44th week of 2012 patent applcation highlights part 59 |
Patent application number | Title | Published |
20120278236 | SYSTEM AND METHOD FOR PRESENTMENT OF NONCONFIDENTIAL TRANSACTION TOKEN IDENTIFIER - A method and system for completing a purchase transaction includes receiving the non-confidential number to effect a purchase transaction from a caller identifier and requesting that a value account associated with the non-confidential number be debited, wherein the debit amount is associated with the purchase transaction. A request for authorization is transmitted to an operator of at least one of portable computing device and a landline phone, wherein the request seeks authorization to debit the value account. The at least one value account may comprise a credit account in which the telephone number may form part of the primary account number (PAN) governed by the ISO/IEC 7812 card number standard. | 2012-11-01 |
20120278237 | Method, System and Mobile Device for Distributing Gift Certificate - A method for distributing a gift certificate may be provided that includes: receiving information on an affiliate identifier recognized by a user terminal device; receiving payment information of a user of the user terminal device from an affiliate terminal device; and calculating a remaining amount of the gift certificate of the user or a mileage of the user on the basis of the payment information. | 2012-11-01 |
20120278238 | Account Permanence - A system and method for using derived account identifiers. The derived account identifiers are associated with a single permanent account identifier. Each derived account identifier is associated with a communication channel or portable consumer device. | 2012-11-01 |
20120278239 | INSTANT AVAILABILILTY OF ELECTRONICALLY TRANSFERRED FUNDS - A system and method for making proceeds of a transaction available to a user before the transaction is completed is provided. The system may be part of an on-line system or traditional merchant configured to facilitate payments or fund transfers from users. In example embodiments, a request from a first entity to conduct a transaction involving a first value is received. Funds of the transaction are caused to be released prior to the transaction clearing a financial institution. Based on the transaction being rejected by the financial institution, at least a portion of the first value is charged against a credit source. | 2012-11-01 |
20120278240 | Method and System to Verify the Identity of a User - A method and system to verify the identity of a user are described. The system may include a communications module to receive a billing telephone number and a private data segment associated with a user; an address detector to obtain a street address associated with the user; a private data processor to obtain one or more identification records, utilizing the obtained street address and the private data segment; and a matching module to compare the one or more identification records with the private data segment associated with the user to generate a match result. | 2012-11-01 |
20120278241 | TRACEABLE AND NON-REPUTABLE TRANSACTION DEVICES AND METHODS - Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable. | 2012-11-01 |
20120278242 | SYSTEM AND METHOD FOR PROVIDING PRODUCT DATA COLLECTION, MONITORING, AND TRACKING - A system for providing product data collection, monitoring, and tracking contains a memory and a processor configured by the memory to perform the steps of: receiving product information and a scannable code; creating and assigning a unique product identifier to the received product information and associated scannable code; receiving customer registration information; creating and assigning a unique customer identifier to the received customer information; associating the unique product identifier with the unique customer identifier; and after receiving the scannable code from a remote device, providing the remote device with access to the received product information. | 2012-11-01 |
20120278243 | Determination of Appraisal Accuracy - A method for determining the accuracy of an appraisal report using a computer implemented application, including pre-validating an appraisal report to determine whether a first set of rules has been satisfied, the appraisal report including N fields to be completed, the first set of rules comprising completion of a pre-determined number of N fields; proceeding to a post-validating step if the first set of rules is satisfied; post-validating an appraisal report to provide an evaluation thereof, the evaluation including a plurality of risk categories including risk level indicators, and a risk-based overall score. | 2012-11-01 |
20120278244 | Evaluating Intellectual Property - Aggregation, analysis, and presentation of patent and business data in a common interface are described. The analysis includes techniques for evaluating a patent or patent application by examining claim-related information. These techniques include deriving unique signatures of individual claims and ascertaining scope of individual claims relative to other claims in a collection (such as claims found in a common class). The signature and scope of patent claims may be graphically depicted using various graphics elements in a user interface. | 2012-11-01 |
20120278245 | INSTANT LOTTERY GAME - An instant lottery game system includes a game play defining element. A symbol display zone is carried on the game play defining element, the symbol display zone containing a plurality of symbols related to gaming machine games. A masking medium covers the symbols of the symbol display zone prior to use. A symbol interpretation zone is also carried on the game play defining element, the symbol interpretation zone carrying a plurality of indicia with the indicia being used in interpreting symbols revealed after removal of the masking medium to determine a prize outcome. | 2012-11-01 |
20120278246 | FRAUD DETECTION SYSTEM AUTOMATIC RULE POPULATION ENGINE - Embodiments of the invention are directed to a fraud detection system that stores fraud detection rules and merchant profiles. The fraud detection system allows a user to designate fraud detection rules as core fraud detection rules, and the fraud detection system can automatically populate new merchant profiles with the user's core fraud detection rules. | 2012-11-01 |
20120278247 | VIRTUAL GOODS INCENTIVE SYSTEM - An interface application enables a campaign manager to manage the transfer of virtual credits to a user upon completion of an action that benefits a provider of goods or services. The campaign manager provides a link to the provider of goods or services. When a user clicks through to this link, the interface application directs the user to perform the desired action. Upon completion of the action, the application deposits a credit to the user's virtual account. Because the virtual transaction is performed by the provided interface application, the logistics associated with launching and executing the campaign are low enough to facilitate hi-volume, low-cost incentive programs. | 2012-11-01 |
20120278248 | Interactive Method for Facilitating Employment Searches - A method and system for job recruiting employing a physically distributed employer video presentation on detachable memory devices that may be selectively accessed by a job applicant through a communication terminal and the internet. | 2012-11-01 |
20120278249 | Generating an Identity Theft Score - A system for generating an identity theft score is disclosed. The system may identify consumers who have experienced identity theft during a historical time period, generate an identity theft risk model based upon the plurality of consumers who have experienced identity theft, and generate an identity theft score for an individual consumer based upon the identity theft risk model and data associated with the individual consumer. The identity theft risk model may comprise a regression model, and the identity theft score may represent a probability that the individual consumer will experience identity theft during a future time period. | 2012-11-01 |
20120278250 | Systems and Methods for Classifying Goods for Export - This disclosure relates to systems and methods of classifying exports. These systems and methods are generally computer implemented methodologies, or software for implementing such methodologies on a computer or computer network, that serve to make it easier to determine the classification of an export and to generate a report associated with that classification. Through a series of user inputs of information about the export entered at the user's own personal computer, the classification software installed on the remote auxiliary computer generates a classification report associated with the export and transmits the report to the personal computer via the Internet. | 2012-11-01 |
20120278251 | SYSTEM AND METHOD FOR COMPLIANT INTEGRATED PAPERLESS WORKFLOW - A system and method for compliant integrated paperless workflow. Check information corresponding to one or more checks is received from at least one remote scanning module in accordance with one or more financial security standards. Paper form information corresponding to one or more paper forms is received from the least one remote scanning module in accordance with the one or more financial security standards. Electronic form information corresponding to one or more electronic forms is received from in accordance with the one or more financial security standards. The check information, paper form information and electronic form information are securely stored and provided in accordance with the one or more financial security standards. | 2012-11-01 |
20120278252 | SYSTEM AND METHOD FOR RECOMMENDING ESTABLISHMENTS AND ITEMS BASED ON CONSUMPTION HISTORY OF SIMILAR CONSUMERS - Systems and methods for recommending establishments and/or items from establishments based on a consumption history of similar consumers are provided. Ratings data can be received from each of a plurality of consumers via an automated process. For example, consumers can take a picture of a receipt after patronizing a restaurant or other establishment. Optical character recognition can then be performed on the receipt to identify, for example, the establishment patronized, items ordered, and the price of each item ordered. The ratings data obtained by the automated process can then be associated with each consumer to create a ratings history. Establishment and/or item recommendations then can be provided to consumers based on their history and that of consumers with similar histories. | 2012-11-01 |
20120278253 | DETERMINING SENTIMENT FOR COMMERCIAL ENTITIES - An overall sentiment is determined amongst a population of persons, for each of a plurality of commercial entities. | 2012-11-01 |
20120278254 | Method for Creating Factor Indexes and Long/Short Index Products With Systematic Risk Management - An investment method and process used to create investment indexes that measure the difference between market segments, which such market segments may be in unrelated investment categories or within the same asset class, while simultaneously managing long/short portfolios that return the measured difference in the form of investible index products is disclosed. The three primary steps of the inventive investment method and process are: (1) to identify the desired risk factor for isolation for purposes of hedging existing risk, diversifying risk, or tactical investment in risk; (2) to create and calculate a Factor Index and develop underlying algorithms for intraday and end-of-period benchmarking; and (3) to design a Factor Index Product and implement a Factor Portfolio involving the isolation of the desired risk factor by establishing and maintaining a long exposure to one (or more) market segment(s) and a short exposure to one (or more) market segment(s). | 2012-11-01 |
20120278255 | METHOD AND SYSTEM FOR BUILDING AND MAINTENANCE WATCH LISTS - A method and apparatus for monitoring a items such as stocks and other securities, suitable for use in portable devices, such as personal organizers, wherein instead of separate watch lists, a pool of items being watched is maintained, and the total number of items which can be contained in the pool is intentionally limited to a predefined number, and further wherein each of the items in the pool includes an associated tag which defines a watch list to which it belongs, and the pool of the items being watched can be viewed simultaneously as one coherent collection, or specific watch lists can be displayed. | 2012-11-01 |
20120278256 | METHOD AND APPARATUS FOR INVESTING IN CREDIT FACILITY AND FOR CALCULATING FEE DISTRIBUTIONS - Disclosed is a computer implemented system by which investors may allocate securities to a Fund where they are used as collateral for offers of credit given by the Fund to borrowers. The value of each investor's Segregated Securities relative to the total Fund value determines the investor's percentage ownership in the Fund. In exchange for offers of credit, the Fund receives incremental Credit Facility Fees, which are paid out to investors as dividends in proportion to their percentage of ownership. The portion of the investor's Segregated Securities committed as collateral to a credit commitment determines the investor's percentage of commitment in the Fund. The Segregated Securities of each investor are managed by the investor or a third party manager at the investor's direction, even while segregated. Therefore, the real-time cash value of the Fund, ownership percentage, and commitments of each investor can change and are calculated by a computer system. | 2012-11-01 |
20120278257 | METHOD FOR FINANCIAL INSTRUMENT VALUATIONS BASED ON PRIMARY DATA AND MINIMUM BASE AVERAGE VALUE OF FINANCIAL ASSETS - A data system and minimum base average value (MBAV) is accurate, verifiable and based on actual market conditions as well as trade data. The system has the cumulative effect of achieving accurate financial instrument valuations that support government, institutional and investor financial investments in a positive, stable way. No longer does a portfolio need to take a percentage hit almost overnight due to some random and/or questionable, or worse still, no valuation process being used in valuations. Without a definitive MBAV, billions of dollars of investment and investor money can “disappear” or be removed by false valuations, literally overnight. | 2012-11-01 |
20120278258 | MEANS AND METHOD OF INVESTMENT PORTFOLIO MANAGEMENT - The core of the present invention is to provide means and methods for managing an investment portfolio according to an investor's personal financial risk tolerance. In one embodiment this is accomplished by means of two separate and independently managed portfolios, these being a high-risk portfolio and low-risk portfolio, with an appropriate ratio of investment in each as appropriate for a given investor's risk tolerance. In another embodiment this is accomplished by choosing an investment portfolio that optimizes certain metrics related to ROI and the given investor's risk tolerance. | 2012-11-01 |
20120278259 | Computer-implemented method of constructing a stock index using index rotation - Computer-implemented methods of creating and maintaining stock indexes are provided. Stock migration is controlled using a systematic stock migration process so that stocks are gradually added and deleted from an index. | 2012-11-01 |
20120278260 | Computer-implemented method of constructing a stock index using multi-dimensional delineation between value and growth - Computer-implemented methods of creating and maintaining stock indexes are provided. Stock investment style is determined in a multi-dimensional process, instead of a linear process. Furthermore, the number of stocks in the stock index need not be a fixed value, but may depend upon how many stocks meet predefined criteria at any given point in time. | 2012-11-01 |
20120278261 | DETERMINING THE IMPORTANCE OF DATA ITEMS AND THEIR CHARACTERISTICS USING CENTRALITY MEASURES - Computer-implemented methods, systems, and articles of manufacture for determining the importance of a data item. A method includes: (a) receiving a node graph; (b) approximating a number of neighbor nodes of a node; and (c) calculating a average shortest path length of the node to the remaining nodes using the approximation step, where this calculation demonstrates the importance of a data item represented by the node. Another method includes: (a) receiving a node graph; (b) building a decomposed line graph of the node graph; (c) calculating stationary probabilities of incident edges of a node graph node in the decomposed line graph, and (d) calculating a summation of the stationary probabilities of the incident edges associated with the node, where the summation demonstrates the importance of a data item represented by the node. Both methods have at least one step carried out using a computer device. | 2012-11-01 |
20120278262 | Suggesting Users for Interacting in Online Applications in a Social Networking Environment - Users of a social networking system are matched with other users of the social networking system based on the likelihood of both users' being interested in using a social application and the likelihood that they would want to interact with each other using the application. Social applications include social games and other applications associated with a social networking system in which users can interact with other users. The social networking system selects for a particular user other candidate users. This selection may be based on at least one of a predicted likelihood that a user would invite the candidate users to use the social application and/or a predicted likelihood that the selected candidate user would accept the user's invitation. The user may choose to act on the suggestion by inviting the other user and the invited user may accept, reject, or ignore the invitation. | 2012-11-01 |
20120278263 | COST-SENSITIVE ALTERNATING DECISION TREES FOR RECORD LINKAGE - Record Linkage (RL) is the task of identifying two or more records referring to the same entity (e.g., a person, a company, etc.). RL models can be based on Cost Sensitive Alternating Decision Trees (ADTree), an algorithm that uniquely combines boosting and decision trees algorithms to create shorter and easier-to-interpret linking rules. These models can be naturally trained to operate at industrial precision/recall operating points, and the shorter output rules are so clear that it can effectively explain its decisions to non-technical users via score aggregation or visualization. The models significantly outperform other baselines on the desired industrial operating points, and the improved understanding of the model's decisions led to faster debugging and feature development cycles. | 2012-11-01 |
20120278264 | TECHNIQUES TO FILTER MEDIA CONTENT BASED ON ENTITY REPUTATION - Techniques to filter media content based on entity reputation are described. An apparatus may comprise a reputation subsystem that manages an entity reputation score for an entity. The reputation subsystem comprising a reputation manager component and a reputation input/output (I/O) component. The reputation manager component may include a data collection module that collects reputation information for an entity from a selected set of multiple reputation sources. The reputation manager component may also comprise a feature manager module, communicatively coupled to the data collection module, that extracts a selected set of reputation features from the reputation information. The reputation manager component may further comprise a reputation scoring module, communicatively coupled to the feature manager module, that generates an entity reputation score based on the reputation features using a supervised or unsupervised machine learning algorithm. Other embodiments are described and claimed. | 2012-11-01 |
20120278265 | EFFORT ESTIMATION USING TEXT ANALYSIS - A system, method and program product for estimating effort of implementing a system based on a use case specification document. A system is provided that includes: a volumetrics processor that quantifies a structure of the document and evaluates a format of the document; a domain processor that identifies a domain of the system associated with the document; a complexity processor that defines a set of complexity variables associated with the document based on the structure of the document, a format of the document and a domain of the document; and a neural network that estimates an effort based on the set of complexity variables. | 2012-11-01 |
20120278266 | Electronic Review of Documents - An example method for reviewing documents includes scoring documents using an artificial intelligence model, and selecting a subset of highest scoring documents. The method further includes inserting a number of randomly-selected documents into the subset of highest scoring documents to form a set of documents for review, wherein a reviewer cannot differentiate between the randomly-selected documents and the subset of highest scoring documents included in the set of documents for review, and presenting the set of documents for review by the reviewer. | 2012-11-01 |
20120278267 | METHODS AND ARRANGEMENTS FOR DYNAMICALLY GENERATING ESTIMATION TRENDLINES - Methods and arrangements for dynamic trendline generation. Input data are assimilated at a capture timepoint from an estimation tool. The input data are filtered, and an estimation-centric map is created from the filtered data ; this creating of a map includes generating an estimation data tree. A trendline is dynamically generated responsive to a request, wherein this generating of a trendline includes applying the estimation data tree to the input data. The dynamically generated trendline is supplied to the estimation tool. | 2012-11-01 |
20120278268 | METHOD AND APPARATUS FOR EXTRACTING EXPLICIT PROFILE REPRESENTATION THROUGH ADAPTIVE RECOMMENDER SYSTEM - An approach is provided for providing recommendations based on preloaded models and for generating user profiles to personalize a user experience with a device or service. A recommendation model platform processes at least one latent user model, at least one latent item model, or a combination thereof associated with a device to determine one or more user preference scores with respect to one or more items. The recommendation platform also processes the one or more user preference scores against one or more thresholds values to determine explicit preference information associated with the one or more items. The recommendation platform also generates at least one user profile associated with the device, a user of the device, or a combination thereof based, at least in part, on the explicit preference information. | 2012-11-01 |
20120278269 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING EXPERT ASSESSMENT OF A PRODUCT - Disclosed are method(s), system(s), and computer program product(s) for implementing expert assessment of a product. Some embodiments are directed at improved methods, systems, and computer program product form implementing expert assessment of product fixes/patches or upgrade. In some embodiments, the method or the system identifies or receives information regarding a client system on which the product runs and a reasoning rule for the expert assessment; analyzes the received or identified information based upon the reasoning rule; and determines the expert assessment based on the result of the act of analyzing the information. In some embodiments, the method or the system further comprises optimizing the expert assessment based on other information; determining whether the determination of the expert assessment is deterministic; and determining whether or not there exists a conflict in the expert assessment. | 2012-11-01 |
20120278270 | SELECTING SOLUTION FOR CARBON EMISSION PREDICTION - A computer-implemented method, apparatus, and system for selecting a solution for carbon emission prediction. The method includes the steps of: obtaining historical records of carbon emission and a current demand for carbon emission, locating from the historical records of carbon emission a best matching historical record with respect to the current demand and selecting, based on the located best matching historical record, one of (i) a data prediction solution record and (ii) a rule prediction solution, where at least one step is carried out using a computer device. | 2012-11-01 |
20120278271 | System and Method for Expanding Variables Associated a Computational Model - Disclosed is a system and method for expanding variables within a computational model. The computational model, which can be a Bayesian-network, includes input and output variables that are interrelated via a conditional probability table. Term expansion is accomplished via a lexical database and a logic engine to determine semantic equivalents that are relevant to the computational model. The expanded terms allow the computational model to be related to instance data, which may be in the form of a dynamic ontology. Input variable expansion permits the computational model to be populated with semantically relevant instance data from the ontology, and output variable expansion permits the computational model to be associated with semantically relevant ontology nodes. | 2012-11-01 |
20120278272 | SYSTEM AND METHOD FOR DISAGGREGATING POWER LOAD - Systems and methods of disaggregating power load are provided. An example of a method is carried out by program code stored on non-transient computer-readable medium and executed by a processor. The method includes receiving time series data representing total energy consumption. The method also includes identifying distinguishing features in the time series data. The method also includes identifying energy consumption constituents of the total energy consumption based on the features. | 2012-11-01 |
20120278273 | PERFORMING QUERIES USING SEMANTICALLY RESTRICTED RELATIONS - Techniques for searching large data sets. A semantically restricted relation graph is generated for an ontology. Queries to the ontology are resolved using the semantically restricted relation graph. | 2012-11-01 |
20120278274 | SYSTEM FOR PROVIDING INFORMATION AND INFORMATION EXPERTS TO A PLURALITY OF USERS - A method to provide an information item and information expert to a user includes storing a first information item, task data, and a first expert identifier in a database. The task data includes a plurality of tasks and at least one attribute associated with each of the tasks. The first expert identifier identifies a first expert associated with the first information item and/or the first task. A task information update is created by associating the first information item with the first task in response to determining that it is related to the at least one attribute associated with the first task, and by providing the first expert identifier with the task information update in response to determining that it is associate with at least one of the first information item and the first task. Users that are associated with the first task are then provided the task information update. | 2012-11-01 |
20120278275 | GENERATING A PREDICTIVE MODEL FROM MULTIPLE DATA SOURCES - Techniques are disclosed for generating an ensemble model from multiple data sources. In one embodiment, the ensemble model is generated using a global validation sample, a global holdout sample and base models generated from the multiple data sources. An accuracy value may be determined for each base model, on the basis of the global validation dataset. The ensemble model may be generated from a subset of the base models, where the subset is selected on the basis of the determined accuracy values. | 2012-11-01 |
20120278276 | Collaborative Authoring - A collaborative authoring application provides an authoring environment in which two or more users can edit a document concurrently. Each user edits a copy of the document, sends updates to a master copy of the document, and receives updates from the master copy of the document. The authoring environment generally inhibits the users from providing conflicting editing instructions to the master copy of the document. For example, each user can generate a content lock about one or more data units within the document. The authoring environment may synchronize content locks automatically and content only at the request of the user. | 2012-11-01 |
20120278277 | OBJECT-BASED MODELS IN DOCUMENT MANAGEMENT - Product Data Management systems, methods, and mediums. A method includes receiving a document component that includes business objects. The method includes receiving a document automation component. The method includes reading a document management part of the document component, and constructing a document model based on the document management part. | 2012-11-01 |
20120278278 | Systems And Methods For Managing Databases - Systems and methods for managing databases are disclosed. One disclosed system includes a processor-addressable physical memory and a processor in communication with said processor-addressable physical memory and configured to execute an environment and to allocate an environment memory to said environment. In such a system, said environment is configured to maintain a database of objects in a database memory within said environment memory. An application executes in an application memory within said environment memory, and upon instantiation of a database object, the application environment allocates memory in said database for said database object, the database providing master storage for said database object. Upon an instruction to obtain said database object from said application, the environment provides to said application a reference to said database object; and upon an access operation on said database object by said application, provides to said application direct access to data of said database object. | 2012-11-01 |
20120278279 | Methods Of Operating Computer System With Data Availability Management Software - According to some embodiments, a method includes running a first application program on a computer system, running a second application program on the computer system, and running a data availability manager (DAM) program on the computer system. The first application program is operative to indicate to the DAM program that a first data item processed by the first application program is available for further processing. The DAM program is operative to determine a second data item that is dependent for processing upon availability of the first data item and to indicate to the second application program that the second data item is ready for processing. | 2012-11-01 |
20120278280 | TRANSPARENT INPUT / OUTPUT SWITCHING BETWEEN SYNCHRONOUSLY MIRRORED STORAGE VOLUMES - A method for configuring transparent synchronous mirroring volume switching for a first volume and a second volume that are coupled, via a storage area network, to a host computer, with the first volume mapped to the host computer, by. The method includes initiating synchronization of status data between the first volume and the second volume, and setting the first volume to an active state. The second volume is set to an inactive state, and an identifier associated with the active first volume is copied to a memory coupled to the inactive second volume. The copied identifier is retrieved from the memory by the host computer, and the inactive second volume is then mapped to the host computer. | 2012-11-01 |
20120278281 | STORING METADATA INSIDE FILE TO REFERENCE SHARED VERSION OF FILE - A link to a shared version of a local file is inserted into metadata of the local file. The local file may be a copy of a shared file and/or a local file that is designated to be shared. For example, when a local file is uploaded to a shared location for collaboration, a link to the shared location is automatically inserted into metadata of the local file. A local copy of a shared file may be created by downloading the shared file to a local data store. A link to the shared location is automatically inserted into the locally stored. When the local file is opened, the link within the metadata may be used to access the version of the local file at the shared location. Changes made to the local file and/or shared version of the file may also be synchronized. | 2012-11-01 |
20120278282 | Techniques for Combining Statement Level, Procedural, and Row Level Replication - Techniques for replicating data in database systems are described. In an example embodiment, a set of changes is received at a destination database, where the set of changes has been applied at a source database and is being replicated from the source database to the destination database. The set of changes is analyzed and it is determined that the set of changes includes two or more of: a subset of row-level changes, a subset of statement-level changes, and a subset of procedure-level changes. A set of dependencies is determined at least between the changes that are included in the subsets of changes. The changes, in the subsets of changes, are assigned to two or more processing elements. The set of changes is applied to the destination database by executing the two or more processing elements in parallel to each other and based on the set of dependencies. | 2012-11-01 |
20120278283 | CONSISTENT DATA RETRIEVAL IN A MULTI-SITE COMPUTING INFRASTRUCTURE - Embodiments of the invention relate to dynamic application migration in a shared pool of configurable computer resources with disaster recovery support. Data from an application is replicated from local data storage to remote data storage. A consistency point of the data is created in both the local data storage and the remote data storage. The application may be migrated to a second data site with separate local data storage. The migration may be planned or unplanned. Based upon the created consistency point, a consistent set of application data may be requested to support a read operation from the migrated application. | 2012-11-01 |
20120278284 | SYSTEM AND METHOD FOR SEARCH ENGINE CAMPAIGN MANAGEMENT - A system for managing search engine campaigns may include storing advertising campaign data associated with a customer account and generating a synchronization thread for an advertising platform selected from a plurality of advertising platforms. The system may synchronize the advertising campaign data with the advertising platform by selecting a proxy class associated with the advertising platform; requesting from the advertising platform, via the proxy class, a set of campaigns that are associated with the customer account and the advertising platform; receiving, from the advertising platform, the set of campaigns associated with the customer account; and updating the advertising campaign data stored in the database based on the set of campaigns received from the advertising platform and a set of campaigns stored in the advertising campaign data. | 2012-11-01 |
20120278285 | Storage Performance Optimization - A system and method for enhancing data throughput in data warehousing environments by connecting multiple servers having local storages with designated external storage systems, such as, for example, those provided by SANS. The system and method may preserve a full reference copy of the data in a protected environment (e.g., on the external storage system) that is fully available. The system and method may enhance overall I/O potential performance and reliability for efficient and reliable system resource utilization. | 2012-11-01 |
20120278286 | BACKUP METHOD AND STORAGE MEDIUM HAVING BACKUP PROGRAM STORED THEREIN - A backup method for a backup system including an information processing apparatus and two or more information processing devices connected via a network includes, when the information processing device is designated as a first device among a plurality of the information processing devices, transmitting a first backup image of the first device to the information processing apparatus and transmitting the first backup image to a second device, and when the information processing device is the second device, extracting a difference image, which is a difference between the first backup image transmitted from the first device and a second backup image of the second device and transmitting the difference image to the information processing apparatus. | 2012-11-01 |
20120278287 | DISCOVERING CLUSTER RESOURCES TO EFFICIENTLY PERFORM CLUSTER BACKUPS AND RESTORES - A system and method for identifying properties of virtual resources to efficiently perform backups and restores of cluster data. A cluster of nodes is coupled to a data storage medium. A node receives a request for a backup or a restore of cluster data. In response to this request, the node queries a cluster subsystem and a virtual subsystem of all other cluster nodes for identification of VMs, a subset of corresponding stored data, and an identification of VMs which are highly available (HA). In response to receiving query responses, the node aggregates the results and sends them to a backup server. These to aggregated results may then be used to schedule subsequent backup and restore operations. In addition, the node may use the results to complete the current backup or restore operation. | 2012-11-01 |
20120278288 | HIGH THROUGHPUT, RELIABLE REPLICATION OF TRANSFORMED DATA IN INFORMATION SYSTEMS - Provided are techniques for, in response to a source object being changed by a local transaction, generating log records, wherein each of the log records includes a sequence identifier, a source system entity modification timestamp, a target key, a target partition identifier, and values of source properties, wherein the source properties are identified using a target key indicator. The log records to process are selected based on a phase value of each log record, wherein the phase value is one of submitted, in-flight, and source system entity state change complete. One or more disjoint partitions are assigned to each of multiple processing instances. Under control of each of the multiple processing instances, it is determined whether to transmit a log record in the one or more disjoint partitions assigned to said processing instance and, in response to determining that the log record is to be transmitted, the log record is transmitted. | 2012-11-01 |
20120278289 | ACCESS CONTROLLER THAT CONTROLS ACCESS TO FILES BY USING ACCESS CONTROL LIST - Each time the file access request is received, it is discriminated whether there is an ACL which corresponds with the file system of the type following the switching in the file designated by the file access request. In cases where the judgment result is that there is no such ACL, an ACL which corresponds with the file system of the type following the switching is generated on the basis of an ACL which corresponds with the file system of the type prior to the switching which is associated with the designated file, and the ACL thus generated is used to control access in accordance with the received file access request. | 2012-11-01 |
20120278290 | DATABASE ARCHIVING MODEL ERROR DETECTION AND CORRECTION SYSTEM - A database archiving model error detection and correction system including an error detection module to detect a referential integrity error in a database archiving model. A column in a foreign key and/or a corresponding unique key column to the foreign key column may include an assigned data mask operation. The error detection module may detect the referential integrity error if a corresponding other column in a foreign key-unique key relationship does not have an identical assigned data mask operation, or if the assigned data mask operation will not result in a unique output value for a unique input value. | 2012-11-01 |
20120278291 | AVOIDING THREE-VALUED LOGIC IN PREDICATES ON DICTIONARY-ENCODED DATA - According to one embodiment of the present invention, a method for dictionary encoding data without using three-valued logic is provided. According to one embodiment of the invention, a method includes encoding data in a database table using a dictionary, wherein the data includes values representing NULLs. A query having a predicate is received and the predicate is evaluated on the encoded data, whereby the predicate is evaluated on both the encoded data and on the encoded NULLs. | 2012-11-01 |
20120278292 | METHOD AND APPARATUS FOR MANAGING AND ARCHIVING PERFORMANCE INFORMATION RELATING TO STORAGE SYSTEM - A data management and archive method and apparatus, for implementation in an automated system to monitor and manage status, performance and configuration data for networked storage components. Analysis and cross-correlation of data related to the storage components can be done individually, collectively and/or comparatively. A collection manager component of a workload analyzer is implemented to start and stop data collection. The collection manager includes a command and control module that coordinates requests of data from at least one collection agent configured on at least one host connected to the storage component(s). The collection manager manages collection of data and effects file transfer of collected data according to a user specified policy, and maintains status of the data collected. The user specified policy allows the user to specify data collection “shifts” (i.e. periodicity). | 2012-11-01 |
20120278293 | REAL-TIME TRANSACTION SCHEDULING IN A DISTRIBUTED DATABASE - In one exemplary embodiment, a method of a distributed database system includes the step of receiving a database transaction with a node of the distributed database system. A priority of the database transaction is determined. A load of a transaction queue of the node is determined. The execution of a database transaction is delayed if the load of the transaction queue is greater than a first-water mark. The database transaction is delayed for a specified period. A portion of the database transaction is execution after the specified period. It is determined if the load of the queue is below a second-water mark after the specified period. A remaining portion of the database transaction can be processed if the load of the queue is below the second-water mark. | 2012-11-01 |
20120278294 | SELECTIVE LOCKING OF OBJECT DATA ELEMENTS - Product Data Management systems, methods, and mediums. A method includes receiving a lock request for data of a specified type. The method includes processing the lock request in response to the lock request, including locking the data of the specified type for a plurality of data objects in response to the lock request. The method includes receiving at least one change to data of the specified type for at least one of the plurality of data objects, The method includes updating and saving the at least one of the plurality of objects according to the received change by changing the data of the specified type. | 2012-11-01 |
20120278295 | DISK IMAGE INTROSPECTION FOR STORAGE SYSTEMS - A method for disk image access in a storage system comprises receiving an input/output (I/O) request to a disk image in a file system of a storage system, and in response to the I/O request to the disk image in the file system, reconstructing a file system request. Introspection is performed on the disk image to determine an original file system request based on the I/O request to the disk image. The method further includes laying out a disk image in the file system of the storage system, and performing type-specific introspection on the disk image. Based upon the results of the introspection, data ranges in the disk image are mapped to block or files within the file system. A mapping of disk image data ranges to block or files in the file system is maintained for responding to further I/O requests. | 2012-11-01 |
20120278296 | Method of usage number of pages found by search engins - The method provides the usage of number of web pages found by search engines for comparison of arbitrary objects by arbitrary parameters. To realize this approach we created the GoogMeter application (www.googmeter.com) that delivers and analyzes the data. GoogMeter inputs lists of any objects and properties and produces and analyses contingency tables of total number of found pages having the combination objects and properties taking in account their proximity in text. | 2012-11-01 |
20120278297 | SEMI-SUPERVISED TRUTH DISCOVERY - The described implementations relate to analysis of electronic data. One implementation provides a technique that can include accessing labeled and unlabeled assertions. The technique can also include identifying relationships between individual assertions. The technique can also include determining a confidence score for a first unlabeled assertion based on the relationships. | 2012-11-01 |
20120278298 | System and method for query temporality analysis - A new approach is proposed that contemplates systems and methods to determine temporality of a query in order to generate a search result including a list of objects that are not only based on matching of the objects to the query but also based on temporality analysis of the query. Here, the temporality of the query can be defined as the distribution over time of the objects matching the query, i.e., the chronology histogram of the query. Such distribution can be analyzed to provide a classification of the intent of the query. Classification of the intent of the query can result either in discrete classification of the query into categories, or in continuous classification of the query which may be a scalar or vector value resulting from transformations of the chronology histogram. | 2012-11-01 |
20120278299 | PRESENTING SEARCH RESULTS FOR GALLERY WEB PAGES - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for classifying web pages as gallery web pages, and for presenting search results for gallery web pages. In one aspect, a method includes receiving a web page that includes text and one or more images, evaluating one or more characteristics of the web page against predefined criteria, generating a score for the web page based on evaluating the characteristics of the web page against the predefined criteria, and classifying the web page as a gallery web page or as not a gallery web page when the score meets or does not meet a predefined threshold, respectively. | 2012-11-01 |
20120278300 | SYSTEM, METHOD, AND USER INTERFACE FOR A SEARCH ENGINE BASED ON MULTI-DOCUMENT SUMMARIZATION - A method for searching multiple documents on a computer system includes steps for sending a query to a system core where the query is passed to a search component for searching the documents. The system core in turn receives results from the search component indicating related documents to the query and passes to a summarization component a specified number of the results. The summarization component processes related documents corresponding to the specified number of results to produce a multi-document summary. The system core receives the summary from the summarization component. The multi-document summary is received from the system core. | 2012-11-01 |
20120278301 | User Interface for Facts Query Engine Snippets from Information Souces that Include Query Terms and Answer Terms - A method and a system for providing snippets of source documents of an answer to a fact query are disclosed. Snippets of source documents may be provided in response to a user request for the source documents from which the fact answer to a fact query was extracted. The snippets include the terms of the fact query and terms of the answer. The snippets may be displayed along with Uniform Resource Locators (URL's) of the source documents. | 2012-11-01 |
20120278302 | MULTILINGUAL SEARCH FOR TRANSLITERATED CONTENT - The multilingual search for transliterated content technique described herein enables a user to submit a search query in both a native script and its foreign script (e.g., Roman script) transliteration and return relevant results in both the scripts while taking care of the spelling variations in transliterated forms. The technique crawls the World Wide Web for data in both the native script and foreign script transliterated forms of the data. It uses a transliteration engine to generate native script equivalents of the foreign script transliterated data and disambiguates the data in native script (whenever possible). The unique native script word forms are then used to jointly index the data in both the scripts. If the query is in native script, it is directly searched for in the index, otherwise the transliterated query is first converted into native script form(s) and then searched in the indexed database to retrieve and rank results in both the scripts. | 2012-11-01 |
20120278303 | PROPAGATING USER IDENTITIES IN A SECURE FEDERATED SEARCH SYSTEM - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety or sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 2012-11-01 |
20120278304 | RELEVANT INDIVIDUAL SEARCHING USING MANAGED PROPERTY AND RANKING FEATURES - Embodiments are configured to provide information relevant to individuals of interest to a searching user. In an embodiment, a method includes identifying relevant individuals of a network using a relevance model that includes the use of a number of managed properties and ranking features to identify relevant individuals of a defined network. The relevance model of one embodiment is defined by a schema that includes a textual matching ranking feature, social distance ranking feature, a levels to top ranking feature, and a proximity ranking feature. | 2012-11-01 |
20120278305 | DYNAMIC MERGING OF EXECUTABLE STRUCTURES IN A DATABASE SYSTEM - Embodiments of the present invention relate to dynamically merging executable structures in a database system. In one embodiment, there is provided a method of dynamically merging executable structures in a database system that includes, in response to a query to the database system, extracting a stem and a branch of a query statement. The query statement includes query conditions, and the branch includes at least a subset of the query conditions. An executable structure of the stem is obtained from a cache of the database system, and an executable structure of the branch is generated. The executable structure of the stem and the executable structure of the branch are merged into a runtime executable structure. | 2012-11-01 |
20120278306 | RETRIEVING DATA OBJECTS - Provided are techniques for generating a Graphical User Interface (GUI) based on relationships between tables identified in a data model and displaying the GUI to enable selection of the tables and columns in the tables. Via the GUI, a selection of at least one of the tables and a selection of at least one of the columns in the at least one of the selected tables are received. A statement is generated based on the selected tables and the selected columns. The statement is executed to obtain results. The results are processed to create a data object having a hierarchical structure that indicates the relationships between the tables. | 2012-11-01 |
20120278307 | SYSTEM AND METHOD FOR PROCESSING DATABASE QUERIES - A system and/or method are implemented to process queries to a database. In particular, the processing of queries to the database is enhanced by enhancing the determination of join orders of tables implicated in queries. Join orders between relatively large numbers of tables are determined by dividing the set of tables to be ordered into a plurality of subsets of tables, and ordering the individual subsets of tables. | 2012-11-01 |
20120278308 | CUSTOM SEARCH QUERY SUGGESTION TOOLS - Methods, systems, and apparatus, including computer program products, for generating search query suggestions directed to a particular website. In one aspect, a method includes receiving a first set of suggestion data defining custom suggestions for a first website. The first set of suggestion data includes one or more first n grams and one or more second n grams that each represent a selectable alternative to a first n gram. The method also includes generating a suggestion resource and providing a search query suggestion tool to the first website, the suggestion tool being configured to generate a search query input field for webpages on the first website, receive a query input entered in the search query input field, and request that one or more query suggestions be provided as selectable alternatives to the search query input. | 2012-11-01 |
20120278309 | ALTERNATIVE MARKET SEARCH RESULT TOGGLE - Systems, methods, and computer media for providing alternative market search results are provided. A user search query in a first market is received. Search results relevant to the user search query are identified for the first market in a first language. A user intent to receive search results for the user search query for a second market and in a second language is determined. A search results page is presented that includes headings and search results for the first market in the first language as well as a search result toggle that includes a user-selectable option to present alternative search results for a second market in a second language. Selection of the option to present alternative search results causes search results for the second market and in the second language to be presented in the search results page along with the search results page headings in the first language. | 2012-11-01 |
20120278310 | Collaborative Filtering Using a Spatial-Aware Social Graph - This specification describes technologies relating to collaborative filtering, such as collaborative filtering using a spatial-aware social graph. In at least one aspect, a method includes: receiving data including objects related to a social graph; identifying a proper subset of the objects based on their relationships with respect to the social graph; applying one or more spatial queries against the proper subset of the objects; and using a result of the one or more spatial queries, applied against the proper subset of the objects, as a feature in a recommendation process. In another aspect, a system includes: a user interface device; and one or more computers configured and arranged to provide a user a recommendation, with respect to objects, based on social and spatial information for the user associated with a spatial-aware social graph. | 2012-11-01 |
20120278311 | Web Service Discovery Via Data Abstraction Model Augmented By Field Relationship Identification - A computer-implemented method includes receiving a selection of a particular logical field via a database query interface. The method includes querying a discovery registry associated with a data abstraction model of a database to discover one or more web services. A web service input and a web service output of a particular discovered web service are associated with logical fields of the data abstraction model via the discovery registry. The method further includes initiating execution of a discovered web service that returns a list of values. The list of values obtained by the discovered web service may be augmented with information determined based on field relationship metadata of the data abstraction model. | 2012-11-01 |
20120278312 | VIDEO AND DIGITAL MULTIMEDIA AGGREGATOR - The present invention utilizes an aggregator for searching, packaging and delivering content. The aggregator processes requests, searches, provides search results and acquires content. The aggregator, operating in a communications network, includes a request and results processing server, a search engine server coupled to the request and results processing server and a content acquisition server coupled to the request and results processing server. A request and results processing server receives a request for content, the search engine server searches for the content and the content acquisition program acquires content for delivery to the user. The request and results processing server includes a search request processor that receives information related to a user's search request and provides the information to a search results form builder that creates an electronic search request. | 2012-11-01 |
20120278313 | SCALABLE RENDERING OF LARGE SPATIAL DATABASES - Aspects of the invention provide a service for data management and integration across a wide range of applications. Clustered computers may be arranged in a cloud-type configuration for storing and handling large amounts of user data under the control of a front-end management server. Communities of distributed users may collaborate on the data across multiple enterprises. Very large tabular data files are uploaded to the storage facilities. The data files are maintained as tables, and a composite table of related information is created and maintained in response to user queries. Different ways of visualizing the data are provided. Depending on the amount of information that can be displayed, features in a spatial index may the thinned for presentation. Spatial and structured queries are processing and results are intersected to obtain information for display. | 2012-11-01 |
20120278314 | PRESENTATION OF ITEMS BASED ON A THEME - Queries submitted by users when interacting with a network-based system may be analyzed by a query mining machine that determines a theme common to the submitted queries. The machine accesses the submitted queries and identifies a portion of the submitted queries as corresponding to the theme. Identification of the portion may include determining a strength score of a submitted query, where the strength score indicates a degree of influence that the submitted query is to have on the identifying of the portion. The machine generates a thematic query based on the identified portion and obtains search results by executing the thematic query. The search results correspond to a group of items. The machine presents at least some of the group of items as a collection that corresponds to the theme (e.g., within a temporary electronic storefront). | 2012-11-01 |
20120278315 | Integrated phonetic matching methods and systems - Methods and systems for searching a database for a query using an integrated approach of associating transduced query string comparisons with literal query string comparisons reduces computation time and results in more relevant and accurate results. The methods and systems include a processor receiving a query, searching a database for the query, and providing results of the search. The query may be compared to data entries from the database, and a transduced version of the query may be compared to transduced data entries. Results from the comparisons between the query and the data entries may be used to guide the comparisons between the transduced query and the transduced data entries. Search results are determined based on the guided comparisons. | 2012-11-01 |
20120278316 | SYSTEMS AND METHODS FOR FACILITATING ENHANCEMENTS TO SEARCH ENGINE RESULTS - In accordance with some embodiments, processes and interfaces for enhancing or modifying the output of search results are provided. For example, an interface may allow a user to indicate a particular search result returned for a search as being undesirable. In one embodiment, such an indication may cause a removal (e.g., by a search engine or by a third party software application with access to a listing of search results returned by the search engine) of the search result from the listing of the search results as well as review of the remainder of the search results to determine which additional search results should also be removed (e.g., additional search results may be determined, on behalf of the user, to be undesirable for the same reason as the search result(s) indicated by the user). | 2012-11-01 |
20120278317 | MINING OF USER EVENT DATA TO IDENTIFY USERS WITH COMMON INTEREST - A computer-implemented matching service matches users to other users, and/or to user communities, based at least in part on a computer analysis of event data reflective of user behaviors. The event data may, for example, evidence user affinities for particular items represented in an electronic catalog, such as book titles, music titles, movie titles, and/or other types of items that tend to reflect the traits of users. Event data reflective of other types of user actions, such as item-detail-page viewing events, browse node visits, search query submissions, and/or web browsing patterns may additionally or alternatively be considered. By taking such event data into consideration, the matching service reduces the burden on users to explicitly supply personal profile information, and reduces poor results caused by exaggerations and other inaccuracies in such profile information. | 2012-11-01 |
20120278318 | SYSTEMS AND METHODS FOR FACILITATING ENHANCEMENTS TO ELECTRONIC GROUP SEARCHES - In accordance with some embodiments, processes and interfaces provide for enhancing search results of a group research project. For example, members of a group may be provided with information regarding other group member's search activities and/or be restricted from viewing certain search results (e.g., search results that are most popular with the public for a given search term, that are most popular with the group for the given search term or for the project, and/or search results that are restricted by a group manager). | 2012-11-01 |
20120278319 | COMPUTER-AIDED EXTRACTION OF SEMANTICS FROM KEYWORDS TO CONFIRM MATCH OF BUYER OFFERS TO SELLER BIDS - One embodiment involves a method and apparatus for mapping lexical keywords into entity description semantics in order to create unambiguous buyer-confirmed descriptions of entities. The method described herein relies on a computer program and some mechanism for computer data storage. | 2012-11-01 |
20120278320 | RECOMMENDATION INFORMATION PROVIDING SYSTEM, RECOMMENDATION INFORMATION PROVIDING APPARATUS, RECOMMENDATION INFORMATION SERVICE METHOD, AND RECOMMENDATION INFORMATION DISTRIBUTION PROGRAM - A recommendation information providing apparatus includes: a stay record managing section configured to store a stay record as a record when each of a plurality of users stayed in each of a plurality of locations; and a visit pattern calculating section configured to calculate a first visit pattern showing statistic data of the stay records for each of the plurality of locations. A candidate location extracting section extracts a second visit pattern to a specified location related to recommendation information from a plurality of the first visit patterns, extracts a third visit pattern which meets a determination value met by the second visit pattern from the plurality of first visit patterns, and extracts a similar location having the third visit pattern from the plurality of locations. A recommendation level calculating section extracts from the stay records, a first user and a second user of the plurality of users who stayed in at least one of the specified location and the similar location, calculates a fourth visit pattern of the first user to the specified location and the similar location from ones of the stay records related to the first user, calculates a fifth visit pattern of the second user to the specified location and the similar location from ones of the stay records related to the second user, and calculates a first priority level of the specified location and the similar location to be notified to the first user and a second priority level of the specified location and the similar location to be notified to the second user based on the fourth visit pattern and the fifth visit pattern. | 2012-11-01 |
20120278321 | VISUALIZATION OF CONCEPTS WITHIN A COLLECTION OF INFORMATION - A system for visualizing concepts within a collection of information analyzes a set of materials from at least one collection of information and defines an attribute space associated with the set of materials. The system then determines automatically similarity of members of the attribute space. The system then generates a graphical model of the members of the attribute space, where the generating includes generating a display of the members of the attribute space, each of the members having a respective display distance from other respective members of the attribute space reflective of the determined similarity. | 2012-11-01 |
20120278322 | Method, Apparatus and Program Product for Personalized Video Selection - Apparatus and program products in which image metadata identifying video objects in video data files is recorded; access to video data files by an end user of an access device is monitored; and a record of the concentration of personal video preferences is compiled from the monitored accesses and the image metadata of the video data files accessed by the end user. This record is then used to create summarizations of videos considered for prospective viewing by an end user and/or to select commercial messages such as advertisements to be delivered to the end user. | 2012-11-01 |
20120278323 | Joining Tables in a Mapreduce Procedure - Systems and techniques by which tables can be joined in a mapreduce procedure. In some implementations, when a large table of business data (e.g., having one billion transaction records or more) is to be joined with a large table of customer data (e.g., having hundreds of millions of customer records), then these two tables can be organized before the mapreduce procedure to speed up the table join. For example, the business data and the customer data can both be hash partitioned, based on the same key, into shards of business data and shards of customer data, respectively. The number of shards in these two groups has an integer relationship with each other: for example such that there are two business data shards for every customer data shard, or vice versa. | 2012-11-01 |
20120278324 | PARTICIPANT GROUPING FOR ENHANCED INTERACTIVE EXPERIENCE - Representative embodiments of a method for grouping participants in an activity include the steps of: (i) defining a grouping policy; (ii) storing, in a database, participant records that include a participant identifier, a characteristic associated with the participant, and/or an identifier for a participant's handheld device; (iii) defining groupings based on the policy and characteristics of the participants relating to the policy and to the activity; and (iv) communicating the groupings to the handheld devices to establish the groups. | 2012-11-01 |
20120278325 | Career Criminal and Habitual Violator (CCHV) Intelligence Tool - A computer implemented method, apparatus, and computer usable program product for ranking and categorizing criminal offenders in a jurisdiction. In one embodiment, external data associated with the offenders is processed in a set of data models to generate a ranking index of criminal offenders. The external data comprises offender data elements related to prior arrests. The computer software and web application enables officers, detectives, and supervisors to research the offenders in their jurisdiction. They can intentionally track and monitor the status of the offenders that are not currently incarcerated. They can deliberately increase lawful contacts with these high-rate and treacherous offenders. | 2012-11-01 |
20120278326 | Method to Dynamically Design and Configure Multimedia Fingerprint Databases - Techniques are provided for dynamic configuration of search parameters for multimedia fingerprint databases that use weak bits. A multimedia fingerprint database, which stores reference fingerprints and uses weak bits, is maintained. Maintaining the database includes dynamically configuring one or more of the following parameters: a fingerprint length of those portions of the reference fingerprints that are used to identify multimedia objects; an index length of the index used to index those portions of the reference fingerprints that are used to identify multimedia objects; a threshold that is used to determine whether multimedia objects are correctly identified; and a number of the weak bits in the reference fingerprints. | 2012-11-01 |
20120278327 | DOCUMENT ANALYSIS DEVICE, DOCUMENT ANALYSIS METHOD, AND COMPUTER READABLE RECORDING MEDIUM - A document analysis device ( | 2012-11-01 |
20120278328 | DATA CLASSIFICATION METHODS AND APPARATUS FOR USE WITH DATA FUSION - Methods and apparatus for classifying data for use in data fusion processes are disclosed. An example method of classifying data selectively groups nodes of a classification tree so that each node is assigned to only one of a plurality of groups and so that at least one of the groups includes at least two of the nodes. Data is classified based on the classification tree and the selective grouping of the nodes, and the results displayed. | 2012-11-01 |
20120278329 | TRACKING FEEDS IN A SOCIAL NETWORK - A system and method for tracking feeds in a social network is disclosed. The system includes a feed module and a personalization module. The feed module is communicatively coupled to the social network. The feed module is configured to receive a social information feed from the social network. The personalization module is communicatively coupled to the feed module to receive the social information feed from the feed module. The personalization module retrieves a category. The personalization module organizes the social information feed into a categorized feed based at least in part on the category. The personalization module extracts a feature based at least in part on a user query. The personalization module queries the categorized feed based at least in part on the feature to generate a personalized feed. The personalization module outputs the personalized feed to the user or a third party. | 2012-11-01 |
20120278330 | SYSTEMS AND METHODS FOR DEDUCING USER INFORMATION FROM INPUT DEVICE BEHAVIOR - User selections entered in the media application or any user input device behavior with user devices may be recorded as clickstream data. The clickstream data may be used to deduce information about the user or a media item being consumed. The clickstream data may be used to define a plurality of behavior patterns. Portions of the media item may be identified based on the user's interaction and/or behavior with the user devices. | 2012-11-01 |
20120278331 | SYSTEMS AND METHODS FOR DEDUCING USER INFORMATION FROM INPUT DEVICE BEHAVIOR - User selections entered in the media application or any user input device behavior with user devices may be recorded as clickstream data. The clickstream data may be used to deduce information about the user or a media item being consumed. Users may be grouped based on their respective clickstream activity during the consumption of one or more media items. Based on the user grouping, information may be derived about a media item being consumed by a user of the group. | 2012-11-01 |
20120278332 | CATEGORY-SENSITIVE RANKING FOR TEXT - Provided are methods, systems and apparatus which include computer program products, for generating topic models for text summarization In one aspect, a method includes receiving a first document of text that is associated with one or more category labels and that includes one or more sequences of one or more words, determining a category label that represents a first category associated with the first document, sampling the one or more sequences to determine a topic and a co-occurrence relationship between the topic and the category label, where a topic represents a subdivision within a category, sampling the one or more sequences to determine a co-occurrence relationship between a sequence in the first document and the topic, and generating a category-topic model that represents the co-occurrence relationships. | 2012-11-01 |
20120278333 | COMPUTERIZED DATA SET SEARCH METHOD - A method provides computerized searching of a data set. A method determines the location of an item in a contiguous data set including a plurality of items, the data set is stored in a computer system, and the method assigns a numeric value to each of the plural items in the data set. A least squares polynomial may be created for the data set using ordered pairs of (x, y), wherein x is the assigned numeric value of the item the data set and y is the location of the item in the data set. A command is received to search for the location of a target item in the data set, and a calculated target item location in the data set is generated using a target item assigned numeric value and the least squares polynomial. | 2012-11-01 |
20120278334 | Database System - A data structure. The data structure includes a record containing data, a record identifier associated with the record, a user identifier associated with the record, and a linking identifier containing the record identifier of a single record with which the linking identifier is associated and the user identifier associated with the record. | 2012-11-01 |
20120278335 | Systems and Methods for a Cache-Sensitive Index Using Partial Keys - Systems and methods are disclosed for a cache-sensitive index that uses fixed-size partial keys. The index may include a node comprising a child group pointer, a number of partial keys and a similar number of full-key pointers. The node may also include a record count. The nodes are organized into groups. The groups may contain a number of nodes one greater than the number of partial keys in a node and the nodes in a group may be stored contiguously in memory. The child group pointer and the number of partial keys may fit within a cache line. A method is disclosed for traversing the index, for bulk-loading the index, and for live deletion of records from the index. | 2012-11-01 |