Patent application number | Description | Published |
20090241128 | Controlling Navigation of Application Logic Using Annotated Application Code - A computer implemented method, apparatus, and computer usable program product for processing application code. In one embodiment, a call is received to invoke a set of methods of annotated application code. The annotated application code includes a set of annotations specifying a selection of the set of methods. A selected method from the set of methods is invoked in response to determining that the call is valid according to the set of annotations. Thereafter, a subsequent set of valid methods for execution is identified based upon an annotation associated with the selected method. | 09-24-2009 |
20110321131 | SECURITY MODEL FOR WORKFLOWS AGGREGATING THIRD PARTY SECURE SERVICES - A method, system and computer program product for security model for workflows aggregating third party secure services. In one embodiment, a workflow model described in a workflow language is provided and configured to declare security requirements of a composite application integrating protected data from two or more external network resources. The method also incorporates providing an authentication service executing on at least one secure server computer. The authentication service is configured to conduct user authentication and authorization to access the protected data at the external network resources on behalf of the composite application executing on at least one host server computer according to the workflow language. | 12-29-2011 |
20120278558 | Structure-Aware Caching - Techniques for structure-aware caching are provided. The techniques include decomposing a response from an origin server into one or more independently addressable objects, using a domain specific language to navigate the response to identify the one or more addressable objects and create one or more access paths to the one or more objects, and selecting a route to an object by navigating an internal structure of a cached object to discover one or more additional independently addressable objects. | 11-01-2012 |
20140297240 | EXTRACTING CLINICAL CARE PATHWAYS CORRELATED WITH OUTCOMES - Systems and methods for data analysis include constructing patient traces as a set of medical events for each patient of a patient population, the patient population being segmented based on patient outcomes. Medical events in one or more of the patient traces are reduced to provide processed patient traces. The processed patient traces are clustered to identify a cluster of patient traces. A process model is mined, using a processor, representing an aggregation of treatment pathways in the patient traces from the cluster. Patterns from patient traces are identified that are discriminative of patient outcomes. At least one of the patterns is represented with respect to the process model to identify treatment pathways correlated with the patient outcomes. | 10-02-2014 |
20140297324 | EXTRACTING CLINICAL CARE PATHWAYS CORRELATED WITH OUTCOMES - Systems and methods for data analysis include constructing patient traces as a set of medical events for each patient of a patient population, the patient population being segmented based on patient outcomes. Medical events in one or more of the patient traces are reduced to provide processed patient traces. The processed patient traces are clustered to identify a cluster of patient traces. A process model is mined, using a processor, representing an aggregation of treatment pathways in the patient traces from the cluster. Patterns from patient traces are identified that are discriminative of patient outcomes. At least one of the patterns is represented with respect to the process model to identify treatment pathways correlated with the patient outcomes. | 10-02-2014 |
20140297640 | CLUSTERING BASED PROCESS DEVIATION DETECTION - Systems and methods for data analysis include correlating event data to provide process instances. The process instances are clustered, using a processor, by representing the process instances as strings and determining distances between strings to form a plurality of clusters. One or more metrics are computed on the plurality of clusters to monitor deviation of the event data. | 10-02-2014 |
20140298341 | CLUSTERING BASED PROCESS DEVIATION DETECTION - Systems and methods for data analysis include correlating event data to provide process instances. The process instances are clustered, using a processor, by representing the process instances as strings and determining distances between strings to form a plurality of clusters. One or more metrics are computed on the plurality of clusters to monitor deviation of the event data. | 10-02-2014 |
20150032499 | BUSINESS PROCESS EVENT MAPPING - Methods and systems for mapping an event type to an activity in a business process model are disclosed. In accordance with one such method, the event type and the activity are tokenized by determining event tokens for event type labels in the event type and determining activity tokens for activity labels in the activity. In addition, a score matrix is generated for pairs of the event tokens and the activity tokens indicating a degree of similarity between the event token and the activity token in each of the pairs. The method also includes determining whether the event type and the activity are correlated by determining scores of the pairs of event tokens and activity tokens that are ranked highest in said score matrix. Further, a mapping report indicating whether the event type and the activity are correlated in the business process model is output. | 01-29-2015 |