15th week of 2013 patent applcation highlights part 44 |
Patent application number | Title | Published |
20130091031 | SYSTEM AND METHOD FOR GENERATING AN ALTERNATIVE PRODUCT RECOMMENDATION - A method and system for automatically generating a self-updating naturally-reading narrative product summary including assertions about a selected product. In one embodiment, the system and method includes evaluating an existing narrative product summary, comparing an existing attribute name, attribute value, attribute unit, and assertion model, respectively, to a current attribute name, attribute value, attribute unit, and assertion model to determine if one of the comparisons shows a change. The system and method further determines a new attribute associated with the selected product, selects an alternative product, retrieves a new assertion model with assertions that describe the selected product and identify an alternative product in a natural manner. The system and method then generates a naturally-reading narrative product summary by combining the new attribute with the new retrieved assertion model, and by combining the selected alternative product with another retrieved assertion model to recommend the selected alternative product in the narrative. | 2013-04-11 |
20130091032 | METHOD AND SYSTEM FOR CROSS SELLING OF GOODS AND SERVICES AMONG NON-AFFILIATED RETAIL MERCHANTS - Methods and systems are provided that encourage and provide informational and transactional support and infrastructure for cross-selling of products and services among otherwise unaffiliated merchants by formation of networks (e.g., social networks) of local merchants with knowledge of each others' products and services. | 2013-04-11 |
20130091033 | Method and System for Product Configuration Validation - A computer-implemented method or system that is capable of configuring a product. The computer-implemented method or system receiving a product configuration matrix from a computer storage medium. The computer-implemented method or system also receiving user input defining a user selection of at least one feature or component of the product. The computer-implemented method or system generating a binary representation of the user selection. The computer-implemented method or system deriving a resolution matrix. The method or system comparing the resolution matrix and the binary representation of the user selection to determine whether one or more of the selected product features or components in the user selection are valid for the product. The computer-implemented method or system also generating a validation result that identifies one or more valid product features or components within the user selection. | 2013-04-11 |
20130091034 | INSTANT, ACCURATE, AND EFFICIENT PRODUCT RECOMMENDATIONS TO CLIENT ENDPOINT - A method of sending a recommendation to a customer's terminal device includes creating pairs of identifiers based on on-line activities of a group of users. Each pair contains a first and second identifier for items acquired and also acquired by a user. The unique pairings of identifiers are tallied to obtain their counts. The counts are then assigned weights so that the highest counted pairs for each first identifier have equal weight. Unique pairings that contain first identifiers in a list of identifiers derived from a customer's on-line activities are extracted with their counts. The unique second identifiers in the extracted pairings are compiled and the weighted counts are summed to form, based on the summed weighted counts, a list of recommendations. The list is then transmitted, from a computer through a communication network to the customer's terminal device, which presents the list as the recommendation to the customer. | 2013-04-11 |
20130091035 | FAIRNESS BASED RATINGS - An apparatus and method for identifying and correcting “unfair” ratings about a first user from a plurality of second users is disclosed herein. For each metric upon which the first user has been rated by the second users, a number of factors are considered to determine if the average rating for a given metric is unfair. Identified unfairness is adjusted dynamically so that the composite rating for a metric becomes more “fair.” | 2013-04-11 |
20130091036 | SYSTEM AND METHOD FOR NAVIGATING A COLLECTION OF EDITORIAL CONTENT - Systems and methods for easily navigating a collection of editorial content related to products are described. Embodiments of the invention provide seamless, continuous, structured access to relevant product reviews. Users of embodiments of the invention can advance from one product review to another by selecting navigational buttons representing the previous and next product reviews from within a product review currently being viewed. The previous product review represents the review the user was viewing prior to the currently viewed review. The next product review is determined based on a simple learning engine that presents the next relevant product, along with another relevant product that is, for example, either cheaper or more expensive than the review being currently viewed. This simplifies the user experience by eliminating the need to go back to a listing page to research products similar to the product whose review is being viewed. | 2013-04-11 |
20130091037 | CONTENT RESELLING METHOD AND CONTENT SELLING APPARATUS THEREFOR - Disclosed is a method for reselling contents registered in contents selling apparatus by a content reselling apparatus. The method includes: accessing the content selling apparatus based on reseller information of the content reselling apparatus; selecting at least one reselling content in which reselling is allowed from contents registered in the content selling apparatus; receiving and notifying information of the selected reselling content; receiving reselling content information which is requested to be purchased from a user terminal among the notified reselling contents; and transferring purchase request information of the to user terminal to the content selling apparatus. | 2013-04-11 |
20130091038 | ASSOCIATING ELECTRONIC COMMERCE LISTINGS WITH CONTENT - A method and system associate electronic commerce listings with online content. In some embodiments, the a content provider presents content to a user. A request is received from the user to associate an electronic commerce listing of the user with the content. If the request is approved, an indicator is displayed within the content and associated with the electronic commerce listing. | 2013-04-11 |
20130091039 | SYSTEM AND METHOD FOR PRESENTING SEARCH RESULTS INCLUDING A CALL BACK INIDICATOR - A search based call back request system enables a user to request a follow up contact from a seller. The system provides search functionality and stores seller information such that when search results appear for sellers that have requested to offer call back service to a buyer, the system formats the search results screen to include a call back request indicator for the seller. The system includes functionality for the user to enter custom call back data. | 2013-04-11 |
20130091040 | Methods and Systems for Providing Wireless Enabled Inventory Peering - Systems and methods for providing wireless enabled inventory peering are disclosed. According to one embodiment, a system for providing wireless enabled inventory peering includes a wireless enabled inventory peering vehicle system (WEIPVS). The WEIPVS is configured to receive an inventory search request. In response to receiving the inventory search request, the WEIPVS searches inventories of proximate technician vehicles. If a needed inventory item is located in an inventory of a proximate technician vehicle, the WEIPVS generates a request for an inventory transfer and sends the request to the proximate technician vehicle. When the item is received at the WEIPVS, the WEIPVS updates the inventory associated with the WEIPVS. | 2013-04-11 |
20130091041 | METHOD FOR USING INTELLIGENT ROUTER IN CHARGING SYSTEM AND APPARATUS ASSOCIATED THEREWITH - A method for using a charging system to account for service provided by a network element (NE) of a service provider network includes receiving an accounting request (ACR) from the NE at a router in the charging system, the ACR associated with service provided by the NE in the service provider network in conjunction with a communication session; modifying the ACR to form a modified ACR; sending the modified ACR to a charging collection function (CCF) server; receiving an accounting answer from the CCF server indicating the CCF server was not able to process the modified ACR; and resending the modified ACR to the CCF server or changing the modified ACR to form a revised ACR and sending the revised ACR to an alternate CCF server. A router associated with the method includes a service network communication module, a message processing module, and a charging system communication module. | 2013-04-11 |
20130091042 | METHOD FOR PROVIDING GEOGRAPHICAL LOCATION-BASED SECURITY, RESTRICT, PERMIT ACCESS OF VARYING LEVEL TO INDIVIDUAL'S ANY KIND OF DATA, INFORMATION, CREDIT, FINANCES, SERVICES OBTAINED(ONLINE AND OR OFFLINE) - Proposed method and security system provide geographical location-based security with varying levels of access, allows users to select entities to protect, configure geographical locations, geographical boundaries as well as permissions, access level for given geographical locations, geographical boundaries and configure security alerts. It takes decision to grant, deny permission or provide coven access level based on user's current geographical location and user's own configuration for that geographical location or boundary and sends out security alerts. | 2013-04-11 |
20130091043 | SYSTEM AND METHOD FOR PRESENTING FRAUD DETECTION INFORMATION - Systems and methods for presenting fraud detection information are presented. In one example, a computer system analyzes empirical data to detect potentially fraudulent activity and alerts users of the potentially fraudulent activity via a fraud detection user interface. The fraud detection user interface determines a set of user interface components to suitable to present the potentially fraudulent activity and presents facts associated with the potentially fraudulent activity to a user for further analysis and investigation. | 2013-04-11 |
20130091044 | PAYMENT DEVICE WITH ACCOUNT IDENTIFIER - A payment device having identifying numbers configured in aligned segments in order to facilitate use of the payment device. | 2013-04-11 |
20130091045 | MULTI-BROKER ORDER ROUTING BASED ON NET POSITION - The disclosed embodiments provide tools for multi-broker order routing based on net position at a broker. The net position of a user at a broker to receive a portion of a trade order is considered when allocating the quantity for the trade order to multiple brokers. | 2013-04-11 |
20130091046 | Visualizing Performance Based on Trader Behavior - A computer implemented techniques for visualize performance of a particular security or a portfolio of securities based on the behavior of traders that trade in the particular security or portfolio of securities is described. | 2013-04-11 |
20130091047 | SYSTEM AND METHOD FOR GROUP PURCHASING - A method for conducting an online group auction of homogeneous shares in an undivided lot uses a server computer accessible via a data network. An associated database contains details of an undivided lot, such as a real estate property, available for auction, and information representing a share offering. The offering comprises a number of homogeneous shares in the undivided lot, each share having an associate individual share price. Participating bidders submit bids via the data network, each bid including information identifying a maximum number of shares, and a maximum price per share. The server determines a degree of success of the bid based on an extent to which the maximum price per share exceeds a current individual share price of one or more of the homogeneous shares. The server then updates the information representing the share offering in accordance with the determined degree of success of the bid. | 2013-04-11 |
20130091048 | SYSTEM AND METHOD FOR MANAGING TRADING ORDERS RECEIVED FROM MARKET MAKERS - According to one embodiment, a method of managing trading is provided. A first offer for a particular instrument in a particular market is received from a first market maker at a first offer price. A first bid for the same particular instrument in the same particular market is received from a second market maker at a first bid price, the first bid price being higher than or equal to the first offer price. As a result of the first bid price being higher than or equal to the first offer price, the first offer price is automatically increased to a price higher than the first bid price such that a trade is not executed between the first offer and the first bid. In some embodiments, such method may be used to protect market makers from unwanted trades caused by inherent latency in the market makers' pricing engines and/or networks. | 2013-04-11 |
20130091049 | SYSTEM AND METHOD FOR DISPLAYING MARKET INFORMATION AND ORDER PLACEMENT IN AN ELECTRONIC TRADING ENVIRONMENT - A system and method are provided for displaying a trading screen and placing an order in an electronic trading environment. The system and method may be used to assist a trader in selecting an item of interest, such as the inside market (best bid and best ask) to be displayed relative to a user configured location on the trading screen, such as the center of the trading screen. In a preferred embodiment, the inside market will stay located relative to center of the trading screen and the price levels associated to the inside market will move as the market conditions fluctuate. Other features and advantages are described herein. | 2013-04-11 |
20130091050 | SYSTEM AND METHOD FOR PROVIDING CREDIT TO UNDERSERVED BORROWERS - A preferred method for providing credit to an underserved borrower can include generating a borrower dataset at a first computer in response to receipt of a borrower profile; formatting the borrower dataset into a plurality of variables; and independently processing each of the plurality of variables using one of a statistical algorithm or a machine learning algorithm to generate a plurality of independent decision sets. The preferred method can further include ensembling the plurality of independent decision sets to generate a model question set; and transmitting the model question set to a second computer from which a user can direct one or more questions in the model question set to a borrower. | 2013-04-11 |
20130091051 | COMPUTER-BASED SYSTEM AND METHODS FOR EVALUATING MORTGAGE PREPAYMENT RISK - A computer-based system for providing mortgage prepayment risk information includes tangible memory storing real estate data associated with an article of real property and mortgage data associated with a mortgage for the real property. The mortgage data includes a mortgagee defined time period for maintaining the mortgage. A computer system having at least one processor operably coupled to the tangible memory is configured to calculate a return on investment value based on the mortgage data and provide a mortgage agent with the mortgagee defined time period. A computer-based method for evaluating mortgage prepayment risk includes receiving, at a computer interface, the mortgagee defined time period for maintaining the mortgage, wherein the mortgagee defined time period is obtained from the computer system. | 2013-04-11 |
20130091052 | SYSTEMS AND METHODS FOR GENERATING NEW ACCOUNTS WITH A FINANCIAL INSTITUTION - Systems, methods and computer programming for evaluating users applying for a new account with a financial institution, and generating the new account online, are described. The request, identity information and geographic information are received by the financial institution over a network from the user, and confidence scores are generated and evaluated by the financial institution. If a temporary limited account is approved for generation, then an online transfer of funds from an existing account with another financial institution is initiated and completed by to complete the new account generation. | 2013-04-11 |
20130091053 | APPARATUS FOR PROVIDING SERVICE LINKING CLOSED USER GROUPS BASED ON SMART TELEVISION AND SMART SET-TOP BOX - Provided is an apparatus for providing a service that links closed user groups (CUGs) based on a smart TV and a smart set-top box. A server may provide at least one application (app) store: The app store may register apps provided by developers, and may provide the registered apps to users of a CUG. The app retriever may provide a result of inquiry and retrieval performed with respect to apps registered in the at least one app store, to a terminal that performs the inquiry and retrieval. The terminal distributed for a predetermined CUG service may use apps associated with varied CUG services through the server. | 2013-04-11 |
20130091054 | DIGITAL DOWNLOADING JUKEBOX SYSTEM WITH USER-TAILORED MUSIC MANAGEMENT, COMMUNICATIONS, AND OTHER TOOLS - A digital downloading jukebox system including a mechanism for delivering custom services to a recognized user, including services for creating playlists, communicating with others, accessing other features, etc. is provided. In some exemplary embodiments, after a user is recognized, the jukebox system allows users to access a special front-end via an Internet-enabled device or on an actual jukebox. Then, the user may, for example, create playlists, share songs with friends, send messages to friends, and access other value-added content. Such a system preferably learns about networks of friends, and enables managers to send similar messages to regular customers and/or others known to the system. In some exemplary embodiments, changes via a first user interface on a first device are reflected on second user interface on other properly-configured devices. | 2013-04-11 |
20130091055 | METHODS AND SYSTEMS FOR EXCHANGING AND/OR TRANSFERRING VARIOUS FORMS OF VALUE - Methods and systems for exchanging various forms of value, including coins, currency, credit, debit, and/or bank account funds, for prepaid cash cards, credit cards, phone cards, and the like. In one embodiment, a value exchange machine includes a coin input region, a coin sorting/counting apparatus, a card reader, and a communications facility configured to communicate with a remote computer network. In another embodiment, a value exchange system includes one or more of the value exchange machines connected to one or more remote computers via a communications link. A user wishing to purchase, for example, a prepaid cash card can visit one of the value exchange machines, select the desired transaction, and pay for the card with coins, currency, a credit card, a debit card, and/or bank account funds. After confirming payment, the value exchange machine dispenses the card to the user. | 2013-04-11 |
20130091056 | SYSTEM AND METHOD FOR MAINTAINING AND CUSTOMIZING USER ACCOUNTS - A system provides for a customer to maintain and customize a user account with a banking institution. A server maintains pre-established packages providing a group of services and applications providing a specific service. The server also maintains user accounts, each associated with a particular customer and with one or more services. The server processes requests to designate and customize packages and applications associated with a customer account. Graphical user interfaces (GUIs) are provided that allow for the customer to build, customize, and view the customer account. A selection GUI includes service icons associated with respective services and selectable by a customer to associate the respective services with the customer account. A customization GUI includes service windows that correspond to respective service icons, that include an overview summary of the respective services, and that are selectable to view and edit features of the respective services. | 2013-04-11 |
20130091057 | METHODS AND SYSTEMS FOR PROVIDING ENHANCED DATA FOR CO-BRAND PAYMENT CARD TRANSACTIONS - A computer-based method for processing a payment transaction using an enhanced payment card is provided. The transaction is processed using a computer device coupled to a storage device. The enhanced payment card is issued to a cardholder by an issuer. The method includes receiving an authorization request message associated with a merchant. The authorization request message includes a card identifier and relating to a transaction initiated by the cardholder with the merchant using the enhanced payment card. The method includes transmitting an authorization response message to the merchant. The authorization response message is generated by the issuer and including an instructing message. The merchant is instructed, via the instructing message, to transmit to the computer device an addendum file including enhanced transaction data for the transaction. | 2013-04-11 |
20130091058 | Electronic Commerce System - Embodiments of the present invention provide methods, systems, and computer readable storage media to facilitate a transaction in an electronic commerce system. Aspects of the embodiments include receiving a request at a network-connected transaction server to transfer one or more transaction items involving a first user account on the transaction server, selecting a delivery instrument from one or more available delivery instruments associated with the first user account on the transaction server, authorizing the request based at least upon a unique transaction identifier associated with the request and a unique user device identifier associated with a user access device, transferring a quantity of the one or more transaction items into or out of the selected delivery instrument, wherein the quantity is determined at least based upon the authorized request. | 2013-04-11 |
20130091059 | SERVER DEVICE FOR CONTROLLING A TRANSACTION, FIRST ENTITY AND SECOND ENTITY - Server device for performing a transaction in a system having a first entity, such as a POS, a second entity, such as a user having a mobile phone with a digital camera, and a remote server. The first entity generates a code having a transaction information and sends a first message to a server. The second entity, such as a buyer of a product or a user of a service captures the code and transmits a second message to the server having information on the transaction extracted from the code. The transaction is only authorized, when the server has determined that the first message and the second message match with each other. The transaction can be a payment transfer, a grant of an access to a service or a grant of an access to an internet portal. | 2013-04-11 |
20130091060 | System and method for configuring risk tolerance in transaction cards - A method comprising receiving a security profile configurable by a card party, storing the security profile in a database, receiving a transaction request to activate a transaction card, determining whether the transaction request satisfies the security profile's one or more requirements. | 2013-04-11 |
20130091061 | SECURE PAYMENT SYSTEM - A method for handling secure information using a first application that has a link to a second, separate secure data handling application, the method comprising: presenting to the user using the secure data handling application a secure data entry screen in response to selection of the link in the first application; receiving secure data from the user using the secure data entry screen; and re-directing the user to the first application once the secure data entry is completed. | 2013-04-11 |
20130091062 | Secure Mobile-Based Financial Transactions - Devices, systems and methods are disclosed which relate to securing payments from a mobile communications device. In exemplary embodiments, a mobile communications device communicates with a payment server via a point-of-sale device to conduct a transaction. The mobile communications device uses a client payment logic to send payment information to the point-of-sale device. The point-of-sale device uses a vendor payment logic to forward the payment information to the payment server. The payment server verifies the payment information and sends confirmation to the point-of-sale device. | 2013-04-11 |
20130091063 | SYSTEM AND METHOD FOR CREATING, NEGOTIATING, SHARING, PURCHASING AND/OR REDEEMING ELECTRONIC VOUCHERS - According to some aspects, a method of creating and negotiating a voucher is provided. The method comprises receiving from a first user an identification of an offer and criteria for terms of a voucher associated with the offer, presenting to a second user an identification of the offer, receiving from the second user a first proposal for terms of the voucher, and sending a response to the second user based on a comparison of the first proposal with the criteria for terms of the voucher. When the first proposal meets the criteria for terms of the voucher, the response comprises an indication that the first proposal is accepted, otherwise the response comprises a second proposal. Some aspects include a system for performing the above method and some aspects include a computer readable medium storing instructions that perform the above method when executed by at least one processor. | 2013-04-11 |
20130091064 | PRICING OPEN-LIST WARRANTIES - Systems, methods, and computer-readable and executable instructions are provided for pricing open-list warranties. Pricing open-list warranties can include determining an expected product support cost of a provider of an open-list warranty to a customer over a time period, determining an expected product repair cost of the customer over the time period, and pricing the open-list warranty for the time period based on the expected product support cost and the expected product repair cost. | 2013-04-11 |
20130091065 | AUTOMATIC SPIKE LICENSING - A license for one or more services may include a certain service capacity under the license. The services may be provided under the license within the service capacity. When there is a spike in service requests, the services requested may exceeds the service capacity under the license. It may be determined that the license includes a spike provision that allows for requested services to be provided in excess of the service capacity under the license. The spike provision may be activated so that the requested services in excess of the service capacity under the license are provided under the spike provision | 2013-04-11 |
20130091066 | Compliance Survey on Mobile Device - Survey processing for compliance assessment includes providing the survey to a mobile device. A survey application executing on the mobile device performs survey processing to obtain responses to survey questions comprising the survey. The survey application provides context-sensitive help information. The survey application provides for contacting individuals in a compliance management organization of a business enterprise for which compliance to regulations and policies by the business is required. | 2013-04-11 |
20130091067 | System and a Method for Matching Members - A system and a method for matching members where the system comprises a database being configured for at least storing information obtained from registered members seeking to be matched with other registered members. A server executes a computer-executable program being configured for processing information from said database and identifying potential matches of registered members. A client executes a computer-executable application being configured for presenting the potential matches and information of the matched members to users electing to vote on a likelihood of successes of the matches. Said computer-executable application is further configured for transferring votes to said database to be processed by said computer-executable program for aggregating votes and maintaining statistical values. Said computer-executable application is further configured for presenting, to a registered member, identified potential matches for the member and statistical values indicating likelihood of successes of the matches. | 2013-04-11 |
20130091068 | Formation of Special Interest Groups - Special interest subgroups are formed by a group of participants by establishing a profile for each participant. The profile defines contribution attributes dealing with contributions the profiled participant might make to a subgroup and attribution attributes dealing with benefits the profile participant might receive from participating in the subgroup. For each possible pairing of participants in the group, an overall contribution score and an overall benefit score is calculated for each participant. A mutual benefit score is calculated by combining the benefit scores for both participants in the pair. Participants are assigned to subgroups as a function of participant contribution and mutual benefit scores. | 2013-04-11 |
20130091069 | PROCESSING OF ELECTRONIC AIR WAYBILLS ACCORDING TO BILATERAL AGREEMENTS - A logistics management system (LMS) may generate electronic air waybills for a received freight waybill when a bilateral agreement is in place between at least a destination country and a origin country on the freight waybill. Bilateral agreements may also be associated with particular accounts, carriers, or shippers, such that freight waybills processed by an LMS cause the LMS to generate an electronic air waybill when information on the freight waybill matches a bilateral agreement. If no bilateral agreement applies then a paper air waybill may be generated. The bilateral agreements for individual destination countries, origin countries, and accounts may be stored in a database of the LMS, which is searched when processing a freight waybill. | 2013-04-11 |
20130091070 | System and Method for Remote Acquisition and Delivery of Goods - A system and method for remote acquisition and delivery of goods includes a server in communication with customer computers, such as through a user interface via the internet. The server can store customer information including billing information, and may include an image processor. A mobile delivery system in communication with the server includes an energy efficient vehicle, an image capture device, a global positioning system, a communication device and a printer. In use, a customer communicates with a mobile delivery agent via the image capture device and the communication device to remotely acquire a product. Once acquired, the delivery agent delivers the product to a designated delivery location. The image capture device can be utilized during the entire transaction. The system preferably includes a processor for optimizing system efficiencies, including selecting a delivery agent based on the product, pick-up location and delivery site. | 2013-04-11 |
20130091071 | PRODUCT CATALOG DYNAMICALLY TAILORED TO USER-SELECTED MEDIA CONTENT - Systems and methods for media-oriented product catalog creation are disclosed herein. Media content displayed or otherwise selected by a content consumer can be identified. Accordingly, products or services depicted by the media content can be compiled into a dynamic product catalog. The catalog can include a description of the products or services as well as associated contextual references to the media content, such as a screen capture or video clip that depicts one or more portions of the media content in which the product or service was featured. | 2013-04-11 |
20130091072 | ALGORITHM FOR POST-TRADE ANALYSIS AND FORMULATION OF OPTIMIZED STRATEGY FOR SUBSEQUENT TRADES - A computer-implemented system and method for using market data and analysis of previous trades to improve return on investment in one or more future trades. Historical trading data relating to a fund is collected and used to identify an alpha profile of the fund. Outcomes of a plurality of strategies for trading a security are simulated based on the identified alpha profile, and an optimized trading strategy is determined based on the results of the simulations. | 2013-04-11 |
20130091073 | Method and System to Solve Dynamic Multi-Factor Models in Finance - Methods and systems for estimating time-varying factor exposures of either an individual financial instrument or a portfolio of such instruments, through the solution of a constrained multi-criteria dynamic optimization problem, providing an estimation error function and one or more transition error functions to be minimized over a period of time. The factor exposures relay the influence of the factors on the return of the instrument or portfolio. The estimation error function provides the estimation error at each time interval between the return of the asset collection and a sum of products of each factor exposure and its respective factor. Each transition error function provides a transition error of each factor exposure between time intervals. In one embodiment, the constraints can include a budget constraint and non-negativity bounds applying to some or all of the factor exposures. In other embodiments, the method and system can be applied to estimating any time-varying weight that is used in a model, to relay the influence of one or more independent variables on a dependent financial or economic variable, through the solution of a constrained multi-criteria dynamic problem, minimizing estimation error and, transition error terms. In other embodiments, the solution of a multi-criteria dynamic problem can be used as part of a method and system to determine structural breakpoints for each factor, and also as part of a method and system for determining optimal parameters to weight the transition error functions and selecting the factors included in the model. | 2013-04-11 |
20130091074 | METHOD AND SYSTEM FOR GENERATING A MUTUAL FUND SALES COVERAGE MODEL - A method for generating a sales coverage model for a purchaser of a mutual fund, comprising: using a processor, determining a purchaser score for the purchaser, the purchaser score being a predicted purchase amount of the mutual fund by the purchaser for an upcoming month; determining a responsiveness metric for the purchaser; determining a response curve for the purchaser by combining the purchaser score with a natural logarithm of a number of meetings with the purchaser per year scaled by the responsiveness metric and with a natural logarithm of a number of telephone calls to the purchaser per year scaled by the responsiveness metric, the response curve being a model of predicted purchase amount of the mutual fund by the purchaser for an upcoming year; determining a profit maximizing number of meetings with the purchaser and a profit maximizing number of telephone calls to the purchaser from the response curve and from predetermined costs associated with each meeting with the purchaser and with each telephone call to the purchaser; and, presenting the profit maximizing number of meetings with the purchaser and the profit maximizing number of telephone calls to the purchaser on a display coupled to the processor as the sales coverage model for the purchaser. | 2013-04-11 |
20130091075 | ELECTRONIC COLLATERAL MANAGEMENT SYSTEM AND METHOD - A process for allocating specific assets from a pool of assets to secure a liability. Information concerning each of the assets in the pool of assets is received from at least two sources. A set of validation rules is applied to the information for each asset in the pool of assets and those assets which do not meet the validation rules are rejected. A price is assigned to each non-rejected asset. A subset of the non-rejected assets is allocated to the liability as a function to collateralize the liability. | 2013-04-11 |
20130091076 | System for Electronic Re-Allocation of a Transaction Amount to an Investment - This system may include a system for electronically reallocating any portion of a transaction by maintaining a user account at a user institution; maintaining a vendor account at a vendor institution; maintaining a user account at a trust institution; initiating: a transaction for the transaction amount; electronically distributing the transaction amount from said user account to said vendor account; and electronically distributing at least a portion of the transaction amount from the vendor account to the user account at the trust institution, wherein the portion of the transaction amount in the user account at the trust institution is placed an to investment vehicle. The system of the present invention may further comprise providing an interactive information source between the user and the trust institution, whereby the trust institution can provide information (current or historical) to the user regarding the portion of the transaction amount placed in the investment vehicle. | 2013-04-11 |
20130091077 | System and Method for Resolving Transactions with Variable Offer Parameter Selection Capabilities - A system and method for the online settling of a transaction is provided. The system includes a server arrangement configured to determine a set of curves or planes defining acceptable settlement conditions for the financial transaction, enabling the user to select an acceptable settlement condition using interactive controls or computer implemented controls engageable by the user, such as sliding selectors or rotatable dials or the like, or controls enabling placement of points on a curve or curves. | 2013-04-11 |
20130091078 | Method And Apparatus To Determine Rules Implementation Decision - A technique and associated mechanism that guides the user through a set of questions relating to operation rules used in the design of Service Oriented Architecture Systems (SOAs). The questions are related to key aspects of a solution—security, maintenance frequency, usage demand/performance and complexity. Preferably, the questions are yes-or-no questions. Based on the answers provided, an appropriate path will be selected categorize into an appropriate category. The category of the rule will require, or at least suggest, the SOA component into which the rule will be implemented when it is implemented by the SOA designer. the technique is technology specific agnostic and helps in selecting an appropriate tool/platform in a standard and consistent manner. | 2013-04-11 |
20130091079 | USING A HEURISTICALLY-GENERATED POLICY TO DYNAMICALLY SELECT STRING ANALYSIS ALGORITHMS FOR CLIENT QUERIES - A method for dynamically selecting string analysis algorithms can begin with the training of the dynamic string analysis handler of a string analysis module to effectively handle a subset of string queries having contextual metadata received from a client application in an instructional environment. The effectiveness of the training module can be based upon feedback from the client application. Upon completion of the training, a string analysis algorithm selection policy can be synthesized. The string analysis algorithm selection policy can correlate a context of a string query in the subset to the usage of a string analysis algorithm. When in the operational environment, the dynamic string analysis handler can dynamically handle string queries having contextual metadata received from the client application in accordance with the string analysis algorithm selection policy. The string analysis algorithm to be used for a string query can be dynamically and independently determined. | 2013-04-11 |
20130091080 | PROBABILISTIC MODEL CHECKING OF SYSTEMS WITH RANGED PROBABILITIES - Systems and methods for model checking of live systems are shown that include learning an interval discrete-time Markov chain (IDTMC) model of a deployed system from system logs; and checking the IDTMC model with a processor to determine a probability of violating one or more probabilistic safety properties. Checking the IDTMC model includes calculating a linear part exactly using affine arithmetic; and over-approximating a non-linear part using interval arithmetic. | 2013-04-11 |
20130091081 | LATENT FACTOR DEENDENCY STRUCTURE DETERMINATION - Disclosed is a general learning framework for computer implementation that induces sparsity on the undirected graphical model imposed on the vector of latent factors. A latent factor model SLFA is disclosed as a matrix factorization problem with a special regularization term that encourages collaborative reconstruction. Advantageously, the model may simultaneously learn the lower-dimensional representation for data and model the pairwise relationships between latent factors explicitly. An on-line learning algorithm is disclosed to make the model amenable to large-scale learning problems. Experimental results on two synthetic data and two real-world data sets demonstrate that pairwise relationships and latent factors learned by the model provide a more structured way of exploring high-dimensional data, and the learned representations achieve the state-of-the-art classification performance | 2013-04-11 |
20130091082 | USING A HEURISTICALLY-GENERATED POLICY TO DYNAMICALLY SELECT STRING ANALYSIS ALGORITHMS FOR CLIENT QUERIES - A method for dynamically selecting string analysis algorithms can begin with the training of the dynamic string analysis handler of a string analysis module to effectively handle a subset of string queries having contextual metadata received from a client application in an instructional environment. The effectiveness of the training module can be based upon feedback from the client application. Upon completion of the training, a string analysis algorithm selection policy can be synthesized. The string analysis algorithm selection policy can correlate a context of a string query in the subset to the usage of a string analysis algorithm. When in the operational environment, the dynamic string analysis handler can dynamically handle string queries having contextual metadata received from the client application in accordance with the string analysis algorithm selection policy. The string analysis algorithm to be used for a string query can be dynamically and independently determined. | 2013-04-11 |
20130091083 | BATTERY ADAPTIVE LEARNING MANAGEMENT SYSTEM - A system and methods for battery health diagnostics are disclosed. At least one battery property of a battery is measured in real-time to provide measured data, and at least one measurement time at which the measured data is measured is tracked. A battery history model is provided by adaptively modeling the measured data and the measurement time, and a future state of the battery is estimated based on the battery history model. | 2013-04-11 |
20130091084 | DATA QUALITY ISSUE DETECTION THROUGH ONTOLOGICAL INFERENCING - Systems and methods (e.g., utilities) for use in providing automated data quality detection that can be used multiple times across various domains and across multiple data quality spheres. A data structure or schema of an incoming data set is initially mapped to a desired data or knowledge state in a domain ontology made up of a number of TBox statements. Data quality issues in the incoming data set can then be detected as instances of the incoming data set are attempted to be inferenced against or otherwise matched to anticipated TBox statements of the domain ontology. | 2013-04-11 |
20130091085 | INSIDER THREAT DETECTION DEVICE AND METHOD - The present invention relates to an insider threat detection device and method which collects and analyzes a variety of information generated by insiders working for an organization, such as behaviors, events, and states of the insider, and detects an abnormal insider who may become a potential threat. According to the present invention, the insider threat detection method and apparatus analyzes information related to insiders using the correlation analysis method, and previously detects an abnormal sign of an insider who may become a potential threat to an organization, which makes it possible to protect the organization from attacks on systems inside the organization or seizure of important information inside the organization. | 2013-04-11 |
20130091086 | GRAPH-THEORETIC ANALYSIS OF DISCRETE-PHASE-SPACE STATES FOR CONDITION CHANGE DETECTION AND QUANTIFICATION OF INFORMATION - Data collected from devices and human condition may be used to forewarn of critical events such as machine/structural failure or events from brain/heart wave data stroke. By monitoring the data, and determining what values are indicative of a failure forewarning, one can provide adequate notice of the impending failure in order to take preventive measures. This disclosure teaches a computer-based method to convert dynamical numeric data representing physical objects (unstructured data) into discrete-phase-space states, and hence into a graph (structured data) for extraction of condition change. | 2013-04-11 |
20130091087 | Systems and methods for prediction-based crawling of social media network - A new approach is proposed that contemplates systems and methods to support efficient crawling of a social media network based on predicted future activities of each user on the social network. First, data related to a user's past activities on a social network are collected and a pattern of the user's past activities over time on the social network is established. Based on the established pattern on the user's past activities, predictions about the user's future activities on the social network can be established. Such predictions can then be used to determine the collection schedule—timing and frequency—to collect data on the user's activities for future crawling of the social network. | 2013-04-11 |
20130091088 | MAKING A RECOMMENDATION TO A USER THAT IS CURRENTLY GENERATING EVENTS BASED ON A SUBSET OF HISTORICAL EVENT DATA - A method and a system of making a recommendation to a user that is currently generating events based on a subset of historical event data are provided. Historical event data, which is segmented into a set of sessions, is received. Each session includes events. The sessions are associated with clusters that represent the users that generated the historical event data. Each of the associated sessions is associated with one cluster and the number of the clusters is the same as the number of the users. A determination as to which cluster is associated with events currently being generated by a current user's behavior is made. The determining does not require identification of the current user. A recommendation is made to the current user based on the cluster that is associated with the events currently being generated. | 2013-04-11 |
20130091089 | EXTENSIBLE AND GENERIC FRAMEWORK FOR MANAGING RESOURCES FOR DATA WAREHOUSING LOADS - Methods, systems, and computer program products are provided for managing resources. A request is received for a plurality of resources from a requester. A ticket is generated for the request that indicates the resources. For each resource, a resource provider for the resource is queried to determine whether the resource can be acquired. The ticket is queued if any of the resources cannot be acquired. The ticket is granted if all of the resources can be acquired. | 2013-04-11 |
20130091090 | SEMANTIC WEB PORTAL AND PLATFORM - An application that enables users to effectively utilize and manage knowledge and data the user posses and allows other users to effectively and seamlessly benefit from the user's knowledge and data over a computer network is also disclosed. A method of processing content created by a user utilizing a semantic, ontology-driven portal on a computer network is described. The semantic portal application provides the user with a content base, such as a semantic form or meta-form, for creating a semantic posting. The semantic portal utilizes a knowledge data structure, such as a taxonomy or ontology, in preparing a semantic posting based on the information provided by the user via the content base. The semantic portal application prepares a preview of a semantic posting for evaluation by the user. The semantic posting is then either modified by the user or accepted and posted by the user for external parties to view. | 2013-04-11 |
20130091091 | DOCUMENT PROCESSING DEVICE AND PROGRAM - A technique is provided in which, in a foreign language document in which a space character is provided for separation of words forming a document, it is possible to reliably detect each word separation and reliably reinsert a space character in the separation. It is decided whether adjacent characters are included in the same word (i.e., presence or absence of space) using: decision by an English writing rule, decision by information as to whether there is a space character in source document data; decision by the identification of character string objects including adjacent characters; and decision by a gap between the character string objects including the adjacent characters. It should be noted that it is preferable to make a decision by these processing in order of this description. | 2013-04-11 |
20130091092 | FRONT END INTELLIGENCE FOR MONITORING BACK END STATE - Apparatus, methods, and other embodiments associated with providing front end intelligence for monitoring back end state are described. One example method includes controlling a first entity to request that a second entity perform a multi-state stateful operation (e.g., file create). The method includes receiving notice from the second entity that the stateful operation has attained a first state (e.g., partial file create complete) and, upon receiving the notice, maintaining, at the first entity, information (e.g., sequence number, metadata) associated with the stateful operation. The method also includes, upon receiving notice that the second entity lost state before the stateful operation attained a second state, selectively providing to the second entity a portion of the information maintained at the first entity, and upon receiving notice from the second entity that the stateful operation has attained the second state, terminating maintaining the information associated with the stateful operation. | 2013-04-11 |
20130091093 | METHOD AND DEVICE FOR MANAGING INFORMATION OF A UNIVERSAL INTEGRATED CIRCUIT CARD - The present invention relates to a method and a device for managing information of a universal integrated circuit card. The method includes: acquiring an integrate circuit card identity (ICCID) of a universal integrated circuit card (UICC); determining a database corresponding to the ICCID; acquiring information of the UICC; and storing and updating the information of the UICC into the database corresponding to the ICCID. Through the method and a device for managing information of a universal integrated circuit card according to the present invention, information of different UICCs is stored in different databases according to ICCIDs of the UICCs, so as to conveniently manage information of different universal integrated circuit cards. | 2013-04-11 |
20130091094 | ACCELERATING DATA PROFILING PROCESS - A data profile request is handles by utilizing data in a distributed file system. Tabular data is extracted from a data source and stored in a distributed file system. Each table in the tabular data is split by columns, which are each stored in separate files in a set of physical nodes of the distributed file system. In response to a data profiling request, a master node determines, based on the profiling request, which groups of files are needed to be on a same physical node in order to perform the profiling analysis. The master node creates jobs using physical nodes that contain the requisite files needed for each job. | 2013-04-11 |
20130091095 | DEVICE, SYSTEM, METHOD AND PROGRAM FOR DATA INTEGRATION PROCESS - A data integration processing device configured to integrate a plurality of graphs includes: an integration processing method selecting means | 2013-04-11 |
20130091096 | METHODS, SYSTEMS, AND PRODUCTS FOR RECORDING MEDIA - Methods, devices, and products are disclosed for recording media. An input is received via a user interface to record media. An entry is created in a recording schedule to record the media. The recording schedule is sent to a restoration server, such that the recording schedule is mirrored to the restoration server. | 2013-04-11 |
20130091097 | IDENTIFICATION OF MOVED OR RENAMED FILES IN FILE SYNCHRONIZATION - A method for synchronizing files is provided. Current metadata including a filename and a hash identifier for each file of the synchronized folder is created. The current metadata is compared to previous metadata. Based on the comparison, a first file and a first folder added to the synchronized folder and a second file and a second folder deleted from the synchronized folder are identified. The hash identifiers of the first and second files are compared. If the hash identifiers match, the filenames of the first and second files are compared. If the filenames do not match, the first file is identified as a renamed file. Metadata is sent to a synchronized device with information related to the first folder sent before information related to the first file, which is sent before information related to the second folder. | 2013-04-11 |
20130091098 | METHOD OF SPEEDING UP ACCESS TO DESIGN DATABASES HAVING LARGE NUMBERS OF DESIGN UNITS - A computer-implemented method is disclosed for speeding up database access of electronic design automation (EDA) tool which utilizes a database manager for file access. The EDA tool accesses a plurality of design files, and each of the plurality of design files is associated with one of a plurality of design units for an integrated circuit (IC). The plurality of design files are encapsulated into an archive file which comprises a plurality of data units, wherein each of the data units corresponds to a design file. A request to access a design file will be redirected to access the archive file. The design file is then accessed by accessing the corresponding data unit in the archive file. | 2013-04-11 |
20130091099 | MIGRATING ARTIFACTS BETWEEN SERVICE-ORIENTED ARCHITECTURE REPOSITORIES | 2013-04-11 |
20130091100 | MANAGING AN ALIAS HOST AND DOMAIN NAMES ON A DNS SERVER - Embodiments of the invention provide a method of managing aliases on a server, including deleting unused aliases, while minimizing required administrator interaction. The server may include expirable alias records, containing an expiration value and an inactivity timer. An alias manager component may process the expirable records. If the alias manager component determines a particular record has expired, the alias manager component may delete that record. | 2013-04-11 |
20130091101 | SYSTEMS AND METHODS FOR NETWORK ASSISTED FILE SYSTEM CHECK - Methods and a processing system directed to a network assisted file system checker are described. In one embodiment the checker system is a network assisted checker that employs virtual storage devices that is storage is backed by files, and optionally the files backing the virtual storage devices may be remote files accessed over a network through a network file sharing protocol such as, but not limited to, NFS or CIFS. A device driver module introduces the virtual storage device to the local operating system supporting the checker process, and the device driver maps read and write requests made by the checker process to the virtual storage device onto files being supported by the network file sharing system. | 2013-04-11 |
20130091102 | DEDUPLICATION AWARE SCHEDULING OF REQUESTS TO ACCESS DATA BLOCKS - Systems and methods for scheduling requests to access data may adjust the priority of such requests based on the presence of de-duplicated data blocks within the requested set of data blocks. A data de-duplication process operating on a storage device may build a de-duplication data map that stores information about the presence and location of de-duplicated data blocks on the storage drive. An I/O scheduler that manages the access requests can employ the de-duplicated data map to identify and quantify any de-duplicated data blocks within an access request. The I/O scheduler can then adjust the priority of the access request, based at least in part, on whether de-duplicated data blocks provide a large enough sequence of data blocks to reduce the likelihood that servicing the request, even if causing a head seek operation, will not reduce the overall global throughput of the storage system. | 2013-04-11 |
20130091103 | SYSTEMS AND METHODS FOR REAL-TIME DE-DUPLICATION - Disclosed are systems, apparatus, and methods for identifying and processing duplicative records in one or more database systems. In various implementations, a first data object may be created and stored in a first database system, where the first data object includes a plurality of data fields capable of storing a plurality of data values. A trigger function may be executed in response to creating the first data object, where the trigger function causes one or more servers to determine if one or more existing data objects stored in the second database system match the first data object, and where the trigger function further causes one or more servers in the first database system to retrieve one or more data values from the one or more existing data objects. The retrieved one or more data values may be stored in one or more data fields of the first data object. | 2013-04-11 |
20130091104 | SYSTEMS AND METHODS FOR REAL-TIME DE-DUPLICATION - Disclosed are systems, apparatus, and methods for identifying and visualizing duplicative records via a social network. In various implementations, a first data object may be created and stored in a first database system, where the first data object includes a plurality of data fields capable of storing a plurality of data values. In some implementations, a trigger function may be executed in response to creating the first data object, where the trigger function causes one or more servers in a second database system to determine if one or more existing data objects stored in the second database system include one or more data values that match data values included in the first data object. In various implementations, feed items may be generated in response to determining that a match exists, where the feed items provide one or more users with an indication of the determined match. | 2013-04-11 |
20130091105 | System for organizing and fast searching of massive amounts of data - A system to collect and analyze performance metric data recorded in time-series measurements, converted into unicode, and arranged into a special data structure. The performance metric data is collected by one or more probes running on machines about which data is being collected. The performance metric data is also organized into a special data structure. The data structure at the server where analysis is done has a directory for every day of performance metric data collected with a subdirectory for every resource type. Each subdirectory contain text files of performance metric data values measured for attributes in a group of attributes to which said text file is dedicated. Each attribute has its own section and the performance metric data values are recorded in time series as unicode hex numbers as a comma delimited list. Analysis of the performance metric data is done using regular expressions. | 2013-04-11 |
20130091106 | AUDITING DATABASE ACCESS IN A DISTRIBUTED MEDICAL COMPUTING ENVIRONMENT - Methods, systems, and computer program products are provided for auditing database access in a distributed medical computing environment including receiving from a user a query of one or more databases within the distributed medical administration computing environment; determining by an audit manager in dependence upon audit policies for the medical computing environment whether any of the results of the query require auditing access; and if any of the results of the query require auditing access, creating an audit record and storing the audit record in an audit database. | 2013-04-11 |
20130091107 | COMMAND INTERPRETER - A system includes a first computer configured to store and run a computer program. The computer program includes an internal interface with tangible machine-readable instructions stored on the first computer, to provide communications between the computer program and external computers and our computer processes. The system also includes a command interpreter configured to interface with the computer program through the internal interface. The command interpreter includes tangible machine-readable instructions to detect a script file; generate one or more command objects, interpretable by the internal interface, representative of a functionality defined in the script file; generate a command script comprising the generated command objects; and execute the command script by executing at least a portion of the machine-readable instructions in the internal interface. | 2013-04-11 |
20130091108 | TEMPORARY DISTRIBUTED FILE PERSISTENCE - A system includes a first computer hosting a version control system, the version control system providing a version control system repository configured to store one or more temporary files, wherein the version control system repository is configured to allow concurrent access of the temporary files by a plurality of computers or computer processes. Also the version control system repository is deleted by the first computer or by one of the plurality of computers or computer processes when the temporary files are no longer needed. | 2013-04-11 |
20130091109 | System and Method for Representing Media Assets - Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for representing media assets. The method includes receiving an original media asset and derivative versions of the original media asset and associated descriptors, determining a lineage to each derivative version that traces to the original media asset, generating a version history tree of the original media asset representing the lineage to each derivative version and associated descriptors from the original media asset, and presenting at least part of the version history tree to a user. In one aspect, the method further includes receiving a modification to one associated descriptor and updating associated descriptors for related derivative versions with the received modification. The original media asset and the derivative versions of the original media asset can share a common identifying mark. Descriptors can include legal documentation, licensing information, creation time, creation date, actors' names, director, producer, lens aperture, and position data. | 2013-04-11 |
20130091110 | Recovery of Inconsistent Data in Databases - A mechanism is provided for efficiently searching a database for data associated with a key value that is unidentifiable in a set of nodes of the database. A request is received to retrieve data from the database, where the request specifies a searched-for key value that is unidentifiable in the set of nodes of the database. The data associated with the searched-for key value is identified in a lowest level node of the database between a current leftmost node and a current rightmost node. A key index is updated in at least one node of the database with the key index value associated with the data and identified from the lowest level node thereby making the searched-for key value identifiable within the at least one node. The data associated with the searched-for key value is then returned to a user. | 2013-04-11 |
20130091111 | Controlling Configurable Variable Data Reduction - Example apparatus, methods, and computers control configurable, variable data reduction. One example method includes identifying data reduction controlling attributes in an object to be data reduced by a configurable variable data reducer. The attributes provide information upon which decisions concerning whether and/or how to data reduce the object can be based. The example method also includes controlling a configurable variable data reducer to selectively data reduce the object based, at least in part, on the data reduction controlling attributes. The control exercised can determine whether, where, when, and/or how data reduction will proceed, | 2013-04-11 |
20130091112 | MANAGING A TEMPORAL KEY PROPERTY IN A DATABASE MANAGEMENT SYSTEM - Embodiments provide an approach for efficiently searching a temporal key index as well as enforcing key distinctiveness property in a database table corresponding to the index. For example, by addressing time range overlaps in an index having a sort order for temporal keys, a database management tool of a server system may efficiently process client requests while enforcing a temporal key property in the database table. | 2013-04-11 |
20130091113 | HIERARCHICAL INFORMATION RETREIVAL AND BOOLEAN SEARCH STRINGS - A system for information retrieval from a collection of hypermedia data over a distributed network, including a data storage system that is a collection of hypermedia data which also has a number of hyperlinks to items of hypermedia content. Hyperlinks are each respectively associated with at least one code value generated based on the content of the respective hypermedia content. Includes an application that receives progressive user input and iteratively builds a user search code value according to the user input. | 2013-04-11 |
20130091114 | AUTOMATIC CRAWLING OF ENCODED DYNAMIC URLS - A computer program product for crawling URLs that are encoded and highly dynamic, the computer program product includes a non-transitory computer readable storage medium having computer readable program code embodied therewith. The computer readable program code includes computer readable program code configured to retrieve navigational state information corresponding to a URL and compare the navigational state information to previously stored navigational state information corresponding to one or more previously visited URLs. The computer readable program code also includes computer readable program code configured to determine if the URL has been previously visited and retrieve content associated with the URL if the URL has not been previously visited. | 2013-04-11 |
20130091115 | AUTOMATIC CRAWLING OF ENCODED DYNAMIC URLS - A method includes retrieving navigational state information corresponding to a URL; analyzing which navigational state to consider for page identification; comparing the navigational state information to previously stored navigational state information corresponding to one or more previously visited URLs; determining if the URL has been previously visited; and retrieving content associated with the URL if the URL has not been previously visited. | 2013-04-11 |
20130091116 | SELECTING AND PRESENTING SEARCH RESULTS BASED ON DISTINCT TAXONOMIES - A search engine stores different taxonomies that each specifies categories and relationships between the categories. When the search engine receives a request having a search query, the search engine determines which taxonomy, if any, it should use to generate a search results page. The search engine bases this determination upon information provided to it in the request, in one embodiment. For example, the search engine might select a taxonomy based on the particular environment from which the search query originated. However, the search engine can select the taxonomy based on other information, such as a role of the user. Thus, a medical researcher and a financial analyst for a particular corporation could receive search results pages that were generated with appropriate taxonomies for each of them. | 2013-04-11 |
20130091117 | Sentiment Analysis From Social Media Content - The sentiment engine includes a sentiment module configured to gather opinions or determine sentiment expressed in documents, a crawling module configured to crawl servers to obtain at least a subset of the documents or opinions from social media websites, a keyword module configured to extract keywords from documents, a filtering module configured to filter keywords and documents, and a classification module configured to classify documents, sentences, and/or keywords, a polarity prediction module configured to predict the polarity of a sentiment sentence, and a social media net promoter score (SNPS) configured to calculate a loyalty metric of users from social media websites. The functionality of these modules may be combined with one another or in addition to other modules. | 2013-04-11 |
20130091118 | AUDITING OF WEBPAGES - A method of performing an audit of auditable objects within webpages of a website includes identifying an auditable object marker and crawling a portion of a website to identify multiple webpages of the website that each include the auditable object marker. The method may further include configuring an audit rule to determine a property of an auditable object of each of the webpages where the auditable object marker is associated with the auditable object. The method may further include performing an audit of each of the webpages according to the audit rule to determine the property of the auditable object for each of the webpages and grouping the webpages based on the property of the auditable object for each of the webpages. | 2013-04-11 |
20130091119 | Method and Server for Handling Database Queries - A method and a server ( | 2013-04-11 |
20130091120 | INTEGRATED FUZZY JOINS IN DATABASE MANAGEMENT SYSTEMS - A fuzzy joins system that is integrated in a database system generates fuzzy joins between records from two datasets. The fuzzy joins system includes a tokenizer to generate tokens for data records and a transformer to find transforms for the tokens. The fuzzy joins system invokes a signature generator, running within a runtime layer of the database system, to generate signatures for data records based on the tokens and their transforms. Subsequently, an equi-join operation joins the records from the two datasets with at least one equal signature. A similarity calculator, running within a runtime layer of the database system, computes a similarity measure using the token information of the joined records. If the similarity measure for any two records is above a threshold, the fuzzy joins system generates a fuzzy join between such two records. | 2013-04-11 |
20130091121 | Method for rapid assessment of similarity between sequences - Genomic sequence matching and alignment techniques are disclosed. In one embodiment, an index of a reference sequence is constructed that represents all transitions from a single l-mer prefix to multiple m-mer suffixes. This index data structure may take a variety of forms, including an array or a tree. The base position of each transition from l-prefix to m-suffix is recorded in k-bit masked form. The positions data structure may take a variety of forms as well, including an array or a tree. The l-prefix, m-suffix and k-position index is used for rapid assessment of similarity between a query and a reference genomic sequence by means of a table of local hits. | 2013-04-11 |
20130091122 | FEDERATED QUERY ENGINE FOR FEDERATION OF DATA QUERIES ACROSS STRUCTURE AND UNSTRUCTURED DATA - The subject technology provides querying structured and unstructured data across disparate incompatible systems with a single language and connection point. Cost based optimizations are provided for executing the query. In some configurations, logical plans for executing a query are generated. For each of the logical plans, the subject technology generates a set of physical plans for executing the query on data systems, determines an execution cost for each physical plan from the physical plans, and selects a respective physical plan with a lowest determined execution cost among the determined execution cost for each physical plan. A physical plan is then selected for execution with a lowest execution cost among the selected respective physical plans of each of the logical plans. Data from an operation from the query may then be persisted and then used for generating a new set of logical and physical plans for executing a remaining set of operations from the query. | 2013-04-11 |
20130091123 | QUERY TO STREAMING DATA - A client computer buffers a continuous flow of streaming data during a sliding window that is defined by a time boundary. The client computer processes a query on a portion of the streaming data buffered during the time boundary of the sliding window and a portion of the streaming data stored in a data warehouse. | 2013-04-11 |
20130091124 | APPARATUS AND METHOD FOR RETRIEVING DATA AT HIGH SPEED TO PERFORM POST-PROCESSING ON SATELLITE TELEMETRY DATA - A telemetry data retrieval apparatus and method for post-processing are provided. The telemetry data retrieval apparatus may include a retrieval initiating unit to receive an input of a retrieval time, and to calculate a percentage of the retrieval time during an entire retrieval period, a start position calculating unit to calculate a retrieval start position in which data retrieval is started within a stored file, based on the calculated percentage, and a telemetry data retrieval unit to verify a start pattern and a time tag from the calculated retrieval start position, and to retrieve a position of telemetry data in the stored file. | 2013-04-11 |
20130091125 | CONSTRUCTION DRAWING EVALUATION SYSTEMS AND METHODS - The invention provides the ability to count symbols within drawings in an automated fashion using a computer processor. This may be accomplished by identifying a particular symbol (representing a drawing part) and then permitting the computer to search for the identified symbol in the drawing. Following the initial search, a secondary search may be performed to increase the accuracy of an initial automated count, and obtaining refined searches results representing similar parts (represented by the same symbol) but being a part type as indicated by an identifier associated with the initial symbol. | 2013-04-11 |
20130091126 | SYSTEMS AND METHODS FOR ANALYSIS AND INTERPRETATION OF NUCLEIC ACID SEQUENCE DATA - Systems and method for annotating variants within a genome can call variants from reads or receive called variants directly and associate the called variants with functional annotations and interpretive annotations. A summary report of the called variants, the associated functional annotations, and the associated interpretive annotations can be generated. | 2013-04-11 |
20130091127 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM AND RECORDING MEDIUM - Search keywords are acquired (S | 2013-04-11 |
20130091128 | Time-Aware Ranking Adapted to a Search Engine Application - Techniques provide time-aware ranking, such as ranking of information, files or URL (uniform resource locator) links. For example, time-aware modeling assists in determining user intent of a query to a search engine. In response to the query, results are ranked in a time-aware manner to better match the user intent. The ranking may model query, URL and query-URL pair behavior over time to create time-aware query, URL and query-URL pair models, respectively. Such models may predict behavior of a query-URL pair, such as frequency and timing of clicks to the URL of the pair when the query of the pair is posed to the search engine. Results of a query may be ranked by predicted query-URL behavior. Once ranked, the results may be sent to the user in response to the query. | 2013-04-11 |
20130091129 | SEARCH METHOD AND SYSTEM USING KEYWORD - A search method in a portable terminal using a keyword is disclosed. A portable terminal transmits, to a server, setting information for a smart push in which a keyword and a search term are set. The server determines whether the keyword falls within top popular search rankings during a term period corresponding to the search term based on the received smart push setting information. If the keyword falls within the top popular search rankings, the server transmits search results obtained using the keyword to the portable terminal. | 2013-04-11 |
20130091130 | SYSTEMS AND METHODS THAT UTILIZE PREFERENCE SHIELDS AS DATA FILTERS - Systems and methods that utilize preference shields as data filters are provided herein. Exemplary methods may include receiving a query from a first user, selecting a preference shield for the first user from a database that includes preference shields, applying the preference shield to query responses obtained for the query, and returning a response to the first user that includes filtered query responses that have been obtained by application of the preference shield to the query responses. | 2013-04-11 |