doc_id
stringlengths 7
11
| appl_id
stringlengths 8
8
| flag_patent
int64 0
1
| claim_one
stringlengths 3
38.8k
|
---|---|---|---|
9154748 | 13775363 | 1 | 1. A system to proctor an examination, comprising: first camera worn by the examination taking subject and directed to capture images in subject's field of vision; computer system programmed to store captured images from said first camera; said computer programmed to issue prompting events instructing the subject to look in a direction specified by the computer at event intervals not disclosed to subject in advance, said computer system being further programmed to index for analysis the captured images in association with indicia corresponding to the prompting events. |
7543743 | 11299870 | 1 | 1. A method, comprising: using one or more computers to perform; specifying a target inventory level of a given one of a plurality of inventory items, wherein said target inventory level specifies a quantity of said given inventory item; determining a breakeven holding time of a unit of said given inventory item in excess of said target inventory level, wherein a cost of holding a given excess unit until said breakeven holding time equals, within an equality threshold, a difference between a sale value for sale of said given inventory item through a sales channel and a disposition value for disposition of said given inventory item through a disposition channel; determining a time rate of sales demand of units of said given inventory item per unit of time; determining a healthy inventory level of said given inventory item, wherein said healthy inventory level exceeds said target inventory level by a function of said time rate of sales demand and said breakeven holding time; and if a current inventory level of said given inventory item exceeds said healthy inventory level, disposing of units of said given inventory item in excess of said healthy inventory level via said disposition channel. |
7693784 | 11514206 | 1 | 1. A method of providing a client with cashflow monitoring during a transfer of services such as pre-authorized debits and credits, from a first account to a second account, the method comprising the steps of: (i) determining an effective date for the transfer of each service, said effective dates creating a transfer window; (ii) determining cashflows for said first account and said second account during said transfer window; (iii) electronically adjusting effective dates for transfer of each service to avoid cashflow interruptions in said first and said second accounts; and (iv) providing a cashflow analysis to the client that lists all the effective dates for each service transfer and predicted cashflows for said first and said second account during said transfer window. |
20180270534 | 15458868 | 0 | 1. A computerized method of delivering content in a content distribution network, the computerized method comprising: receiving data representative of a request for storing digitally rendered programming content, the request (i) associated with a computerized client device or user associated with a subscriber account and (ii) being received through the content distribution network; storing the requested digitally rendered programming content; storing data indicating at least a time the storing of the digitally rendered programming content is effected; identifying one or more secondary digitally rendered content elements associated with the requested digitally rendered programming content at the time the storing is effected, the identifying of the one or more secondary digitally rendered content elements associated with the requested digitally rendered programming content at a time the storing is effected comprising: (i) contacting a secondary content decision process using at least data indicative of the computerized client device or the user; and (ii) receiving from the secondary content decision process first data indicative of the one or more secondary digitally rendered content elements to be inserted into the stored digitally rendered programming content; receiving data representative of a request for at least a portion of the stored digitally rendered programming content from at least the computerized client device; determining that the request meets one or more prescribed criteria, the one or more prescribed criteria comprising a time associated with receipt of the request being within a prescribed temporal window of the time of the storing of the digitally rendered programming content; and based on the determination that the request meets the one or more prescribed criteria, causing delivery of the identified one or more secondary digitally rendered content elements to at least the computerized client device, the causing delivery of the identified one or more secondary digitally rendered content elements to at least the computerized client device comprising causing delivery according to respective cues within the stored digitally rendered programming content while the stored digitally rendered programming content is being delivered to at least the computerized client device. |
20040112954 | 10616434 | 0 | 1. A system for automatically establishing a merchant account for transaction card usage comprising: a central hub and communication means for providing communication between an agent and a transaction card issuer/processor for submitting a merchant application for receiving transaction card usage approval; and means for providing a report to the agent from the transaction card issuer/processor. |
8196053 | 12320282 | 1 | 1. A method for generating information about a document, the method comprising: retrieving a citation of the document from a first database; retrieving the information about the document from a second database; converting, by a processor, the information into metadata; generating an icon from the metadata, wherein the icon includes a plurality of time periods and graphs a number of times the document is treated a particular way over the time periods; and sending the icon for display in response to a query. |
8621423 | 11720904 | 1 | 1. A computer-based method of building a customised software application for a specific type of Wireless Computing Device, the method comprising the computer-implemented steps of: (a) automatically determining attributes of that type of Wireless Computing Device by downloading a test application to the Wireless Computing Device that electronically investigates the capabilities and features of the Wireless Computing Device and generates a list of these attributes; (b) automatically selecting various individual Software Components from a library including many other Software Components, the selected Software Components being compatible with that type of Wireless Computing Device based on values of the attributes determined in (a), in which no individual Software Component constitutes the application, but instead many such Software Components must be selected in combination to form the complete application; (c) automatically combining the various, previously selected and compatible Software Components together to generate a new build of the application, compatible for that type of Wireless Computing Device. |
20110077988 | 12758349 | 0 | 1. A computer-implemented method comprising: (A) providing a survey to a plurality of people, the survey comprising a plurality of questions; (B) receiving, from the plurality of people, a plurality of sets of answers to the plurality of questions; (C) identifying a plurality of loyalty indices of the plurality of people based on the plurality of sets of answers; (D) for each of the plurality of people U: (D)(1) identifying text input T associated with person U; (D)(2) identifying a count E of words in text input T which are in a set of words representing strong emotions; (D)(3) identifying a count P of words in text input T which are in a set of words representing positive emotions; (D)(4) identifying a count N of words in text input T which are in a set of words representing negative emotions; and (E) selecting values of coefficients A, B, and C that maximize a value of R 2 between the plurality of loyalty indices and values of a variable Emo for the plurality of people, wherein Emo=A*E+B*P+C*N. |
20010034637 | 09773471 | 0 | 1. A computer implemented method of predicting inventory for web spaces in a network of spaces, comprising: generating historical inventory data for a first web space based on records of daily traffic for the first web space and descendent spaces of the first web space; and predicting future inventory for the first web space based on the historical inventory data. |
8583589 | 12573899 | 1 | 1. A computer-implemented method, comprising: iteratively inputting batches of unprocessed equivalence pairs from a semantic model to an operating memory; building, in the operating memory, one or more cliques for the input batches until no further batches remain, where a clique designates a canonical representative resource for a group of equivalent resources as determined from the equivalence pairs; appending the one or more cliques built for the batches to a clique map in a remote access memory; iteratively transferring merge candidate cliques that still have equivalent resources for the input batches that can be merged from the clique map to the operating memory until determining no further merges can be made to the one or more cliques in the clique map; merging the merge candidate cliques in the operating memory; updating the clique map with the merged cliques; and returning the clique map for use by the semantic model. |
8738719 | 13781245 | 1 | 1. A method, comprising: storing in a database on a network a plurality of profiles each corresponding to a respective member of a social networking website, wherein each profile specifies at least contact information for its respective social networking website member and an image selected by its respective social networking website member; after said storing, receiving, at a network device, an electronic message originating from a user terminal remote from the network device; processing the received electronic message to enable at least a portion of the electronic message to be displayed on a user terminal associated with a destination of the electronic message; comparing sender information of the received electronic message to the database to identify a corresponding one of the profiles; and responsive to identifying the corresponding one of the profiles, causing the image of the corresponding one of the profiles to be displayed by the user terminal associated with the destination concurrently with the displayed electronic message portion. |
20160196628 | 15073470 | 0 | 1. A system for detecting security threats, the system comprising: at least one canine detection unit comprising one or more canines and one or more handlers that inspect items at screening locations to detect potential security concerns; a plurality of screening devices, wherein the screening devices include imaging systems comprising sensors for inspecting the items at the screening locations and wherein inputs received through the sensors are transformed into scanning data for display on workstations located at the screening locations; and a server device that includes a processor and a non-transitory storage device that stores instructions which cause the processor to: receive a first set of selections for creating expert groups, wherein each of the expert groups defines a set of experts equipped to manage potential security threats; receive a second set of selections for creating dialing plans that are used to route requests received from the workstations at the screening locations to the expert groups, wherein each dialing plan specifies a sequential ordering of expert groups for handling requests originating from the screening locations; store data that associates at least one of the dialing plans with at least one of the screening locations; in response to receiving a request submitted by an operator located at one of the screening locations, retrieve a dialing plan associated with that screening location; select an expert group identified in the retrieved dialing plan to receive the request based, at least in part, on the sequential ordering of expert groups specified in the retrieved dialing plan; establish a connection between the operator and an expert in the selected expert group in response to the request being accepted by the expert; transmit the transformed screening data to the expert for assistance in resolving the request; receive an assistance request from the expert in the selected expert group for requesting assistance from a second remote expert in resolving the request submitted by the operator; establish a second connection between the expert and a second remote expert in response to the second remote expert accepting the assistance request; and transmit the transformed scanning data to the second remote expert to permit the second remote expert to provide assistance with resolving the request; wherein communications between the expert and the second remote expert via the second connection are private and are not visible to the operator on the operator's workstation. |
20120188405 | 13041361 | 0 | 1. An image-capturing apparatus comprising: an image-capturing unit configured to capture digital images; an image-storage unit configured to store captured digital images; an image-selection unit configured to select a subset of digital images of a set of stored images, wherein the selected subset includes a group of ranked digital images in accordance with weighted selection criteria; and an image-presentation unit configured to present the selected subset of digital images to a user of the image-capturing apparatus. |
20150156744 | 14093254 | 0 | 1. A method comprising facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following: communication information associated with at least one user device; at least one determination of a current geo-location of the at least one user device based, at least in part, on the communication information; at least one determination of an accuracy of the current geo-location based, at least in part, on a comparison of the current geo-location with contextual location information associated with the current geo-location; and at least one determination of a correction-offset to the current geo-location based, at least in part, on an accuracy threshold. |
7542960 | 10320959 | 1 | 1. An automated method of performing hierarchical clustering of data for profiling customers generating a set of data records, said method comprising: inputting unlabeled data records from at least one of a group of customer profile data, text mining data, image categorization data, and video categorization data, said unlabeled data records being retrieved from a storage device, each of said data records representing one of a record and a pattern that do not possess any class labels; generating an n-ary decision tree from said unlabeled data records, wherein said generating comprises: creating a list of nodes to be explored, wherein each node comprises a set of attributes pertaining to said set of data records, each of said attributes comprising one of binary, numeric, ordinal and categorical attributes; for every node in said list, selecting a particular attribute from a set of attributes pertaining to a first node in which information loss is at a maximum when said particular attribute is deleted from said set of attributes, wherein said information loss is measured in terms of loss of inhomogeneity of said set of data records available to said node by a relationship between a distance between two data values in a data set of each node and a maximum distance between a pair of data values in said data set of each node; determining whether said inhomogeneity at each node exceeds a first predetermined threshold value, then segmenting said set of data records at said first node based on a selected attribute if said inhomogeneity at said first node exceeds a first predetermined threshold value to produce at least one segmented set of data records, wherein said segmenting is based on a single attribute and is performed using any of valley detection, k-means, and leader clustering; creating child nodes for said first node; assigning each said segmented set of data records to exactly one child node of said first node; and allocating each said child node a set of attributes comprising attributes available in a parent node of a particular child node minus said selected attribute used to perform said segmenting of said set of data records; outputting to a user said n-ary generated decision tree on a video display; and using said n-ary generated decision tree to generate a subset of said previously unlabeled data records comprising homogeneous characteristics for said at least one from said group of customer profile data, text mining data, image categorization data and video categorization data, respectively. |
20160180284 | 14578253 | 0 | 1. A computer-implemented method comprising: receiving, by a shopping platform from a user device, a browsing request to view an item offered by a first third party retailer; retrieving an estimated inventory value for the item at the first third-party retailer, wherein the shopping platform maintains the estimated inventory value for the item using a combination of a history of purchases of the item by users of the shopping platform and a history of inventory values for the item received from one or more third party retailers; transmitting, from the shopping platform to the user device, a representation of the item as being available for purchase based upon the estimated inventory value for the item; receiving, by the shopping platform from the user device, a request to initiate a purchase of the item in response to the transmitted representation of the item; transmitting, from the shopping platform to a retail server in response to the received selection, a request for a current inventory value for the item; receiving, by the shopping platform from the retail server, the current inventory value for the item; initiating the purchase of the item in response to determining the item is available based upon the received current inventory value. |
20030088596 | 10035735 | 0 | 1. A hand-held computing device for teaching procedures for solving mathematical problems comprising: a processor for performing mathematical operations; a memory including first areas for storing a master group of mathematical operations for solving mathematical problems, which operations are performable by said processor, said memory further including second areas for storing a “problem” linked list of mathematical problems which may include algebraic expression, said “problem” linked list comprising a first data set, said memory further including a third area for storing a mathematical “operations” linked list of selected ones of said master list of mathematical operations applicable to a selected mathematical problem of said “problem” linked list, said “operations” linked list not limited to a mathematical operation which leads to a solution of said selected mathematical problems; a display for displaying multi-lines of information including said selected mathematical problem and said “operations” linked lists of mathematical operations related to said selected mathematical problem; and an input device for inputting information related to mathematical problems and for selecting a mathematical operation to be performed on a selected mathematical problem from said mathematical “operations” linked list. |
20120022667 | 13186613 | 0 | 1. An apparatus for use with a prosthetic system, the apparatus comprising: a controller, that operates to gather data and derive prosthetic information from a plurality of sensors, and that transmits said prosthetic information over a wireless radio link, wherein said controller and said plurality of sensors are disposed within the interior of a prosthetic socket; and a wireless smart device, coupled to said controller via said wireless radio link, that receives said prosthetic information, and that provides visual and audio representations of said prosthetic information to a user. |
9104888 | 14096997 | 1 | 1. A method for storing files, comprising: receiving by a first client application at least a first identifier; receiving by the first client application a third identifier; providing the first identifier and the third identifier to a hash algorithm, wherein the hash algorithm produces a first output using the first and third identifiers; using the first output to determine a first system file location; storing a first system file in data storage at the first system file location, wherein the first system file stored in the data storage at the first system file location is a first index file; assigning a first file name to a first data file; receiving by the first client application a second identifier; providing the first file name as the second identifier to the hash algorithm; providing the second identifier to the hash algorithm, wherein the hash algorithm produces a second output; using the second output to determine a first data file location; storing the first data file in the data storage at the first data file location; storing the first data file location in the first index file; determining a size of the first data file, wherein in response to the size of the first data file having less than a first predetermined size the first data file is padded to have a first normalized size, and wherein the padded first data file is stored; assigning a second file name to a second data file, wherein the first file name has a first character length, and wherein the second file name has the first character length; providing the second file name as a fourth identifier to the hash algorithm, wherein the hash algorithm produces a third output; using the third output to determine a second data file location; storing the second data file in the data storage at the second data file location; storing the second data file location in the first index file. |
9900335 | 14757988 | 1 | 1. A method for prioritizing indicators of compromise for a network, comprising: receiving, by a server computer, information identifying an indicator of compromise for a network resource of an organization associated with the network, the information comprising an least one of an identification of a severity for the indicator of compromise provided by a reporting entity or a confidence of the reporting entity in the identification of the indicator of compromise; calculating, by the server computer, a normalized severity for the indicator of compromise based at least in part on a set of factors comprising collision logging information that indicates occurrences of the indicator of compromise within a plurality of network resources of the network subsequent to receiving the information; determining, by the server computer, a lifecycle to associate with the indicator of compromise based at least in part on the normalized severity for the indicator of compromise; updating, by the server computer, a database associated with the network indicating the normalized severity for the indicator of compromise and the lifecycle of the indicator of compromise; generating, by the server computer, a set of rules to apply to the network resource based at least in part on the indicator of compromise and the normalized severity for the indicator of compromise; and providing, by the server computer, the set of rules to the network resource for implementation, the network resource configured to detect and prevent subsequent occurrences of the indicator of compromise utilizing the set of rules. |
8682421 | 12916559 | 1 | 1. A method of assessing a Fitness Score of a person, comprising: determining diagnostic indicators of the fitness score using heart rate variability (HRV) analysis of ECG signals during orthostatic intervention by: assessing a level of Overall Adaptation Reserve of the person, by analyzing a transition period of the person between a supine position and an upright position during orthostatic intervention; determining a diagnostic indicator of adaptability of the myocardium; and determining a diagnostic indicator of compensatory ability of the peripheral vascular system. |
20120323507 | 13594340 | 0 | 1. A fault detection apparatus comprising: a sunshine condition estimation unit configured to receive an actual electrical output from a string that is a unit in which a plurality of electricity generating modules are connected in series, and an output characteristic model based on which an electrical output is estimated depending on a sunshine condition affecting electricity generation, and to set a value of sunshine condition in the output characteristic model which is closest to the actual electrical output as a sunshine condition estimate for each string based on the received actual electrical output and output characteristic model; a sunshine condition spatial correction unit configured to calculate a first total estimate that is a sum of sunshine condition estimates of all output characteristic models included in a target string, to calculate a second total estimate that is a sum of sunshine condition estimates of all electricity generating modules included in each of first adjacent strings adjacent to both lengthwise surfaces of the target string, and to correct the sunshine condition estimates of the target string so that the first total estimate falls within a range determined by the second total estimates; and an electrical output fault detection unit configured to identify a faulty electricity generating module when a difference between the actual electrical output and a sum of expected electrical outputs of the electricity generating modules calculated by using the output characteristic model and the corrected sunshine condition estimates within each string is greater than or equal to a first threshold, and the actual electrical outputs is smaller than the sum of the expected electrical outputs. |
9542807 | 14277989 | 1 | 1. A method of operating a gaming system, said method comprising: electronically determining, via an electronic gaming controller of the gaming system, an outcome to present for a wagering game, wherein the wagering game includes a wagering game object configured to present the outcome using a set of possible behavioral responses, and wherein the gaming system comprises a value input device configured to receive monetary value for placement of wagers in the wagering game; based on the outcome, automatically determining, via the electronic gaming controller, priorities for the set of possible behavioral responses, wherein the automatically determining the priorities for the set of possible behavioral responses comprises one or more of electronically analyzing virtual physics that govern interactions between the wagering game object and other objects, electronically analyzing a distance the wagering game object is from one or more other objects associated with the outcome, and electronically analyzing a frequency of occurrence of the outcome; automatically performing, via the electronic gaming controller, at least a portion of the set of possible behavioral responses according to the priorities; and causing the wagering game object to present the outcome for the wagering game in response to the automatically performing the at least the portion of the set of possible behavioral responses. |
7689005 | 11064266 | 1 | 1. A method for implementing a biometric database management system, comprising the steps of: storing encoded biometric data in a biometric database on a biometric data storage; running an enrollment process on a server, said enrollment process comprising an encoding plug-in interface in said biometric database to convert a biometric data into an encoded biometric data; converting target biometric data into an encoded target biometric data with an encoding plug-in interface; searching said biometric database, using a plug-in interface, for customized one-to-one similarity comparing said encoded target biometric data to encoded biometric data in said biometric database; and providing a unique ID to said sewer for a set of related encoded biometric data in said biometric data storage using said unique ID to retrieve information other than biometric data from a second database, wherein said second database is separate from said biometric data storage. |
8386568 | 10235324 | 1 | 1. A method of communicating during an instant messaging (“IM”) session, comprising: creating, by a message author participating in the IM session, a first message to be sent to each of at least one other participants in the IM session; designating in the first message, by the message author, at least one portion of the first message for sending to a non-participant in the IM session; annotating the first message, by the message author, with at least one messaging identifier associated with the non-participant and, for each of the at least one messaging identifiers, a corresponding routing method; sending a query to each of the at least one other participants to determine if they approve sending the at least one designated portion to the non-participant, and if a response to each sent query indicates that the at least one other participants approve the sending, then: programmatically generating a second message that comprises each of the at least one designated portions of the first message and excludes other portions of the first message; and sending the second message to the non-participant using at least one of the messaging identifiers with which the first message is annotated and the corresponding routing method; and sending the first message to each of the at least one other participants in the IM session using the IM session, wherein at least one of the corresponding routing methods used for sending the second message to the non-participant is different from the IM session used for sending the first message to each of the at least one other participants. |
10089765 | 14918515 | 1 | 1. A method performed by a computing device to display an output comprising an image generated based on an input of a selected text from sources, wherein the sources comprise at least one of books, newspapers, songs, letters, documents, speeches or any written item, the method comprising; selecting, by the computing device, a source from among the sources; selecting, by the computing device, the text from among the selected source; defining, by the computing device, expectations for the image; building, by the computing device, a transformed text from the selected text; dividing, by the computing device, the transformed text into slides of text; generating, by the computing device, man objects for respective slides of text, each of the main objects being a graphical element that represents the respective slides of text; defining, by the computing device, a shape and properties of respective main objects; defining, by the computing device, mathematical functions for relating the properties of the respective main objects to the respective slides of text; obtaining, by the computing device, numerical values for the respective slides of text based on the mathematical functions and the properties of the respective main objects, wherein the obtained numerical values include magnitude of the respective slides of text and an angle of the respective slides of text; building, by the computing device, scripts for generating the image, based on the shape of the respective main objects and the numerical values for the respective slides of text; generating, by the computing device, the image on a polar coordinate system in accordance with the scripts; displaying, by the computing device, the image generated; displaying, by the computing device, the output that comprises the image generated upon the defined expectations for the generated image being fulfilled; and when the defined expectations are not fulfilled, performing, by the computing device, interactive processes until the defined expectations for the generated images are fulfilled. |
8762164 | 12786125 | 1 | 1. A method comprising accessing, on a processor, a plurality of pharmacy claims associated with an individual; generating, on a processor, a raw risk index indicative of at least one of said individual's medical costs, acute medical conditions, and variation in medical costs, by using the plurality of pharmacy claims; processing, on the processor, the plurality of pharmacy claims to identify a plurality of compliance medications prescribed to the individual; associating, on the processor, a regression coefficient with each compliance medication of the plurality of compliance medications; determining, on the processor, compliance of the individual with the plurality of compliance medications to generate a plurality of compliance medication scores a compliance medication score of the plurality of compliance medication scores being associated with a compliance medication prescribed to the individual; multiplying, on the processor, each of the plurality of compliance medication scores with an associated regression coefficient of the plurality of coefficients, the plurality of regression coefficients including the regression coefficient; and modifying, on the processor, the raw risk index based on multiplying each of the plurality of compliance medication scores with the associated regression coefficient to generate the risk index. |
7622986 | 11213220 | 1 | 1. A method of generating a single-ended, non-differential output signal from a single ended, non-differential input signal using differential amplifiers, comprising: converting a single-ended input signal into a pair of full-differential signals using a first pair of differential amplifiers comprising: a first differential amplifier for receiving said single-ended input signal and an external reference signal; and a second differential amplifier for receiving said single-ended input signal and said external reference signal; applying said full-differential signals to a second pair of differential amplifiers to generate outputs, said second pair of differential amplifiers comprising: a first differential amplifier; and a second differential amplifier; inputting said outputs to one or more additional pairs of differential amplifiers to generate one or more outputs, respectively; and combining said outputs of a last pair of differential amplifiers to generate a single non-differential output signal. |
7711919 | 11203513 | 1 | 1. In an execution environment for an object-oriented program, a method of manipulating objects, comprising instantiating an object A of class X, said instantiating step comprising allocating memory for a header of object A allocating memory for at least one of one or more data elements inherited from class X and associated with object A, and one or more method members inherited from class X and associated with object A, allocating memory for one or more data elements inherited from of class Y which are absent from class X, and associating those data elements with said header of object A. |
8799191 | 13198394 | 1 | 1. Computer-implemented method for creating a network from a number of nodes and edges, where each node is assigned data from at least one data source, the data of a data source being changeable, the data assigned to a node describing single forecasts from a prediction market, the method comprising; (a) structuring the data according to a predefined taxonomy; (b) performing a pattern recognition within first data, the first data being assigned to a first node, whereby the pattern recognition determines and analyzes at least a first sequence of patterns of changes in the first data; (c) performing a pattern recognition within second data, the second data being assigned to a second node, whereby the pattern recognition determines and analyzes at least a second sequence of patterns of changes in the second data; (d) comparing the first sequence of patterns with the second sequence of patterns and deriving a correlation between the first sequence of patterns and the second sequence of patterns from the comparison result, wherein the correlation defines the dependency between the first node and the second node; (e) storing the sequence of patterns and the dependency in a pattern database, whereby the dependency forms an edge between the first node and the second node (f) creating a chain between the first node and a third node, where there is no dependent defined between the first node and the third node according to steps (b) through (e), wherein the first node in the network is reachable via a path from the third node, the path comprising a number of dependencies, and wherein the chain between the first node and third node is derived from the number of dependencies; and (g) storing the chain between the first node and the third node in the pattern database, the chain creating an edge between the first node and the third node. |
20150238863 | 14697598 | 0 | 1. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising: receiving, from a computer devices, gaming stimulations, substituted stimulations, gaming results, and performance factors that are associated with gamers that play gaming programs at the computer devices, wherein the gaming stimulations, the substituted stimulations, and the gaming results are correlated to generate the performance factors, and wherein the substituted stimulations comprise signals that are substituted at the computer devices for stimulus signals generated by gaming accessory devices based on pre-arranged substitution strategies; combining the gaming stimulations, the substituted stimulations, the gaming results, and the performance factors to generate gaming profiles that are associated with the gamers; matching a first gamer and a second gamer of the gamers according to patterns present in the gaming profiles; initiating a gaming application for a game play comprising the first gamer and the second gamer that are matched; and presenting information representing the game play of the gaming application to a member of a social network. |
9424567 | 13868241 | 1 | 1. A mediator authorizing a transaction involving a user having a mobile device, the mediator comprising: a processor that accesses the mobile device's address in response to a request by an entity to authorize a transaction involving the user, causes a communication to be sent to the mobile device address from a first reply address, and determines if a communication response to the first reply address authorizes the transaction, wherein the processor sends a further communication to the entity indicating if the transaction is authorized; and wherein determination if the communication response to the first reply address authorizes the transaction includes verifying correspondence of both the mobile device's address and the first reply address of the communication response with the mobile device's address and the first reply address of the sent communication. |
20130013999 | 13177884 | 0 | 1. A method for creating an annotation from a document comprising: searching a first electronic legal document to determine a first reference to a statute; identifying a portion of the first electronic legal document that includes the first reference to the statute; copying the portion of the first electronic legal document for inclusion as an annotation to the statute; compiling the portion of the first electronic legal document into the annotation to the statute; and providing, by a computing device, the annotation for display. |
20170132089 | 14936867 | 0 | 1. A method, said method comprising: monitoring, by one or more processors of a computer system, a capacity utilization of an application system and of a backup system of a data processing system for a predefined first period of time, said monitoring resulting in retrieving utilization statistics indicative of a capacity utilization of the application system and of the backup system; determining, by the one or more processors, for several time slots of a backup schedule, an application load score for the application system and a backup load score for the backup system, by applying a predefined metric to the retrieved utilization statistics of the application system and of the backup system, the application load score and the backup load score being indicative of an expected load of the application system and of the backup system, respectively, during each time slot of a plurality of time slots, each time slot being defined by a starting time and a time duration relative to the starting time; determining, by the one or more processors, for each time slot, a suitability score, by combining the application load score and the backup load score, the suitability score being indicative of a suitability of the application system and of the backup system in combination for execution of a backup during the time slot, the backup comprising copying data elements from the application system to the backup system; selecting, by the one or more processors, for the backup, a first time slot, from the plurality of time slots, whose suitability score does not exceed a predefined threshold; and scheduling, by the one or more processors, the selected backup for the first time slot for the application system and for the backup system. |
8131613 | 11385397 | 1 | 1. A computer-implemented method of allocating assets in a defined benefit pension plan with a set of pension liabilities from required benefit payments to plan participants as defined by a plan specification of the defined benefit pension plan including pension benefits and other post-retirement benefits, a plurality of pension assets with asset classes and security weightings representative of amounts of the pension assets invested over the plurality of asset classes and security weightings including stocks and bonds, the method being performed on a computer system having an output device, comprising: (A) calculating by the computer system the set of pension liabilities including calculating each of the required benefit payments using discounted values based on rates of mortality, morbidity, disability, withdrawal, turnover, retirement and a membership roster of the defined benefit pension plan wherein the required benefit payments are based on fixed deterministic assumptions or based on stochastic random variable assumptions; (B) calculating by the computer system a first calculated value indicative of a first set of pension assets that are matched with the set of pension liabilities wherein a unit of matched pension assets moves with a unit of pension liabilities of the set of pension liabilities and wherein the calculating of the first calculated value includes; (i) determining for each of the asset classes and security weightings in the first set of pension assets an expected asset return and a variance of asset return, (ii) determining for each of the asset classes and security weightings in the first set of pension assets a covariance of asset return with respect to every other asset return over the plurality of asset classes and security weightings, (iii) determining for each required benefit payment in the set of pension liabilities an expected liability return and a variance of liability return, (iv) determining for each required benefit payment in the set of pension liabilities a covariance of liability return with respect to every liability return of every other required benefit payment in the set of pension liabilities, (v) determining for each of the asset classes and security weightings in the first set of pension assets a covariance of asset return with respect to the liability return of each required benefit payment in the set of pension liabilities; and (vi) multiplying a matrix of variances and co-variances in B(i) to B(v) with the matrix of corresponding weightings of each of the required benefit payments in the set of pension liabilities and corresponding security weightings of each of the asset classes and security weightings in the first set of pension assets; (C) calculating by the computer system a second calculated value indicative of a second set of pension assets that are not fully matched with the set of pension liabilities wherein a unit of the non-fully matched pension assets does not move with a unit of pension liabilities of the set of pension liabilities and wherein the calculating of the second calculated value includes; (i) determining for each of the asset classes and security weightings in the second set of pension assets an expected asset return and a variance of asset return, (ii) determining for each of the asset classes and security weightings in the second set of pension assets a covariance of asset return with respect to every other asset return over the plurality of asset classes and security weightings, (iii) determining for each of the required benefit payments in the set of pension liabilities an expected liability return and a variance of liability return, (iv) determining for each of the required benefit payments in the set of pension liabilities a covariance of liability return with respect to every liability return of every other required benefit payment in the set of pension liabilities, (v) determining for each of the asset classes and security weightings in the second set of pension assets a covariance of asset return with respect to the liability return of every required benefit payment in the set of pension liabilities; and (vi) multiplying a matrix of variances and covariances in C(i) to C(v) with the matrix of corresponding weightings of each of the required benefit payments in the set of pension liabilities and corresponding weightings of each of the asset classes and security weightings in the second set of pension assets; (D) wherein the calculating of the first and second calculated values representative of the first and second sets of pension assets includes applying to specified portions of the first and second sets of pension assets each of; (i) a binary liability allocation method wherein any asset class or security that is not completely matched is assigned as completely unmatched, (ii) a continuous liability allocation method wherein any asset class or security that is not completely matched is assigned partially as matched and partially as unmatched in accordance with the extent of matching based on a defined volatility metric having a first anchor value for assigning zero percent matching, a second anchor value for assigning one-hundred percent matching, and a transformation function for transforming from the defined volatility metric to a matching factor for assigning intermediate values of matching, and (iii) a correlation-based liability allocation method wherein each of the asset classes and security weightings is assigned as matched or unmatched in accordance with the correlation of each asset return within the set of pension assets to the liability return of the set of pension liabilities and in accordance with the corresponding weightings of each of the asset classes and security weightings; (E) calculating by the computer system a pension liability allocation ratio by dividing one of the first and second calculated values by the other of the first and second calculated values in accordance with step (D); (F) calculating by the computer system a further first calculated value and a further second calculated value in accordance with steps (A)-(E) to provide differing asset class and security weightings representative of differing amounts of the pension assets invested over the plurality of asset classes and security weightings; (G) determining a pension liability allocation efficient frontier in accordance with; (i) calculating the pension liability allocation ratio within an optimization objective function, (ii) calculating the pension liability allocation ratio as a constraint to the optimization objective function; wherein an optimized asset class and security weighting are determined by an optimization process; and (H) outputting a representation of the optimized asset class and security weighting on the output device. |
8904350 | 13334033 | 1 | 1. A system comprising: a data storage component for storing a log of subroutine usage by an application under test; a processor coupled to the data storage component and configured to: analyze the log to identify subroutines used by the application based on actions in the subroutines, wherein the identifying subroutines comprises: segment the log into sequences of related actions based on a time period; map each sequence of related actions into a sequence of action classes; analyze the resulting sequences of action classes to identify a common substring; and output the common substring as one of the subroutines used by the application; compare the identified subroutines against a repository of subroutines applicable to the application; and designate a first subroutine in the repository as a matching subroutine wherein the first subroutine is used by the application. |
9027048 | 13676983 | 1 | 1. A system comprising: at least one processor; and at least one memory for storing computer executable instructions, wherein execution of said computer executable instructions by said at least one processor causes said computing device to perform a method comprising: receiving audio including speech content corresponding to a multimedia program, said audio generated by a multimedia viewing device; processing said audio to determine the speech content of said audio; correlating said speech content determined from the audio with a product or service offering; correlating the product or service offering with a database comprising a plurality of promotional deals; generating a nonempty proper subset of said plurality of promotional deals based on said correlating of the product or service offering with the database comprising the plurality of promotional deals, the nonempty proper subset including two or more promotional deals; and transmitting said subset to said multimedia viewing device from which the audio was generated, wherein said subset is displayed on a subscreen of said multimedia viewing device. |
20050160052 | 10996690 | 0 | 1. A method of providing authorization of a transaction, comprising: registering a biometric sample of an authorizer; providing biometric information of the authorizer; comparing the biometric information with the biometric sample; determining whether the biometric information matches the biometric sample to provide an indication; if the indication is that the biometric information matches the biometric sample, then providing an authorization of the transaction without the authorizer presenting any personalized man-made token. |
8275899 | 12344987 | 1 | 1. A computer implemented method, comprising: performing operations as follows on at least one processor: calculating a network activity score that corresponds to a network usage pattern for each network user of a plurality of network users; assigning one network user of the plurality of network users into a first risk class of a plurality of risk classes responsive to the network activity score of the one network user; and selecting a first subsequent action based on the first risk class to which the one network user is assigned, wherein the plurality of risk classes include at least the first risk class, a second risk class and a third risk class, wherein the plurality of network users include a first network user, a second network user and a third network user, and wherein the second risk class is associated with a second subsequent action and the third risk class is associated with a third subsequent action, the method further comprising assigning the second network user to the second risk class responsive to the network activity score of the second network user, selecting the second subsequent action based on the second risk class to which the second network user is assigned, assigning the third network user to the third risk class responsive to the network activity score of the third network user, and selecting the third subsequent action based on the third risk class to which the third network user is assigned; wherein calculating the network activity score comprises estimating network flow data corresponding to each one of the plurality of network users; wherein estimating the network flow data comprises: estimating bandwidth utilization of each one of the plurality of network users; and estimating high-risk-access data corresponding to communications between each one of the plurality of network users and high-risk network sources; wherein assigning the second network user to the second risk class responsive to the network activity score of the second network user comprises assigning the second network user to a subscriber surveillance class, and wherein selecting the second subsequent action based on the second risk class to which the second network user is assigned comprises: gathering evidence of high-risk network activity; and adjusting the network activity score of the second network user responsive to gathering evidence of high-risk network activity; wherein gathering the evidence of high-risk network activity comprises: redirecting network traffic of the network user to a security node that is operable to analyze network activity of the network user via deep packet inspection. |
20140316798 | 14257784 | 0 | 1. (canceled) |
9358394 | 14244652 | 1 | 1. A neurostimulation system for use with a plurality of electrodes implanted within a tissue region, comprising: a neurostimulator configured for delivering electrical stimulation energy to the plurality of electrodes in accordance with a set of stimulation parameters, thereby injecting a charge into the tissue region; a control device configured for receiving user input to modify the set of stimulation parameters; and controller/processor circuitry configured for, in response to the user input: computing a charge injection metric value as a function of a physical electrode parameter and an electrical source parameter for a first set of the electrodes comprising independent contributions of the physical electrode parameter and the electrode source parameter for each electrode in the electrode set, wherein the electrode set comprises at least two electrodes; comparing the computed charge injection metric value to a safety threshold value; and performing a corrective action based on the comparison. |
4037302 | 05660684 | 1 | 1. A method for providing used vehicle parts obtained from used vehicles which comprises: conveying a used vehicle along a fixed conveyor line; sequentially disassembling at various locations along said conveyor line, while preserving in recyclable condition, substantially all recyclable used parts from the used vehicle; identifying the sequentially disassembled used vehicle parts; storing the sequentially disassembled used vehicle parts in a storage area; and entering and maintaining inventory information on the used vehicle parts in a record-keeping system wherein said inventory information is based on inventory numbers which indicate the interchangeability of certain vehicle parts between various makes, models and years, whereby the availability of said used vehicle parts can be determined and a desired used vehicle part and its interchangeable equivalents can be located among the recyclable used vehicle parts stored and identified in the storage area of said integrated system. |
8943469 | 13633405 | 1 | 1. A method comprising: using a computer to implement: creating a first graphical data flow program in response to user input, wherein the first graphical data flow program includes a plurality of interconnected nodes, wherein the interconnected nodes visually indicate functionality of the first graphical data flow program, and wherein the first graphical data flow program is a data type-generic graphical data flow program; wherein each of the nodes comprises at least one of an input or an output, and wherein for at least a first subset of the nodes, input(s) and/or output(s) for the first subset are not restricted to a specific data type; wherein the first graphical data flow program is executable to perform the functionality for a plurality of different data types; and wherein the first graphical data flow program comprises one set of graphical code that performs the functionality for the plurality of different data types; instantiating a plurality of instances of the first graphical data flow program in a second graphical data flow program, wherein each instance is a data type-specific graphical data flow program; determining if two or more of the instances have same data types; and in response to determining that two or more of the instances have the same data types, replacing one or more of the instances with a reference to a particular instance of the first graphical data flow program with the same data types. |
20060157145 | 11061868 | 0 | 1. A method of providing virtual real-time status of sales transactions in order to perform a liquid product fuel reconciliation regardless of ongoing sells, the method comprising: receiving a request to perform a liquid product book to physical reconciliation for one or more storage tanks; identifying a duration for accumulation of measurement data used for said reconciliation; during said identified duration, monitoring a status of one or more dispensers for dispensing liquid product from said one or more storage tanks; and based on said status of said one or more dispensers, updating at least one of (i) a physical inventory, and (ii) a book value to appropriately determine the book to physical reconciliation. |
9400639 | 13530138 | 1 | 1. A method for generating a program, comprising: detecting a plurality of steps for performing a task on a computing device and actual input data for the task; detecting an example relating to each of the plurality of steps, wherein the example comprises input data and corresponding output data relating to the step; and for each example, determining a plurality of rules that transform the input data to the corresponding output data based on cues comprising textual features within the input data and cues comprising textual features within the corresponding output data; for each example, ranking the plurality of rules according to a probability that each rule explains a transformation from the input data to the corresponding output data; for each example, specifying a rule to be used for performing a step represented by the example based on the ranking of the plurality of rules; and generating a program for performing the task based on the specified rules. |
9324321 | 14201704 | 1 | 1. A method of adapting and personalizing a deep neural network (DNN) model for automatic speech recognition (ASR), comprising: receiving, by a computing device, at least one utterance comprising a plurality of speech features for one or more speakers from one or more ASR tasks; applying, by the computing device, a decomposition process to two or more matrices in the DNN model; in response to applying the decomposition process, adapting the DNN model to include a decomposed matrix that is generated from decomposition processing of the two or more matrices; and exposing the adapted DNN model as a service. |
9027039 | 12011956 | 1 | 1. An application program interface (API) management server comprising: an API source interface to i) send a request for one or more API elements to an API source, and ii) receive the one or more API elements from the API source, a processor to i) determine whether to allow a request from a client application for the one or more API elements based on a distribution rule set, wherein the distribution rule set includes a rule associated with a limit on a number of API calls, and ii) monitor distribution of the one or more API elements including monitoring of at least one of the number of API requests made by the client application over a period of time, usage trends by the client application, and usage trends based on Internet Protocol (IP) address; an interface to i) receive the request for the one or more API elements from the client application and ii) send the one or more API elements to the client application in response to a determination by the processor to allow the request; and a monitor interface to produce and display a web page that is capable of displaying (i) API access information of the API elements and (ii) an error code message, wherein the API access information includes API usage trend information, API usage plots, API access and usage amounts over a period of time, average API calls per developer, or average API calls per IP address, and wherein the error code message is specified by an API owner or provider. |
20100138134 | 12409791 | 0 | 1. An engine control system comprising: a temperature comparison module that generates a temperature difference between an engine coolant temperature and a radiator coolant temperature; an energy determination module that determines an energy value corresponding to heat energy generated by an engine, wherein the heat energy increases at least one of the engine coolant temperature and the radiator coolant temperature; and a diagnostic module that generates a comparison of the temperature difference and the energy value and determines a status of a thermostat associated with the engine based on the comparison. |
20150073689 | 14050390 | 0 | 1. A system for traffic impact prediction, the system comprising: a memory having computer readable computer instructions; and a processor for executing the computer readable instructions to perform a method comprising: estimating a link level background traffic demand in a transportation network, the estimating the link level background traffic demand including: receiving information about available routes in the transportation network; receiving expected background traffic volumes between origins and destinations in the transportation network; and applying a background traffic flow model that optimizes a background flow of the expected background traffic volumes among the available routes to minimize a sum of background congestion costs, background path entropy, and errors between an observed background traffic flow and the optimized background flow; identifying alternative routes for at least a subset of the estimated link level background traffic demand, the identifying based on the available routes in the transportation network and event based control plans; receiving expected additional event based traffic volumes between the origins and the destinations in the transportation network; estimating a link level total traffic demand in the transportation network based on the expected additional event based traffic volumes, the identified alternative routes, and the estimated link level background traffic demand; and outputting the estimated link level total traffic demand. |
8312058 | 12551959 | 1 | 1. A system for providing elements dossiers, comprising: one or more memories; one or more life cycle records in the one or more memories, each life cycle record describing a life cycle in a work project; one or more artifact description records in the one or more memories, each artifact description record describing an artifact in the life cycle, at least one of the artifacts being a dynamic artifact; one or more relationship records in the one or more memories, each relationship record describing a relationship between at least two of the artifacts, at least one of the relationship records comprising a dynamically derived relationship; and computer module that determines a dossier including one or more relationships associated with a target artifact and all of the relationships associated with one or more other artifacts that have a common path of relationships with the target artifact based on the life cycle records, and artifact description records, and the relationship records wherein the computer module further derives one or more relationships between the target artifact and one or more of the other artifacts that are identified in the life cycle that is non-adjacent to the life cycle of the target artifact, and stores the derived one or more relationships with a derivation history in the one or more memories. |
9307016 | 14802262 | 1 | 1. A computer program product comprising a non-transitory computer readable storage medium or device having program instructions embodied therewith, the program instructions executable by a computing device to cause the computing device to: receive registration information of a mobile device with a IP multimedia subsystem (IMS) network using IMS semantics via a Session Initiation Protocol (SIP) registration process; receive registration information of a mobile device with a presence server using information packaged in a presence document, wherein the presence document comprises device status and presence of the mobile device; process the presence document at a distributed network for future workload management decisions; manage workload for distributed network computing by utilizing the processed presence document to determine whether the mobile device is available to process the workload; send via the IMS network using SIP a workload request in the form of a presence notification to the mobile device based on the registration, wherein the presence notification includes data for retrieving the workload and provides for ad hoc leveraging of computing power from the mobile device, which was not formally part of the distributed network prior to receiving the presence notification; upload instructions and content for the workload to a content cache by the distributed network; provide the instructions and content for the workload to the mobile device from the content cache associated with the distributed network, based on the workload request, for assisting in the distributed network computing; and perform the workload on the mobile device after the providing the workload from the content cache to the mobile device. |
8176494 | 12105140 | 1 | 1. A computer program product in a tangible computer readable medium having instructions for use in a data processing system for processing data in a multithreaded application, the computer program product comprising instructions for: placing work items into a data structure that is maintained in the data processing system, wherein the work items are pending processing by the multithreaded application; processing work items from the data structure by a plurality of threads within the multithreaded application in accordance with a first algorithm; processing work items from the data structure by a thread within the multithreaded application in accordance with a second algorithm that differs from the first algorithm, wherein the thread is configured distinctly from the plurality of threads; and restricting the processing of work items by the thread in accordance with a second set of parameters used to evaluate workflow conditions, wherein restricting the processing of work items by the thread in accordance with a second set of parameters further comprises: evaluating workflow conditions of the plurality of threads for a characteristic of a workflow condition as controlled by the second set of parameters; processing or not processing work items by the thread, respectively, in response to a determination of whether or not the workflow conditions of the plurality of threads has a characteristic indicated by the second set of parameters; reevaluating workflow conditions of the plurality of threads for a characteristic of a workflow condition as controlled by the second set of parameters in response to processing a work item by the thread; processing or not processing work items by the thread, respectively, in response to a determination of whether or not the workflow conditions of the plurality of threads has a characteristic indicated by the second set of parameters; and adjusting one or more parameters in the second set of parameters in accordance with a third set of parameters used to regulate a time period associated with processing the work items by the thread in response to a determination that workflow conditions do not have a characteristic indicated by the second set of parameters. |
20140278376 | 14215124 | 0 | 1. A computer-implemented method of generating recitation items, the method comprising: generating one or more text sets, wherein each text set includes one or more texts; determining a value for each text set using one or more metrics selected from the group consisting of: a vocabulary difficulty metric, a syntactic complexity metric, a phoneme distribution metric, a phonetic difficulty metric, and a prosody distribution metric; selecting a final text set based on the value associated with each text set. |
20050151320 | 10971413 | 0 | 1. A method for playing a competitive card game simulating combat between a first character and a second character, the method comprising the steps of: (a) providing a stack of playing cards for each player playing the game, each card representing at least one specific character of the first character and the second character, each card having a plurality of games thereon, wherein said card has indicia thereon representing various information about the at least one specific character of the first character and the second character, wherein said indicia has a plurality of statistics; (b) selecting a statistical comparison game from said plurality of games on said card, said plurality of games comprising a statistical comparison game; (c) selecting a card from the stack of each player; (d) choosing one category of the statistics to be compared; and (e) comparing the statistics of the at least one specific character of the first character and the second character on the chosen category on the selected cards to determine a winner of the card game. |
20020007457 | 09816869 | 0 | 1. An electronic voting system for use with a computerized network, comprising: a plurality of voting computers coupled to the computerized network, wherein each voting computer provides an electronic encrypted ballot, wherein each electronic ballot is encrypted under a discrete log asymmetric encryption process using underlying groups Z p or elliptic curve; at least first, second and third authority computers coupled to the computerized network, wherein the first authority computer is configured to receive a series of electronic ballots corresponding to an aggregation of each of the electronic ballots received from the plurality of voting computers, and to apply a secret, one-way cryptographic transformation using at least a first secret key to anonymously shuffle the series of electronic ballots and produce a first shuffled series of ballots, wherein only the first authority computer knows a correspondence between the first series of shuffled ballots and the series of electronic ballots, and wherein the first authority computer is further configured to provide a first linear size, non-interactive proof of correctness for the first series of shuffled ballots based on a scaled iterated logarithmic multiplication proof; wherein the second authority computer is configured to receive the first series of shuffled ballots, to apply the cryptographic transformation using at least a second secret key to anonymously shuffle the first series of shuffled ballots and produce a second series of shuffled ballots, wherein only the second authority computer knows a correspondence between the first series of shuffled ballots and the second series of shuffled ballots, and wherein the second authority computer is further configured to provide a second linear size, non-interactive proof of correctness for the second series of shuffled ballots based on the scaled iterated logarithmic multiplication proof; wherein the third authority computer is configured to receive the second series of shuffled ballots, to apply the cryptographic transformation using at least a third secret key to anonymously shuffle the second series of shuffled ballots and produce a third series of shuffled ballots, wherein only the third authority computer knows a correspondence between the third series of shuffled ballots and the second series of shuffled ballots, and wherein the third authority computer is further configured to provide a third linear size, non-interactive proof of correctness for the third series of shuffled ballots based on the scaled iterated logarithmic multiplication proof; and a verification computer coupled to the computerized network, wherein the verification computer is configured to receive the proofs of correctness from the first, second and third authority computers and without interacting with the first, second and third authority computers, to verify a correctness of the shuffled ballots. |
8410633 | 12792938 | 1 | 1. A method of managing a plurality of electric loads powered by a standby generator, the method comprising the steps of: interconnecting each of the plurality of electric loads to one of a plurality of outputs such that the electric loads receive power through the outputs; providing a plurality of predefined priority assignment programs in a control unit; assigning a priority value to each of the electric loads between a highest priority value and a lowest priority value for each of the priority assignment programs, wherein the initial priority values assigned to the electric loads vary among the plurality of priority assignment programs; receiving a selection of one the predefined priority assignment programs from a user; monitoring a combined load on the generator; selectively disconnecting the electric loads from the generator in a sequential order from the lowest priority value to the highest priority value based on the assigned priority values according to the selected priority assignment program when the combined load on the generator reaches a rated value for the generator, wherein the electric loads having the lowest priority value are sequentially disconnected from the generator until the combined load on the generator falls below the rated value for the generator; and selectively reassigning the priority values to the electric loads to modify the order the electric loads are disconnected from the generator upon the selection of another priority assignment program by the user. |
20120271966 | 13358422 | 0 | 1. A system for delivering content comprising: a first data center for receiving and optimizing the content and having a plurality of transcoding resources; a decision engine coupled to the data center for scheduling and queueing the content for delivery to a service provider and for selecting one of the plurality of transcoding resources to utilize to transcode the content, where the decision engine includes a processor for determining a priority value and for determining an affinity value based on a preference of a transcoder. |
7860899 | 11728650 | 1 | 1. A method comprising: receiving a logical description that references an abstract datatype in a database system, wherein the database system supports multiple database representations for the abstract datatype; receiving one or more sample queries that reference the abstract datatype; evaluating the one or more sample queries, wherein evaluating one or more sample queries comprises: determining a plurality of database representations that the database system supports for the abstract datatype; re-writing the one or more sample queries based on the plurality of database representations; performing a cost analysis of the re-written sample queries; based on the logical description and said evaluating said one or more sample queries, determining a database representation for the abstract datatype; wherein said database representation includes one or more base structures that are used to store data for the abstract datatype; wherein the method is performed by one or more computing devices. |
20150287184 | 14434944 | 0 | 1. A system for generating a final Cobb angle prediction for idiopathic scoliosis, the system comprising: a memory having stored thereon a predictive model based on 3D morphological spine parameters, curve type, and skeletal maturity; a processor; and at least one application stored in the memory and executable by the processor for receiving patient-specific 3D morphological spine parameters, a selected curve type, and a selected skeletal maturity, retrieving the predictive model, and modeling a progression curve of the idiopathic scoliosis to generate the final Cobb angle prediction. |
20140379126 | 14309241 | 0 | 1. A method for monitoring a kinematically redundant robot, the method comprising: detecting joint forces acting in joints of the robot; determining an external work force between a robot-permanent reference point and an environment based on the detected joint forces; determining, based on the detected joint forces, a further monitoring variable which is at least substantially independent of an external force acting on the robot-permanent reference point; and monitoring the determined external work force and the determined further monitoring variable. |
9137253 | 14591317 | 1 | 1. A method of controlling access to an information technology (IT) resource, the method comprising the steps of: a computer initiating a display including a visual representation of the IT resource and a visual representation of a first entity; the computer detecting in the display a first movement of the visual representation of the first entity from outside a boundary of the visual representation of the IT resource to a first position close to the boundary of the visual representation of the IT resource; responsive to the step of detecting the first movement to the first position close to the boundary, the computer determining a first attribute assigned to the visual representation of the first entity satisfies an access control requirement assigned to the visual representation of the IT resource; based on the first attribute assigned to the visual representation of the first entity satisfying the access control requirement assigned to the visual representation of the IT resource, the computer determining the first entity is permitted to access the IT resource; based on the first entity being permitted to access the IT resource, the computer permitting in the display a movement of the visual representation of the first entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the first entity within the boundary of the visual representation of the IT resource; the computer initiating the display including a visual representation of a second entity; the computer detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the IT resource to a second position close to the boundary of the visual representation of the IT resource; responsive to the step of detecting the second movement to the second position close to the boundary, the computer determining a second attribute assigned to the visual representation of the second entity does not satisfy the access control requirement assigned to the visual representation of the IT resource; based on the second attribute assigned to the visual representation of the second entity not satisfying the access control requirement assigned to the visual representation of the IT resource, the computer determining the second entity is not permitted to access the IT resource; and based on the second entity being not permitted to access the IT resource, the computer presenting in the display a visual cue that indicates the visual representation of the second entity is prevented in the display from (1) moving across the boundary of the visual representation of the IT resource and (2) being placed within the boundary of the visual representation of the IT resource. |
8868976 | 12939189 | 1 | 1. A computerized apparatus for generating a testcase, the computerized apparatus having a processor and a storage device, the computerized apparatus comprising: a test template obtainer operative to obtain a test template associated with a system-under-test (SUT), wherein the SUT comprises a plurality of units, wherein the test template represents alternative testcases in which the plurality of units interact, wherein the test template defines system-level generation tasks and unit-level generation tasks; a system-level generator operative to generate an abstract testcase based on the test template, wherein said system-level generator is operative to perform the system-level generation tasks, wherein the abstract testcase is an incomplete testcase that cannot be executed, wherein the abstract testcase comprises the unit-level generation tasks; and at least one unit-level generator operative to generate a testcase comprising the abstract testcase, wherein said at least one unit-level generator is operative to perform the unit-level generation tasks. |
20130080866 | 13679952 | 0 | 1. A method of producing a customized card containing a tailored intergenerational historic snapshot message, the method comprising the steps of: obtaining digital values for parameters of a tailored historic snapshot message template data structure stored in a computer-readable memory, the template data structure having predefined text and parameters, the text being interleaved with the parameters to form sentences, the predefined text and parameters of the template data structure including at least one of the following pairs within a sentence: “from where you are” and a distance parameter, “was your age” and a familial relationship parameter, “when she/he turned” and a person's age parameter, “like to know” and a person's name parameter, “in the year” and a date parameter based on an elder person's birthdate and a younger person's age, “people in it” and a historic date population parameter, “population of” and a historic date population parameter, “just. .. invented” and a historic event parameter with the ellipsis representing text rather than being literal, “first successful” and a historic event parameter, “world. .. changed” and a person's age parameter, with the ellipsis representing text rather than being literal; generating by execution of code with a computer processor a tailored historic snapshot message from the parameters and the template data structure; and including a version of the tailored historic snapshot message in an electronic version of the customized card, the customized card containing text tailored for at least one of the following subjects: an anniversary, a birthday, a congratulation, a gift, a graduation, a seasonal greeting, a holiday, an expression of sympathy. |
9369906 | 14128424 | 1 | 1. A non-transitory computer readable medium comprising computer executable instructions stored thereon to cause one or more processing units to: receive a measurement of signal strength and a time associated with the measurement of signal strength; record the measurement of signal strength and the time associated with the measurement of signal strength in a connectivity history store; compute an instantaneous rate of signal strength loss; determine that the instantaneous rate of signal strength loss is not within an allowed margin; compute an expected remaining time window for data transmission; select data for transmission, wherein the selected data comprises data packets having sizes configured to be transmitted within the expected remaining time window; and direct the selected data to be sent to a desired recipient. |
8581227 | 13246138 | 1 | 1. A system for performing quantum computation, the system comprising: a processor; and a storage device having instructions stored therein, the instructions, when executed by the processor, cause the processor to perform acts comprising: modeling a lattice having a system of non-Abelian anyons disposed thereon, the lattice comprising a system of particles, the non-Abelian anyons being excitations of least energy states of the system of particles that form the lattice, wherein each of the non-Abelian anyons is associated with a respective initial position in the lattice, wherein the lattice is modeled as a Kagome lattice comprising a plurality of hexagons, and wherein each hexagon contains exactly one particle, wherein each particle is a real, nonquasi-particle; identifying a first quantum state of the lattice; modeling movement of the non-Abelian anyons within a 2D+1 space-time of the lattice; identifying a second quantum state of the lattice after movement of the non-Abelian anyons has been modeled; and determining a computational result based on the first and second quantum states of the lattice model. |
20090248431 | 12060192 | 0 | 1. A computer readable medium including program code for providing a message-based interface for performing an automatic identification label service, the service exposing at least one service as defined in a service registry, wherein upon execution the program code executes in an environment of computer systems providing message-based services and comprises: program code for receiving, from a service consumer, a first message for automatically identifying labels; program code for invoking an automatic identification label business object, wherein the business object is a logically centralized, semantically disjointed object for a label that can be automatically identified, and comprises data logically organized as: an automatic identification label root node; and program code for initiating transmission of a message to a heterogeneous second application, executing in the environment of computer systems providing message-based services, based on the data in the automatic identification label business object, the message comprising an automatic identification label create request message entity, a message header package, and an automatic identification label package. |
9275220 | 14305027 | 1 | 1. A computer program product for utilizing one or more input methods for passwords, the computer program product comprising: one or more computer readable tangible storage media and program instructions stored on at least one of the one or more storage media, the program instructions comprising: program instructions to determine one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; program instructions to receive a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; program instructions to determine if the candidate password meets one or more predetermined criteria, wherein the criteria includes at least one of: a character length and a number of input methods; program instructions to, responsive to determining the candidate password does meet the criteria, determine to store the password entry based at least on the candidate password and the associated input method for each character of the candidate password; program instructions to store the candidate password as the password entry, along with the associated input method for each character of the candidate password; program instructions to receive a first password for verification, wherein verification grants access to a resource; program instructions to determine each character of the first password matches each of the characters of the password entry; program instructions to determine that at least one input method for a character of the first password does not match at least one input method for a character of the password entry; program instructions to determine if a password verification attempt number has been exceeded, where the password verification attempt number represents a number of times a password is received for verification; and program instructions to, responsive to determining the password verification attempt number has not been exceeded, receive a second password for verification, wherein verification grants access to the resource. |
20050198342 | 10777607 | 0 | 1. A method for use in rate controlling an activity, the method comprising: identifying an approximated inverse rate, a fix-up adjustment value, and a quantum; maintaining an activity measurement value based on a measure of activity; maintaining a rate control value based on the measure of activity and the approximated inverse rate; applying the fix-up adjustment value once each said quantum to the rate control value to maintain rate accuracy of the activity. |
20090100180 | 12338651 | 0 | 1. A method for balancing use of resources between nodes of a multi-node system, the method comprising the steps of: detecting a service-level violation on a first node from a set of nodes in the multi-node system; wherein the set of nodes hosts a multi-node server that includes a first server instance on the first node; wherein the first server instance hosts a plurality of services, wherein each service of the plurality of services is work of a particular type; selecting, based on a policy function that is supplied and registered in response to user input, (a) a particular service of said plurality of services; (b) a second server instance hosting said particular service on a node different than said first node; determining, based on the policy function, a first number of sessions of the particular service running on the first server instance to migrate to the second server instance; migrating at least a portion of said first number of selected sessions of the particular service to said second server instance; determining whether said service-level violation on the first node persists; and if said service-level violation persists, repeating the steps of selecting at least one particular service, the second server instance hosting said particular server, and determining the first number of selected service sessions to migrate. |
20060047478 | 11221548 | 0 | 1. A method of monitoring a data processing system including the steps of: providing a set of samples of at least one performance indicator of the system, characterized by the steps of estimating an expected value of each performance indicator through a predictive algorithm based on the corresponding set of samples, and detecting a critical condition of the system according to the at least one expected value. |
20060111940 | 11218069 | 0 | 1. A computerized method to make healthcare patient credit decisions comprising: receiving patient information; obtaining financial information from a guarantor of costs associated with services the patient needs; determining a benefit of additional guarantor financial information from a third party; and obtaining the additional guarantor financial information from the third party if the benefit of the additional guarantor financial information is greater than the cost of obtaining the additional information. |
9390630 | 14269133 | 1 | 1. An apparatus, comprising: at least one processors; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following; detect a change in position of a body member of a performer relative to a performance element of a performance object with which an event is to be performed; generate a signal dependent on the detected change in position of the body member; record the signal so that a first sensory cue can be determined to indicate the change in position of the body member relative to the element of the performance object during a learning session; determine the first sensory cue dependent on the recorded signal; and apply the first sensory cue to indicate to a user during the learning session the change in position of the body member of the performer during the performance of the event, the first sensory cue being effective for stimulating a first processing center of a brain of the user, wherein the first sensory cue is an applied electrical signal dependent on the recorded signal effective to stimulate at least one of muscles and nerves of the user during the learning session to indicate to the user the position of the body member of the performer during the performance. |
20090106063 | 12234122 | 0 | 1. A computer-implemented method for propagating relations between a first business parameter and a second business parameter wherein the first and second business parameters are invoked by a common workflow model, the method comprising: tracing paths along a first direction through the workflow model from the first business parameter to the second business parameter; automatically enumerating relations that extend along the first direction from first the business parameter to the second business parameter; using multi-valued logic; and computing the effects on the relations of control flow through the workflow model from the first business parameter to the second business parameter. |
4471448 | 06300073 | 1 | 1. A method for realigning a complex optical system having several degrees of alignment freedom comprising the steps of: (a) measuring a plurality of optical performance characteristics, said plurality of characteristics having at least as many separate components as the number of said alignment degrees of freedom; (b) determining whether or not the alignment of the system is satisfactory by comparing a figure of merit derived from said plurality of performance components with a pre-established performance criterion; (c) if the said performance is determined not to be adequate, then, (i) calculating successive approximations to an estimated set of adjustments that would alter the calculated performance of an analytical model of said system to a degraded performance comparable to said measured performance; (ii) deriving a set of physical adjustments for said adjustment parameters from said estimated set of adjustments so as to compensate at least partially for the alignment errors associated with said system; and (iii) applying said physical adjustments to the optical system for correcting any alignment errors; (iv) repeating steps (a) through (c) (iv) until a satisfactory alignment results. |
9464914 | 14842203 | 1 | 1. A computer implemented method for landmark navigation, the method comprising: extracting information of a plurality of landmark candidates near a map route wherein near a map route is based on a pre-determined distance away from the map route; assigning a recognizability score to the plurality of landmark candidates; selecting a landmark among the plurality of landmark candidates based on the recognizability score; modifying the map route based on the selected landmark; providing a list of landmarks to a user based on the recognizability score; and presenting a modified map based on the user's selection. |
20170353532 | 15684759 | 0 | 1. A method for a host device to access a remote server and perform a task, comprising: receiving, by the host device, a task command for a task to be performed regarding the remote server; determining a task performing pattern based on at least one guest device and details of the task, wherein the task performing pattern comprises a pattern including one or more of: the host device performing the task itself; the at least one guest device performing the task in place of the host device; and the host device and the at least one guest device dividing and performing the task; and allocating performing of the task with respect to the remote server to one or more devices selected from among the host device and the at least one guest device, based on the task performing pattern, wherein determining the task performing pattern comprises: measuring network performance of the host device; measuring network performance of the at least one guest device; selecting one or more guest devices among the at least one guest device to which to allocate at least a portion of the task; and determining a task allocation ratio between the host device and the selected guest devices, and wherein the task allocation ratio between the host device and the selected guest device is determined to be proportional to the measured network performances of the host device and the selected guest devices. |
20050203880 | 10796705 | 0 | 1. A computer-implemented method for creating a task identifier for identifying a file within a system for providing help content to a computer operator, the method comprising: providing a user with a limited set of word selections that can be assigned to represent a first of a plurality of elements that together form the task identifier; receiving a selection from the user that is indicative of a word selection from the limited set of word selections; and assigning said word selection to represent the first of the plurality of elements. |
20060221357 | 11387809 | 0 | 1. An information processing apparatus comprising: a setter, arranged to set application data to be registered in a data management system; a determiner, arranged to determine whether or not the application data can be processed by the data management system; a converter, arranged to convert the application data which cannot be processed by the data management system into drawing data; and a transmitter, arranged to transmit the application data set by said setter or registration data as a combination of the drawing data of the application data and the application data to the data management system in accordance with a determination result of said determiner. |
9112897 | 12139422 | 1 | 1. A system comprising: an end-user device configured to receive a security policy from a website during a website session with the website, the security policy being based on security demands of a particular section of the website associated with an increased data security risk; and a security component on the end-user device configured to use the security policy to activate a security mechanism to temporarily protect the end-user device while a user visits the particular section of the website from operations of malicious code that may be on the end-user device, the security component configured to activate the security mechanism at an activation point corresponding to the user visiting the particular section of the website associated with the increased data security risk, the security component further configured to deactivate the security mechanism at a deactivation point corresponding to the user navigating away from the particular section of the website associated with the increased data security risk. |
9898732 | 13977112 | 1 | 1. A method of authorizing transactions comprising: receiving, by a host operating system (OS) running on a processor of a subscriber mobile device into a secure storage element, user input via a user interface of the subscriber mobile device, the secure storage element comprising a non-transitory memory; and executing, by a secure processing element of the subscriber mobile device, an embedded OS without involving the host OS running on the processor, wherein the secure processing element is implemented in configurable logic or fixed-functionality hardware, and wherein executing the embedded OS without involving the host OS includes: identifying a card value based on the user input; identifying one or more mobile usage constraints including a time bounded policy based on the user input; generating, without involving a third party or point of sale terminal, a virtual transaction card based on the card value and the one or more mobile usage constraints, wherein the virtual transaction card is invalid when the time bounded policy is not satisfied; transmitting the virtual transaction card to a delegate mobile device; retrieving, encryption information from the secure storage element of the subscriber mobile device; and transmitting, using the encryption information, an encrypted representation of the card value and the one or more mobile usage constraints to a payment network component. |
20160134430 | 14982989 | 0 | 1. A method for arranging an event opportunity, the method comprising: detecting, by a processor deployed in a communication network, the event opportunity that matches user profiles of at least two users who are unassociated with one another, wherein the event opportunity is provided by a third-party that is different from the at least two users; verifying, by the processor, a safety parameter for one of the at least two users, wherein the safety parameter is defined by the one of the at least two users and comprises a criterion which the one of the at least two users desires a second of the at least two users to satisfy in order for the one of the at least two users to be willing to engage in the event opportunity with the second of the at least two users; when the safety parameter is satisfied, sending, by the processor, an invitation to the event opportunity to each of the at least two users; and providing, by the processor, contact information for the at least two users to contact each other, when each of the at least two users accepts the invitation. |
20130298181 | 13461057 | 0 | 1. A method for processing data messages in a network device connected to a dynamic computer network, the method comprising: implementing a mission plan specifying a set of filtering rules to be applied to messages received at each of the plurality of network devices based on a message type and a message distance vector; determining a message type of a received data message generated in accordance with the mission plan, the received data message including a plurality of identity parameters; on a condition that the message type is a false message, determining whether the message distance vector of the false message has been exhausted; on a condition that the distance vector of the false message has been exhausted, dropping the false message; and on a condition that the distance vector of the false message has not been exhausted, transmitting the false message in accordance with the mission plan. |
7958158 | 12142182 | 1 | 1. A computer-implemented method, comprising: receiving a database query; determining at least one data element required for executing the database query; identifying, from a plurality of storage devices, a storage device storing the determined at least one data element; adding the received database query to a first queue of a plurality of queues each having a plurality of queued queries, each of the queues having a predefined association with a respective storage device of the plurality of storage devices, wherein the predefined association of the first queue is a first predefined association with the identified storage device storing the determined at least one data element, wherein each of the queued queries of a given of one of the queues requires one or more data elements stored in the respective storage device in order to be executed, wherein each queued query is received during a specified time period, and wherein the specified time period is selected according to an energy consumption objective; and after the specified time period: dispatching the plurality of queued queries from the first queue; retrieving, from the respective storage device, data elements required for executing the dispatched queries; and executing the dispatched queries, using the retrieved data elements as inputs. |
9213938 | 13701153 | 1 | 1. A method for guidance and navigation of an autonomous vehicle, the autonomous vehicle comprising at least one camera, the method comprising: processing a plurality of images of an environment of the autonomous vehicle captured using the at least one camera of the autonomous vehicle over a period of time to track one or more objects within the environment, wherein processing the plurality of images to track the one or more objects in the environment comprises processing at least two images of the plurality of images to estimate a pose of a first object in the environment, wherein processing the at least two images to estimate the pose of the first object comprises: generating hypotheses for a pose component of pose of the first object; identifying a mode of a probability mass function associated with the hypotheses; extracting low-noise hypotheses; and averaging the low-noise hypotheses to obtain an estimate for the pose component for the pose of the first object. |
9214008 | 13745707 | 1 | 1. A method comprising: identifying input attributes read by a shader program to generate output attributes; identifying a portion of the output attributes to be consumed by a destination shader program or a fixed-function hardware engine; computing a size of an attribute storage buffer to be allocated for execution of the shader program based on the input attributes and the portion of the output attributes; and enabling attribute buffer combining for the shader program when all reads of the e input attributes occur before any writes of the output attributes. |
8405652 | 12206986 | 1 | 1. A method of visually representing a form, the method comprising: identifying a plurality of objects in the form; identifying a hierarchical relationship between the plurality of objects; upon selection, using at least one processor, displaying a two-dimensional representation of the form including a two-dimensional representation of each object of the plurality of objects and the hierarchical relationship between the plurality of objects, the hierarchical relationship between the plurality of objects being shown by a position of the two-dimensional representation of each object in the two-dimensional representation of the form; upon the selection, retrieving a three-dimensional representation of each of the plurality of objects in the two-dimensional representation of the form, the three-dimensional representation of each of the plurality of objects being a three-dimensional model generated using three-dimensional modeling; and displaying a three-dimensional representation of the form including the three-dimensional representation of each object of the plurality of objects of the two-dimensional representation of the form and the hierarchical relationship between the plurality of objects, the hierarchical relationship between the plurality of objects in the three-dimensional representation being shown by a position of the three-dimensional representation of each object in the three-dimensional representation of the form. |
20090281640 | 12115570 | 0 | 1. A method of estimating a basepoint, comprising: receiving a plurality of goals, wherein each goal has a desired value; receiving a plurality of sensor feedback signals from a controlled system; receiving a plurality of predicted output values of the controlled system from a mathematical model; estimating a desired change for a plurality of basepoint values in response to the goals, the feedback, and the predicted output values; calculating an actual change in basepoint values in response to a plurality of limits and the desired change for the plurality of basepoint values; modifying the desired change as necessary to hold the limits; and combining the actual change in basepoint values with last pass values of the plurality of basepoint values to produce an updated basepoint estimate. |
20110208512 | 13127986 | 0 | 1. A method for generating derivative words, the method comprising the steps of: 1) creating a plurality of derivative grammar rule arrays, each of which comprising a suffix alphabetic character set and a condition array whose condition the base words have to meet, said condition array having a part of speech of the base words as required by corresponding suffix alphabetic character set; 2) inputting a user character set; 3) matching the user character set with each derivative grammar rule array, then obtaining the derivative grammar rule array which matches with the user character set; 4) obtaining a word meeting the requirement of the condition arrays of the obtained derivative grammar rule arrays, from a language database in accordance with the user character set; generating a derivative word via adding the suffix alphabetic character sets to the obtained words, the alphabetic character sets being included in the derivative grammar rule arrays which include the condition arrays as met by the obtained words. |
20090177599 | 11971126 | 0 | 1. A computer-implemented method of developing a propensity model for an event, comprising: establishing a plurality of biased samples of data representative of a previous event, wherein each of the plurality of biased samples of data representative of a previous event is biased differently; establishing at least one propensity model for each biased sample of data; processing each of the at least one propensity model with a genetic algorithm; checking fitness of at least one propensity model for each biased sample against a validation sample of data; and identifying a first propensity model for a first biased sample of data for cross-breeding with a second propensity model for a second biased sample based on fitness of the first propensity model to the validation sample of data. |
9032091 | 11403229 | 1 | 1. A system for management of intelligent devices within a network, the system comprising: a receiver component located at a server receiving a set of device characteristics, the device characteristics comprising criteria by which an organized group of the networked intelligent devices is defined, and by which the membership of an intelligent device within the organized group of intelligent devices may be determined; a group determination component located at the server, the group determination component configured to determine membership of intelligent devices within the organized group by comparing a database containing characteristics of intelligent devices within the network to the criteria; the receiver component configured to receive an update signal from any member of the organized group, the update signal comprising an updated configuration for the member of the organized group from which the update signal was received; and the group determination component configured to re-assess the membership of the member from which the update signal was received in the organized group by comparing the updated configuration for the member to the criteria, so as to determine if the updated intelligent device is still a member of the group based on the contents of the update signal; and the group determination component is also configured to update the membership of the organized group if the re-assessment of the membership of the member from which the update signal was received indicates that the configuration of the member no longer matches the criteria; an information component configured for receiving a request for group information from a networked device other than one of the intelligent devices; and a security component wherein when the information component receives a request for group information from a networked device, the security component determines an associated access level for the request and based upon the access level, the security component determines if the networked device can receive the group information, wherein the information component causes a communication module to send the group information to the networked device if the security component determines that the networked device can receive the requested group information. |
20040153222 | 10378746 | 0 | 1. A microprocessor based system for selecting an appropriate harbor for a vessel subject to weather conditions comprising a. a program for receiving parameters descriptive of a vessel, the vessel's location, and weather conditions, b. a memory under the control of said program for receiving a database of harbor parameters, c. a graphical interface under the control of said program for displaying maps of harbors corresponding to those whose harbor parameters are in the database and for allowing a user to input values of said parameters d. an algorithm for determining from the parameters a set of appropriate harbors. |
9387402 | 11901780 | 1 | 1. A method for converting a computer game environment of a computer game running on a computer into a real-life simulation environment, the method comprising: receiving metadata produced by a computer application useable in conjunction with the computer game, the metadata generated in response to an input from a user of the computer game defining virtual features and a virtual layout of the computer game to customize the computer game environment for playing on the computer; matching the virtual features of the computer game environment to simulation features of the real-life simulation environment, the real-life simulation environment including a simulation space and a vehicle designed to move through the simulation space, the simulation space being outer to the vehicle; mapping the virtual layout of the computer game environment onto the simulation space outer to the vehicle; compiling the simulation features and results of the mapping to produce data for the real-life simulation environment corresponding to the computer game environment; and configuring the real-life simulation environment, including the simulation space outer to the vehicle, according to the data. |
20160367361 | 14762428 | 0 | 1. A medical system for short time replacement and repair of a native valve, comprising: an artificial valve; and a device for collecting and arranging chordae to hold and/or stabilize said artificial valve in a desired position, said device comprising: a unit for grasping a plurality of chordae and/or leaflets and pulling the plurality of chordae towards the device. |
20120050257 | 12862038 | 0 | 1. A computer implemented method for generating a customized virtual world, the computer implemented method comprising: identifying a set of entities, wherein an entity is a location within the customized virtual world; selecting a representation associated with a target style for each entity in the set of entities to form a set of selected representations; and constructing a virtual world with the set of selected representations to form the customized virtual world, wherein the set of representations are rendered within the customized virtual world. |
20030220924 | 10155406 | 0 | 1. A method for integrating Uniform Resource Locator (URL) into a local computer system comprising: providing a local file system to said local computer system; providing a standard local file system protocol to said local file system; encapsulating an Internet protocol into said local file system protocol of said local file system; connecting said encapsulated local file system with a public network system; providing a URL to said local file system via said public network system without using a browser; and treating said URL as a standard file in said local file system without downloading said URL into a persistent storage of said local file system. |
7512892 | 11073140 | 1 | 1. In a computing environment, a method for enabling a host program to display document content through an object comprising content control and display functionality, the method comprising: providing an object to a host program, the host program enabled to host the object; the object comprising a plurality of public methods for providing document content control and display functionality, the public methods comprising: PageCount, FirstVisiblePage, LastVisiblePage, HorizontalOffset, ExtentWidth, ExtentHeight, ViewportWidth, ViewportHeight, ShowPageBorders, ZoomPercentage, GridColumnCount, VerticalPageSpacing, HorizontalPageSpacing, ToggleToolbar, ReflowDocument, ViewThumbnails, ViewFitToWidth, and ViewFitToHeight; the object comprising flags for styling purposes, the flags comprising: IsAtStart, IsAtEnd, CanZoomIn, CanZoomOut, and IsToolbarMaximized; the object providing an application programming interface (API), and a document content class; the document content class being enabled to receive and to contain document content; the API providing an interface for host programs to control the display of document content through the object; receiving, by the object, a call from the host program through the API; the host program adding content to the object using a set method of the content class; the object providing a default user interface comprising a toolbar and a viewport; and the object displaying document content within the object viewport, the viewport and the toolbar being displayed within a viewing area of the host program. |
20130343104 | 13920729 | 0 | 1. A method of managing recovery from an event in an electrical circuit leading to a loss of control of an inverter in the electrical circuit, the method comprising: sampling a parameter of operation before the event; monitoring for occurrence of the event; calculating an estimated value of the parameter at a time after the event based on an extrapolation of the monitored parameter; and controlling the inverter using the estimated value of the parameter. |
20060041436 | 10919845 | 0 | 1. A resource entitlement computer server (RECS) system having one or more network connections, the system further comprising: a. one or more resource data structures having one or more resource identifiers associated with one or more resources, the resources capable of being provided by a provider; b. one or more event data structures having one or more dynamic event identifiers, the dynamic event identifiers each associated with one or more dynamic event attributes; c. one or more entitlement data structures associating one or more entitlements with one or more entitlement attributes; d. an access data structure that associates one or more of the dynamic events, one or more user attributes, and one or more of the resources with one or more access criteria; and e. an entitlement process that, upon the occurrence of one of the dynamic events, determines whether one or more users associated with the respective user attributes, being selected users, meet the access criteria for the respective resource, the entitlement process further granting the selected users permission to access the resource without disclosing the identity of the selected user. |
20090089302 | 12212246 | 0 | 1. A method to generate linkage indicative data for a linkage indicative diagram that represents a linkage at least between two information resources being interrelated with each other, in a printing apparatus, comprising: collecting at least two pieces of primary linkage information respectively identifying the at least two information resources, of which contents are instructed to be printed, and subsidiary linkage information included in each of the at least two plurality of information resources, the subsidiary linkage information identifying a subsidiary information resource; storing the collected subsidiary linkage information in association with corresponding one of the at least two pieces of primary linkage information in a storage; judging whether each of the at least two pieces of primary linkage information stored in the storage is included in the subsidiary linkage information stored in the storage; determining the linkage between the at least two information resources, one of the at least two information resources being linked to the other of the at least two information resources if the primary linkage information of the one of the at least two information resources is included in the subsidiary linkage information associated with the other of the at least two primary linkage information; and creating the linkage indicative data to represent the linkage indicative diagram that represents the linkage at least between the two information resources based on the linkage determined by the step of determining. |
8051420 | 10698769 | 1 | 1. A method of governing access to resources in a computing utility facility, comprising: providing a processor for receiving a demand profile associated with an application that identifies the resources required from a pool of resources in the computing utility facility during one or more demand cycles; admitting an application to the computing utility facility if resources required for the application can be provided from the pool of resources in accordance with the demand profile and associated one or more demand cycles; and assigning available resources from the pool of resources in response to a request from the applications admitted to the computing utility facility; wherein admitting the application further comprises unfolding the one or more demand cycles from the demand profile associated with the application into time slots requiring resources from the pool of resources, wherein the amount of resources required from the pool of resources by the application varies across each of the time slots such that assignment of resources is tailored to varying demand across each of the time slots; wherein admitting the application further comprises: comparing the time slots requiring resources with a staging calendar of time slots representing availability of resources in the pool of resources; and converting time slots from the staging calendar to a permanent calendar when comparison indicates the time slots requiring resources from the demand profile are available for assignment; and wherein unfolding the one or more demand cycles includes a caveat time cycle based upon an event that occurs over a long-period of time and is selected from a set including special events, holidays, seasonal occurrences and emergencies. |
End of preview. Expand
in Dataset Viewer.
No dataset card yet
New: Create and edit this dataset card directly on the website!
Contribute a Dataset Card- Downloads last month
- 13