Patents by Inventor Jennifer Lynn La Rocca
Jennifer Lynn La Rocca has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11481561Abstract: Aspects of the present disclosure include determining, by a processor, an ontology, the ontology comprising a plurality of ontological relationships, receiving, by the processor, a plurality of passages, determining, by the processor, a target set of co-occurring entities comprising a first entity and a second entity, determining a first passage in the plurality of passages that includes the first entity and the second entity, determining, from the ontology, a first ontological relationship between the first entity and the second entity, analyzing the first passage to determine a congruency score for the first ontological relationship, and generating a relationship annotation between the first entity and the second entity in the first passages based on the congruency score being within a threshold.Type: GrantFiled: July 28, 2020Date of Patent: October 25, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Scott Carrier, Jennifer Lynn La Rocca, Rebecca Lynn Dahlman, Mario J. Lorenzo
-
Patent number: 11416686Abstract: Techniques for natural language processing based on user context include identifying a context of a user and responsive to receiving a request from the user intended for processing by a natural language processing (NLP) model, accounting for the context of the user in relation to the request. A result from the NLP model having accounted for the context of the user is provided.Type: GrantFiled: August 5, 2020Date of Patent: August 16, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kristin E. McNeil, Mario J. Lorenzo, Jennifer Lynn La Rocca, Debra L. Angst, Rebecca Lynn Dahlman
-
Patent number: 11270065Abstract: Embodiments include methods, system and computer program products for extracting attributes from embedded table structures in a document. Aspects include identifying a table in the document and identifying one or more headers of the table by locating co-occurring attributes in the table. Aspects also include identifying a plurality of values in the table and creating an annotation for each of the plurality of values value in the table, wherein each annotation includes text extracted from the one or more headers that correspond to the location of the value in the table.Type: GrantFiled: September 9, 2019Date of Patent: March 8, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Debra L. Angst, Jennifer Lynn La Rocca, Kristin E. Mcneil, Mario J. Lorenzo, Rebecca Lynn Dahlman
-
Publication number: 20220043980Abstract: Techniques for natural language processing based on user context include identifying a context of a user and responsive to receiving a request from the user intended for processing by a natural language processing (NLP) model, accounting for the context of the user in relation to the request. A result from the NLP model having accounted for the context of the user is provided.Type: ApplicationFiled: August 5, 2020Publication date: February 10, 2022Inventors: Kristin E. McNeil, Mario J. Lorenzo, Jennifer Lynn La Rocca, Debra L. Angst, Rebecca Lynn Dahlman
-
Publication number: 20220036009Abstract: Aspects of the present disclosure include determining, by a processor, an ontology, the ontology comprising a plurality of ontological relationships, receiving, by the processor, a plurality of passages, determining, by the processor, a target set of co-occurring entities comprising a first entity and a second entity, determining a first passage in the plurality of passages that includes the first entity and the second entity, determining, from the ontology, a first ontological relationship between the first entity and the second entity, analyzing the first passage to determine a congruency score for the first ontological relationship, and generating a relationship annotation between the first entity and the second entity in the first passages based on the congruency score being within a threshold.Type: ApplicationFiled: July 28, 2020Publication date: February 3, 2022Inventors: Scott Carrier, Jennifer Lynn La Rocca, Rebecca Lynn Dahlman, Mario J. Lorenzo
-
Publication number: 20220036000Abstract: Examples described herein provide a computer-implemented method that includes performing a text analysis on unstructured text to identify a restriction associated with a subject. The method further includes identifying an environmental requirement associated with the subject based at least in part on the restriction. The method further includes identifying one or more devices associated with the subject based at least in part on the environmental requirement. The method further includes receiving data from the one or more devices. The method further includes determining device usage information based at least in part on the data. The method further includes determining a compliance of the subject to the restriction based at least in part on the device usage information. The method further includes, responsive to determining non-compliance of the subject, changing a function of the one or more devices.Type: ApplicationFiled: July 29, 2020Publication date: February 3, 2022Inventors: Jennifer Lynn La Rocca, Rebecca Lynn Dahlman, Kristin E. McNeil, Debra L. Angst, Mario J. Lorenzo
-
Publication number: 20210192133Abstract: Methods, systems, and computer program products for auto-suggestion of expanded terms for concepts are provided. Aspects include analyzing, by a cognitive model, a seed dictionary to determine one or more concepts associated with the seed dictionary, determining a target ontology, analyzing, by the cognitive model, the target ontology to determine one or more expanded terms for each concept of the one or more concepts, determining, by the cognitive model, a confidence score for each of the one or more expanded terms, and updating the seed dictionary by associating the one or more expanded terms with a corresponding concept from the one or more concepts based at least in part on the confidence score exceeding a first threshold confidence score.Type: ApplicationFiled: December 20, 2019Publication date: June 24, 2021Inventors: Jennifer Lynn La Rocca, Mario J. Lorenzo, Rebecca Lynn Dahlman, Kristin E. McNeil
-
Patent number: 11036939Abstract: An artifact identification engine identifies artifacts from structured and unstructured data in one or more documents based on pre-defined artifacts, by using cognitive annotations. The identified artifacts are analyzed based at least on received inputs. A cartridge that includes artifacts that are relevant to the structured and unstructured data is generated, based on the analyzing.Type: GrantFiled: April 11, 2019Date of Patent: June 15, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mario J. Lorenzo, Jennifer Lynn La Rocca, Rebecca Lynn Dahlman, Kristin E. McNeil
-
Publication number: 20210117812Abstract: Methods, systems, and computer program products for cognitive model modification are provided. Aspects include receiving a plurality of documents, receiving a cognitive model, identifying a set of cognitive model modification based on an alteration to the cognitive model, and for each cognitive model modification in the set of cognitive model modifications determining an updated concept or surface form based on each cognitive model modification, identifying one or more documents from the plurality of documents based on the updated concept or surface form, adding the one or more documents to a subset of documents, and generating an updated cognitive model based on one or more text analytics performed, by the cognitive model, on the subset of documents.Type: ApplicationFiled: October 22, 2019Publication date: April 22, 2021Inventors: Mario J. Lorenzo, Rebecca Lynn Dahlman, Jennifer Lynn La Rocca, Debra L. Angst, Kristin E. McNeil
-
Publication number: 20210073325Abstract: Embodiments include methods, system and computer program products for extracting attributes from embedded table structures in a document. Aspects include identifying a table in the document and identifying one or more headers of the table by locating co-occurring attributes in the table. Aspects also include identifying a plurality of values in the table and creating an annotation for each of the plurality of values value in the table, wherein each annotation includes text extracted from the one or more headers that correspond to the location of the value in the table.Type: ApplicationFiled: September 9, 2019Publication date: March 11, 2021Inventors: DEBRA L. ANGST, JENNIFER LYNN LA ROCCA, KRISTIN E. MCNEIL, MARIO J. LORENZO, REBECCA LYNN DAHLMAN
-
Publication number: 20200327195Abstract: An artifact identification engine identifies artifacts from structured and unstructured data in one or more documents based on pre-defined artifacts, by using cognitive annotations. The identified artifacts are analyzed based at least on received inputs. A cartridge that includes artifacts that are relevant to the structured and unstructured data is generated, based on the analyzing.Type: ApplicationFiled: April 11, 2019Publication date: October 15, 2020Inventors: Mario J. Lorenzo, Jennifer Lynn La Rocca, Rebecca Lynn Dahlman, Kristin E. McNeil
-
Patent number: 7890758Abstract: A global key control mechanism provides a single point of overall control for key generation, but portions of the key generation and/or allocation tasks may be delegated to client computer systems, thereby reducing network traffic. The global key control mechanism may download a client key generation mechanism on one or more client computer systems, and may allocate a block of keys to the client key generation mechanism. Requests for keys may then be routed to the client key generation mechanism, which can generate and/or allocate keys within the block of keys that the global key control mechanism allocated to it. When the block of keys is used up, the client key generation mechanism may request another block from the global key control mechanism. The preferred embodiments also include the capability of downloading a client key generation mechanism with an associated block of keys once the requests from one or more client applications exceed a predetermined threshold.Type: GrantFiled: March 27, 2003Date of Patent: February 15, 2011Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Jennifer Lynn La Rocca, Richard Joseph Stevens
-
Patent number: 7213014Abstract: A database operation mechanism includes the capability of specifying a predefined database operation as a source of data for a different database operation. When the different database operation needs to be performed, the database operation mechanism determines whether the different database operation can use a predefined database operation as a data source. If so, the predefined database operation is specified as the source of data for the different database operation. If the different database operation cannot use a predefined database operation as a data source, the database operation mechanism determines whether the different database operation can use a modified form of a predefined database operation as a data source. If so, the different database operation may use the modified predefined database operation as a source of data.Type: GrantFiled: March 27, 2003Date of Patent: May 1, 2007Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Jennifer Lynn La Rocca, Rick Joseph Stevens
-
Publication number: 20040190724Abstract: A global key control mechanism provides a single point of overall control for key generation, but portions of the key generation and/or allocation tasks may be delegated to client computer systems, thereby reducing network traffic. The global key control mechanism may download a client key generation mechanism on one or more client computer systems, and may allocate a block of keys to the client key generation mechanism. Requests for keys may then be routed to the client key generation mechanism, which can generate and/or allocate keys within the block of keys that the global key control mechanism allocated to it. When the block of keys is used up, the client key generation mechanism may request another block from the global key control mechanism. The preferred embodiments also include the capability of downloading a client key generation mechanism with an associated block of keys once the requests from one or more client applications exceed a predetermined threshold.Type: ApplicationFiled: March 27, 2003Publication date: September 30, 2004Applicant: International Business Machines CorporationInventors: Richard Dean Dettinger, Jennifer Lynn La Rocca, Richard Joseph Stevens
-
Publication number: 20040193567Abstract: A database operation mechanism includes the capability of specifying a predefined database operation as a source of data for a different database operation. When the different database operation needs to be performed, the database operation mechanism determines whether the different database operation can use a predefined database operation as a data source. If so, the predefined database operation is specified as the source of data for the different database operation. If the different database operation cannot use a predefined database operation as a data source, the database operation mechanism determines whether the different database operation can use a modified form of a predefined database operation as a data source. If so, the different database operation may use the modified predefined database operation as a source of data.Type: ApplicationFiled: March 27, 2003Publication date: September 30, 2004Applicant: International Business Machines CorporationInventors: Richard Dean Dettinger, Jennifer Lynn La Rocca, Rick Joseph Stevens