Patent application number | Description | Published |
20090287673 | RANKING VISUALIZATION TYPES BASED UPON FITNESS FOR VISUALIZING A DATA SET - Technologies are described herein for ranking visualization types. In order to rank the visualization types, visualization metadata is generated for each of the visualization types and data set metadata is generated for the data set. A suitability score is then computed based upon the visualization metadata and the data set metadata through the use of data mapping rules and chart selection rules. The visualization types are then ranked according to the computed scores. A user interface may then be displayed that includes visual representations corresponding to the visualization types that are ordered according to the ranking. One of the visual representations may then be selected to apply the corresponding visualization type to the data set | 11-19-2009 |
20120159355 | OPTIMIZED JOINT DOCUMENT REVIEW - A UI for presenting and reviewing a document is optimized based upon the type of computing device being utilized to present the document. One such UI includes a first pane showing a view of the document under review that is sized and formatted for display on a large-format display device. The first pane can also be utilized to emphasize a portion of the document. The UI also includes a second pane that includes indicators for each of the reviewers of the document. The selection of an indicator will cause a portion of the document being reviewed by the corresponding reviewer to be displayed in the first pane. The UI also includes a third pane that includes a scaled image of the document shown in the first pane. Selection of a portion of the scaled image causes the selected portion of the document to be displayed in the first pane. | 06-21-2012 |
20130002565 | DETECTING PORTABLE DEVICE ORIENTATION AND USER POSTURE VIA TOUCH SENSORS - Concepts and technologies are described herein for processing touch sensor signals from sensors located on a portable touch screen device along with accelerometer data, to determine if, and how, the device is currently being used. Data from touch sensors along with accelerometer data are analyzed to identify a manner in which the device is being held, including how the user is holding the device. The touch sensor signals can be used to better control the device, including placing the device into a sleep state, and waking up the device. The touch sensor signals can also be used to configure the display contents, including where to locate various virtual keys or function keys on the screen or how to present a virtual keyboard based on how the user is holding and using the device. | 01-03-2013 |
20130332475 | TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to analyze the data to identify relationships within data elements or other portions of the data. The computing device also can determine a visualization model to apply to the data and to choose a world based upon the determined visualization model. The computing device can obtain rules associated with the selected or chosen world, and can apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback to the output. | 12-12-2013 |
20140025619 | CREATING VARIATIONS WHEN TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for creating variations when transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to analyze the data to identify relationships among data elements or other portions of the data, and to identify any possible approaches to transforming the data (“worlds”) based upon the relationships and the data. The worlds can be ranked and selected based upon rank. The computing device can obtain rules associated with the selected and apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback regarding the world selection. | 01-23-2014 |
20140025650 | ABSTRACT RELATIONAL MODEL FOR TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for an abstract relational model for transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to generate an abstract relational model from data to analyze the data and to identify relationships within data elements or other portions of the data. The computing device also can determine a visualization model to apply to the data and to choose a world based upon the determined visualization model. The computing device can obtain rules associated with the selected or chosen world, and can apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback to the output. | 01-23-2014 |
20140026038 | TRANSFORMING DATA TO CREATE LAYOUTS - Concepts and technologies are described herein for transforming data to create layouts. In accordance with the concepts and technologies disclosed herein, a computing device can execute a layout generator. The computing device can be configured to receive or retrieve data that includes visual content such as an image and other content such as text. The computing device can analyze the visual content to identify a salient region and/or an invariant region within the visual content. The computing device can access designs for laying out visual content and other content based upon an identified salient region and/or invariant region. The computing device can evaluate the designs to determine if a design matches the data. The computing device can load the data into the selected design to generate the layout. | 01-23-2014 |
Patent application number | Description | Published |
20080209552 | IDENTIFYING POTENTIALLY OFFENDING CONTENT USING ASSOCIATIONS - Methods for identifying potentially harmful, malicious, or unwanted content based upon associations with known offenders are provided. Executable content associated with a domain is identified. The executable content URL and the domain are compared to URLs/domains known to be associated with malicious content. If the URL and/or the domain has been identified as associated with offending code, the remaining domain contents and any available associated information are examined to identify any referencing domains, referenced domains, linking domains, affiliated entities, etc. Each identified domain, affiliate, etc. is subsequently examined in a similar manner to identify any domain, entity, etc. having an association with malicious content. Each identified domain, entity, etc. is assigned a suspicion level based upon proximity to the source of the offending code. If desired, relationships among the domains, entities, and the like may be relationally mapped to render associations easier to identify. | 08-28-2008 |
20080250018 | Binary function database system - A binary function database system is provided in which binary functions are extracted from compiled and linked program files and stored in a database as robust abstractions which can be matched with others using one or more function matching heuristics. Such abstraction allows for minor variations in function implementation while still enabling matching with an identical stored function in the database, or with a stored function with a given level of confidence. Metadata associated with each function is also typically generated and stored in the database. In an illustrative example, a structured query language database is utilized that runs on a central database server, and that tracks function names, the program file from which the function is extracted, comments and other associated information as metadata during an analyst's live analysis session to enable known function information that is stored in the database to be applied to binary functions of interest that are disassembled from the program file. | 10-09-2008 |
20100077481 | COLLECTING AND ANALYZING MALWARE DATA - A malware analysis system is described that provides information about malware execution history on a client computer and allows automated back-end analysis for faster creation of identification signatures and removal instructions. The malware analysis system collects threat information on client computers and sends the threat information to a back-end analysis component for automated analysis. The back-end analysis component analyzes the threat information by comparing the threat information to information about known threats. The system builds a signature for identifying the threat family and a mitigation script for neutralizing the threat. The system sends the signature and mitigation data to client computers, which use the information to mitigate the threat. Thus, the malware analysis system detects and mitigates threats more quickly than previous systems by reducing the burden on technicians to manually create environments for reproducing the threats and manually analyze the threat behavior. | 03-25-2010 |
20120260343 | AUTOMATED MALWARE SIGNATURE GENERATION - Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of malware and analyzing the incoming unknown files based on both a plurality of classifiers of file behavior and a plurality of classifiers of file content. An incoming file is classified as having a particular malware classification based on the analyzing of incoming unknown files and a malware signature is generated for the incoming unknown file based on the particular malware classification. Access is provided to the malware signature. | 10-11-2012 |
Patent application number | Description | Published |
20090055351 | DIRECT MASS STORAGE DEVICE FILE INDEXING - An arrangement for enumerating data, such as media content including music, that is stored on external hard drive-based mass storage devices is provided by a media content processing system that implements a direct mass storage device file indexing process. This file indexing process is configured for finding all files and directories on the mass storage device, and reading through those parts of the files which contain metadata (such as album name, artist name, genre, track title, track number etc.) about the file. Use of the media content processing system reduces file enumeration time by minimizing the amount of physical movement of the read/write head in the hard disk drive that is used by the mass storage device. This motion minimization is accomplished by reading the clusters of directory and file data in a sequential manner on the hard disk, rather than randomly performing such read operations. | 02-26-2009 |
20120109994 | ROBUST AUTO-CORRECTION FOR DATA RETRIEVAL - A data-retrieval method for use on a portable electronic device. The method comprises receiving a query string at a user interface of the device and displaying one or more index strings on the user interface such that the relative prominence of each index string displayed increases with increasing resemblance of that index string to the query string. The method further comprises displaying an index string with greater prominence when a fixed-length substring of the query string occurs anywhere in the index string, regardless of position. In this manner, the relevance of prominently displayed index strings increases as more characters are appended to the query string, even if the query string contains errors. | 05-03-2012 |