Patent application number | Description | Published |
20090012991 | SYSTEM AND METHOD FOR PROVIDING INFORMATION TAGGING IN A NETWORKED SYSTEM - A computer-implemented system and method for providing information tagging in a networked system is disclosed. The apparatus in an example embodiment includes a tag engine configured to process a database of categorized product listings; to receive a user-provided tag associated with at least one of the product listings; to retain the user-provided tag; and to serve the user-provided tag to a user viewing at least one of the product listings. | 01-08-2009 |
20090307100 | SYSTEM AND METHOD FOR COMMUNITY AIDED RESEARCH AND SHOPPING - A system and method for providing product research help to a consumer doing internet shopping. A consumer helper application for internet commerce has been designed to integrate the techniques that are currently used by many internet consumers into a single application program. For example, the consumer helper application allows a user to take notes, store web site links, store web site annotations, obtain collaborative input, and perform other tasks commonly used by web site consumers. The consumer helper application stores all of the information gathered in a single place. Information provided by other consumers may be shared using the consumer helper application. The consumer helper application will suggest specific items for a consumer to purchase based up on the information gathered by the consumer into the consumer helper application. | 12-10-2009 |
20100042511 | METHOD AND APPARATUS FOR SOCIAL NETWORK QUALIFICATION SYSTEMS - There is provided a method and system for qualification testing in a social network service. Qualification testing provides access control into a social network, wherein qualification is based on answers to questions related to a topic. In one example, members admitted to the network provide guidance, notes and research assistance to another member. The social network members access the social network from an external networked computing service, such as another social network, to facilitate easy connection to potential members. The social network may be implemented as an application overlay to the external service, or may access connections in the external network. | 02-18-2010 |
20110078047 | CATALOG GENERATION BASED ON DIVERGENT LISTINGS - A method and a system are described for catalog generation based on divergent listings. For example, a listing module may receive a divergent listing and collect data corresponding to an item in the listing. Each divergent listing of an item for sale is divergent with respect to other listings of the same item for sale. A calculation module may calculate an entropy value based on the collected data, the entropy value indicating a degree of difference between the item in the listing and a product in a catalog. A catalog module may associate the listing to the product in the catalog based on the entropy value. | 03-31-2011 |
20110179033 | MULTI-PASS DATA ORGANIZATION AND AUTOMATIC NAMING - A method and a system to organize a data set into groups of data subsets in multiple passes using different parameters and to automatically name the groups is disclosed. For example, a data set is retrieved in accordance with a search query submitted by a user. The data set is organized into clusters based on a statistic(s) of the data set. The data set is then organized into groups of data subsets based on an attribute(s) indicated by the data set. Each of the groups are automatically named based on a property shared by data units of the group. The name(s) of a group may be mined from the data units of the group, retrieved from a structure that maps to attribute values indicated by the data units of the group, etc. | 07-21-2011 |
20120041831 | CATALOG GENERATION BASED ON DIVERGENT LISTINGS - A method and a system are described for catalog generation based on divergent listings. For example, a listing module may receive a divergent listing and collect data corresponding to an item in the listing. Each divergent listing of an item for sale is divergent with respect to other listings of the same item for sale. A calculation module may calculate an entropy value based on the collected data, the entropy value indicating a degree of difference between the item in the listing and a product in a catalog. A catalog module may associate the listing to the product in the catalog based on the entropy value. | 02-16-2012 |
20120323739 | MAPPING DESCRIPTIONS - An item record in an item database contains an item description generated by a seller of an item. A server machine is configured to access the item database, analyze the item description, and extract descriptive information by inferring an attribute and a corresponding attribute value from the item description. The attribute and its attribute value constitute an attribute-value pair. The server machine uses the attribute-value pair to map the item record to a product record stored in a product database. The mapping of the item record to the product record is based on comparing the attribute-value pair of the item record to a reference attribute-value pair in the product record to identify the product record. The mapping is performed upon detection of a match between the attribute-value pairs. | 12-20-2012 |
20140032368 | SYSTEM AND METHOD FOR COMMUNITY AIDED RESEARCH AND SHOPPING - A system and method for providing product research help to a consumer doing internet shopping. A consumer helper application for internet commerce has been designed to integrate the techniques that are currently used by many internet consumers into a single application program. For example, the consumer helper application allows a user to take notes, store web site links, store web site annotations, obtain collaborative input, and perform other tasks commonly used by web site consumers. The consumer helper application stores all of the information gathered in a single place. Information provided by other consumers may be shared using the consumer helper application. The consumer helper application will suggest specific items for a consumer to purchase based up on the information gathered by the consumer into the consumer helper application. | 01-30-2014 |
20140172858 | HEADER-TOKEN DRIVEN AUTOMATIC TEXT SEGMENTATION - A method and a system to automatically segment text based on header tokens is described. A relevance value and an irrelevance value are determined for each token in a description, assuming no tokens are left out of computations. The irrelevance value is based on occurrences of a token in a sample set of descriptions. The relevance value is an estimated probability of relevance based on the header of the description being segmented. | 06-19-2014 |
20150261761 | HEADER-TOKEN DRIVEN AUTOMATIC TEXT SEGMENTATION - A method and a system to automatically segment text based on header tokens is described. A relevance value and an irrelevance value are determined for each token in a description, assuming no tokens are left out of computations. The irrelevance value is based on occurrences of a token in a sample set of descriptions. The relevance value is an estimated probability of relevance based on the header of the description being segmented. | 09-17-2015 |
Patent application number | Description | Published |
20130148512 | DISTRIBUTED CONTROL PLANE FOR LINK AGGREGATION - In accordance with embodiments of the disclosure, a method may include communicating, via an inter-card communication channel, local link status information regarding at least one local physical port resident on a first network interface, wherein the at least one local physical port is a member port of a link aggregation group, to one or more other network interfaces, other than the first network interface, having member ports of the link aggregation group. The method may also include receiving, via the inter-card communications channel, non-local link status information regarding at least one non-local physical port resident on the one or more other network interfaces, wherein the at least one non-local physical port is a member port of the link aggregation group. The method may further include designating a link status of the at least one local physical port based on the local link status information and the non-local link status information. | 06-13-2013 |
20130343747 | Method and System for Dynamic Selection of Transport Path with Lowest Latency - In accordance with a particular embodiment of the present disclosure, a network element may include a network-side interface configured to communicatively couple to a network and a controller communicatively coupled to the network-side interface. The controller may be configured to periodically receive one or more messages indicative of a delay for each of a plurality of paths for a network flow between the network element and a second network element, periodically compare the delays for the plurality of paths, and select a path for a network flow from the plurality of paths based on the delays. | 12-26-2013 |
Patent application number | Description | Published |
20120063310 | METHOD AND SYSTEM FOR VIRTUALIZED FORWARDING - According to one embodiment, a method may include receiving a frame via an ingress port of a network element. The method may also include assigning a virtual destination address to the frame of the traffic. The method may further include internally switching the frame within the network element based on the virtual destination address. The method may additionally include modifying the virtual destination address one or more times such that the virtual destination address is translated to an actual destination address identifying an actual egress port of the network element. Moreover, the method may include routing the frame to an egress port of the network element based on the actual destination address. | 03-15-2012 |
20120063311 | METHOD AND SYSTEM FOR PROVIDING CONTEXTUALIZED FLOW TAGS - According to one embodiment, a method may include assigning a virtual local area network (VLAN) ingress connection identifier (iXid) to a frame upon ingress. The method may also include classifying a traffic flow for which the frame is a part through ingress engines of the network element based on the iXid. The method may further include swapping the iXid for an egress connection identifier (eXid) in the frame. The method may additionally include policing or shaping the traffic flow based on at least one of the iXid and the eXid. Moreover, the method may include classifying the traffic flow through egress engines of the network element based on the eXid. | 03-15-2012 |
20120063312 | METHOD AND SYSTEM FOR DISTRIBUTED VIRTUAL TRAFFIC MANAGEMENT - According to one embodiment, methods and systems may be configured to support client-to-network, network-to-client, and network-to-network flows in a network element including multiple plug-in units. Such support may include policing and shaping flows as aggregates across plug-in units, combining outputs of two upstream traffic managers to network ports on two plug-in units, combining network flows that ingress two plug-in units, and shaping traffic to client ports. | 03-15-2012 |
20120327768 | System and Method for Dynamic Rate Limiting and Shaping of Traffic Based on Available Bandwidth - A method may include monitoring available aggregate bandwidth of a network element and determining if the available aggregate bandwidth is sufficient to communicate traffic at a rate equal to an aggregate sum of committed information rates for a plurality of classes of traffic. If the available aggregate bandwidth is sufficient to communicate traffic at the rate equal to the aggregate sum of committed information rates for a plurality of classes of traffic, traffic may be communicated for each of the plurality of classes in accordance with the respective committed information rate for each class. Otherwise, traffic may be communicated for each of the plurality of classes in an amount proportional to the respective committed information rate for a particular class and the available aggregate bandwidth. | 12-27-2012 |
20130003535 | SYSTEMS AND METHODS FOR DISTRIBUTED SERVICE PROTECTION ACROSS PLUG-IN UNITS - A method may include provisioning: a first flow from a client-side port to a network-side port of the plug-in unit; a second flow from the network-side port to the client-side port; a third flow from the network-side port to a mate link configured to interface with a fourth flow from the mate link to a second client-side port of the second plug-in unit; a fifth flow from the mate link to the network-side port configured to interface with a sixth flow from the second client-side port to the mate link; a seventh flow from the client-side port to the mate link configured to interface with an eighth flow from the mate link to a second network-side port of the second plug-in unit; and a ninth flow from the mate link to the client-side port configured to interface with a tenth flow from the second network-side port to the mate link. | 01-03-2013 |
20130003539 | SYSTEM AND METHOD FOR CONFIGURATION ADMISSION CONTROL OF SERVICE INSTANCES - A method for configuring admission control of service instances in a network element may include: (i) reading a pre-determined maximum service-idle utilization of a processor approximately equal to maximum utilization of the processor in the absence of services executing on the processor; (ii) reading, for each particular service instance of a desired configuration of service instances, a pre-determined maximum utilization of the processor associated with the particular service instance; (iii) calculating an aggregate maximum utilization for the desired configuration, based on the pre-determined maximum service-idle utilization and the pre-determined maximum utilizations for each of the particular service instances; (iv) determining whether the aggregate maximum utilization is greater than a threshold maximum utilization for the processor; (v) allowing or denying the desired configuration based on the determination. | 01-03-2013 |
20130022349 | SYSTEMS AND METHODS FOR PROTECTION OF ADAPTATION LAYER IN A COMMUNICATION NETWORK - A method may include: (i) provisioning a first network-side interface of a first plug-in unit and a second network-side interface of a second plug-in unit as members of a network-side protection group, the first plug-in unit and the second plug-in unit integral to an adaptation layer network element; (ii) provisioning a first client-side interface of the first plug-in unit and a second client-side interface of the second plug-in unit as members of a client-side protection group; (iii) designating one of the first and second network-side interface as an active network-side interface of the network-side protection group; and (iv) designating one of the first second client-side interface as an active client-side interface of the client-side protection group, such that traffic ingressing on the active network-side interface may egress on the active client-side interface and traffic ingressing on the active client-side interface may egress on the active network-side interface. | 01-24-2013 |
Patent application number | Description | Published |
20120075432 | IMAGE CAPTURE USING THREE-DIMENSIONAL RECONSTRUCTION - Embodiments may take the form of three-dimensional image sensing devices configured to capture an image including one or more objects. In one embodiments, the three-dimensional image sensing device includes a first image device configured to capture a first image and extract depth information for the one or more objects. Additionally, the image sensing device includes a second imaging device configured to capture a second image and determine an orientation of a surface of the one or more objects. | 03-29-2012 |
20130241308 | WIRELESS POWER UTILIZATION IN A LOCAL COMPUTING ENVIRONMENT - Various embodiments of a wirelessly powered local computing environment are described. The wireless powered local computing environment includes at least a near field magnetic resonance (NFMR) power supply arranged to wirelessly provide power to any of a number of suitably configured devices. In the described embodiments, the devices arranged to receive power wirelessly from the NFMR power supply must be located in a region known as the near field that extends no further than a distance D of a few times a characteristic size of the NFMR power supply transmission device. Typically, the distance D can be on the order of 1 meter or so. | 09-19-2013 |
20130244491 | AUDIO/VIDEO CONNECTOR FOR AN ELECTRONIC DEVICE - A receptacle connector for a electronic device includes two sets of contacts arranged in two opposing rows in a cavity. A corresponding plug connector can be inserted into the receptacle connector so as to contact both sets of contacts. The receptacle connectors includes contacts that are dedicated for DisplayPort signals and contacts that provide non-DisplayPort signals. The contacts dedicated for DisplayPort signals are only enabled if the electronic device receives a notification from a connected accessory that that the accessory supports DisplayPort capability. Otherwise these contacts are in an “open” or deactivated state. | 09-19-2013 |
20140054974 | WIRELESS POWER UTILIZATION IN A LOCAL COMPUTING ENVIRONMENT - Various embodiments of a wirelessly powered local computing environment are described. The wireless powered local computing environment includes at least a near field magnetic resonance (NFMR) power supply arranged to wirelessly provide power to any of a number of suitably configured devices. In the described embodiments, the devices arranged to receive power wirelessly from the NFMR power supply must be located in a region known as the near field that extends no further than a distance D of a few times a characteristic size of the NFMR power supply transmission device. Typically, the distance D can be on the order of 1 meter or so. | 02-27-2014 |
Patent application number | Description | Published |
20110175813 | PIEZO-BASED ACOUSTIC AND CAPACITIVE DETECTION - One particular implementation conforming to aspects of the present disclosure takes the form of an input device for a computing system. The input device includes a input surface on which one or more input characters are shown and one or more sensors to detect which input character is pressed or selected by the user. In one example, the input device may include one or more piezo-electric sensors that detect an acoustic pulse created when the user taps on the input surface to indicate a selected input. Each character of the input surface of the input device creates a different acoustic pulse signature when tapped such that, upon detection and receiving of the acoustic pulse at the piezo-electric sensors, the input device or computer system may compare the received pulse to a database of stored pulse signatures to determine which character on the surface of the input device was tapped by the user. | 07-21-2011 |
20120075473 | POLARIZED IMAGES FOR SECURITY - One embodiment may take the form of a method for providing security for access to a goal including storing a first image and receiving a second image comprising polarized data. The method also includes comparing the first image with the second image to determine if the first image and the second image are substantially the same. In the event the first and second images are not substantially the same, the method includes denying access to the goal. In the event the first and second images are substantially the same, the method includes determining, utilizing the polarized information, if the second image is of a three-dimensional object. Further, in the event the second image is not of a three-dimensional object, the method includes denying access to the goal and, in the event the second image is of a three-dimensional object, permitting access to the goal. | 03-29-2012 |
20140118309 | Piezo-Based Acoustic and Capacitive Detection - One particular implementation conforming to aspects of the present disclosure takes the form of an input device for a computing system. The input device includes a input surface on which one or more input characters are shown and one or more sensors to detect which input character is pressed or selected by the user. In one example, the input device may include one or more piezo-electric sensors that detect an acoustic pulse created when the user taps on the input surface to indicate a selected input. Each character of the input surface of the input device creates a different acoustic pulse signature when tapped such that, upon detection and receiving of the acoustic pulse at the piezo-electric sensors, the input device or computer system may compare the received pulse to a database of stored pulse signatures to determine which character on the surface of the input device was tapped by the user. | 05-01-2014 |
20150135108 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANIPULATING USER INTERFACES BASED ON FINGERPRINT SENSOR INPUTS - Devices, methods and graphical user interfaces for manipulating user interfaces based on fingerprint sensor inputs are provided. While a display of an electronic device with a fingerprint sensor displays a first user interface, the device may detect movement of a fingerprint on the fingerprint sensor. In accordance with a determination that the movement of the fingerprint is in a first direction, the device allows navigating through the first user interface, and in accordance with a determination that the movement of the fingerprint is in a second direction different from the first direction, the device allows displaying a second user interface different from the first user interface on the display. | 05-14-2015 |