Patents Issued in May 12, 2016
-
Publication number: 20160132760Abstract: A dynamic recognizable 2D-code for interaction between electronic devices is provided, applicable to a displaying electronic device displaying the dynamic recognizable 2D-code and a capturing electronic device using a camera module to capture the dynamic recognizable 2D-code displayed by a display screen of the displaying electronic device; including at least a 2D-code, a recognizable image, and a displaying pattern; wherein the 2D-code being a representation of a plurality of data in 2D-code format; the recognizable image being recognizable by human eyes and touchable when displayed on a touch screen, the touching detected by an application and triggering subsequent operations defined by the application; and the displaying pattern defining a sequence of displayed images with each displayed image of specific displayed duration, each displayed image being one of the 2D-code or recognizable image, and the dynamic recognizable 2D-code can be displayed cyclically.Type: ApplicationFiled: November 6, 2014Publication date: May 12, 2016Inventor: Kuei-Sheng TSOU
-
Publication number: 20160132761Abstract: In an IC (integrated circuit) card, a selection signal is received from a user-actuatable switch to select between two different payment card accounts, each represented by a respective account indicator number stored in the IC component of the card. In response to the selection signal, a light-emitting diode indicator on the IC card is illuminated to indicate selection of a corresponding one of the payment card accounts.Type: ApplicationFiled: December 28, 2015Publication date: May 12, 2016Inventor: Matthew Hanmer
-
Publication number: 20160132762Abstract: Method of manufacturing at least one card each including an electronic module (2), this method providing a frame (14) or a plate (18) having at least one aperture (16) provided for receiving said electronic module.Type: ApplicationFiled: January 19, 2016Publication date: May 12, 2016Applicant: NAGRAVISION S.A.Inventor: Francois Droz
-
Publication number: 20160132763Abstract: A wearable tag capable of wireless communications includes a first elastic layer, a second elastic layer over the first elastic layer, wherein the second elastic layer is embedded with a first conductive circuit. The wearable tag includes a dielectric layer on the second elastic layer, a third elastic layer on the dielectric layer, wherein the third elastic layer is embedded with a second conductive circuit, wherein the dielectric layer comprises via holes that contain electric connections between the semiconductor chip and the first conductive circuit. A semiconductor chip is in connection with the first conductive circuit and the second conductive circuit, wherein the semiconductor chip, the first conductive circuit, and the second conductive circuit are configured to wirelessly communicate with external devices. The wearable tag also includes a fourth elastic layer on the semiconductor chip.Type: ApplicationFiled: January 18, 2016Publication date: May 12, 2016Inventors: Junfeng Mei, Jie Li
-
Publication number: 20160132764Abstract: A device for determining an occupancy rate of a conveying means is provided. The device comprises an adjusting means for adjusting at least one detecting means such that the at least one detecting means detects, after detecting the freight conveyed by the conveying means, the conveying means without conveyed freight, or such that the at least one detecting means detects, after detecting the conveying means without conveyed freight, the freight conveyed by the conveying means, and a determining means for determining a current occupancy rate of the conveying means on the basis of the position of the at least one detecting means, which was adjusted by the adjusting means.Type: ApplicationFiled: November 6, 2015Publication date: May 12, 2016Applicant: Krones AGInventors: Christian Paul, Johannes Vierheilig, Juergen Waetzold, Michael Keppler
-
Publication number: 20160132765Abstract: Embodiments of the present invention relate to meeting latency constraints in a multi-core neurosynaptic network. In one embodiment of the present invention, a method of and computer program product for power-driven synthesis under latency constraints is provided. Power consumption of a neurosynaptic network is modeled as wire length. The neurosynaptic network comprises a plurality of neurosynaptic cores. Each of the plurality of neurosynaptic cores is modeled as a node in a placement graph. The graph has a plurality of edges. A weight is assigned to each of the plurality of edges based on a spike frequency. An arrangement of the neurosynaptic cores is determined. The arrangement comprises a length of each of the plurality of edges. A maximum length is compared to the length of each of the plurality of edges. The weight of at least one of the plurality of edges is increased where the length is greater than the maximum length.Type: ApplicationFiled: November 10, 2014Publication date: May 12, 2016Inventors: Charles J. Alpert, Pallab Datta, Myron D. Flickner, Zhuo Li, Dharmendra S. Modha, Gi-Joon Nam
-
Publication number: 20160132766Abstract: A sensor system comprises: an energy storage device; an intermittent energy release device electrically coupled to the energy storage device, wherein the intermittent energy release device causes the energy storage device to release stored energy intermittently; a sensor electrically coupled to the energy storage device; a register electrically coupled to the sensor, wherein the register stores readings from the sensor; a synaptic neural network core electrically coupled to the sensor, wherein the synaptic neural network core converts the readings from the sensor into a synthetic context-based object that is derived from the readings and a context object; a transponder electrically coupled to the synaptic neural network core; and a storage buffer within the transponder, wherein the storage buffer stores the synthetic context-based object for transmission by the transponder to a monitoring system.Type: ApplicationFiled: November 7, 2014Publication date: May 12, 2016Inventors: Samuel S. Adams, Wendy A. Belluomini, Robert R. Friedlander, James R. Kraemer
-
Publication number: 20160132767Abstract: Embodiments of the present invention relate to providing power minimization in a multi-core neurosynaptic network. In one embodiment of the present invention, a method of and computer program product for power-driven synaptic network synthesis is provided. Power consumption of a neurosynaptic network is modeled as wire length. The neurosynaptic network comprises a plurality of neurosynaptic cores. An arrangement of the synaptic cores is determined by minimizing the wire length.Type: ApplicationFiled: November 10, 2014Publication date: May 12, 2016Inventors: Charles J. Alpert, Pallab Datta, Myron D. Flickner, Zhuo Li, Dharmendra S. Modha, Gi-Joon Nam
-
Publication number: 20160132768Abstract: A method for training a neural network to be configured to filter a multipath corrupted signal is provided. The method includes receiving, at the neural network, real or simulated multipath corrupted signal data, and training the neural network on the multipath corrupted signal data using a complex iterated least square thresholding algorithm (CILST) capable of processing both real and complex signals.Type: ApplicationFiled: November 10, 2014Publication date: May 12, 2016Inventor: Gary A. Ray
-
Publication number: 20160132769Abstract: Embodiments of the present invention relate to providing fault-tolerant power minimization in a multi-core neurosynaptic network. In one embodiment of the present invention, a method of and computer program product for fault-tolerant power-driven synthesis is provided. Power consumption of a neurosynaptic network is modeled as wire length. The neurosynaptic network comprises a plurality of neurosynaptic cores connected by a plurality of routers. At least one faulty core of the plurality of neurosynaptic cores is located. A placement blockage is modeled at the location of the at least one faulty core. A placement of the neurosynaptic cores is determined by minimizing the wire length.Type: ApplicationFiled: November 10, 2014Publication date: May 12, 2016Inventors: Charles J. Alpert, Pallab Datta, Myron D. Flickner, Zhuo Li, Dharmendra S. Modha, Gi-Joon Nam
-
Publication number: 20160132770Abstract: After beginning an evaluation of a first generation of a first plurality of candidate solutions and prior to completion of the evaluation, a system can determine a first plurality of tournament participants from the first plurality of candidate solutions The system may determine whether each of the first plurality of tournament participants have been evaluated. In response to determining each of the first plurality of tournament participants have been evaluated the system can determine a first one or more winners of the tournament and determine whether a first quantity of the first one or more winners is above a predefined threshold. In response to determining the first quantity is above a predefined threshold, the system can determine a second generation of a second plurality of candidate solutions, the second plurality of candidate solutions based, at least in part, on the first one or more winners.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventor: Jason F. Cantin
-
Publication number: 20160132771Abstract: A machine learning technique may be applied to applications hosted by an application store to extract features that can be utilized to train one or more classifiers of the applications based on their relative complexity. A processor may receive pairwise comparisons of relative complexity and feature representations for the applications to be used in training of a classifier. The processor may determine a feature set that is correlated with the pairwise comparison of relative complexity and obtain a classifier based thereupon.Type: ApplicationFiled: November 12, 2014Publication date: May 12, 2016Inventors: Sanketh Shetty, Ibrahim Elbouchikhi
-
Publication number: 20160132772Abstract: According to various aspects, an energy management system is provided for generating a user request for information. According to one embodiment, the user selects energy management information to initiate a request for information. The system captures user context, the selected information, and determines information that is necessary to resolve the user's request. In some embodiments, the system requires explicit consent prior to sharing the necessary information with potential responders. In other embodiments, the system can require payment before proceeding. User requests can be routed to potential responders based on user context (e.g., what energy management information was being viewed, what report was being displayed, what actions the user was taking, etc.). User context can also include information on the user so a compatible responder with subject matter expertise can be identified. Generated responses can then be returned in-line in same context (e.g.Type: ApplicationFiled: June 21, 2013Publication date: May 12, 2016Applicant: SCHNEIDER ELECTRIC USA, INC.Inventor: Marcus Little
-
Publication number: 20160132773Abstract: An approach is provided for automatically predicting an event occurrence based on a question from an end user presented using a near-real-time natural language processing (NLP) analysis to generate, score and rank a plurality of event occurrences based on a plurality of question context parameters extracted from the question, one or more user profile parameters for the end user, and the one or more historical questions, answers, and events having a specified spatial and/or temporal proximity to the question which are identified by an information handling system. In the approach, performed by an information handling system, a top ranked event occurrence from the ranked plurality of event occurrences is selected for inclusion in a notification message that is communicated or broadcast to the end user, as well as other users engaged with the information handling system and/or first responders in the affected area.Type: ApplicationFiled: November 6, 2014Publication date: May 12, 2016Applicant: International Business Machines CorporationInventors: Swaminathan Chandrasekaran, Bharath Dandala, Lakshminarayanan Krishnamurthy, Alvin C. Richardson
-
Publication number: 20160132774Abstract: A method and system for predicting the geographic location of a network entity are described. Examples include predicting the geographic location of a network entity by directing the network entity to transmit one or more data packets to a number of predetermined network identifiers, such as IP addresses, where data corresponding to each of the network identifiers is part of a geographic location prediction model. In examples, a dataset that represents transit times for the data packets transmitted from the network entity to the hosts identified by the IP addresses is determined, and a geographic location for the network entity is predicted by applying the geographic location prediction model to the dataset.Type: ApplicationFiled: November 6, 2014Publication date: May 12, 2016Applicant: NEUSTAR, INC.Inventor: Armand Prieditis
-
Publication number: 20160132775Abstract: A method, system, and computer program product for weight adjusted composite model for forecasting in anomalous environments are provided in the illustrative embodiments. A base forecasting model and a second forecasting model are combined to form a composite model, the base forecasting model configured to forecast an event in a time series, the second forecasting model configured to represent an anomalous portion of data in the time series. A mixing algorithm is combined with the composite model to adjust a set of weights associated with the composite model. Upon identifying a future period in which the event is to be forecasted, using the mixing algorithm, a subset of the set of weights is adjusted to from a weight adjusted composite model. The weight adjusted composite model is executed to forecast the event in the future period.Type: ApplicationFiled: November 10, 2014Publication date: May 12, 2016Applicant: International Business Machines CorporationInventors: Aaron K. Baughman, James R. Kozloski, Cameron N. Mcavoy, Brian M. O'Connell
-
Publication number: 20160132776Abstract: Service management methods for use in an electronic device are provided, including the steps of: providing a record including at least one first event and possible probability parameters corresponding thereto, each having a weight; collecting device status information regarding information of current status of the electronic device, user operation behavior information and event triggering information using a data collector; evaluating a first evaluation value according to the device status information regarding information of current status of the electronic device, user operation behavior information and event triggering information, the possible probability parameters and respective weights of the record; and inferring that the first event reoccurs and performing a service corresponding to the first event when the first evaluation value has exceeded a threshold value.Type: ApplicationFiled: June 10, 2015Publication date: May 12, 2016Inventors: Tsung-Hang YANG, Shu-Han WANG, Yu-Hsiang WU, Ling-Fan TSAO
-
Publication number: 20160132777Abstract: In general, embodiments of the present invention provide systems, methods and computer readable media for providing a belief data modeling service for representing and operating belief models data. In embodiments, a belief data modeling service may be configured to perform operations comprising receiving a belief data modeling service request including an input data model representing a set of data, a set of input parameters including at least one of observational data and modeling data, and an operation to be applied to the input data model using the input parameters; and, in response to receiving the belief data modeling service request, generating an output belief data model of the set of entities by generating new states and a set of logical conditionals that constrain the states for at least a subset of the entities by applying the input operation to the input data model.Type: ApplicationFiled: November 12, 2015Publication date: May 12, 2016Inventor: Carlos Luis Araya
-
Publication number: 20160132778Abstract: A simulation apparatus according to one embodiment, including: an event receiver, a decision maker and an execution command transmitter. The event receiver receives an event showing a situation of a first monitor target simulated by a first simulator simulating at least one of motion and state change of the first monitor target from a monitor apparatus monitoring a simulation of the first simulator. The decision maker determines an action based on the event, the action to be carried out with respect to a second monitor target undergoing a simulation of at least one of motion and state change by a second simulator synchronized with the first simulator by time progress. The execution command transmitter transmits an execution command of the action determined by the decision maker to a control apparatus controlling the second simulator.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Applicant: Kabushiki Kaisha ToshibaInventor: Hisashi HAYASHI
-
Publication number: 20160132779Abstract: A hybrid rule reasoning apparatus and a method thereof includes: a reasoning rule classification unit for classifying an input reasoning rule into at least one of a schema rule, an instance rule, and a mixed rule; a memory-based reasoning unit for performing reasoning by applying a schema rule to a previously stored schema triple and specifying a mixed rule into an instance rule by applying the mixed rule to the schema triple; and a disk-based distributed/parallel reasoning unit for performing reasoning by applying the instance rule specified by the memory-based reasoning unit or the instance rule classified by the reasoning rule classification unit to a previously stored instance triple.Type: ApplicationFiled: December 16, 2014Publication date: May 12, 2016Inventors: Seungwoo Lee, Chang Hoo Jeong, Jung Ho Um, Taehong Kim, Hanmin Jung, Won Kyung Sung
-
Publication number: 20160132780Abstract: Images and/or videos may be recommended to a developer based on a classifier. The classifier may determine an application metric that may measure the likelihood that an application is successful for applications on an application store. The system may extract and/or determine features from images and/or videos associated with a training set of applications that are deemed successful. A classifier may be trained on the training set of applications to determine which features of the images and/or videos are associated with the application metric. The classifier may be applied to new and/or existing applications on the application store to generate a recommendation of which images the developer of the application should use to increase the likelihood that the application will be successful.Type: ApplicationFiled: November 12, 2014Publication date: May 12, 2016Inventors: Hrishikesh Aradhye, Atul Kumar
-
Publication number: 20160132781Abstract: Techniques for predicting a user response to content are described. According to various embodiments, a configuration file is accessed, where the configuration file includes a user-specification of raw data accessible via external data sources and raw data encoding rules. In some embodiments, the raw data includes raw member data associated with a particular member and raw content data associated with a particular content item. Thereafter, source modules encode the raw data from the external data sources into feature vectors, based on the raw data encoding rules. An assembler module assembles one or more of the feature vectors into an assembled feature vector, based on user-specified assembly rules included in the configuration file. A prediction module performs a prediction modeling process based on the assembled feature vector and a prediction model, to predict a likelihood of the particular member performing a particular user action on the particular content item.Type: ApplicationFiled: January 15, 2016Publication date: May 12, 2016Inventors: Jonathan David Traupman, Deepak Agarwal, Liang Zhang, Bo Long, Frank Emmanuel Astier
-
Publication number: 20160132782Abstract: A device for estimating a deleted fluid consumption during a deletion phase, where said device comprises: a collection module configured to collect: a) first consumption data comprising information about the consumption of fluid from n fluid meters coming from a first group, and b) second consumption data comprising information about the consumption of fluid from m fluid meters coming from a second group, a computer analysis module which is configured for calculating, as a function of the first and second consumption data weighting coefficients ?i minimizing the distance between the fluid consumptions of the first and second groups, where i is a positive integer included between 1 and m.Type: ApplicationFiled: May 23, 2014Publication date: May 12, 2016Inventors: Benoit Grossin, Philippe Charpentier, Leslie Hatton, Eric Matzner-Lober
-
Publication number: 20160132783Abstract: A system and method of determining sets of related terms in a target domain based on a probability of co-occurrence in a source domain user model and a target domain user model of a same user, creating an adapted user model for a first user based on the sets of related terms, and merging the adapted user model with a target domain user model for the first user to form a merged user model for the first user.Type: ApplicationFiled: February 5, 2015Publication date: May 12, 2016Inventors: Huazhong Ning, Cheng Sheng, Wei Chai
-
Publication number: 20160132784Abstract: A mobile storage system is disclosed that in one aspect identifies a geographical location change of a user, such as movement from a first geographical location to a second geographical location. In response, the mobile storage system may move the user's information to a storage device associated with the second geographical location so that the user's information may be accessed by the user more efficiently.Type: ApplicationFiled: August 3, 2015Publication date: May 12, 2016Inventors: Frances Bevan, David Markowitz, Michael Rekstad, Jae Sim, Christopher Stone
-
Publication number: 20160132785Abstract: Systems and methods for employing macroscopic resonant tunneling operations in quantum processors are described. New modes of use for quantum processor architectures employ probe qubits to determine energy eigenvalues of a problem Hamiltonian through macroscopic resonant tunneling operations. A dedicated probe qubit design that may be added to quantum processor architectures is also described. The dedicated probe qubit enables improved performance of macroscopic resonant tunneling operations and, consequently, improved performance of the new modes of use described.Type: ApplicationFiled: October 22, 2013Publication date: May 12, 2016Applicant: D-Wave Systems Inc.Inventors: Mohammad H.S. Amin, Andrew J. Berkley, Richard G. Harris, Trevor Michael Lanting, Anatoly Yu Smirnov
-
Publication number: 20160132786Abstract: Various embodiments relating to partitioning a data set for training machine-learning classifiers based on an output of a globally trained machine-learning classifier are disclosed. In one embodiment, a first machine-learning classifier may be trained on a set of training data to produce a corresponding set of output data. The set of training data may be partitioned into a plurality of subsets based on the set of output data. Each subset may correspond to a different class. A second machine-learning classifier may be trained on the set of training data using a plurality of classes corresponding to the plurality of subsets to produce, for each data object of the set of training data, a probability distribution having for each class a probability that the data object is a member of the class.Type: ApplicationFiled: November 12, 2014Publication date: May 12, 2016Inventors: Alexandru Balan, Bradford Jason Snow, Christopher Douglas Edmonds, Henry Nelson Jerez, Kyungsuk David Lee, Mark J. Finocchio, Miguel Susffalich, Cem Keskin
-
Publication number: 20160132787Abstract: A system is provided for multi-methodology, multi-user, self-optimizing Machine Learning as a Service for that automates and optimizes the model training process. The system uses a large-scale distributed architecture and is compatible with cloud services. The system uses a hybrid optimization technique to select between multiple machine learning approaches for a given dataset. The system can also use datasets to transferring knowledge of how one modeling methodology has previously worked over to a new problem.Type: ApplicationFiled: January 16, 2015Publication date: May 12, 2016Applicant: Massachusetts Institute of TechnologyInventors: Will D. Drevo, Kalyan K. Veeramachaneni, Una-May O'Reilly
-
Publication number: 20160132788Abstract: The disclosed embodiments illustrate methods and systems for creating a classifier for predicting a personality type of users. The method includes receiving a first tag for messages, from a crowdsourcing platform. The first tag relates to personality type of users. Further, the messages, tagged with first tag are segregated into a training data and a testing data. Further, parameters associated with set of messages in the training data are determined based on type of messages. Further, classifiers are trained for a personality type. Further, a second tag for set of messages in testing data is predicted using trained classifiers for a combination of parameters. A performance of classifiers is determined by comparing the second tag and the first tag associated with set of messages in the testing data. A classifier is selected from classifiers, which is indicative of a best combination of parameters to predict personality type of users.Type: ApplicationFiled: June 5, 2015Publication date: May 12, 2016Inventors: Juan Li, Sumit Bhatia, Chandrima Sarkar
-
Publication number: 20160132789Abstract: A stream of attention method, system, and apparatus determines a first focus of attention by applying a probabilistic analysis to a first set of syntactical elements. The syntactical elements may be derived from external communications or from communications generated internally by a computer-implemented system. Alternatively, the syntactical elements may be determined based on their association with images accessed from an external or internal source. Actions are performed by the computer-implemented system that are expected to reduce uncertainty with respect to the focus of attention. Such actions may include posing syntactical-based interrogatives directed to external entities or internally, searching a corpus of content, and/or moving to a new location and receiving input at the new location.Type: ApplicationFiled: January 18, 2016Publication date: May 12, 2016Applicant: ManyWorlds, Inc.Inventors: Steven Dennis Flinn, Naomi Felina Moneypenny
-
Publication number: 20160132790Abstract: At a data ingestion time, a travel sessionizer captures raw event data representing a plurality of bookings made by a plurality of users for a given day, identifies a plurality of cache entries corresponding to a travel property for the given day, wherein at least one of the plurality of bookings from the raw event data is for the travel property, and updates the plurality of cache entries corresponding to the travel property for the given data to reflect the at least one booking from the raw event data. At a runtime, the travel sessionizer receives a travel analytic query corresponding to the travel property, accesses at least one of the plurality of cache entries corresponding to the travel property for the given day, and executes the travel analytic query using travel data from the at least one of the plurality of cache entries.Type: ApplicationFiled: November 12, 2014Publication date: May 12, 2016Inventor: Craig Weissman
-
Publication number: 20160132791Abstract: Methods and systems for real-time graphical search for airline flight itineraries that satisfy predetermined criteria (e.g., place and time) using a distributed graph processing system are disclosed. The advantages of the graphical method include: computational work is easily split across multiple processors for parallel processing; the resulting speed is appropriate for real-time personalized search; the method naturally supports multi-segment routes up to any user-specified maximum; the method easily handles constraints or freedoms on connections between flights, such as connection time or transferring to another airport in the same metropolis; and the method is efficient due to focusing only on viable flight segments.Type: ApplicationFiled: November 9, 2015Publication date: May 12, 2016Inventors: Ruoming Jin, Ding Chu
-
Publication number: 20160132792Abstract: Systems and methods for facilitating transportation transactions are described. The techniques describe herein may enable users to participate in ride-sharing. Applications may be provide that present graphical user interfaces that enable a user to complete ride-sharing transactions.Type: ApplicationFiled: November 10, 2015Publication date: May 12, 2016Applicant: CARZAC, INC.Inventor: David ROSNOW
-
Publication number: 20160132793Abstract: A reservation system for travel, accommodation, venue ticketing and other purposes may be accessed on-line, for example via a social networking website. A user enters their social networking identification into the reservation system, which is stored for future use. When a subsequent user makes a reservation, they also enter their social networking ID and the system retrieves a list of associated parties from the social networking website, which may be a friends or contacts list, and searches for reservations made by any of those parties which have an overlapping criterion, such as date and destination. It then sends the subsequent user the social networking ID of the overlapping party. The overlap may be used to identify parties who will be at the same destination at the same time as the subsequent user, and/or are travelling on the same flight or journey.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventors: Kevin D O'Sullivan, Renaud Irminger, Stephane Cheikh
-
Publication number: 20160132794Abstract: A reservation system for travel, accommodation, venue ticketing and other purposes may be accessed on-line, for example via a social networking website. A user enters their social networking identification into the reservation system, which is stored for future use. When a subsequent user makes a reservation, they also enter their social networking ID and the system retrieves a list of associated parties from the social networking website, which may be a friends or contacts list, and searches for reservations made by any of those parties which have an overlapping criterion, such as date and destination. It then sends the subsequent user the social networking ID of the overlapping party. The overlap may be used to identify parties who will be at the same destination at the same time as the subsequent user, and/or are travelling on the same flight or journey.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventors: Kevin D. O'Sullivan, Renaud Irminger, Stephane Cheikh
-
Publication number: 20160132795Abstract: A method and system comprising: receiving travel request data; retrieving schedule data associated with the travel request data from the database, the schedule data being further associated with a scheduled travel time; retrieving availability data associated with the travel request data from the cache, the availability data being further associated with an available travel time; and sending the schedule data and the availability data via a computer network.Type: ApplicationFiled: January 15, 2016Publication date: May 12, 2016Inventors: Bruce Elliott, Sofia Krasnovskaya, Alan McCloskey, Michael Fredericks
-
Publication number: 20160132796Abstract: The Cognitive Process Workflow (CPW) method with its grammar, syntax and semantics is a process method, a process modeling method and a workflow method applicable to different technical systems. Among others also the application of the CPW Method in a process tool, workflow tool, workflow engine, enterprise architecture framework and enterprise architecture engine. The CPW Process is represented as simple sentence with a CPW Subject, a CPW Predicate and a CPW Object. The CPW Method—with CPW Process, CPW Dialog and CPW Workflow and in addition with CPW Context Diagrams (CPW Subject Context Diagram, CPW Object Context Diagram and CPW Subject Object Context Diagram)—can be applied to the business areas of financial services (banking, assurance and financial approval), chemistry, pharmacy, medicine, transport, travel, film industry, politics, psychology, legal practice and other business areas.Type: ApplicationFiled: April 15, 2013Publication date: May 12, 2016Inventor: Bernd Schneider
-
Publication number: 20160132797Abstract: In a method for determining appropriate runtime environments for execution of a process model, a computer receives a process model. The process model includes a plurality of activities, wherein two activities are linked by a relationship. The computer determines that the two activities linked by a relationship match a process pattern. The computer determines one or more runtime environments for execution of the process model, wherein each of the one or more runtime environments is capable of executing the process pattern.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventors: Khirallah Birkler, Boris Feist, Martin A. Oberhofer, Torsten Wilms
-
Publication number: 20160132798Abstract: According to an example, service level agreement (SLA) analysis may include receiving selection of a SLA to be analyzed. The SLA may include clauses including attributes. The SLA analysis may further include receiving selection of a grouping option for the SLA clauses, receiving selection of a sub-grouping option for the SLA clauses, and analyzing the attributes of the SLA clauses based on the selected grouping option and the selected sub-grouping option. The SLA analysis may further include receiving selection of a minimum status of the SLA, evaluating the analyzed SLA clauses based on the selected minimum status, and identifying the SLA clauses based on the analysis related to the selected grouping option and the selected sub-grouping option, and based on the evaluation related to the selected minimum status.Type: ApplicationFiled: July 26, 2013Publication date: May 12, 2016Inventors: Jean-Charles Picard, Dominique Pelissier, Anas El Ferachi
-
Publication number: 20160132799Abstract: A computer-implemented method of assessing the veracity of a list of email addresses for use with an e-mail messaging campaign is described. The method comprises: receiving the list of email addresses; categorising and marking any email addresses from the received list of email addresses which are considered to have predetermined email address problems; each marked email address being assigned a category of problem; associating each marked email address with a score, wherein the score is dependent on the severity of risk associated with the assigned category; calculating a cumulative score of all of the marked email addresses; and determining, in view of the cumulative score of the marked email addresses, whether the list of email addresses is safe for use for the email messaging campaign.Type: ApplicationFiled: May 30, 2014Publication date: May 12, 2016Applicant: Smartfocus Holdings LimitedInventors: Jean-Yves Simon, Charles Wells
-
Publication number: 20160132800Abstract: A computer method and system provide means for inputting, verifying and outputting business relationship data to a user. The system comprises a database of business relationships between organizations, some of which are marked as visible or hidden. The system applies an algorithm to determine which relationships to verify. A user may search for an organization according to search criteria and the system will select a set of organizations that match the criteria. Web content is displayed based on the verification and visibility status of the relationships.Type: ApplicationFiled: November 19, 2015Publication date: May 12, 2016Applicant: 0934781 B.C. LTDInventors: Ali DAVAR, Simon James HEWITT, David Robert THOMPSON
-
Publication number: 20160132801Abstract: An end-to-end, centralized and globally-accessible platform for work assignment input, allocation, performance and tracking is herein described. The platform is configured to improve operational and quality assurance effectiveness and efficiency through automated work allocation, performance tracking and reporting. The end-to-end approach accounts for work assignment input, work assignment allocation, work assignment processing and quality assessment and assurance of the completed work assignments. In addition, both automated and manual work assignment allocations from both an operation (i.e., work input and allocation) perspective, as well as, a quality assurance perspective are possible.Type: ApplicationFiled: November 6, 2014Publication date: May 12, 2016Inventors: Gopala Krishna Meher Kala, Sarvesh Neelakanta Subramani, Sreedhar Reddy Chilumula, Mohit Kapoor, Navneesh Sarin, Dinesh Narain
-
Publication number: 20160132802Abstract: The invention provides a computer system including a router receiving a plurality of requests, a broker and a plurality of service workers, each assigned by the broker receive to receive the request and determining an answer based on the request, the router receiving the answers from the service workers, and the router providing an output that is based on at least one of the answers. A language independent platform is provided that can deploy code online while processing requests, execute multiple commands and join their answers, and scale automatically depending on load.Type: ApplicationFiled: November 7, 2014Publication date: May 12, 2016Applicant: IAC Search & Media, Inc.Inventor: Alexander L. Daw
-
Publication number: 20160132803Abstract: An information presenting method for presenting information that supports a determination of an assignment of security officers within a security zone, the information presenting method includes: acquiring an intrusion position of an intruder and one of a position and range targeted by the intruder on a movement route model that indicates a plurality of routes within the security zone; identifying a line that separates the intrusion position from the one of the target position and the target range on the movement route model, based on a number of routes that the line crosses from among the plurality of routes; and causing a display device to display graph information in which the line is displayed as information indicating the assignment of the security officers on the movement route model.Type: ApplicationFiled: September 16, 2015Publication date: May 12, 2016Applicant: Fujitsu LimitedInventor: Hiroaki IWASHITA
-
Publication number: 20160132804Abstract: Systems and methods for continuously planning maintenance of enterprise equipment are provided. Draft forecasts relating to projects in an infrastructure are generated by a computer system. A first user (U1) selects a draft forecast and submits it for approval. The computer system adds the submitted forecast to a submitted scenario. A second user (U2) approves or rejects the submitted forecast for inclusion in a master scenario. The second user may modify the submitted forecast. The system permits continuous planning of projects to maintain an enterprise infrastructure.Type: ApplicationFiled: November 7, 2014Publication date: May 12, 2016Inventors: Lawrence CROFT, Giuseppe GNOCATO, Stanley Thomas COLEMAN, Simon Nesbitt HORNER
-
Publication number: 20160132805Abstract: A service provider system may implement an enterprise catalog service that manages software products and portfolios of software products on behalf of service provider customer organizations. Through an administrator interface of the service, a customer organization administrator may create constraints on the use of the software products, and each constraint may include one or more rules about how the products can be launched. These may include environmental constraints (specifying a region in which a product launches), restrictions on input parameter values (including the types of resource instances on which a product can be launched), quotas (controlling the number of product installations), or billing constraints. Constraints may be applied on a user-to-product arc or on a portfolio-to-product arc. Constraints may be stored as objects, and reference to those objects may be added to product or portfolio objects.Type: ApplicationFiled: November 11, 2014Publication date: May 12, 2016Applicant: AMAZON TECHNOLOGIES, INC.Inventors: FREDERIK CHRISTOPHE DELACOURT, QUAN BINH TO, CHRISTOPHER WHITAKER, RICHARD CURTIS EDWARDS, Jr., JULIEN JACQUES ELLIE, ZACHARY THOMAS CROWELL, BENJAMIN DAVID NEWMAN
-
Publication number: 20160132806Abstract: A service provider system may implement an enterprise catalog service that manages catalogs or portfolios of software products (e.g., desktop applications and server products) on behalf of service provider customer organizations. Through the enterprise catalog service, an administrator in a customer organization may discover, select, and ingest products (e.g., based on their features, pricing, and terms), and may add them to catalogs or portfolios for subsequent use by end users in the organization. The administrator may apply constraints on product use and limit product access to particular end users. The products may include third party products that are made available through the enterprise catalog service and a customer's own applications. The enterprise catalog service may monitor usage of third party products and bill the customer organization. Products managed by the enterprise catalog service may be deployed through an application fulfillment platform or resource stack management platform.Type: ApplicationFiled: November 11, 2014Publication date: May 12, 2016Applicant: Amazon Technologies, Inc.Inventors: QUAN BINH TO, CHRISTOPHER WHITAKER, SHESHADRI SUPREETH KOUSHIK, BENJAMIN DAVID NEWMAN, JULIEN JACQUES ELLIE, ZACHARY THOMAS CROWELL
-
Publication number: 20160132807Abstract: The embodied invention is a software system in a central computer that facilitates scheduling of a high volume of meetings among a wide array of individuals and companies with important secure methods for managing documents requiring a notarized signature or third party document exchange. The schedule is run from a central location where individual notaries attend signing appointments. Important convenience features are included that facilitate the volume of meetings and the accuracy needed to transfer signed legal documents to the correct authority in a timely manner.Type: ApplicationFiled: October 15, 2015Publication date: May 12, 2016Inventors: Charles J. Camenzind, Spencer T. Brown
-
Publication number: 20160132808Abstract: A service provider system may implement an enterprise catalog service that manages catalogs and portfolios of software products (e.g., desktop applications and server products) on behalf of service provider customer organizations. Through the service, a customer organization administrator may create a portfolio (e.g., a container) and configure the portfolio for subsequent use by end users in the organization, which may include adding products, users, permissions, and constraints on the usage of the products (individually or collectively) to the portfolio for all authorized end users or particular end users. Portfolios may be shared with other administrators by publishing them or through direct notification of sharing. A recipient of a shared portfolio may, after importing it, further restrict access to the portfolio or the use of the products therein, but cannot modify the portfolio itself. Changes made by a portfolio owner may be propagated to authorized users and to portfolio importers automatically.Type: ApplicationFiled: November 11, 2014Publication date: May 12, 2016Applicant: AMAZON TECHNOLOGIES, INC.Inventors: QUAN BINH TO, FREDERIK CHRISTOPHE DELACOURT, SHESHADRI SUPREETH KOUSHIK, CHRISTOPHER WHITAKER, BENJAMIN DAVID NEWMAN, JULIEN JACQUES ELLIE, ZACHARY THOMAS CROWELL
-
Publication number: 20160132809Abstract: Methods and systems for identifying conditional actions in a business process are disclosed. In accordance with one such method, text fragments are extracted from input documents. In addition, a plurality of pairs of the text fragments that respectively include text fragments that are similar according to a pre-defined similarity standard are determined. For each pair of at least a subset of the pairs, at least one difference between the text fragments of the corresponding pair is determined. Further, at least two particular pairs of the subset of the pairs are merged in response to determining that the particular pairs have at least one of the determined differences in common. Additionally, the merged particular pairs are output to indicate the conditional actions in the business process.Type: ApplicationFiled: January 14, 2016Publication date: May 12, 2016Inventors: TAIGA NAKAMURA, HIRONORI TAKEUCHI