Patent application number | Description | Published |
20080222063 | Extensible mechanism for detecting duplicate search items - Systems, methods, and other embodiments associated with identifying and selectively deleting duplicate search results are described. One example system embodiment includes logic to receive an identity indicator from a search logic. The identity indicator is associated with a search item that the search logic determines to be relevant to a search request. The example system may also include logic to determine whether the search result associated with the identity indicator is a duplicate result based on comparing the identity indicator to another identity indicator associated with another search result. | 09-11-2008 |
20080235210 | Searching related documents - Systems, methods, and other embodiments associated with logically expanding a document and determining the relevance of the logically expanded document to a query are described. One method embodiment includes searching an index to locate a document identifier for a document in which a query term appears. The method includes determining whether the index entry includes an expansion identifier, and, if so, producing a logically expanded document. The logically expanded document may include both a document associated with the document identifier and a document associated with the expansion identifier. The method may then determine a relevance value of the logically expanded document with respect to the query and may provide a signal corresponding to the relevance value. | 09-25-2008 |
20090006356 | CHANGING RANKING ALGORITHMS BASED ON CUSTOMER SETTINGS - Search term ranking algorithms can be generated and updated based on customer settings, such as where a ranking algorithm is modeled as a combination function of different ranking factors. An end user of a search system provides personalized preferences for weighted attributes, generally or for a single instance of the query. The user also can indicate the relative importance of one or more ranking factors by specifying different weights to the factors. Ranking factors can specify document attributes, such as document title, document body, document page rank, etc. Based on the attribute weights and the received user query, a ranking algorithm function will produce the relevant value for each document corresponding to the user preferences and personalization configurations. | 01-01-2009 |
20090100039 | Extensible mechanism for grouping search results - Systems, methods, and other embodiments associated with grouping automated search results are described. One embodiment includes a computer-readable medium storing computer-executable instructions operable to perform a method that includes identifying items to group. The method also includes selectively grouping a first item and a second item upon determining that a comparison of a metadata attributes indicates that the first item and the second item are to be treated as members of a group. | 04-16-2009 |
20100185611 | RE-RANKING SEARCH RESULTS FROM AN ENTERPRISE SYSTEM - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security, recency, or other attributes to be submitted at query time, for example, in order to re-rank query results from enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 07-22-2010 |
20100268711 | DOCUMENT SUMMARIZATION - Systems, methods, and other embodiments associated with automatically summarizing a document are described. One method embodiment includes computing term scores for members of a set of terms in a document to be summarized and computing sentence scores for sentences in a set of sentences in the document. The method embodiment also includes computing a set of entries for a term-sentence matrix that relates terms to sentences. The method embodiment also includes computing a dominant topic for the document and simultaneously ranking the set of terms and the set of sentences based on the dominant topic. The method embodiment provides a summarization item(s) selected from the set of terms and/or the set of sentences. | 10-21-2010 |
20110246443 | SUGGESTED CONTENT WITH ATTRIBUTE PARAMETERIZATION - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 10-06-2011 |
20110258184 | CHANGING RANKING ALGORITHMS BASED ON CUSTOMER SETTINGS - Search term ranking algorithms can be generated and updated based on customer settings, such as where a ranking algorithm is modeled as a combination function of different ranking factors. An end user of a search system provides personalized preferences for weighted attributes, generally or for a single instance of the query. The user also can indicate the relative importance of one or more ranking factors by specifying different weights to the factors. Ranking factors can specify document attributes, such as document title, document body, document page rank, etc. Based on the attribute weights and the received user query, a ranking algorithm function will produce the relevant value for each document corresponding to the user preferences and personalization configurations. | 10-20-2011 |
20110265189 | RE-RANKING SEARCH RESULTS FROM AN ENTERPRISE SYSTEM - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security, recency, or other attributes to be submitted at query time, for example, in order to re-rank query results from enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 10-27-2011 |
20120272304 | CRAWLING SECURE DATA SOURCES - It is desirable to provide a secure search mechanism to provide for searching over any and all content, such as across an enterprise. A secure search, however, requires access to the secure content repositories holding the data to be searched. In some cases the credentials required to crawl a repository may be extremely sensitive, or the user may be reluctant or unwilling to store user identification information in memory or on disk for any longer than is absolutely necessary. An approach is provided that allows a user or an administrator to provide security credentials to be stored and used only during a crawl, and to erase the credentials from the system when the crawl is complete. | 10-25-2012 |
20120278303 | PROPAGATING USER IDENTITIES IN A SECURE FEDERATED SEARCH SYSTEM - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety or sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 11-01-2012 |
20130173582 | INDEXING SECURE ENTERPRISE DOCUMENTS USING GENERIC REFERENCES - A web crawler indexes documents including information about document contents and metadata including information such as a URL. However, some applications rely on URL's that change frequently or are constructed to include user information so that the contents retrieved is customized to the user. An approach is provided for storing generic URL's in an index at crawl time, which are customized for the user at search time. A callback mechanism may be used to dynamically transform the generic URL into a URL that is specific to the user issuing the query and/or includes current information that may change frequently. In this way, when the query or search results are returned to the user, the user receives links that are active and valid for that particular user, directing the user to the appropriate site, application, etc. without requiring continuous updating of a very large index. | 07-04-2013 |
20130311459 | LINK ANALYSIS FOR ENTERPRISE ENVIRONMENT - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 11-21-2013 |
20140046978 | PROPAGATING USER IDENTITIES IN A SECURE FEDERATED SEARCH SYSTEM - A method of implementing a universal framework for searching across multiple search platforms in a secure federated search. The method includes receiving, at a federated broker, a query from an authorized user, obtaining a plurality of user credentials associated with the authenticated user, wherein each of the plurality of user credentials are used to access at least one source of a plurality of sources, determining a required query format for each of the plurality of sources, translating the query into a plurality of queries formatted according to the required query format of each of the plurality of sources, propagating the plurality of translated queries and the plurality of user credentials to each corresponding source to appear to each corresponding source to be the authorized user, receiving, at the federated broker, results of each of the plurality of queries from each source of the plurality of sources, and consolidating the results of each of the plurality of queries to be displayed in a uniform manner. | 02-13-2014 |
Patent application number | Description | Published |
20090176704 | Exendin Agonist Analogs to Treat Diabetes - Methods for treating conditions or disorders which can be alleviated by reducing food intake are disclosed which comprise administration of an effective amount of an exendin or an exendin agonist, alone or in conjunction with other compounds or compositions that affect satiety. The methods are useful for treating conditions or disorders, including obesity, Type II diabetes, eating disorders, and insulin-resistance syndrome. The methods are also useful for lowering the plasma glucose level, lowering the plasma lipid level, reducing the cardiac risk, reducing the appetite, and reducing the weight of subjects. Pharmaceutical compositions for use in the methods of the invention are also disclosed. | 07-09-2009 |
20110034377 | Exendin and Exendin Agonists for Eating Disorders - Methods for treating conditions or disorders which can be alleviated by reducing food intake are disclosed which comprise administration of an effective amount of an exendin or an exendin agonist, alone or in conjunction with other compounds or compositions that affect satiety. The methods are useful for treating conditions or disorders, including obesity, Type II diabetes, eating disorders, and insulin-resistance syndrome. The methods are also useful for lowering the plasma glucose level, lowering the plasma lipid level, reducing the cardiac risk, reducing the appetite, and reducing the weight of subjects. Pharmaceutical compositions for use in the methods of the invention are also disclosed. | 02-10-2011 |
20130023470 | EXENDIN AND EXENDIN AGONISTS FOR EATING DISORDERS - Methods for treating conditions or disorders which can be alleviated by reducing food intake are disclosed which comprise administration of an effective amount of an exendin or an exendin agonist, alone or in conjunction with other compounds or compositions that affect satiety. The methods are useful for treating conditions or disorders, including obesity, Type II diabetes, eating disorders, and insulin-resistance syndrome. The methods are also useful for lowering the plasma glucose level, lowering the plasma lipid level, reducing the cardiac risk, reducing the appetite, and reducing the weight of subjects. Pharmaceutical compositions for use in the methods of the invention are also disclosed. | 01-24-2013 |