Patent application number | Description | Published |
20080256097 | Method and system for location identification - A method and system for generating location information for a network space is provided. Generating location information for a network space involves maintaining location profiles for spaces familiar to a client device, and performing location detection for the client device in a current space utilizing a signature of the current space and the location profiles. Location detection for the client device in a current space can also be performed utilizing information indicating the probable presence of familiar resources in the current space. | 10-16-2008 |
20080288641 | Method and system for providing relevant information to a user of a device in a local network - A method and system for providing information to a user of a device on a local network is provided. This involves obtaining information about current user activity on the local network, obtaining contextual information about current user activity on the local network and obtaining additional information interrelated to the contextual information and the user activity information. Then correlations are identified between the additional information, the contextual information and the user activity information. The correlations are used in forming a query to search for information related to the current user activity, to provide to the user. | 11-20-2008 |
20080307093 | Method and system for managing resource consumption by transport control protocol connections - A method and system for managing resource consumption by TCP connections. After establishing a TCP connection between two devices, such as a client and a server, the TCP connection is placed into a dormant mode when the server has no data to send to the client. Only when there is data to be sent, is the TCP connection awakened and the required resources for communication allocated for the TCP connection. This approach reduces resource usage for a TCP connection, and enables a TCP server to push information to a large number of clients. | 12-11-2008 |
20080313190 | Method and system for searchable web services - A method and system for a searchable Web service is disclosed, which involve gathering service information, using the gathered information for constructing a service definition file in a pre-defined format and enabling one or more search engines to discover information in the service definition file. | 12-18-2008 |
20080313320 | Method and system for generating a space signature - A method and system implementing a process for generating a signature for a network space using existing resources in the space. The process for generating a signature for a space involves discovering the resources in the space and generating a signature for the space using the identification of the devices. | 12-18-2008 |
20090055132 | DETERMINING SITUATIONAL PATTERNS OF USE FOR COMPUTING SYSTEMS - Techniques for determining situational patterns of use of computing systems are disclosed. A situational pattern of use can be determined based on the situations encountered by the computing system as the situations occur without having to predefine a set of situations. Generally, a situation can be determined and/or defined based on the context of use of the computing system when the use occurs. The context of use can, for example, be determined based on internal and external variables including the physical environment where a device is used and biological data associated with a person who uses the device. The state of use of the computing system can, for example, be determined based on the state (or status) of one or more components of the computing system (e.g., the state of one or more active applications that are being used by person). Similar to the context of use, the state of use can be determined as the use occurs without having to predefine potential uses of the computing system (e.g., there is no need to predefine or know the applications that will be used on a device). Moreover, the state of use can be connected to context of use defining a situation in which the state of use has occurred to allow determining a pattern of use of the computing system at least based on the association of the state of use with the situation effectively defined by the contextual usage data which can be obtained as and when the use occurs. | 02-26-2009 |
20090055334 | IDENTIFYING AND RECOMMENDING POTENTIAL USES OF COMPUTING SYSTEMS BASED ON THEIR PATTERNS OF USE - Techniques for identifying potential uses of computing systems are disclosed. A potential use of a computing system can be identified by considering the context that effectively represents a situation for the computing system and further considering a known situation to be a match for the situation. A known situation can be associated with a known corresponding state of use of the computing system. As such, a potential state of use of the computing system can be identified based on one or more known states of use of the computing system. A matching situation can, for example, be determined, based on pattern of use data that effectively associates a state of use with a situation in which the use may or has occurred. Identifying a potential state of use, among other things, allows making various applications, tasks, and/or services more accessible and/or effectively recommending what is likely to be used for a given situation. As a result, computing systems and the manner in which they can be used can be enhanced. In particular, a much better user experience can be achieved for mobile systems. | 02-26-2009 |
20090055388 | Method and system for selecting search engines for accessing information - A method and system for access to information using search engines is provided. A search engine is selected for executing a query based on search engine characteristic information and the query. The characteristic information for each search engine includes information representing searching capabilities of each search engine. Selecting a search engine further involves determining a similarity between the query and the characteristic information for each search engine, and selecting a search engine based on the similarities such that a search engine with the highest similarity may be selected for executing the query and returning search results. | 02-26-2009 |
20090055426 | Method and system for generating playlists for content items - A method and system for generating playlists for content items is provided. Generating a playlist involves monitoring user interaction with one or more content items as user-content interactions, determining a context associated with one or more user-content interactions, and generating a playlist of the content items based on the user-content interactions and the associated context. | 02-26-2009 |
20090055523 | IDENTIFYING AND RECOMMENDING POTENTIAL COMMUNICATION STATES BASED ON PATTERNS OF USE - Techniques for identifying potential communication uses of various systems are disclosed. Identifying potential communication uses of a computing system can improve the manner in which the computing system is used by allowing more intelligent decisions and better choices to be made regarding its communication use. By way of example, communication applications (or tasks or services) that are likely (or more likely) to be used by a person in a particular situation can be identified as potential communication use of a particular device. Such potential uses can, for example, be made more assessable (or more readily available) and/or effectively recommended (or automatically initiated), thereby allowing a person to more conveniently use the device. By way of example, identifying communication applications or tasks that are likely to be used by a person in a particular situation for various reasons (e.g., preferences and/or habits of a person in a particular situation) as potential communication use of a system (e.g., computing and/or communication device) allows making the communications applications, tasks, or services more assessable and/or effectively recommending them for use in a particular situation. | 02-26-2009 |
20090070318 | Method and system for selecting personalized search engines for accessing information - A method and system for selecting personalized search engines for accessing information is provided. Each personalized search engine represents one or more base search engines. Characteristic information, representing searching capabilities of each of the multiple personalized search engines is obtained. A personalized search engine is selected among the multiple personalized search engines for executing a query based on said characteristic information and the query. | 03-12-2009 |
20090077065 | Method and system for information searching based on user interest awareness - A method and system are provided for information searching based on user interest awareness. Information that represents user interest is obtained. One or more key terms are obtained from the user interest information. Then, a given query is enhanced based on one or more of the key terms for generating an enhanced query for searching. | 03-19-2009 |
20090105987 | SITUATION-AWARE RECOMMENDATION USING LIMITED CLUSTER SIZES - In one embodiment, data relating to usage patterns of the user is stored, wherein the data includes information as to items which were used and the context in which they were used. The data is then clustered into clusters of data points, wherein the number of data points per cluster is limited based on a preset value. Then a centroid is determined for each of the clusters. Clusters similar to the current context of the user are then selected by comparing a data point representing the current context of the user to one or more of the centroids. Then, for each of the one or more items, a probability that the user wishes to use the corresponding item is computed, based on the selected similar clusters, wherein the probabilities are used to recommend one or more of the items. | 04-23-2009 |
20090106304 | SITUATION RECOGNITION FOR RECOMMENDATION USING MERGE-SPLIT APPROACH - In one embodiment, data relating to usage patterns of the user is stored, wherein the data includes information as to items which were used and the context in which they were used. The data is then clustered into input clusters of data points. It is determined if there are any input clusters that are similar to each other. Similar clusters are merged if there are any input clusters similar to each other. Any non-merged input clusters are divided into split clusters if the split clusters would not be similar to each other. The determining, merging, and dividing are then repeated using the merged, divided, and remaining unmerged and undivided clusters as input clusters. | 04-23-2009 |
20090106314 | SITUATION-AWARE RECOMMENDATION USING CORRELATION - In one embodiment, data relating to usage patterns of the user is stored, wherein the data includes information as to items which were used and the context in which they were used. A correlation table is constructed. Correlation values between each item and each context are then stored in then correlation table, wherein the correlations are used to recommend one or more of the items. | 04-23-2009 |
20090177689 | SITUATION-AWARE PATTERN EXTRACTION AND RECOMMENDATION - A method for determining user interests is provided, the method comprising: storing data items relating to usage patterns of the user, wherein the data items include an interest portion and a context portion; grouping the data items into context groups, each context group having data items with related context portions; for each context group, determining if the number of data items in the context group is greater than or equal to a first threshold; creating a first partition having context groups having a number of data items greater than or equal to the first threshold; averaging the ratings for interests in the data items in the context groups in the first partition, resulting in each context group in the first partition being a cluster; and deriving a user's interest by comparing a current context to a context group in the first partition. | 07-09-2009 |
20090271148 | COLD-START IN SITUATION-AWARE SYSTEMS - A definition of a set of context variables to be considered is received, wherein the context variables represent categories of situations in which the computer system can be. A definition of a set of activities to be considered is also received, wherein the activities represent activities that can be performed using the computer system. For each context variable to be considered, a definition of a set of states to be considered is received, wherein the states represent situations in which the computer system can be. For each context variable to be considered, a specification of first probability distributions for each corresponding state is received. For each context variable to be considered, for each activity to be considered, a specification of second probability distributions to represent the likelihood of the activity being performed in the corresponding context is received. Usage data is generated using the first second probability distributions. | 10-29-2009 |
20090271244 | SITUATION-AWARE AD-HOC SOCIAL INTERACTION - In one embodiment, a method for social networking is provided. A social profile is automatically built for a first user by monitoring the usage of an electronic device operated by the first user. A social network appropriate for the first user is determined by examining the first user's social profile. The appropriate social network is provided to the first user to join if the appropriate social network is available for the first user to join. | 10-29-2009 |
20090271356 | SITUATION-AWARE THRESHOLDING FOR RECOMMENDATION - In one embodiment, data relating to usage patterns of the user is stored, wherein the data includes information as to items which were used and the context in which they were used. The data is then clustered into clusters of data points. Then a centroid is determined for each of the clusters. A cluster similar to a current context of the user is selected by comparing a data point representing the current context of the user to one or more of the centroids. For each of one or more items, a threshold based on values for a plurality of the centroids with respect to the corresponding item, wherein a threshold is used to compare with centroid value of an item in a selected cluster to determine whether to recommend the item. | 10-29-2009 |
20090307176 | CLUSTERING-BASED INTEREST COMPUTATION - Data relating to usage patterns of the user are stored. The data includes a context portion having information as to the context in which items were used and an interest rating portion indicative of an interest of the user in one or more objects of interest. The data is clustered into clusters of data points. For each of the clusters, a centroid is determined. The centroid includes a context portion and an interest rating portion. A current context of the user is received. Clusters are selected by comparing a data point representing the current context with the context portion of one or more centroids. Based on the selected clusters, an interest rating is computed. The computed interest rating indicates an interest of the user in one of the one or more objects of interest, given the current context. | 12-10-2009 |
20090307262 | SITUATION-DEPENDENT RECOMMENDATION BASED ON CLUSTERING - Data relating to usage patterns of the user is stored, wherein the data includes an application portion having information as to items which were used and a context portion having information as to the context in which the items were used. The data is clustered into clusters of data points and centroid are computed, wherein the centroid includes an application portion and a context portion. Clusters similar to a current context of the user are selected by comparing a data point representing the current context of the user to the context portions of one or more of the centroids. For each of one or more items, a expectation value that the user wishes to use the corresponding item is computed, based on the application portions of the selected similar clusters, wherein the expectation values are used to recommend one or more of the items. | 12-10-2009 |
20090307608 | INTERACTION BETWEEN REAL-WORLD DIGITAL ENVIRONMENTS AND VIRTUAL WORLDS - In one embodiment, a method for operating a local virtual world proxy is provided. A virtual world view is received corresponding to a virtual world client. Information about resources available to the virtual world client is obtained. Virtual representations of one or more resources available to a virtual world client are fetched. Then the virtual representations are injected into the virtual world view. The virtual world view is then forwarded to the virtual world client for display to a user of the virtual world client. | 12-10-2009 |
20090322517 | CREATING DYNAMIC SIGNATURES FOR VIRTUAL LOCATIONS - In one embodiment, a method for forming location signatures for a device, the method comprising: retrieving information regarding one or more digital devices detected around the device during a first set time period; and creating a first signature for a location based on information regarding the one or more digital devices detected during the first set time period. | 12-31-2009 |
20100010944 | MANAGING PERSONAL DIGITAL ASSETS OVER MULTIPLE DEVICES - In a first embodiment of the present invention, a method for managing digital assets of a user over multiple home network-enabled devices, the method comprising: receiving information, from a plurality of home network-enabled personal devices, regarding digital assets accessed by the personal devices, wherein the plurality of personal devices are owned or operated by the user and the information is automatically gathered by each personal device tracking its own usage; storing the information; and providing, to one of the plurality of personal devices, identifications of digital assets accessed by the personal devices by accessing the stored information. | 01-14-2010 |
20100036814 | PERSONAL MASHUPS - In a first embodiment of the present invention, a method for automated creation of a mashup is provided, the method comprising: receiving data needs of a user; identifying sources of data to satisfy the data needs by comparing the data needs to available data sources; retrieving metadata relating to the identified sources of data from a source metadata store; identifying services to satisfy the data needs by comparing the retrieved metadata to available services; retrieving metadata related to the identified services from a service metadata store; and generating a plan for supplying data from the identified sources of data to the identified services based on the retrieved metadata from the source metadata source and the retrieved metadata from the service metadata source. | 02-11-2010 |
20100114930 | SITUATION-AWARE, INTEREST BASED SEARCH QUERY GENERATION - A method for generating a portion of a query for a user is provided, the method comprising: retrieving information regarding the user's interests; and generating a portion of a query by analyzing the user's interests and the current situation of a user device operated by the user to determine at least one keyword. | 05-06-2010 |
20100131590 | EXTENDING THE CAPABILITY OF COMPUTING DEVICES BY USING DYNAMICALLY SCALABLE EXTERNAL RESOURCES - Techniques for extending the capabilities of computing environments and/or systems are disclosed. A scalable and dynamic external computing resource can be used in order to effectively extend the internal computing capabilities of a computing environment or system. The scalable and dynamic external computing resource can provide computing resources that far exceed the internal computing resources, and provide the services as needed, and in a dynamic manner at execution time. As a result, a computing device may function with relatively limited and/or reduced computing resources (e.g., processing power, memory) but have the ability to effectively provide as much computing services as may be needed, and provide the services when needed, on demand, and dynamically during the execution time. | 05-27-2010 |
20100131592 | EXECUTION ALLOCATION COST ASSESSMENT FOR COMPUTING SYSTEMS AND ENVIRONMENTS INCLUDING ELASTIC COMPUTING SYSTEMS AND ENVIRONMENTS - Techniques for assessing the cost of allocation of execution and affecting the allocation of execution are disclosed. The cost of allocation of execution to or between a first computing device (e.g., a mobile device) and one or more computing resource providers (e.g., one or more Clouds) can be determined during runtime of the executable code. It will be appreciated that a computing system can operate independently of the first computing device and one or more computing resource providers and provide execution allocation cost assessment as a service to the first computing device and/or one or more computing resource providers. Execution allocation cost can be assessed (or determined) based on execution allocation data pertaining to the first computing device and/or one or more computing resource providers. By way of example, power consumption of a mobile device can be used as a factor in determining how to allocate individual components of an application program (e.g., weblets) between a mobile phone and a Cloud. The invention is especially suited for Elastic computing environment and systems. In an Elastic computing environment, scalable and dynamic external computing resources can be used in order to effectively extend the computing capabilities beyond that which can be provided by internal computing resources of a computing system or environment. | 05-27-2010 |
20100131966 | FLAT OR EXTENDED ARCHITECTURE USING AN INTEGRATED APPLICATION AND OPERATING SYSTEM COMPONENT FOR COMPUTING SYSTEMS AND ENVIRONMENTS - An architectural model can use integrated and/or flat (or extended) approaches. An “integrated application and OS” component can effectively integrate at least one computer application program with one or more OS functions, in an integrated approach. The integrated application and OS component can be provided in or as an upper level system (or layer) in relation to a lower level system (or layer). The lower level system can include an OS operable to perform a reduced set of operating system functions not including one or more functions that can be performed by the integrated application and OS component of the upper layer. Furthermore, the OS may be specialized and/or optimized for the components of the upper level system including the integrated application and OS component. By way of example, the OS may be specialized and/or optimized for Web-based and/or Browser-based applications of the integrated application and OS component. In a flat approach, one or more components can be provided as adjacent components in an upper level, thereby allowing effective extension of the upper level to accommodate various needs including, for example, the need for new hardware, or customization for a particular situation. An adjacent component can, for example, include one or more operating system components not provided by the OS (e.g., Device Drivers) and/or one or more functions that are not provided by the operating system (e.g., application management, security and/or isolation of applications), effectively serve as an interface to another adjacent layer and/or the OS, or provide Real-Time Operating System (RTOS). | 05-27-2010 |
20100161380 | RATING-BASED INTERESTS IN COMPUTING ENVIRONMENTS AND SYSTEMS - An interest in an object of interest in a given situation can be determined by determining multiple sets of probability values for specific interest levels. Each set of probability values includes a probability that a specific interest level occurs in a situation represented by a plurality of context variables each having a plurality of possible context values. Input context values are then obtained. The relevance of each one of the sets of probability values to the input context values can be determined in order to determine a projected interest level. | 06-24-2010 |
20100161381 | SEMANTICS-BASED INTERESTS IN COMPUTING ENVIRONMENTS AND SYSTEMS - An input situation can be represented by at least a first context variable. Data that includes interest values for multiple context variables can be provided and obtained. The obtained data can include a first data pertaining to the input situation and a second data pertaining to one or more other situations. It can be determined whether the first context variable is associated with a discrete range of values or a continuous range of values. At least a portion of data pertaining to the situations can be determined to be proximate data when the first context variable is associated with a continuous range of values. Based on the input situation and the proximate data, an interest value for the first input situation can be determined as a prediction of the interest in the input situation. | 06-24-2010 |
20100161544 | CONTEXT-BASED INTERESTS IN COMPUTING ENVIRONMENTS AND SYSTEMS - Techniques for determining an interest in an object of interest in a given situation are disclosed. Multiple situation-based interest rating components can be provided for various situations. Each situation-based interest rating component can include an interest value indicative of interest in an object of interest in one of the situations. An input situation can then be obtained. One of the situation-based interest rating components can be identified matching an input situation. The relevance of one or more of the other situation-based interest rating components to the identified matching component can then be determined. This can, for example, be done by computing one or more distances between only the respective situation-based portions of the matching situation-based interest rating component and one or more of the other components, or based on the interest value-based portion of each component, or both. | 06-24-2010 |
20100198604 | GENERATION OF CONCEPT RELATIONS - Given a situation, an interest in a first object of interest can be determined. In the given situation, interest in a first object of interest is initially unknown and interest in a second object of interest is known. Data is obtained. The obtained data can, for example, include documents from the Internet or other forms of information from a network and/or database. The number of joint occurrences of the first object of interest and the second object of interest in the data is determined. Based on this number, at least one correlation value is determined. Based on the at least one correlation value, an interest value is determined. The interest value indicates the interest in the first object of interest in the given situation. | 08-05-2010 |
20100293559 | SHARING INPUT/OUTPUT (I/O) RESOURCES ACROSS MULTIPLE COMPUTING SYSTEMS AND/OR ENVIRONMENTS - Techniques for achieving Input/Output I/O coalition across multiple computing systems and/or environments (e.g., computing devices) are disclosed. I/O coalition can be achieved by allowing one or more internal I/O devices of a first computing device to be effectively shared with a second computing device while one or more I/O devices of the second computing device is effectively shared with the first computing device. An Input-Output Coalition Management (IOCM) system can be provided for each the computing devices to facilitate I/O coalition between them. An IOCM system can, for example, be provided as Virtual Input-Output Computing Environment (VIOCE). By way of example, one or more Virtual Machines (VMs) can be provided to effectively support one or more Virtual Device Drivers (VDDs). An IOCM system can also be provided as and/or by an Operating System (OS). Furthermore, an IOCM system of a first computing device can be operable to switch between: (i) use of a first I/O device of the first computing device, (ii) use of a second I/O device of a second computing device, and (iii) use of a third I/O device of a third computing device. | 11-18-2010 |
20110138174 | BROWSER SECURITY STANDARDS VIA ACCESS CONTROL - A computing system is operable to contain a security module within an operating system. This security module may then act to monitor access requests by a web browser and apply mandatory access control security policies to such requests. It will be appreciated that the security module can apply mandatory access control security policies to such web browser access attempts. | 06-09-2011 |
20110145360 | WEB APPLICATION SCRIPT MIGRATION - In a first embodiment of the present invention, a method is provided comprising: determining if a portion of a script of web application code within a web application is migratable to a remote infrastructure, wherein the portion of the script contains one or more functions; and modifying the portion of the script if the portion of the script is migratable, such that execution of the portion of the script results in the one or more functions being executed on the remote infrastructure, wherein the remote infrastructure is not restricted to the device on which the web application was designed or distributed. | 06-16-2011 |
20110319053 | SITUATION-AWARE THRESHOLDING FOR RECOMMENDATION - In one embodiment, data relating to usage patterns of the user is stored, wherein the data includes information as to items which were used and the context in which they were used. The data is then clustered into clusters of data points. Then a centroid is determined for each of the clusters. A cluster similar to a current context of the user is selected by comparing a data point representing the current context of the user to one or more of the centroids. For each of one or more items, a threshold based on values for a plurality of the centroids with respect to the corresponding item, wherein a threshold is used to compare with centroid value of an item in a selected cluster to determine whether to recommend the item. | 12-29-2011 |
20120005429 | REUSING STYLE SHEET ASSETS - In a first embodiment of the present invention, a method is provided comprising: parsing a document, wherein the document contains at least one reference to a style sheet; for each referenced style sheet: determining if a ruleset corresponding to the referenced style sheet is contained in a first local cache; if the ruleset corresponding to the style sheet is contained in the first local cache; if the referenced style sheet is not contained in the first local cache, parsing the referenced style sheet to derive a ruleset; and applying the ruleset(s) to the document to derive a layout for displaying the document. | 01-05-2012 |
20120117073 | PERSONAL MASHUPS - In a first embodiment of the present invention, a method for automated creation of a mashup is provided, the method comprising: receiving data needs of a user; identifying sources of data to satisfy the data needs by comparing the data needs to available data sources; retrieving metadata relating to the identified sources of data from a source metadata store; identifying services to satisfy the data needs by comparing the retrieved metadata to available services; retrieving metadata related to the identified services from a service metadata store; and generating a plan for supplying data from the identified sources of data to the identified services based on the retrieved metadata from the source metadata source and the retrieved metadata from the service metadata source. | 05-10-2012 |
20120166436 | METHOD AND SYSTEM FOR GENERATING PLAYLISTS FOR CONTENT ITEMS - A method and system for generating playlists for content items is provided. Generating a playlist involves monitoring user interaction with one or more content items as user-content interactions, determining a context associated with one or more user-content interactions, and generating a playlist of the content items based on the user-content interactions and the associated context. | 06-28-2012 |
20120191706 | SITUATION-AWARE RECOMMENDATION USING CORRELATION - In one embodiment, data relating to usage patterns of the user is stored, wherein the data includes information as to items which were used and the context in which they were used. A correlation table is constructed. Correlation values between each item and each context are then stored in then correlation table, wherein the correlations are used to recommend one or more of the items. | 07-26-2012 |
20120246172 | METHOD AND SYSTEM FOR FACILITATING INFORMATION SEARCHING ON ELECTRONIC DEVICES - A method and system for facilitating information searching for a user of an electronic device is provided. Facilitating searches involves obtaining information about the user interests, identifying potential data of interest to the user, extracting data related to said data of interest to the user, and collecting the extracted related data for presentation to the user on the device. | 09-27-2012 |
20120265884 | EXECUTION ALLOCATION COST ASSESSMENT FOR COMPUTING SYSTEMS AND ENVIRONMENTS INCLUDING ELASTIC COMPUTING SYSTEMS AND ENVIRONMENTS - Techniques for assessing the cost of allocation of execution and affecting the allocation of execution are disclosed. The cost of allocation of execution between a first computing device (e.g., mobile device) and one or more computing resource providers (e.g., Clouds) can be determined during runtime of the code. A computing system can operate independently of the first computing device and a computing resource provider and provide execution allocation cost assessment. Execution allocation cost can be assessed based on execution allocation data pertaining to the first computing device and computing resource providers. Power consumption of a mobile device can be used as a factor in determining how to allocate individual components of an application program between a mobile phone and a Cloud. In an Elastic computing environment, external computing resources can be used to extend the computing capabilities beyond that which can be provided by internal computing resources. | 10-18-2012 |
20130018954 | SITUATION-AWARE USER SENTIMENT SOCIAL INTEREST MODELS - A method for constructing user models from user usage and context data is provided where a personal interest graph for a user is constructing from interests of the user derived from usage data and situational data derived from one or more sensors of the electronic device. The nodes in the interest graph also contain information about a degree of user interest in the corresponding interest and a sentiment of the user at the time when the usage data suggests that the user expressed interest in the interest graph. The personal interest graph can be modified by annotating one or more nodes of the personal interest graph with influence information. Later, a current sentiment for the user can be determined by analyzing input from one more sensors on the electronic device, and a particular node can be located in the personal interest graph based on the information in the nodes. | 01-17-2013 |
20130038756 | LIFE-LOGGING AND MEMORY SHARING - In a first embodiment of the present invention, a method for creating a memory object on an electronic device is provided, comprising: capturing a facet using the electronic device; recording sensor information relating to an emotional state of a user of the electronic device at the time the facet was captured; determining an emotional state of the user based on the recorded sensor information; and storing the facet along with the determined emotional state as a memory object. | 02-14-2013 |
20130254836 | BROWSER SECURITY STANDARDS VIA ACCESS CONTROL - A computing system is operable to contain a security module within an operating system. This security module may then act to monitor access requests by a web browser and apply mandatory access control security policies to such requests. It will be appreciated that the security module can apply mandatory access control security policies to such web browser access attempts. | 09-26-2013 |
20130275498 | MANAGING PERSONAL DIGITAL ASSETS OVER MULTIPLE DEVICES - In a first embodiment of the present invention, a method for managing digital assets of a user over multiple home network-enabled devices, the method comprising: receiving information, from a plurality of home network-enabled personal devices, regarding digital assets accessed by the personal devices, wherein the plurality of personal devices are owned or operated by the user and the information is automatically gathered by each personal device tracking its own usage; storing the information; and providing, to one of the plurality of personal devices, identifications of digital assets accessed by the personal devices by accessing the stored information. | 10-17-2013 |
20130304739 | COMPUTING SYSTEM WITH DOMAIN INDEPENDENCE ORIENTATION MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a gather module configured to gather a distribution of a class bias score for a feature and across multiple domains; a transformation module, coupled to the gather module, configured to generate a transformation for a characteristic of a domain independence based on the class bias score; and a consolidation module, coupled to the transformation module, configured to compute a domain-independent class-bias score based on the transformation. | 11-14-2013 |
20140047015 | WEB APPLICATION SCRIPT MIGRATION - In a first embodiment of the present invention, a method is provided comprising: determining if a portion of a script of web application code within a web application is migratable to a remote infrastructure, wherein the portion of the script contains one or more functions; and modifying the portion of the script if the portion of the script is migratable, such that execution of the portion of the script results in the one or more functions being executed on the remote infrastructure, wherein the remote infrastructure is not restricted to the device on which the web application was designed or distributed. | 02-13-2014 |
20140279726 | COMPUTING SYSTEM WITH ITERATIVE KNOWLEDGE MANAGEMENT MECHANISM AND METHOD OF OPERATION THEREOF - A computing system includes: a control unit configured to operate a knowledge discovery component to extract knowledge from data, operate a knowledge engineering component to perform a knowledge extension or a knowledge evolution on the data or the knowledge; and a user interface, coupled to the communication unit, configured to operate an interface component to interact with the knowledge discovery component and the knowledge engineering component. | 09-18-2014 |