Method and system for communication, publishing, searching, sharing and
dynamically providing a journal feed
A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to...
Database query optimization utilizing remote statistics collection
A method, apparatus and program product to optimize a database query. In a first system having a first dataspace, a query plan is generated for the database...
Crawling pages is disclosed. Pages are crawled up to a target number of pages. Additional pages, that have an importance that is equal to or greater than an...
Constructing a domain-specific ontology by mining the web
A method, apparatus, and program product is provided for constructing a domain-specific ontology for interpreting a policy. A phrase assumed to be associated...
Communication apparatus, communication method and communication program
When a retrieval keyword that requires contents is transmitted to a server, the server retrieves contents from a database based on the retrieval keyword, and...
System and method for performing a search operation within a sequential
access data storage subsystem
A system and method for performing a search operation within a sequential access data storage subsystem are disclosed. According to one embodiment, a data...
System for obtaining recommendations from multiple recommenders
A personalization network service enables developers to develop recommenders that can be made available to content site operators for providing recommendations...
Adding low-latency updateable metadata to a text index
Techniques are disclosed for allowing efficient updating of metadata and high performance searching through the use of a text index and a separate updateable...
Dynamically ranking nodes and labels in a hyperlinked database
The World Wide Web (WWW) can be modelled as a labelled directed graph G(V,E,L), in which V is the set of nodes, E is the set of edges, and L is a label function...
System for integrated utilization of data to identify, characterize, and
support successful farm and land use...
Computer configurations, search processors (2), software, and methods of viewing and analyzing information regarding agriculture or land use automatically...
Lock acquisition among nodes of divided cluster
The acquisition of a lock among nodes of a divided cluster is disclosed. A method is performable by each of at least one node of the cluster. A node waits for a...
Managing and coordinating savepoint functionality in a distributed
Provided are techniques for savepoint processing. One of a savepoint statement, a rollback to savepoint statement, and a release savepoint statement is...
Method and a system for information identification
A method for detecting an information item within an information sequence obtained from a digital medium, the information item comprising any one of a specified...
Application recovery from network-induced data corruption
A source application reads a body of data in data block sized units and calculates a checksum value for each data block before sending the data block, the...
Database recovery method applying update journal and database log
A database recovery method including a computer and a storage system, in which: the storage system includes a disk drive for storing data; the disk drive...
Virtual data store creation and use
A method, apparatus, and system for accessing units of storage that depends at least in part on an address of the unit of storage and the time that data was...
System and method for managing data loss due to policy violations in
A method and apparatus for managing data loss due to policy violations in temporary files is described. In one embodiment, the method includes monitoring, by a...
Storage system and method
A storage system comprising apparatus for consolidating portions of free space from a plurality of remote storage units; and apparatus for presenting the...
Database log capture that publishes transactions to multiple targets to
handle unavailable targets by...
A first log reader publishes first messages to a plurality of queues. The messages comprise changes for transactions extracted from a log by the first log...
Method and system for dynamically collecting data for checkpoint tuning
and reduce recovery time
A system and method for checkpoint tuning in a computer environment comprising a processor coupled to a statistical database and at least one database or table...
User-definable run-time grouping of data records
In some embodiments, a method includes receiving input that includes a criteria for filtering a set of records to define a subset of records within the set of...
System for detecting migration differences of a customized database schema
Provided is a database schema migration difference detecting technique for detecting differences of a customized database schema before and after database...
System and method for synchronizing data record with web document in a
content management system
A system and associated method for synchronizing a record with a web document. A synchronizer selects a web document that is stored in a published web document...
Synchronization server process
Among other things, techniques and systems are disclosed for providing sync server process. Processing data sync sessions includes processing a request to...
Real time backup system for computer users
This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The...
Synchronization methods and systems
Connection architectures, methods, systems and computer readable media are described. In one exemplary embodiment, a computer readable medium comprises a first...
Synchronization of records of a table using bookmarks
A method and system for controlling an application server in order to provide application services to clients while maintaining synchronization between records...
Article of manufacture and system for autonomic data caching and copying
on a storage area network aware file...
Techniques are provided for processing a request. When the request is to read a data unit, information regarding the closest physical block locations is...
Method for the transmission of data samples
A method enables efficient and coherent sample data storage in a system containing data transmitting and receiving devices. The algorithm is implemented by...
Techniques for remote redirection are discussed. Redirection may be used to mimic a local user experience on a remote system. Redirection may include...
Data structure, system and method for knowledge navigation and discovery
Data structures, systems, methods and computer program products that enable precise information retrieval and extraction, and thus facilitate relational and...
Incrementally adding segmentation criteria to a data set
A system displays and filters reports including website visitation data in response to receiving user input. The system includes a client for processing the...
Data access service queries
A technique is described for selectively obtaining information stored in a business warehouse. Such a technique may include selecting a data access service from...
Methods for similarity searching of chemical reactions
A computer-based method for identifying at least one pair of similar chemical reactions between a plurality of reactions each related to preparation of at least...
Scenario workflow based assessment system and method
A system and a method for automating performance assessments of an exercise or a training activity provide event assessment information in real-time to one or...
Computer reputation-based message boards and forums
System and method for operating reputation-based communication or content service. Method includes obtaining metric related to first user contributor...
Mechanism to abstract fact types from a rule engine
Some embodiments of a fact type abstraction mechanism of a rule engine have been presented. In one embodiment, a fact type abstraction layer is provided to a...
Intrusion detection system alerts mechanism
A system and method for analyzing Intrusion Detection System (IDS) alert data associated with a computer network is described. The method includes applying...
Intelligent reputation attribution platform
Systems and methods allowing for the attribution of reputation to data sources (e.g., for the creation of referrals) are provided. In an illustrative...
Method and a computer program product for providing a response to a
statement of a user
A method for providing a response to a statement of a user, the method includes: receiving user input that comprises a portion of a user statement; selecting,...
Data pattern analysis using optimized deterministic finite automaton
Techniques for data pattern analysis using deterministic finite automaton are described herein. In one embodiment, a number of transitions from a current node...
Information request generator
A sensor manager comprising: a situation information expected value network and an information instantiator. The situation information expected value network...
Differential availability determination and notification
A method for determining differential availability, the method including identifying a current context of a first entity, and determining a current availability...
Method and apparatus for organizing information in a computer system
A method and apparatus for organizing information in a computer filing system. The method and apparatus include the creation of a pile comprising a collection...
Information processing method and apparatus, and image pickup device
An output value of neuron within an objective layer of a hierarchical neural network is computed. The data of the output value of neuron is stored in a memory...
Method and apparatus for generating an inference about a destination of a
trip using a combination of...
The claimed subject matter provides systems and/or methods that facilitate generating an inference about events that may not have yet been observed. Open-world...
Optimal cessation of training and assessment of accuracy in a given class
of neural networks
A system, method, and process for configuring iterative, self-correcting algorithms, such as neural networks, so that the weights or characteristics to which...
Comprehensive identity protection system
A system and method for protecting identity fraud are disclosed. A system includes a detection subsystem to identify applications and/or accounts at risk of...
System and method for image classification
Systems and methods for image classification are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a...
Cognitive memory and auto-associative neural network based search engine
for computer and network located...
Designs for cognitive memory systems storing input data, images, or patterns, and retrieving it without knowledge of where stored when cognitive memory is...