interfaces generally allows users to reply to any previously sent messages, but no message context is automatically supplied. A system that may send multiple messages to a user needs a mechanism by which the system can correlate a user-sent response to one of potentially many system-sent requests or queries. Context correlation to resolve ambiguities can be based on one or more of a dialog-based solution, a token-based solution and a keyword-based solution. | 2010-04-08 |
20100088303 | MINING NEW WORDS FROM A QUERY LOG FOR INPUT METHOD EDITORS - Described is a technology in which new words (including a phrase or set of Chinese characters) are mined from a query log. The new words may be added to (or otherwise supplement) an IME dictionary. A set of candidate queries may be selected from the log based upon market (e.g., the Chinese market) and/or by language. From this set, various filtering steps are performed to locate only new words that are frequently in used. For example, only frequent queries are kept for further processing, which may include filtering out queries based on length (e.g., less than two or greater than eight Chinese characters), and/or filtering out queries based on too many stop-words in the query. Processing may also include filtering out a query that is a substring of a larger query, or Vice-versa. Also described is Pinyin-based clustering and filtering, and filtering out queries already handled in the dictionary. | 2010-04-08 |
20100088304 | SYSTEM AND METHOD FOR DYNAMICALLY MANAGING DATA CENTRIC SEARCHES - Disclosed herein are systems, methods, and computer readable-media for dynamically managing data-centric searches. The method includes receiving information associated with an event related to domain-specific searches to a database, identifying data at a first memory location in the database, the data being data identified in response to the domain-specific searches, duplicating the data at least once to at least one new memory location, and distributing processing more domain-specific searches amongst the at least one of the new memory location and the first memory location. The system can distribute the processing for more or additional domain-specific searches randomly, serially or using any other approach. The method optionally includes an expanded search space made up of the first memory location and at least one memory location and can identify a reduction event related to the domain-specific searches, and collapse the expanded search space by removing duplicate data from one or more memory location and adjusting the distribution of processing amongst at least one remaining memory location. The method can optionally include organizing multiple events by network segment, identifying a network segment associated with domain-specific searches, and duplicating the data to at least one new memory location in close proximity to the identified network segment. The method can measure proximity by one or more of geographic distance, network latency, number of intermediate network hops, temperature, and cost. | 2010-04-08 |
20100088305 | Detection of Confidential Information - Among other aspects disclosed are a method and system for detecting confidential information. The method includes reading stored data and identifying strings within the stored data, where each string includes a sequence of consecutive bytes which all have values that are in a predetermined subset of possible values. For each of at least some of the strings, determining if the string includes bytes representing one or more format matches, wherein a format match includes a set of values that match a predetermined format associated with confidential information. For each format match, testing the values that match the predetermined format with a set of rules associated with the confidential information to determine whether the format match is an invalid format match that includes one or more invalid values and calculating a score for the stored data, based at least in part upon the ratio of a count of invalid format matches to a count of other format matches. | 2010-04-08 |
20100088306 | Method, Computer Apparatus and Computer Program for Identifying Unusual Combinations of Values in Data - In a method of identifying unusual combinations of values in data ( | 2010-04-08 |
20100088307 | SEARCH CONDITION DESIGNATION APPARATUS, SEARCH CONDITION DESIGNATION METHOD, AND PROGRAM - A search condition designation apparatus includes an attribute value presentation unit configured to present a list of an attribute value selectable for each attribute, an attribute value designation accepting unit configured to accept designation of the attribute value from the list of the attribute value presented by the attribute value presentation unit, an attribute presentation unit configured to present a list of an attribute corresponding to the attribute value the designation of which is accepted by the attribute value designation accepting unit, an attribute designation unit configured to accept designation of the attribute from the list of the attribute presented by the attribute presentation unit, and a search execution unit configured to execute search of data using a search condition based on the attribute value the designation of which is accepted by the attribute value designation accepting unit and the attribute the designation of which is accepted by the attribute designation unit. | 2010-04-08 |
20100088308 | System and Method for Automated Discovery, Binding, and Integration of Non-Registered Geospatial Web Services - A method and computer system for identifying internet web pages containing documents that comply with a predetermined XML schema. The method includes searching the internet with a search engine for web pages using initial search terms and identifying a first set of HTTP URLs, web crawling at least the first set of HTTP URLs to identify additional HTTP URLs, appending a query to the identified URLs, and evaluating the responses to the query to determine which responses comply with the predetermined XML schema. The XML schema can be a Web Mapping Services schema. The system can store responses that comply with the XML schema in a database of servers, periodically check the database for validity, and convert the map requests for map servers in the database to a GIDB Portal Interface API. | 2010-04-08 |
20100088309 | EFFICIENT LARGE-SCALE JOINING FOR QUERYING OF COLUMN BASED DATA ENCODED STRUCTURES - The subject disclosure relates to querying of column based data encoded structures enabling efficient query processing over large scale data storage, and more specifically, with respect to join operations. Initially, a compact structure is received that represents the data according to a column based organization, and various compression and data packing techniques, already enabling a highly efficient and fast query response in real-time. On top of already fast querying enabled by the compact column oriented structure, a scalable, fast algorithm is provided for query processing in memory, which constructs an auxiliary data structure, also column-oriented, for use in join operations, which further leverages characteristics of in-memory data processing and access, as well as the column-oriented characteristics of the compact data structure. | 2010-04-08 |
20100088310 | Method And System For Automating Data Queries During Discontinuous Communications - In accordance with one embodiment, a method includes receiving a query request comprising geospatial filter criteria. The query request may be received from a mobile client computing system capable of displaying query results as overlays on a digital map. The digital map may be stored at the mobile client computing system and the query results may be stored at a server. First and second portions of the query results may be wirelessly transmitted from the server to the mobile client computing system. The first and second portions may be transmitted during first and second communication sessions between the mobile client computing system and the server. The first and second communication sessions may occur during respective time intervals temporally separated from each other by a gap interval. The client may be capable of concatenating the transmitted first and second portions of the query results. | 2010-04-08 |
20100088311 | ENHANCED DATABASE SCHEME TO SUPPORT ADVANCED MEDIA PRODUCTION AND DISTRIBUTION - An enhanced database system and method for media production and distribution enables the aggregation of assets using external unique IDs. The use of the external IDs allows the searching of Media Asset Management database to be performed without any prior knowledge of the actual database. The search configuration defines a set of search environment parameters that are imported into the search database during a configuration stage and which are used by the search services to provide client applications with an interface to create, validate, and execute queries. | 2010-04-08 |
20100088312 | Real-Time Radio Station Audio Content Search and Delivery - Disclosed are systems and methods distributing and/or recommending real-time radio. More specifically, it relates to methods for providing information of real-time radio songs and methods for recommending at least one real-time radio songs to a particular user. Methods are provided for switching to a real-time radio song based on the preferences of a user. Systems for collecting the preferences of a user and recommending at least one real-time radio song to the user or switching to a real-time radio song based on the preferences of a user are also disclosed. | 2010-04-08 |
20100088313 | DATA SOURCE ATTRIBUTION SYSTEM - A data attribution system uses a unique identifier (UID) that uniquely identifies a particular individual. A search is conducted of different data sources and, different types of profile information associated with the UID is extracted from the data sources. The different types of profile information associated with the same UID is aggregated together and displayed in a same screen presentation on a user interface. | 2010-04-08 |
20100088314 | Method and system for searching on internet - The present invention provides methods and systems for presenting users a search results with choices to display the results in a different sorting or ranking orders. The two or more sets of search results in a different sorting or ranking orders are displayed in the same page. The present invention provides methods and systems to assign truthiness scores to news, messages, or stories. | 2010-04-08 |
20100088315 | EFFICIENT LARGE-SCALE FILTERING AND/OR SORTING FOR QUERYING OF COLUMN BASED DATA ENCODED STRUCTURES - The subject disclosure relates to querying of column based data encoded structures enabling efficient query processing over large scale data storage, and more specifically with respect to complex queries implicating filter and/or sort operations for data over a defined window. In this regard, in various embodiments, a method is provided that avoids scenarios involving expensive sorting of a high percentage of, or all, rows, either by not sorting any rows at all, or by sorting only a very small number of rows consistent with or smaller than a number of rows associated with the size of the requested window over the data. In one embodiment, this is achieved by splitting an external query request into two different internal sub-requests, a first one that computes statistics about distribution of rows for any specified WHERE clauses and ORDER BY columns, and a second one that selects only the rows that match the window based on the statistics. | 2010-04-08 |
20100088316 | METHOD AND SYSTEM FOR MANAGING RECENT DATA IN A MOBILE DEVICE LINKED TO AN ON-DEMAND SERVICE - Systems and methods for managing recent data items in a database. A method typically includes determining whether a data object managed by an on demand service is designated as able to be accessed by a user at a mobile device and storing locally at a mobile device a plurality of most recently used items viewed for a data object designated as able to be accessed by a user at a mobile device. The method also typically includes determining a single most recently used set from among the stored plurality of most recently used items viewed for at least one data object designated as able to be accessed by a user at a mobile device. | 2010-04-08 |
20100088317 | METHOD AND APPARATUS FOR HARVESTING FILE SYSTEM METADATA - A harvester is disclosed for harvesting metadata of managed objects (files and directories) across file systems which are generally not interoperable in an enterprise environment. Harvested metadata may include 1) file system attributes such as size, owner, recency; 2) content-specific attributes such as the presence or absence of various keywords (or combinations of keywords) within documents as well as concepts comprised of natural language entities; 3) synthetic attributes such as mathematical checksums or hashes of file contents; and 4) high-level semantic attributes that serve to classify and categorize files and documents. The classification itself can trigger an action in compliance with a policy rule. Harvested metadata are stored in a metadata repository to facilitate the automated or semi-automated application of policies. | 2010-04-08 |
20100088318 | INFORMATION SEARCH SYSTEM, METHOD, AND PROGRAM - Disclosed is a system in which an index registration unit registers an index, which will be used for search processing, as a partitioned index which is partitioned on a time series basis, and a search means reads indexes older than a specified point in time, which is used as a search base point, to perform search processing, thereby searching for information based on a point in time in the past. | 2010-04-08 |
20100088319 | System and Method for Efficiently Storing Information Related to a Telephone number - Information related to telephone numbers is efficiently stored and retrieved by generating an index based on a portion of a telephone number for which information is to be stored or retrieved. For example, the portion of the telephone number can be a prefix of the telephone number. Information related to the telephone number is stored and retrieved in accordance with the generated index. | 2010-04-08 |
20100088320 | ADAPTIVE HYBRID REASONING DECISION SUPPORT SYSTEM - A method for indexing a plurality of nodes using a computer system is provided. The computer system includes data storage and a processor coupled to the data storage. The method includes acts of storing the plurality of nodes in the data storage, each of the plurality of nodes having a hit count, a link count and an outcome, creating a qualitative index ordering a plurality of nodes according to the hit count, the link count and the outcome of each node and storing the qualitative index in the data storage. The hit count of each node indicates a number of times a case attribute associated with the node is presented to a user. The link count of each node indicates a number of times the case attribute associated with the node is affirmed as useful. The outcome of each node indicates a desirability of the outcome. | 2010-04-08 |
20100088321 | METHOD AND A SYSTEM FOR ADVERTISING - A method for selecting an advertisement to be presented to a network user. The method comprises identifying a reference to a specific product in a document, reviewing an advertisement database to select an advertisement related to the specific product, and delivering an indication to the advertisement, thereby allowing the advertisement to be presented to a network user accessing the document. | 2010-04-08 |
20100088322 | REAL TIME QUERY TRENDS WITH MULTI-DOCUMENT SUMMARIZATION - A list of “hot topics” may be provided to a user to indicate information that is currently popular. A topic may be deemed popular when a large number of search queries related to the topic are entered by users. A search system may receive and analyze an electronic source of published information to determine a reason for why a particular popular topic is popular. If content related to why a particular popular topic is popular exists in multiple electronic sources of published information, text summarization techniques may be used to determine a reason for why the popular topic is popular by from among the multiple electronic sources of published information. | 2010-04-08 |