Patent application number | Description | Published |
20130016917 | Image CompressionAANM Rodriguez; Adrian X.AACI DurhamAAST NCAACO USAAGP Rodriguez; Adrian X. Durham NC USAANM Woods; EricAACI DurhamAAST NCAACO USAAGP Woods; Eric Durham NC US - Methods, apparatuses, and computer program products for image compression are provided. Embodiments include: examining, by an image controller, contextual data of a plurality of uncompressed images; selecting from the plurality of uncompressed images, by the image controller, a group of uncompressed images that have related contextual data; designating, by the image controller, one of the selected images to be a reference image; creating, by the image controller, delta images, each delta image representing differences between the reference image and one of the uncompressed images; and compressing and storing, by the image controller, the reference image and each of the delta images. | 01-17-2013 |
20130066889 | Obscuring Search Results to Increase Traffic to Network Sites - According to an embodiment of the present invention, a system alters search results to increase traffic at network sites, and comprises a computer system including at least one processor. The system processes a search query including an inquiry to determine corresponding search results and an answer to the inquiry, wherein the search results include one or more network sites and a corresponding description of content. The search results are filtered to remove from view the answer from the description of content for the network sites. The filtered search results are displayed to enable access of the network site having a corresponding description of content indicating the network site contains the answer. Alternatively, the answer is highlighted for readily viewing by the user. Embodiments of the present invention further include a method and computer program product for altering search results in substantially the same manners described above. | 03-14-2013 |
20130154947 | DETERMINING A PREFERRED SCREEN ORIENTATION BASED ON KNOWN HAND POSITIONS - Determining a display orientation on a screen of a portable device includes detecting a current hand position of a user on a touch sensitive surface that is applied to an entire body of the portable device; comparing the current hand position to pre-stored hand position templates that are each associated with a preferred display orientation; determining a matching hand position template; configuring the display orientation of the screen to match the preferred display orientation associated with the matching hand position template; learning hand position patterns of the user by monitoring whether the user changes the display orientation of the screen within a predetermined amount of time after the configuring of the display orientation; and modifying the preferred display orientation associated with the matching hand position template based on the learned hand position patterns of the user. | 06-20-2013 |
20130159111 | CUSTOMIZING BROWSING CONTENT BASED ON USER DATA INFERRED FROM TARGETED ADVERTISEMENTS - A system comprising a web server containing website content, where the web server is configured for receiving requests from IP addresses for the website content and delivering the requested website content from the web server to the requesting IP address. The system further comprises an inspector tool that is configured for inspecting an advertising feed targeted to a first IP address and inferring user data from the advertising feed, and also a supplemental content generator configured for generating supplemental content according to the user data inferred from the advertising feed and providing the supplemental content to the first IP address. | 06-20-2013 |
20130159114 | CUSTOMIZING BROWSING CONTENT BASED ON USER DATA INFERRED FROM TARGETED ADVERTISEMENTS - Methods are provided for inferring user data based on a third-party advertising feed provided to a user while browsing a website hosted by a web server. One method includes receiving, at a web server, a request from a first user at a first IP address for content hosted on the web server, and delivering the requested content from the web server to the first IP address. An advertising feed targeted to the first IP address is inspected and user data from the advertising feed is inferred. The method then generates supplemental content according to the user data inferred from the advertising feed, and provides the supplemental content to the first IP address. | 06-20-2013 |
20130185807 | End User License Agreement Detection and Monitoring - An approach is provided for detecting and monitoring end user license agreement (EULA) compliance is provided. A request to access a executable software code is received from an end user. A EULA version corresponding to the requested executable software code is identified. A determination is made as to whether the end user has accepted the identified EULA. If the end user has not accepted the identified EULA, then an out of date EULA notification is sent to the end user, the EULA is sent to the end user requesting an acceptance to the EULA. A EULA response is received from the end user. If the end user accepts the EULA, then the end user is allowed access to the executable software code. | 07-18-2013 |
20130253757 | Maintaining A Dynamic Service Registry For A Self-Diagnosing Device - Maintaining a dynamic service registry for a self-diagnosing device, including: detecting, by the self-diagnosing device, a fault condition, wherein the fault condition indicates that the self-diagnosing device needs to be serviced; detecting, by the self-diagnosing device, that the fault condition has been resolved; determining, by the self-diagnosing device, the geographic location of the self-diagnosing device upon detecting that the fault condition was resolved; and entering, by the self-diagnosing device, the fault condition and the geographic location of the self-diagnosing device when the fault condition was resolved into the dynamic service registry. | 09-26-2013 |
20130268827 | ENSURING USER INTERFACE SPECIFICATION ACCURATELY DESCRIBES USER INTERFACE AFTER UPDATES TO USER INTERFACE - A method, system and computer program product for ensuring a user interface specification accurately describes its corresponding user interface. The system links sections of the user interface code with corresponding user interface objects. Furthermore, the system links these sections of the user interface code with corresponding sections of the user interface specification. Upon detecting a modification to the user interface code which reflects an update to the user interface, the system notifies the user that the user interface specification needs to be updated. By linking the user interface objects to the user interface code and linking the user interface code to the corresponding sections of the user interface specification, appropriate modifications to the user interface specification can be recommended or implemented based on the modifications to the corresponding sections of the user interface code, which reflect the changes to the corresponding objects on the user interface. | 10-10-2013 |
20130275408 | Presenting Unique Search Result Contexts - Presenting unique search result contexts, including: receiving, by a search result presentation module, a plurality of search results generated in response to a search query, wherein each search result includes context information associated with the search result; identifying, by the search result presentation module for each search result, a displayable portion of the context information associated with the search result; determining, by the search result presentation module for each search result, whether the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result; and responsive to determining that the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result, updating, by the search result presentation module, the displayable portion of the context information for the search result. | 10-17-2013 |
20130311440 | COMPARISON SEARCH QUERIES - A computer implemented method, system and computer program product for providing search results in response to a search query includes receiving, by a processor, a search query from a user. A processor detects that the search query includes a request for a comparison-mode query and the processor automatically detects terms in the search query indicating that the query includes components. The comparison-mode query is decomposed into respective, individual component queries for the respective components and the query is performed as respective component queries for the respective, individual components. This includes finding an individual result for each respective, individual component from a single, remote website. The user is presented the individual results of the component queries, which includes aligning the results side-by-side and vertically, so that although the results are for respective, individual components, the alignment tends to help the user compare the individual results. | 11-21-2013 |
20140006327 | PROGRAMMATICALLY IDENTIFYING BRANDING WITHIN ASSETS | 01-02-2014 |
20140019126 | SPEECH-TO-TEXT RECOGNITION OF NON-DICTIONARY WORDS USING LOCATION DATA - Speech-to-text recognition of non-dictionary words by an electronic device having a speech-to-text recognizer and a global positing system (GPS) includes receiving a user's speech and attempting to convert the speech to text using at least a word dictionary; in response to a portion of the speech being unrecognizable, determining if the speech contains a location-based phrase that contains a term relating to any combination of a geographic origin or destination, a current location, and a route; retrieving from a global positioning system location data that are within geographical proximity to the location-based phrase, wherein the location data include any combination of street names, business names, places of interest, and municipality names; updating the word dictionary by temporarily adding words from the location data to the word dictionary; and using the updated word dictionary to convert the previously unrecognized portion of the speech to text. | 01-16-2014 |
20140046932 | PRESENTING UNIQUE SEARCH RESULT CONTEXTS - Presenting unique search result contexts, including: receiving, by a search result presentation module, a plurality of search results generated in response to a search query, wherein each search result includes context information associated with the search result; identifying, by the search result presentation module for each search result, a displayable portion of the context information associated with the search result; determining, by the search result presentation module for each search result, whether the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result; and responsive to determining that the displayable portion of the context information is a duplicate of the displayable portion of the context information for another search result, updating, by the search result presentation module, the displayable portion of the context information for the search result. | 02-13-2014 |
20140050370 | OCULAR BIOMETRIC AUTHENTICATION WITH SYSTEM VERIFICATION - A biometric authentication system includes an image database and a user database containing user profiles. Each user profile is associated with a selected image in the image database as an image key and with an ocular biometric data record obtained from an eye of the associated user. A user input terminal receives asserted user credentials, an eye scanning module obtains ocular biometric data, and a position detection module detects an eye position or eyelid position. An access control module communicates with the user database for obtaining a user profile associated with the asserted user credentials, communicates with a display device for displaying the image key associated with the obtained user profile, communicates with the position detection module for verifying the biometric authentication system by detecting whether the user is viewing the image key, and communicates with the eye scanning module for obtaining ocular biometric data and authenticating the user. | 02-20-2014 |
20140050371 | OCULAR BIOMETRIC AUTHENTICATION WITH SYSTEM VERIFICATION - A biometric user authentication method and computer program product includes receiving asserted user credentials from a user into a biometric authentication system, and obtaining a digitally-stored image key and ocular biometric data both associated with the asserted user credentials from memory within the biometric authentication system. The biometric authentication system is verified by simultaneously displaying the image key and at least one image other than the image key to the user and detecting that the user has selected the image key. The user is authenticated by scanning an eye of the user to obtain ocular biometric data and matching the scanned ocular biometric data to the digitally stored ocular biometric data. If the biometric system is verified and the user is authenticated, then the user is provided access to a protected area. | 02-20-2014 |
20140059420 | APPENDING A UNIFORM RESOURCE IDENTIFIER (URI) FRAGMENT IDENTIFIER TO A UNIFORM RESOURCE LOCATOR (URL) - Embodiments of the present invention disclose a method, computer program product, and system for dynamically appending a Uniform Resource Identifier (URI) fragment identifier to a Uniform Resource Locator (URL). A web browser on a client device is displaying a webpage, and is accessing the HyperText Markup Language (HTML) coding for the webpage. HTML identification attributes are detected for the content that is being rendered within the web browser. A URI fragment identifier corresponding to the HTML identification attribute that is being rendered at the top of the web browser window is determined and is appended to the end of the URL of the webpage that is displayed in the URL box of the web browser. In an embodiment, the detection of the content that is being rendered at the top of the web browser window occurs responsive to a command to scroll to a new section of the webpage. | 02-27-2014 |
20140068480 | Preservation of Referential Integrity - Methods and apparatus, including computer program products and a computer system, implement and use techniques for preserving referential integrity. A first input receiving component receives a first input selecting a target file within a first directory. A second input receiving component receives a second input selecting all files referenced by the target file. A transfer component automatically performs a moving or copying operation of all referenced files from a first directory to a second directory when a moving or copying operation of the target file is performed. | 03-06-2014 |
20140086430 | REMOVING NETWORK DELAY IN A LIVE BROADCAST - A first stream of audio data is received a into a data store. Excess pauses are identified in the audio data. A second stream of audio data is transmitted from the data store comprising the first stream of audio data with the excess pause removed, the second stream of audio data transmitted after a delay that is approximately equal to but no less than the duration of the removed excess pause. | 03-27-2014 |
20140088745 | REMOVING NETWORK DELAY IN A LIVE BROADCAST - A first stream of audio data is received a into a data store. Excess pauses are identified in the audio data. A second stream of audio data is transmitted from the data store comprising the first stream of audio data with the excess pause removed, the second stream of audio data transmitted after a delay that is approximately equal to but no less than the duration of the removed excess pause. | 03-27-2014 |
20140101422 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 04-10-2014 |
20140101428 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 04-10-2014 |
20140101430 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 04-10-2014 |
20140101431 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 04-10-2014 |
20140108774 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140108779 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140109220 | TRUST RETENTION - A method, system and computer program product for retaining trust. A computer receives a correct password for administrative access. The computer sets a trust to a maximum level. The computer detects at least one period of inactivity. The computer adjusts a trust based on the at least one period of inactivity. The computer receives a request to access an privileged function. The computer, responsive to receiving the request, determines that the trust is below a trust threshold. The computer, responsive to determining that the trust is below the trust threshold, challenges the user to authenticate. The computer receives a authentication attempt. The computer determines whether the authentication attempt is correct. The computer, responsive to a determination that the authentication attempt is correct, grants access to the administrative function. | 04-17-2014 |
20140123163 | MANAGING DISPLAY OF CONTENT IN A CONTENT FEED - A method and a computer program product are disclosed for managing the display of content from a content feed. In one embodiment, a content feed includes a dynamically-generated set of content items electronically fed to one or more device. A priority content item is identified along with a plurality of other content items related by subject matter to each other and to the priority content item. A display status of the priority content item is then monitored, indicating whether the priority content item has been displayed for a user. The visibility of the related content items on the one or more device is controlled according to the display status of the priority content item. | 05-01-2014 |
20140123164 | MANAGING DISPLAY OF CONTENT IN A CONTENT FEED - A method includes generating a content feed, wherein the content feed includes a dynamically-generated set of content items electronically fed to one or more device for selectively displaying on the one or more device. A priority content item and a plurality of related content items in the content feed are identified, wherein the plurality of related content items include subject matter that is common with the priority content item. A display status of the priority content item is monitored indicating whether the priority content item has been displayed for a user. The visibility of the related content items on the one or more device is then controlled according to the display status of the priority content item. | 05-01-2014 |
20140157037 | IDENTIFYING SOFTWARE RESPONSIBLE FOR CHANGES IN SYSTEM STABILITY - A computer program product includes computer usable program code for: detecting a stability change in a computer system; identifying a first set of at least one capability of the computer system that is affected by the stability change; identifying, in response to detecting the stability change, a software application that was installed or updated prior to the stability change; identifying a second set of at least one capability that is utilized by the identified software application; comparing the first set to the second set to determine a degree of similarity; comparing a first time that the stability change was detected to a second time that the identified software application was installed or updated to determine a temporal proximity; and identifying the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity. | 06-05-2014 |
20140157040 | IDENTIFYING SOFTWARE RESPONSIBLE FOR CHANGES IN SYSTEM STABILITY - A computer-implemented method detects a stability change in a computer system, and identifies a first set of at least one capability of the computer system that is affected by the stability change. In response to detecting the stability change, the method identifies a software application that was installed prior to the stability change, and identifies a second set of at least one capability of the computer system that is utilized by the identified software application. The method compares the first and second capability sets to determine a degree of similarity, and compares the time that the stability change was detected to the time that the identified software application was installed to determine a temporal proximity. The method then identifies the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity. | 06-05-2014 |
20140157056 | IDENTIFYING SOFTWARE RESPONSIBLE FOR A CHANGE IN SYSTEM STABILITY - A computer program product including computer usable program code embodied on a tangible computer usable storage medium, includes: computer usable program code for detecting a stability change in a first computer system; computer usable program code for comparing a first set of software applications installed on the first computer system to each set of software applications installed on a plurality of other computer systems in communication with a management module; computer usable program code for identifying a second computer system from among the plurality of other computer systems, wherein the set of software applications installed on the second computer system includes all of the first set of software applications except for a given software application; and computer usable program code for identifying the given software application as the cause of the stability change in the first computer system. | 06-05-2014 |
20140157058 | IDENTIFYING SOFTWARE RESPONSIBLE FOR A CHANGE IN SYSTEM STABILITY - A computer-implemented method detects a stability change in a first computer system, and compares a first set of software applications installed on the first computer system to each set of software applications installed on a plurality of other computer systems. The method then identifies a second computer system from among the plurality of other computer systems, wherein the set of software applications installed on the second computer system includes all of the first set of software applications except for a given software application. The given software application is then identified as the cause of the stability change in the first computer system. The computer systems are preferably virtual machines being managed by a management module, such as a provisioning manager. The method may be used to detect both increases in stability and instability. | 06-05-2014 |
20140157096 | SELECTING VIDEO THUMBNAIL BASED ON SURROUNDING CONTEXT - Some embodiments of the inventive subject matter include a computer program product for determining a thumbnail image for a video. The computer program product can include computer usable program code configured to analyze the video. The computer usable program code can be further configured to determine video themes based on the analyzing the video. The computer usable program code can be further configured to produce a first group of thumbnail images for the video themes. The computer usable program code can be further configured to determine a forum theme for an electronic forum in which the video will be accessible. The computer usable program code can be further configured to choose, from the first group of thumbnail images, a matching thumbnail image that is thematically consistent with the forum theme. The computer usable program code can be further configured to present the matching thumbnail image in the forum. | 06-05-2014 |
20140157097 | SELECTING VIDEO THUMBNAIL BASED ON SURROUNDING CONTEXT - Some embodiments of the inventive subject matter include a method for embedding, in a website, a video and a thumbnail image associated with the video. The method can include requesting, over a network, the video from a video source. The method can include transmitting, to the video source, theme information indicating a theme of the website. The method can include receiving the video and the thumbnail image, wherein the thumbnail image is thematically consistent with the theme of the website. The method can include embedding the video in the website. The method can include presenting the thumbnail image in association with the video. | 06-05-2014 |
20140201702 | Automatic Identification of Affected Product Assets with Work Items - A work description for a computing system or environment is automatically associated with the affected source components, such as source code modules, web pages, icons, etc., by analyzing the textual description for a change to produce keywords, concepts, and metadata from the textual description; analyzing the source components in a component repository against the keywords, the concepts, and the metadata; identifying source code areas within the source components for changing according to the keywords, concepts, and metadata; and producing a report indicating the source areas for changing. The analysis may employ pattern matching, deep semantic relationship detection, shallow semantic relationship detection, scoring, weighting, logic matching, and other natural language processing techniques. | 07-17-2014 |
20140236573 | Automatic Semantic Rating and Abstraction of Literature - Deep semantic analysis is performed on an electronic literary work in order to detect plot elements and optional other storyline elements such as characters within the work. Multiple levels of abstract are generated into a model representing the literary work, wherein each element in each abstraction level may be independently rated for preference by a user. Through comparison of multiple abstraction models and one or more user rating preferences, one or more alternative literary works may be automatically recommended to the user. | 08-21-2014 |
20140258817 | CONTEXT-BASED VISUALIZATION GENERATION - An apparatus includes memory, a processor and a visualization analysis unit coupled with the memory and the processor. The visualization analysis unit is configured to detect a visualizable subject matter contained within data. The visualization analysis unit is also configured to determine a context in which the visualizable subject matter appears. The visualization analysis unit is also configured to select a visualization engine from a plurality of visualization engines based, at least in part, on the context in which the visualizable subject matter appears. The visualization analysis unit is also configured to configure the visualization engine to generate a visualization of the visualizable subject matter. | 09-11-2014 |
20140278363 | Enhanced Answers in DeepQA System According to User Preferences - A semantic search engine is enhanced to employ user preferences to customize answer output by, for a first user, extracting user preferences and sentiment levels associated with a first question; receiving candidate answer results of a semantic search of the first question; weighting the candidate answer results according to the sentiment levels for each of the user preferences; and producing the selected candidate answers to the first user. Optionally, user preferences and sentiment levels may be accumulated over different questions for the same user, or over different users for similar questions. And, supplemental information may be retrieved relative to a user preference in order to further tune the weighting per the preferences and sentiment levels. | 09-18-2014 |
20140278377 | AUTOMATIC NOTE TAKING WITHIN A VIRTUAL MEETING - Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated. | 09-18-2014 |
20140278405 | AUTOMATIC NOTE TAKING WITHIN A VIRTUAL MEETING - Arrangements relate to automatically taking notes in a virtual meeting. The virtual meeting has meeting content that includes a plurality of meeting content streams. One or more of the meeting content streams is in a non-text format. The one or more meeting content streams in a non-text format can be converted into text. As a result, the plurality of meeting content streams is in text format. The text of the plurality of meeting content streams can be analyzed to identify a key element within the text. Consolidated system notes that include the key element can be generated. | 09-18-2014 |
20140280186 | CROWDSOURCING AND CONSOLIDATING USER NOTES TAKEN IN A VIRTUAL MEETING - Arrangements relate to crowdsourcing and consolidating user notes taken within a virtual meeting. Notes from one or more meeting attendees can be received. The received user notes can be analyzed to identify a key element therein using natural language processing. The analysis of received user notes can be performed by a processor. A consolidated system notes can be generated. The consolidated system notes can include the key element. | 09-18-2014 |
20140283097 | Anonymizing Sensitive Identifying Information Based on Relational Context Across a Group - Mechanisms are provided for relational context sensitive anonymization of data. A request for data is received that specifies a relational context corresponding to a selected group of selected persons selected from a global group of persons based on the relational context. The relational context specifies one or more attributes of selected persons in the selected group that establishes a relationship between the selected persons and distinguishes the selected persons from non-selected persons in the global group that are not in the selected group. For the relational context, based on a corpus of personal information data corresponding to the selected persons, key attributes in the personal information data are determined and a rarity value for each key attribute is determined. Selected key attributes are then anonymized based on the determined rarity value for each of the key attributes within the relational context of the selected group. | 09-18-2014 |
20140358964 | Natural language processing (NLP) query formulation engine for a computing device - A computing device includes a query formulation engine having a data collection component that collects metadata associated with the device or its operation. Typically, the metadata describes a characteristic about the device (e.g., which components or applications are resident, their current operating states or characteristics, what applications are active, which application has the display focus, what permissions are associated with each application, what application-specific calls are being made to the device operating system, etc.). A natural language processing (NLP)-based question and answer (Q&A) system is trained to understand natural language text queries generated by the query formulation engine. When a user performs an action on the device, the engine converts that action, preferably together with a structured form of the metadata, into an NLP query. The query is directed to the Q&A system. A response to the NLP query is received at the computing device and then acted upon. | 12-04-2014 |
20140359691 | Policy enforcement using natural language processing - A term of use policy document defines permissible actions that may be implemented by a user using a computing device. A natural language processing (NLP)-based question and answer (Q&A) system is trained to understand the policy document. The device includes a management application that interacts with the Q&A system to identify a policy violation. When the user performs an action on the device, the application converts that action into an NLP query directed to the Q&A system to determine whether the action constitutes a violation. The query may be accompanied by metadata associated with the user, the device or its state. Upon receipt of the query and any associated metadata, the Q&A system determines if the user action is compliant with the policy and returns a response. Based on the response, the user's computing device may take an enforcement action, e.g., restricting or disabling functionality, or issuing a warning. | 12-04-2014 |
20140363046 | PRIORITIZATION OF FACIAL RECOGNITION MATCHES BASED ON LIKELY ROUTE - Prioritizing facial recognition matches includes obtaining identification information and a facial image for each visitor entering the monitored environment, the monitored environment having a plurality of cameras at known locations including entry and exit points; obtaining itineraries of the visitors. Itineraries of the visitors are obtained, and based on the entry points and the itineraries of the visitors, likely routes of the visitors are determined through the monitored environment. Responsive to receiving an image captured by a first camera at a first location at an image capture time, the database records are sorted for facial recognition matching with the image from the first camera based on the visitors who routes are likely to place the visitors in proximity to the first camera at the time of image capture. | 12-11-2014 |
20140379331 | Automatic Semantic Rating and Abstraction of Literature - Deep semantic analysis is performed on an electronic literary work in order to detect plot elements and optional other storyline elements such as characters within the work. Multiple levels of abstract are generated into a model representing the literary work, wherein each element in each abstraction level may be independently rated for preference by a user. Through comparison of multiple abstraction models and one or more user rating preferences, one or more alternative literary works may be automatically recommended to the user. | 12-25-2014 |
20150039536 | Clarification of Submitted Questions in a Question and Answer System - Mechanisms for clarifying an input question are provided. A question is received for generation of an answer. A set of candidate answers is generated based on an analysis of a corpus of information. Each candidate answer has an evidence passage supporting the candidate answer. Based on the set of candidate answers, a determination is made as to whether clarification of the question is required. In response to a determination that clarification of the question is required, a request is sent for user input to clarify the question. User input is received from the computing device in response to the request and at least one candidate answer in the set of candidate answers is selected as an answer for the question based on the user input. | 02-05-2015 |
20150058329 | Clarification of Submitted Questions in a Question and Answer System - Mechanisms for clarifying an input question are provided. A question is received for generation of an answer. A set of candidate answers is generated based on an analysis of a corpus of information. Each candidate answer has an evidence passage supporting the candidate answer. Based on the set of candidate answers, a determination is made as to whether clarification of the question is required. In response to a determination that clarification of the question is required, a request is sent for user input to clarify the question. User input is received from the computing device in response to the request and at least one candidate answer in the set of candidate answers is selected as an answer for the question based on the user input. | 02-26-2015 |
20150065172 | GEOGRAPHIC AREA AND CATEGORY SPECIFIC CONTENT SHARING BETWEEN MOBILE DEVICES - A method, system, and/or computer program product automatically shares content between mobile devices. Permissible geographic areas for sharing digital content from a user's mobile device are received, where the digital content is from a user-approved category of digital content. A determination is made as to whether an authorized mobile receiving device is within a specific permitted geographic area from the permissible geographic areas. In response to determining that the authorized mobile receiving device is within the specific permitted geographic area, the digital content is automatically shared between the user's mobile device and the authorized mobile receiving device. | 03-05-2015 |
20150066935 | CROWDSOURCING AND CONSOLIDATING USER NOTES TAKEN IN A VIRTUAL MEETING - Arrangements relate to crowdsourcing and consolidating user notes taken within a virtual meeting. Notes from one or more meeting attendees can be received. The received user notes can be analyzed to identify a key element therein using natural language processing. The analysis of received user notes can be performed by a processor. A consolidated system notes can be generated. The consolidated system notes can include the key element. | 03-05-2015 |