Patent application number | Description | Published |
20080208855 | METHOD FOR MAPPING A DATA SOURCE TO A DATA TARGET - The invention relates to a method for mapping at least one data column from a database source to at least one data column of a data target, the method comprising: defining at least one reference column of the data target and at least one database source column; performing a comparison of data contained in the data column(s) with the reference column(s); and determining mapping candidates between the data column(s) and the reference column(s). | 08-28-2008 |
20090112927 | System and Method of Transforming Data for Use in Data Analysis Tools - A process of transforming data residing in databases, such as relational databases, into forms suitable as input to data analysis tools, such as predictive modeling tools includes the steps of defining a business process problem to be solved and identifying data requirements. For example, the business process problem may relate to predicting a customer's propensity to make purchases in the future or a store's requirements for inventory in the future. In the process, a computer implemented method is used for automatically transforming data for data analysis such as predictive modeling. Database metadata that describe database tables, their interrelationships, dimensional information, fact tables and measures are accessed. A mining transformation profile is created to encapsulate aggregations and transformation on data stored in relational databases in order to convert the data to forms suitable for predictive mining tools. The mining transformation profile specifies data transformations relative to the data base metadata. Executable data transformation codes is then generated from the database metadata and the mining transformation profile. Execution of this code results in aggregation and transformation of data residing in a database for input to a data analysis tool such as a predictive modeling tool. The data transformation code can be used by, for example, the predictive modeling tool to generate an output that provides a solution to a business process problem. | 04-30-2009 |
20090292743 | MODELING USER ACCESS TO COMPUTER RESOURCES - Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes. | 11-26-2009 |
20090293121 | DEVIATION DETECTION OF USAGE PATTERNS OF COMPUTER RESOURCES - Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes. | 11-26-2009 |
Patent application number | Description | Published |
20090182554 | TEXT ANALYSIS METHOD - A list of reference terms can be provided. Text and the list of reference terms can be broken down into tokens. At least one candidate can be generated in the text for mapping to at least one of the reference terms. Characters of the candidate can be compared to characters of the reference term according to one or more mapping rules. A confidence value of the mapping can be generated based on the comparison of characters. Candidates can be ranked according to their confidence value. | 07-16-2009 |
20120084251 | PROBABILISTIC DATA MINING MODEL COMPARISON - A first data mining model and a second data mining model are compared. A first data mining model M | 04-05-2012 |
20120158624 | PREDICTIVE MODELING - A predictive analysis generates a predictive model (Padj(Y|X)) based on two separate pieces of information,
| 06-21-2012 |
20130144833 | PROCESSING DATA IN A DATA WAREHOUSE - Data of a database environment, which includes hierarchy information and a matrix of values, is processed. The hierarchy information includes at least two sets of identification codes and defines at least two groups of identification codes. The matrix of values includes at least two columns of identification values. At least one simple filter object is generated based on a user input. Each simple filter object defines an ad hoc group of identification codes selected from a respective one of the sets of identification codes. A filtered operation object that specifies an operation and at least one of the simple filter objects is generated based on a user input. Each of the ad hoc groups differs from each of the groups defined by the hierarchy information. | 06-06-2013 |
20140180973 | Iterative Active Feature Extraction - Techniques for iterative feature extraction using domain knowledge are provided. In one aspect, a method for feature extraction is provided. The method includes the following steps. At least one query to predict at least one future value of a given value series based on a statistical model is received. At least two predictions of the future value are produced fulfilling at least the properties of 1) each being as probable as possible given the statistical model and 2) being mutually divert (in terms of numerical distance measure). A user is queried to select one of the predictions. The user may be queried for textual annotations for the predictions. The annotations may be used to identify additional covariates to create an extended set of covariates. The extended set of covariates may be used to improve the accuracy of the statistical model. | 06-26-2014 |
20140180992 | Iterative Active Feature Extraction - Techniques for iterative feature extraction using domain knowledge are provided. In one aspect, a method for feature extraction is provided. The method includes the following steps. At least one query to predict at least one future value of a given value series based on a statistical model is received. At least two predictions of the future value are produced fulfilling at least the properties of 1) each being as probable as possible given the statistical model and 2) being mutually divert (in terms of numerical distance measure). A user is queried to select one of the predictions. The user may be queried for textual annotations for the predictions. The annotations may be used to identify additional covariates to create an extended set of covariates. The extended set of covariates may be used to improve the accuracy of the statistical model. | 06-26-2014 |
20140258311 | INSIGHT DETERMINATION AND EXPLANATION IN MULTI-DIMENSIONAL DATA SETS - Techniques are disclosed for determining reasons underlying insights gleaned from multi-dimensional data. In one embodiment, a contingency table is accessed that represents multiple dimensions of the data, in order to identify one or more insights. One or more dimensions, other than the represented dimensions, are evaluated to identify one or more reasons underlying a first insight of the one or more insights, and the one or more reasons are output. | 09-11-2014 |
20140258312 | INSIGHT DETERMINATION AND EXPLANATION IN MULTI-DIMENSIONAL DATA SETS - Techniques are disclosed for determining reasons underlying insights gleaned from multi-dimensional data. In one embodiment, a contingency table is accessed that represents multiple dimensions of the data, in order to identify one or more insights. One or more dimensions, other than the represented dimensions, are evaluated to identify one or more reasons underlying a first insight of the one or more insights, and the one or more reasons are output. | 09-11-2014 |
20160034552 | PROCESSING DATA IN A DATA WAREHOUSE - Processing data of a data warehouse is provided and includes receiving, by a processing device, user input to create simple filter objects. Each filter object defines an ad hoc subset of a respective dimension of a dimension table of the data warehouse. User input is received to create a filtered operation object that specifies an operation and a plurality of the simple filter objects. The ad hoc subset differs from all subsets defined in the dimension table. | 02-04-2016 |