Patent application number | Description | Published |
20100305986 | Using Service Exposure Criteria - Techniques for performing service exposure for reuse of one or more services are provided. The techniques include analyzing applicability of service criteria for a candidate service, identifying one or more services that are contextually-related to the candidate service, and using the service criteria applicable to the candidate service to expose the one or more services contextually-related to the candidate service. | 12-02-2010 |
20120016701 | INTELLIGENT TIMESHEET ASSISTANCE - A timesheet assistant mines development items in a repository of a computer to form identified development items. Development context information and effort indicators, associated with the identified development items, are extracted. Statistical analysis is applied to tasks of the identified development items using the effort indicators. Efforts expended on the tasks are predicted using historical data to create effort estimates. Developer reported efforts for the identified items are received, and a timesheet is generated using the development context information, the effort estimates and the developer reported effort. The timesheet is presented for review, verification, and approval. | 01-19-2012 |
20120072227 | AUTOMATICALLY GENERATING HIGH QUALITY SOA DESIGN FROM BUSINESS PROCESS MAPS BASED ON SPECIFIED QUALITY GOALS - Methods and systems for automatically generating a service oriented architecture (SOA) design. A set of business process maps for the domain under consideration is defined and a design quality goal (function) that should be met (optimized) is specified. The design goal/function involves SOA metrics like coupling, cohesion, granularity, etc., which the system under consideration is pre-programmed to compute on any SOA design. The system takes as input the set of business process maps and the design quality goal/functions. It first generates semantic business process maps by identifying key concepts that occur in the task and business item descriptions. Next, it efficiently searches the service design space by starting with a seed design and employing a sequence of moves to iteratively optimize it. It outputs a set of possible SOA designs that meet the specified quality goals or optimizes the specified function, from where a user may select the final design. | 03-22-2012 |
20120174057 | INTELLIGENT TIMESHEET ASSISTANCE - A timesheet assistant mines development items in a repository of a computer to form identified development items. Development context information and effort indicators, associated with the identified development items, are extracted. Statistical analysis is applied to tasks of the identified development items using the effort indicators. Efforts expended on the tasks are predicted using historical data to create effort estimates. Developer reported efforts for the identified items are received, and a timesheet is generated using the development context information, the effort estimates and the developer reported effort. The timesheet is presented for review, verification, and approval. | 07-05-2012 |
20120284073 | OPTIMIZED COLLABORATION BETWEEN DISTRIBUTED CENTERS OF GLOBAL SERVICE DELIVERY SYSTEMS - A computer implemented method, system, and/or computer program product facilitate optimal collaboration between cells from different service centers for delivering a service to a customer. A cost of collaboration between two cells in different service centers is defined. Each of the two cells is a group of resources capable of executing a same task, and the cost is a 3-Tuple that consists of a monetary cost, a makespan cost, and a skill misalignment cost associated with the collaboration. After establishing acceptable cost ranges for the 3-Tuple based on constraints defined by an enterprise policy, a processor creates multiple collaboration matrices based on different permutations of the 3-Tuple. Once an optimal collaboration function derived from the multiple collaboration matrices is identified, the task is assigned to two optimal cells identified in the optimal collaboration function. | 11-08-2012 |
20120284076 | OPTIMIZING SERVICE DELIVERY SYSTEMS - A computer implemented method, system and/or computer program product optimizes a service delivery system. A processor receives a first set of inputs that describes a current state of a service delivery system and a second set of inputs that describes a cost overhead for the service delivery system. The processor then optimizes the service delivery system in order to derive an optimized service delivery system. | 11-08-2012 |
20120284078 | TOOL FOR MANAGER ASSISTANCE - A computer implemented method, system, and/or computer program product generate an optimal training policy and an optimal promotion policy to accommodate an upcoming project. Required new job positions are identified for an upcoming project. A skillset matrix, which describes a current skill level of each worker in a work unit, and a promotion matrix, which describes historical evaluations of how well each worker achieved predefined goals of past projects, are generated. The skillset matrix is utilized to create an optimal training policy that identifies which workers are in need of additional training in order to qualify for one or more of the identified new job positions, and the promotion matrix is utilized create an optimal promotion policy that identifies which workers will be candidates for being promoted into one or more of the identified said new job positions. | 11-08-2012 |
20120316912 | OPTIMIZING A SHARED SERVICE DELIVERY SYSTEM - A computer implemented method, system, and/or computer program product optimize a shared service delivery system. A model of an existing shared service delivery system is created. Capacity of the existing shared service delivery system is defined according to required resources for existing projects, new projects, and proposed projects. Existing cells of practitioners in the existing shared service delivery system are identified, and any gaps or gluts of capacity in the existing cells of practitioners are identified according to a general predetermined resource requirement for the shared service delivery system. | 12-13-2012 |
20130054291 | DETERMINING RELATIVE CRITICALITY OF SERVICE TICKETS IN FACTORY-STYLE SHARED DELIVERY - Described herein are methods, systems, apparatuses and products for determining relative criticality of service tickets in factory-style shared delivery. An aspect provides for accessing ticket information, accessing service level agreement information, accessing future volume estimation information, estimating a number of missed service level objectives that are permissible without having a service level agreement breach; and determining a criticality of at least one received ticket based on said ticket information, said service level agreement information, and said future volume estimation information. Other embodiments are disclosed. | 02-28-2013 |
20130054292 | DETERMINING RELATIVE CRITICALITY OF SERVICE TICKETS IN FACTORY-STYLE SHARED DELIVERY - Described herein are methods, systems, apparatuses and products for determining relative criticality of service tickets in factory-style shared delivery. An aspect provides for accessing ticket information, accessing service level agreement information, accessing future volume estimation information, estimating a number of missed service level objectives that are permissible without having a service level agreement breach; and determining a criticality of at least one received ticket based on said ticket information, said service level agreement information, and said future volume estimation information. Other embodiments are disclosed. | 02-28-2013 |
20130191186 | SYSTEM, METHOD AND COMPUTER PROGRAM FOR CAPTURING RELATIONSHIPS BETWEEN BUSINESS OUTCOMES, PERSONS AND TECHNICAL ASSETS - A method includes building a library of service value maps (SVMs) each including a multi-layered hierarchical arrangement of elements with causal links between at least some elements of a particular layer and at least some elements of next higher layer. Each SVM includes at a topmost layer at least one desired outcome for an entity associated with the SVM, at a next lower layer capabilities that support the at least one desired outcome and, for each identified capability, at a next lower layer organization solution assets that support the capabilities. The identified solution assets and components are mapped to infrastructure elements in a lower-most layer. The method further includes assigning weights to the links between elements of a particular layer and elements of a next higher layer, where each weight has a value to indicate a contribution of an associated element to a linked-to element in the next higher layer. | 07-25-2013 |
20130191187 | SYSTEM, METHOD AND COMPUTER PROGRAM FOR IDENTIFYING VALUE AGGREGATION POINTS FROM A SET OF SERVICE VALUE MAPS - A method provides a set of service value maps (SVMs) each having a plurality of nodes and linkages between nodes; forming a network model based on the set of SVMs and analyzing the network model to compute aggregate values for the nodes to enable an identification of a node that matches at least one criterion. Analyzing can include using a degree centrality process where a value for each node is defined as a number of outgoing edges from the node, or an eigenvalue centrality process where a value of a node is proportional to a value of those nodes that the node is connected to. Each SVM can be represented as a directed acyclic graph (DAG) where each edge between nodes is an edge in the DAG. The at least one criterion can include a highest valued node identifying a value aggregation point (VAP) of the set of SVMs. | 07-25-2013 |
20140207528 | SYSTEM, METHOD AND COMPUTER PROGRAM FOR IDENTIFYING VALUE AGGREGATION POINTS FROM A SET OF SERVICE VALUE MAPS - A data processing system provides a set of service value maps (SVMs) each having a plurality of nodes and linkages between nodes, forms a network model based on the SVMs and analyses the network model to compute aggregate values for the nodes to enable an identification of a node that matches at least one criterion. Analyzing can include using a degree centrality process where a value for each node is defined as a number of outgoing edges from the node, or an eigenvalue centrality process where a value of a node is proportional to a value of those nodes that the node is connected to. Each SVM can be represented as a directed acyclic graph (DAG) where each edge between nodes is an edge in the DAG. The at least one criterion can include a highest valued node identifying a value aggregation point (VAP) of the set of SVMs. | 07-24-2014 |
20140297831 | CONTINUOUS IMPROVEMENT OF GLOBAL SERVICE DELIVERY AUGMENTED WITH SOCIAL NETWORK ANALYSIS - Improving global service delivery by augmenting with social network analysis, may comprise identifying social network metrics and key performance indicator metrics; collecting data associated with the social network metrics and the key performance indicator metrics, from on-going work performed in the global service delivery and a social network of practitioners; transforming the data into measurable metric data; determining whether a deviation exists in the measurable metric data; and generating an actionable recommendation in response to determining that the deviation exists. | 10-02-2014 |
20140297837 | CONTINUOUS IMPROVEMENT OF GLOBAL SERVICE DELIVERY AUGMENTED WITH SOCIAL NETWORK ANALYSIS - Improving global service delivery by augmenting with social network analysis, may comprise identifying social network metrics and key performance indicator metrics; collecting data associated with the social network metrics and the key performance indicator metrics, from on-going work performed in the global service delivery and a social network of practitioners; transforming the data into measurable metric data; determining whether a deviation exists in the measurable metric data; and generating an actionable recommendation in response to determining that the deviation exists. | 10-02-2014 |
20150134640 | Device Data Personalization - A method and system for synchronizing contents is provided. The method includes retrieving a user profile associated with a user. A user specified order for presenting data from a services content repository is determined. A context of the data is determined and the user profile is compared to additional user profiles. In response, commonly followed orders of presenting the data to a plurality of users are determined. Specified data and a specified order for presenting the specified data to the user via a personal device are determined. | 05-14-2015 |
20150149225 | Automatically Determining Targeted Investigations on Service Delivery Incidents - Methods, systems, and articles of manufacture for automatically determining targeted investigations on service delivery incidents are provided herein. A method includes creating an incident profile for a given set of incidents, wherein the incident profile comprises one or more details associated with the given set of incidents; matching the created incident profile with one or more existing class profiles associated with one or more incident investigation classes based on a comparison of the one or more details associated with the given set of incidents to the one or more existing class profiles; identifying one incident investigation within the one or more existing class profiles matching the created incident profile that most closely matches the created incident profile; and generating a recommendation to create an investigation for the given set of incidents based on the one incident investigation within the one or more existing class profiles. | 05-28-2015 |
Patent application number | Description | Published |
20110090924 | SYSTEM TO CONNECT A SERIAL SCSI ARRAY CONTROLLER TO A STORAGE AREA NETWORK - An apparatus comprising a first circuit, a second circuit and an expansion circuit. The first circuit may be configured to present and receive one or more first data packets in a first format compatible with a first protocol. The second circuit may be configured to present and receive one or more second data packets in a second format compatible with a second protocol. The expansion circuit may be configured to convert the first data packets from the first format to the second format. | 04-21-2011 |
20110314141 | METHOD AND APPARATUS FOR ENABLING COMMUNICATION BETWEEN iSCSI DEVICES AND SAS DEVICES - A method and apparatus for enabling communication between iSCSI/SAS host devices and iSCSI/SAS target devices via an iSCSI/SAS router is disclosed. In one embodiment, an iSCSI/SAS router includes iSCSI interfaces, SAS interfaces, and a mapping and routing logic. The mapping and routing logic is coupled to the iSCSI interfaces and the SAS interfaces. The mapping and routing logic virtualizes one or more SAS host and target devices to communicate with discovered one or more iSCSI host and target devices. Further, the mapping and routing logic virtualizes the one or more iSCSI host and target devices to communicate with discovered one or more SAS host and target devices. | 12-22-2011 |
20120239857 | SYSTEM AND METHOD TO EFFICIENTLY SCHEDULE AND/OR COMMIT WRITE DATA TO FLASH BASED SSDs ATTACHED TO AN ARRAY CONTROLLER - An apparatus comprising a controller and an array. The controller may be configured to generate control signals in response to one or more input requests. The array may comprise a plurality of solid state devices. The solid state devices may be configured to (i) read and/or write data in response to the control signals received from the controller and (ii) distribute writes across the plurality of solid state devices such that each of said solid state devices has a similar number of writes. | 09-20-2012 |
20120254462 | REMOTE DATA MIRRORING USING A VIRTUALIZED IO PATH IN A SAS SWITCH - An apparatus comprising a first switch and a second switch. The first switch may include a first plurality of ports, where a first of the ports is connected to a first host device, a second of the ports is connected to a first target device, and a third of the ports is connected to a network. The first target device may include a first storage LUN. The second switch may include a second plurality of ports, where a first of the ports is connected to a second host device, a second of the ports is connected to a second target device, and a third of the ports is connected to the network. The second target device may include a second storage LUN. The first storage LUN and the second storage LUN form a data mirror. | 10-04-2012 |
20120263101 | METHOD TO DE-MULTIPLEX DATA AND/OR SIGNALS FROM A SINGLE DATA CARD INTO MULTIPLE INTERFACES AND TO ALLOW PARALLEL CONNECTIVITY - An apparatus comprising a device, a multiplexer circuit and a plurality of interface circuits. The device may be configured to present/receive a multiplexed data signal from a wireless network. The multiplexer circuit may be configured to present/receive a plurality of data signals in response to the multiplexed data signal. The plurality of interface circuits may each be configured to present/receive a respective one of the data signals. At least one of the interface circuits is a first interface type. At least one of the interface circuits is a second interface type. The apparatus may allow the plurality of interface circuits to share access to the wireless network. | 10-18-2012 |
20130036212 | BACKUP, RESTORE, AND/OR REPLICATION OF CONFIGURATION SETTINGS IN A STORAGE AREA NETWORK ENVIRONMENT USING A MANAGEMENT INTERFACE - A method for backing up components in a mixed vendor network using a common administration computer, comprising the steps of (A) sending a plurality of first requests to a plurality of components of a first network, (B) storing responses to the first requests in the common administration computer and (C) sending a plurality of second requests to a plurality of components in a second network in response to the stored plurality of first requests. The first network comprises components from a first manufacturer. The second network comprises components from a second manufacturer. The second network replicates the first network in response to the plurality of second requests. | 02-07-2013 |
20130318297 | NETWORK STORAGE SYSTEMS HAVING CLUSTERED RAIDS FOR IMPROVED REDUNDANCY AND LOAD BALANCING - A clustered network-based storage system includes a host server, multiple high availability system controller pairs, and multiple storage devices across multiple arrays. Two independent storage array subsystems each include a quorum drive copy and are each controlled by a HA pair, with remote volume mirroring links coupling the separate HA pairs. The host server includes a virtualization agent that identifies and prioritizes communication paths, and also determines capacity across all system nodes. A system storage management agent determines an overall storage profile across the system. The virtualization agent, storage management agent, quorum drive copies and remote volume minoring link all operate to provide increased redundancy, load sharing, or both between the separate first and second arrays of storage devices. | 11-28-2013 |
20150058559 | NETWORK STORAGE SYSTEMS HAVING CLUSTERED RAIDS FOR IMPROVED REDUNDANCY AND LOAD BALANCING - A clustered network-based storage system includes a host server, multiple high availability system controller pairs, and multiple storage devices across multiple arrays. Two independent storage array subsystems each include a quorum drive copy and are each controlled by a HA pair, with remote volume mirroring links coupling the separate HA pairs. The host server includes a virtualization agent that identifies and prioritizes communication paths, and also determines capacity across all system nodes. A system storage management agent determines an overall storage profile across the system. The virtualization agent, storage management agent, quorum drive copies and remote volume mirroring link all operate to provide increased redundancy, load sharing, or both between the separate first and second arrays of storage devices. | 02-26-2015 |
Patent application number | Description | Published |
20080300851 | System and method for application migration in a grid computing environment - A system and method for assessing performance of a software application migrated to a grid infrastructure is provided. The system comprises a grid code analyzer for generating a directed acyclic graph (DAG) corresponding to the software application by performing static and dynamic analysis; a grid task generator for reducing the DAG generated by the grid code analyzer; and a grid simulator for simulating performance of the software application on one or more predetermined grid infrastructures. The grid simulator accepts the reduced DAG as input and produces performance data as output. | 12-04-2008 |
20090282418 | Method and system for integrated scheduling and replication in a grid computing system - A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system | 11-12-2009 |
20120272206 | ANALYSIS SYSTEM FOR TEST ARTIFACT GENERATION - A requirements testing system facilitates the review and analysis of requirement statements for software applications. The requirements testing system generates test artifacts from the requirement statements. The test artifacts characterize the requirements statements to provide valuable analysis information that aids understanding whether the requirement statements are testable, what the intentions of the requirement statements are, and other useful analysis information. Because the system generates the analysis information from the requirement statements, the system provides benefits in terms of early feedback along the software application development timeline. | 10-25-2012 |
20130054536 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 02-28-2013 |
20130185056 | SYSTEM FOR GENERATING TEST SCENARIOS AND TEST CONDITIONS AND EXPECTED RESULTS - A requirements testing system facilitates the review and analysis of requirement statements for software applications. The requirements testing system automatically generates test artifacts from the requirement statements, including test scenarios, test conditions, test hints, and expected results. These test artifacts characterize the requirements statements to provide valuable analysis information that aids understanding what the intentions of the requirement statements are. The automation of the generation of these test artifacts produces numerous benefits, including fewer errors, objectivity, and no dependency on the skills and experience of a creator. | 07-18-2013 |
20130268916 | COMPONENT DISCOVERY FROM SOURCE CODE - A method for component discovery from source code may include receiving source code, and determining business classes by excluding packages and classes in the source code identified as belonging to a presentation layer, as belonging to a data access layer, as models and/or as utilities. The method may further include extracting multi-dimensional features from the business classes, estimating similarity for business class pairs based on the extracted multi-dimensional features, clustering the business classes based on the similarity and mapping functional concepts to the clusters. The clusters generated by the clustering may represent components of the source code. The method may also include determining interfaces for the components based on the clustering. | 10-10-2013 |
20140101111 | BACKUP OF DATA ACROSS NETWORK OF DEVICES - A distribution plan that indicates how to encode and distribute backup data across multiple data centres may be generated. The distribution plan may be generated such that one or more characteristics of the distribution plan, such as costs, are optimized while constraints on the plan, such as protection level, recovery point objective (RPO), and recovery time objective (RTO) are satisfied. The protection level may indicate the number of the data centres that are to remain available such that the backup data is recoverable from encoded fragments of the backup data stored in the data centres that remain available. | 04-10-2014 |
20140149485 | METHOD AND SYSTEM FOR MANAGING USER STATE FOR APPLICATIONS DEPLOYED ON PLATFORM AS A SERVICE (PAAS) CLOUDS - The REsilient LOosely Coupled (ReLoC) system and method implement a session-state management architecture for cloud computing that uses loosely-coupled services and platform agnostic scalable messaging technology to propagate and save session states. Maintaining the state of applications and user sessions is difficult in large scale web-based software systems, particularly in the context of cloud computing (e.g., platform as a service (PaaS) vendors, do not explicitly support state management infrastructure, such as clustering). In a PaaS environment, a user has little or no access and control over the server platform and session management layer. The platform tiers are generally loosely coupled and service-oriented, which make traditional session-state management techniques non-usable. The ReLoC system and method provides a high level of tolerance to failures of the platform tiers without corresponding disruptions in user sessions. In the context of PaaS Clouds, the ReLoC system provides greater scalability compared to traditional clustering environments. | 05-29-2014 |
20140163966 | IDENTIFYING GLOSSARY TERMS FROM NATURAL LANGUAGE TEXT DOCUMENTS - A device may obtain text to be analyzed to identify glossary terms. The device may analyze a linguistic unit to generate multiple linguistic units related to the linguistic unit. The device may analyze the multiple linguistic units to generate potential glossary terms. The device may perform a glossary term analysis on the potential glossary terms to generate glossary terms that include a subset of the potential glossary terms. The device may identify included terms that are included in the glossary terms. The device may identify excluded terms that are excluded from the glossary terms. The device may determine a semantic relatedness score between at least one excluded term and at least one included term. The device may selectively add the excluded linguistic term to the glossary terms to form a final set of glossary terms based on the semantic relatedness score, and may output the final set of glossary terms. | 06-12-2014 |
20140201541 | SECURE ONLINE DISTRIBUTED DATA STORAGE SERVICES - The data vaporizer provides secure online distributed data storage services that securely store and retrieve data in a public distributed storage substrate such as public cloud. The data vaporizer vaporizes (e.g., fragmented into tiny chunks of configurable sizes) data and distributes the fragments to multiple storage nodes so that the data is not vulnerable to local disk failures, secures data so that even if some of the storage nodes are compromised, the data is undecipherable to the attacker, stores data across multiple cloud storage providers and/or parties using keys (e.g., tokens) provided by multiple parties (including the owners of the data) and maintains data confidentiality and integrity even where one or more data storage provider is compromised. The data vaporizer is configurable for different domain requirements including data privacy and anonymization requirements, encryption mechanisms, regulatory compliance of storage locations, and backup and recovery constraints. | 07-17-2014 |
20140337820 | SOURCE CODE FLOW ANALYSIS USING INFORMATION RETRIEVAL - According to an example, source code flow analysis may include receiving source code for an application, and identifying virtual flow documents for the application from the source code. The virtual flow documents may represent ordered sequences of method calls for the application. The source code flow analysis may further include extracting features of the virtual flow documents, determining similarity between the virtual flow documents by estimating similarities for the extracted features to determine a flow-to-flow similarity, and clustering the virtual flow documents based on the flow-to-flow similarity. The flow-to-flow similarity may be further used, for example, to generate highest priority virtual flow documents and methods for the source code. The source code flow analysis may also include determination of flow-to-maintenance activity description (MAD) similarity, for example, to identify relevant virtual flow documents from the virtual flow documents based on the flow-to-MAD similarity to generate ordered relevant virtual flow documents. | 11-13-2014 |
20140359129 | Migration Assessment for Cloud Computing Platforms - Various embodiments provide an assessment tool that enables an automated functional assessment of applications for migration to target cloud computing platforms, such as a Platform as a Service (PaaS). The technical capabilities of various types of applications in a traditional non-platform deployment are studied and support for these technical capabilities is evaluated relative to the target platform. | 12-04-2014 |
20150020048 | COMPONENT DISCOVERY FROM SOURCE CODE - A method for component discovery from source code may include receiving source code, and determining business classes by excluding packages and classes in the source code identified as belonging to a presentation layer, as belonging to a data access layer, as models and/or as utilities. The method may further include extracting multi-dimensional features from the business classes, estimating similarity for business class pairs based on the extracted multi-dimensional features, clustering the business classes based on the similarity and mapping functional concepts to the clusters. The clusters generated by the clustering may represent components of the source code. The method may also include determining interfaces for the components based on the clustering. | 01-15-2015 |
20150058349 | IDENTIFYING AND CLASSIFYING NON-FUNCTIONAL REQUIREMENTS IN TEXT - A device may obtain text to be categorized, and may determine rules for categorizing portions of the text. A rule may specify text patterns to be used to categorize the portions of the text into a category, and may specify a relationship, between at least two text patterns, to be used to categorize the portions of the text into the category. The device may determine that the text patterns and the relationship between the at least two text patterns exist in a text portion. The device may categorize the text portion into the category based on determining that the text patterns and the relationship between the at least two text patterns exist in the text portion. The device may provide an indication of an association between the text portion and the category based on categorizing the text portion into the category. | 02-26-2015 |
20150066939 | GROUPING SEMANTICALLY RELATED NATURAL LANGUAGE SPECIFICATIONS OF SYSTEM REQUIREMENTS INTO CLUSTERS - A device may analyze text to identify a set of text portions of interest, and may analyze the text to identify a set of terms included in the set of text portions. The device may perform a similarity analysis to determine a similarity score. The similarity score may be determined between each term, included in the set of terms, and each text portion, included in the set of text portions, or the similarity score may be determined between each term and each other term included in the set of terms. The device may determine a set of dominant terms based on performing the similarity analysis. The set of dominant terms may include at least one term with a higher average degree of similarity than at least one other term. The device may provide information that identifies the set of dominant terms. | 03-05-2015 |
20150088910 | AUTOMATIC PRIORITIZATION OF NATURAL LANGUAGE TEXT INFORMATION - A device may receive text to be processed to prioritize text sections included in the text. The device may perform one or more prioritization techniques to prioritize the text sections. The one or more prioritization techniques may include at least one of: a semantic centrality analysis that indicates a degree to which a text section is semantically related to at least one other text section, an information content analysis that indicates a degree to which the text section includes information not included in the at least one other text section, or a combined analysis based on the semantic centrality analysis and the information content analysis. The device may prioritize the text sections, to form a set of prioritized text sections, based on performing the one or more prioritization techniques. The device may provide information that identifies the set of prioritized text sections. | 03-26-2015 |
20150261743 | GENERATING A SEMANTIC NETWORK BASED ON SEMANTIC CONNECTIONS BETWEEN SUBJECT-VERB-OBJECT UNITS - A device may obtain text to be analyzed to determine semantic connections between sections of the text. The device may identify subject-verb-object (SVO) units included in the text, and may determine SVO unit information that describes the SVO units. The device may analyze the SVO unit information to determine semantic connection information that identifies one or more semantic connections between two or more of the SVO units. The one or more semantic connections may identify relationships between verbs associated with the two or more of the SVO units. The device may generate a semantic network based on the SVO unit information and the semantic connection information, and may provide information regarding the semantic network. | 09-17-2015 |