Patents by Inventor Robert C. Weir

Robert C. Weir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090168609
    Abstract: A system that enables a user to indicate time zones in their electronic calendar for corresponding time periods in the future, and that makes the future time zone information it collects available for scheduling purposes, so that free time can be correctly determined even for frequently traveling users. The disclosed system further automatically provides indications to the user when input future free time information creates local times for previously scheduled calendar events that are outside of the user's regular working hours.
    Type: Application
    Filed: December 28, 2007
    Publication date: July 2, 2009
    Inventors: Robert C. Weir, Maureen Elizabeth Kraft, Raj Heda, Diana Weir, Elizabeth Paulsen Sawyer
  • Publication number: 20090144254
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to social bookmarking and provide a method, system and computer program product for aggregating scoring of tagged content across social bookmarking systems. In an embodiment of the invention, a method for aggregating scoring of tagged content across social bookmarking systems can be provided. The method can include combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score and applying the single aggregate tag score to the tag in the content. In this regard, combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score can include computing either a simple or a weighted average of the tag scores for the tag to produce the single aggregate score.
    Type: Application
    Filed: November 29, 2007
    Publication date: June 4, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090132329
    Abstract: A computer-implemented method of automatically scheduling meetings can include determining that no timeslot is available for scheduling a proposed meeting involving a plurality of participants and selecting a plurality of candidate times for the proposed meeting. An inconvenience metric for each participant of the proposed meeting can be calculated. A schedule misfit metric for each of the plurality of candidate times can be calculated, at least in part, according to the inconvenience metric for each participant. A time for the proposed meeting can be selected from the candidate times according to the schedule misfit metric. The proposed meeting can be scheduled for the selected time.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 21, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek S. Lam, Asima Silva, Ping Wang, Robert C. Weir, Andrew L. Schirmer, Tolga Oral
  • Publication number: 20090132661
    Abstract: A method of forwarding an instant message to electronic mail can begin with determining availability of an instant messaging client for a recipient. The method can continue with sending the instant message to the instant messaging client for the recipient. The method can include not receiving a reply to the instant message within a pre-defined period of time. The method can further include sending an electronic mail message including the instant message to the recipient upon reaching the pre-defined period of time.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 21, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Titus Kao, Eric S. Portner, Robert C. Weir
  • Publication number: 20090116630
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to telephonic phishing and provide a method, system and computer program product for preventing telephonic phishing. In an embodiment of the invention, a method for preventing telephonic phishing can be provided. The method can include receiving in a third-party validation service a request by an enterprise caller to establish a telephone call with a customer, validating the enterprise caller in the third-party validation service, and notifying the customer of whether or not the enterprise caller is legitimate or illegitimate.
    Type: Application
    Filed: November 6, 2007
    Publication date: May 7, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090112725
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to errata sheet management for published documents and provide a novel and non-obvious method, system and computer program product for errata sheet notification aggregation. In one embodiment of the invention, a method for errata sheet handling in an e-commerce system can be provided. The method can include registering a customer for errata sheet notification for a publication externally to a publisher of the publication and also externally to a publisher of errata sheets for the publication. The method further can include providing a notification to the customer of the publication of the errata sheet in response to determining the publication of an errata sheet for the publication by the publisher of errata sheets for the publication.
    Type: Application
    Filed: October 30, 2007
    Publication date: April 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090106247
    Abstract: A system for allowing multiple users to access and unlock shared electronic documents in a computer system. A group of users are defined as potential “lock-breaker” users for a document, such that they are automatically contacted in the event that a user wishes to unlock the document after it has been locked by another user. The lock-breaker users defined for a document are given access rights to the document that allow them to break a current lock on the document, so that it can be opened for editing, and accordingly re-locked. The lock-breaker users for a document may be organized in a hierarchy, such as a hierarchy matching the relationships of employees of an organization. The lock-breaker hierarchy may define the order in which the lock-breaker users are automatically contacted when a user wishes to access a locked document (e.g. an LDAP directory tree or social network).
    Type: Application
    Filed: October 23, 2007
    Publication date: April 23, 2009
    Inventors: Chenita D. Daughtry, Carol S. Zimmet, Robert C. Weir, Mohamed Bachiri
  • Publication number: 20090106370
    Abstract: A computer-implemented method of sorting electronic messages can include identifying at least one recipient of an electronic message and retrieving a classification scheme of the recipient. An identifier can be included within the electronic message. The identifier can specify a tag selected from the classification scheme of the recipient. The electronic message, including the identifier specifying the selected tag, can be sent.
    Type: Application
    Filed: October 19, 2007
    Publication date: April 23, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Marc Dreyfus, Derek S. Lam, Michael Muller, Asima Silva, Ping Wang, Robert C. Weir
  • Publication number: 20090100183
    Abstract: A computer-implemented method of identifying a missing recipient of an electronic message can include identifying at least one user specified as a recipient of an electronic message and accessing a data store comprising measures of correlation between a plurality of users, wherein the plurality of users comprises the recipient of the electronic message. One or more users not designated as a recipient of the electronic message and having a measure of correlation, with at least one recipient of the electronic message, that exceeds a predetermined threshold can be identified as a potential missing recipient of the electronic message. An indication that a recipient may have been excluded from the electronic message can be output.
    Type: Application
    Filed: October 14, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Derek S. Lam, Asima Silva, Ping Wang, Robert C. Weir
  • Publication number: 20090100052
    Abstract: A system and method for providing collaborative resources to a user. A search expression is received from a user. One more keywords are determined from the search expression. One or more resources are determined responsive to the keywords and based on information related to the user, and the at least one resource is provided to the user. The one or more resources may be determined responsive to and prioritized to at least one of, for example, information in email of the user, an organization of the user, a search history of the user, an organizational position of the user, a level of experience of the user, a geographical location of the user, a geographical location of the resource, a language preference of the user, or a keyword match confidence. The resource may include at least one person and presence information associated with the at least one person.
    Type: Application
    Filed: October 16, 2007
    Publication date: April 16, 2009
    Inventors: Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Barry E. Willner
  • Publication number: 20090099880
    Abstract: A user interface to establish dynamic prioritization of business process instances enables a user to select a business process for association with dynamic prioritization, define at least two different priority levels that correspond to the business process and to define a priority relevant context associated with the business process, where the priority relevant context is evaluated to select an execution priority level from at least two different priority levels for association with a specific instance of the business process. The user interface further enables a user to define at least one directive that is evaluated in consideration of the priority relevant context in order to select the execution priority level and is coupled to data storage to store the priority levels and the priority relevant context.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090100431
    Abstract: Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090049135
    Abstract: A system and method exploits organizational distances associated with an organizational hierarchy in a directed acyclic graph to both affect behavior in instant messaging systems, as well as to modify behavior (presence, IM, availability, who can get to the IM user) based on the reporting relationships that exist in an organization. One part of the invention is in exploiting a directed acyclic graph for the purposes of controlling instant messaging behavior for an individual, a team or a community. This is accommodated by abstracting organizational reporting relationships. The reporting relationships that exist in LDAP are used to enforce top-down rules which determine actions that motivate a change in behavior for instant messaging users across the organization. Such actions are not possible to motivate in conventional art. Conventional art relies on rules that a specific user manually builds, and do not consider capabilities around hierarchical imposition, not a reporting team/group/organizational.
    Type: Application
    Filed: August 16, 2007
    Publication date: February 19, 2009
    Inventors: Patrick J. O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20090024971
    Abstract: A system and method for detecting click fraud where data is received corresponding to a tracking of movement of a cursor on a web page. The movement of the cursor is associated with at least one vector. The at least one vector represents at least a portion of the cursor movement. A confidence level useable in the determination of click fraud is determined. The confidence level is responsive to analysis of the at least one vector representing at least a portion of the cursor movement.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Barry E. Willner, Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Sean Callanan
  • Publication number: 20090024461
    Abstract: A system and method for detecting click fraud where data related to at least one vector associated with a path taken by movement of a cursor on a web page prior to an advertisement on the web page being clicked by a controller of the cursor is received. Click fraud is detected based on an analysis of the received data. A pattern in the at least one vector is analyzed to determine if the cursor movement is human-like and a click fraud detected if the cursor movement is not human-like. In another embodiment, the at least one vector associated with the path is stored and compared with previously stored vectors associated with the path and a click fraud detected if the stored at least one vector is analogous to at least one of the previously stored vectors associated with the path.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Barry E. Willner, Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Sean Callanan
  • Publication number: 20090024460
    Abstract: A system and method for detecting click fraud where the movement of a cursor on a web page is tracked prior to an advertisement on the web page being clicked by a controller of the cursor. The tracking is performed by client code on a client device displaying the web page. A path taken by the movement of the cursor is mapped to at least one vector associated with the path by the client code. The at least one vector is useable to detect a click fraud.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Barry E. Willner, Edith H. Stern, Patrick J. O'Sullivan, Robert C. Weir, Sean Callanan
  • Publication number: 20080319842
    Abstract: Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: Patrick O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080319774
    Abstract: Detecting click fraud that includes a processing device that receives data related to a cursor movement towards an advertisement displayed on a web page. The processing device analyzes the cursor movement data and determines a confidence level useable in the determination of click fraud, the confidence level responsive to the analysis of the cursor movement. The received data includes data that the cursor on the web page has transited at least one pixel cluster on the web page prior to a clicking the advertisement. In one embodiment, a click fraud is detected when the click occurred without the cursor crossing a pixel cluster, and no click fraud occurring when the click occurred after the cursor crossed a pixel cluster.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: Patrick O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080320125
    Abstract: Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page.
    Type: Application
    Filed: June 22, 2007
    Publication date: December 25, 2008
    Inventors: Patrick O'Sullivan, Edith H. Stern, Robert C. Weir, Barry E. Willner
  • Publication number: 20080177755
    Abstract: File transitions are identified that are to be tracked and at least one element of metadata is generated that characterizes each identified file transition to be tracked. Upon receiving a request for historical transition information, elements of metadata corresponding to at least two instances of a tracked file are aggregated and information is provided responsive to the request that is derived from the aggregated elements of metadata. The action metadata may follow that history of each tracked file as well as the histories of copies of each tracked file over time. Thus, an operator can manage the infrastructure of a corresponding computing environment with knowledge of the current and historical activities of files.
    Type: Application
    Filed: January 18, 2007
    Publication date: July 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edith H. Stern, John J. Thomas, Robert C. Weir, Barry E. Willner