Patent application number | Description | Published |
20090182744 | STRING PATTERN ANALYSIS - A method of analyzing a string-pattern includes defining a minimum length (Lmin | 07-16-2009 |
20090187560 | STRING PATTERN CONCEPTUALIZATION METHOD AND PROGRAM PRODUCT FOR STRING PATTERN CONCEPTUALIZATION - A conceptualization method uses maximum or other substrings of a string pattern to find specific N-tuples of substring triples with N≧2 and m=1 . . . N inside a reference set (SET_r_i) of strings (STR_n_i). Each N-tuple is considered as a candidate for representing related concepts. Each concatenation of the substrings triples is an explicit member of the reference set (SET_r_i). Each middle substring out of middle substrings is unequal to another middle substring out of middle substrings within the substring triples found inside the reference set (SET_r_i). Each prefix substring (X_i) is equal to all other prefix substrings (X_i) within the substring triples found inside the reference set (SET_r_i). Each suffix substring (Z_i) is equal to all other prefix substrings (Z_i) within the substring triples found inside the reference set (SET_r_i). Either the prefix substring (X_i) or the suffix substring (Z_i) is not empty. | 07-23-2009 |
20100050069 | SYSTEM AND METHOD FOR CUSTOMIZING DOCUMENTATION WITH CONSTRAINT-CONTROLLED CUSTOM VALUES - A system and associated method for customizing a documentation. A documentation template has elements and each element can hold a custom value. At least one element is associated with at least one constraint that governs the validity of the custom value for the element. The documentation template is presented and custom values for elements in the documentation template are obtained. The custom value for the element can be interactively provided by a user or automatically determined by system context of the user. Then validity of obtained custom values is checked against constraints associated with each element. Constraints may be classified in determining the impact of violated constraints in generating a customized document. Elements are substituted by valid corresponding custom values, and the customized documentation for the user is generated and stored as a result. | 02-25-2010 |
20100161389 | SYSTEM AND METHOD FOR BUILDING KNOWLEDGEBASE FOR SOFTWARE SYSTEM - A system and associated method for building a knowledgebase for a software system. The knowledgebase has multiple problem-solution records for problems that may occur in the software system. A user of the knowledgebase requests a solution to a problem by submitting a problem description and payment information. The payment information is separately verified and the knowledgebase is searched for a problem-solution record that has the same problem description provided by the user. A solution of the matched problem-solution record is presented to the user and the user provides a feedback rating how effective the solution is in solving the problem. The feedback may be another solution for the problem or evidences supporting the feedback. If the feedback is evaluated to be valuable, the knowledgebase may be updated with the feedback. An author of an existing valuable solution and/or the user who provided another solution is rewarded. | 06-24-2010 |
20100217777 | System for Automatic Arrangement of Portlets on Portal Pages According to Semantical and Functional Relationship - The present invention relates to the field of network computing, and in particular to method and system for designing a Web Portal comprising a hierarchical structure of portal pages and portlets for accessing Web contents accessible via the Portal. A typical larger enterprise's portal contains large numbers, e.g., thousands of pages and portlets. Due to the complexity of an enterprise portal, manual administration is inefficient as it is time-consuming, error-prone and thus expensive. In order to overcome these disadvantages, it is proposed that a Portal according to the invention performs some mining of the portlet markup and/or that of the portlet description in order to autonomously compute and propose an enhanced portal content structure. This helps to provide a user-friendly content structure that reflects well the relationships between portlets. | 08-26-2010 |
20120297362 | EDITING SOURCE CODE - A method for editing source code includes receiving a modification to the source code made by a user, determining whether the modification would change the semantics of the source code, and handling the modification depending on the result of the determining. | 11-22-2012 |
20120317100 | STRING PATTERN CONCEPTUALIZATION FROM DETECTION OF RELATED CONCEPTS BY ANALYZING SUBSTRINGS WITH COMMON PREFIXES AND SUFFIXES - A reference string set including a group of strings is set. At least two specific tuples of substring triples is found inside the reference string set of strings. Each tuple is considered as a candidate for representing a related concept. Each concatenation of the substrings triples is an explicit member of the reference string set. Each middle substring of the substring triples is unequal to another middle substring within the substring triples found inside the reference string set. Each prefix substring is equal to all other prefix substrings within the substring triples found inside the reference string set. Each suffix substring is equal to all other suffix substrings within the substring triples found inside the reference string set. Either the prefix substring or the suffix substring is not empty. | 12-13-2012 |
20140373176 | PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS - A computer determines, based on a degree of authorization of a user, that a user has authorization to view a type of field. Based on the degree of authorization of the user, the computer generates a modified list of search terms by adding additional search terms to a list of search terms. The computer executes a search using the modified list of search terms. The computer identifies a search result that includes the first type of field which further includes a search term that is included in the modified list of search terms. | 12-18-2014 |
20140373177 | PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS - A computer determines, based on a degree of authorization of a user, that a user has authorization to view a type of field. Based on the degree of authorization of the user, the computer generates a modified list of search terms by adding additional search terms to a list of search terms. The computer executes a search using the modified list of search terms. The computer identifies a search result that includes the first type of field which further includes a search term that is included in the modified list of search terms. | 12-18-2014 |