sentence1
stringlengths 40
15.9k
| sentence2
stringlengths 88
20k
| label
float64 0.5
0.99
|
---|---|---|
24. The non-transitory computer readable medium of claim 18 , wherein the method further comprises using the personality type of the customer to facilitate a future interaction with the customer. | 24. The non-transitory computer readable medium of claim 18 , wherein the method further comprises using the personality type of the customer to facilitate a future interaction with the customer. 25. The non-transitory computer readable medium of claim 24 , wherein the method further comprises facilitating at least one future interaction with the customer by routing a future customer-agent communication to an agent matched to the personality type of the customer. | 0.864914 |
10. A computer-readable storage medium having computer-executable instructions recorded thereon for delivering search results that include data from one or more online data repositories that store a plurality of online reports and one or more offline data repositories that store a plurality of archived or compressed reports in a long-term backup system, the computer-executable instructions operable when executed on a computer to: set security to limit access to the plurality of online reports stored in the online data repositories and the plurality of archived or compressed reports stored in the offline data repositories; specify one or more mandatory criteria fields and one or more optional criteria fields to search the online data repositories and the offline data repositories; search, by a processor, the plurality of online reports stored in the online data repositories to a first report among the plurality of online reports stored in the online data repositories that matches criteria provided in a search query in response to the criteria provided in the search query including at least the one or more mandatory criteria fields; search, by the processor, the plurality of archived or compressed reports stored in the long-term backup system associated with the offline data repositories to identify a second report among the plurality of archived or compressed reports stored in the offline data repositories that matches the criteria provided in the search query in response to the criteria provided in the search query including at least the one or more mandatory criteria fields; export data from the first report identified in the online data repositories in accordance with one or more export options provided for the first report; export data from the second report stored in the offline data repositories in accordance with one or more export options provided for the second report, wherein the computer-executable instructions are further operable to unarchive or decompress the second report identified among the plurality of archived or compressed reports stored in the offline data repositories to export the data from the second report; analyze the data exported from the first report and the data exported from the second report; deliver the analyzed data exported from the first report and the analyzed data exported from the second report to a spreadsheet application in response to a user that submitted the search query having one or more permissions that satisfy the security, wherein manipulating the data delivered to the spreadsheet application does not modify the first report stored in the online data repositories or the second report stored in the long-term backup system associated with the offline data repositories; and track activity associated with the user interacting with the analyzed data delivered to the spreadsheet application to generate an audit log, vary a presentation associated with the first report or the second report depending on read versus unread status, and generate statistical analysis relating to the tracked activity. | 10. A computer-readable storage medium having computer-executable instructions recorded thereon for delivering search results that include data from one or more online data repositories that store a plurality of online reports and one or more offline data repositories that store a plurality of archived or compressed reports in a long-term backup system, the computer-executable instructions operable when executed on a computer to: set security to limit access to the plurality of online reports stored in the online data repositories and the plurality of archived or compressed reports stored in the offline data repositories; specify one or more mandatory criteria fields and one or more optional criteria fields to search the online data repositories and the offline data repositories; search, by a processor, the plurality of online reports stored in the online data repositories to a first report among the plurality of online reports stored in the online data repositories that matches criteria provided in a search query in response to the criteria provided in the search query including at least the one or more mandatory criteria fields; search, by the processor, the plurality of archived or compressed reports stored in the long-term backup system associated with the offline data repositories to identify a second report among the plurality of archived or compressed reports stored in the offline data repositories that matches the criteria provided in the search query in response to the criteria provided in the search query including at least the one or more mandatory criteria fields; export data from the first report identified in the online data repositories in accordance with one or more export options provided for the first report; export data from the second report stored in the offline data repositories in accordance with one or more export options provided for the second report, wherein the computer-executable instructions are further operable to unarchive or decompress the second report identified among the plurality of archived or compressed reports stored in the offline data repositories to export the data from the second report; analyze the data exported from the first report and the data exported from the second report; deliver the analyzed data exported from the first report and the analyzed data exported from the second report to a spreadsheet application in response to a user that submitted the search query having one or more permissions that satisfy the security, wherein manipulating the data delivered to the spreadsheet application does not modify the first report stored in the online data repositories or the second report stored in the long-term backup system associated with the offline data repositories; and track activity associated with the user interacting with the analyzed data delivered to the spreadsheet application to generate an audit log, vary a presentation associated with the first report or the second report depending on read versus unread status, and generate statistical analysis relating to the tracked activity. 17. The computer-readable storage medium of claim 10 , wherein the data exported from the first report or the second report includes data from any line in the respective report having an inclusion filtering criteria provided in the export options associated with the respective report and excludes data from any line in the respective report having an exclusion filtering criteria provided in the export options associated with the respective report. | 0.518497 |
1. A computer-implemented system that facilitates data management, comprising: at least one processor; a type component of a financial intelligence system that executes on the at least one processor to create and assign types to system entities, the types associated with behaviors defined by member properties; a rules component that executes on the at least one processor to generate rules based on the types; a type content component that executes on the at least one processor to store the rules as a hierarchy of classes, the hierarchy of classes including a tree of application types and, for each application type in the tree, a set of rules associated with the application type; a type creator component that performs a depth-first traversal of the rules of at least one application type in the tree of application types to create an instance of the at least one application type; and a runtime engine that executes on the at least one processor to generate an application that employs the behaviors based on execution of the rules associated with the instance of the at least one application type. | 1. A computer-implemented system that facilitates data management, comprising: at least one processor; a type component of a financial intelligence system that executes on the at least one processor to create and assign types to system entities, the types associated with behaviors defined by member properties; a rules component that executes on the at least one processor to generate rules based on the types; a type content component that executes on the at least one processor to store the rules as a hierarchy of classes, the hierarchy of classes including a tree of application types and, for each application type in the tree, a set of rules associated with the application type; a type creator component that performs a depth-first traversal of the rules of at least one application type in the tree of application types to create an instance of the at least one application type; and a runtime engine that executes on the at least one processor to generate an application that employs the behaviors based on execution of the rules associated with the instance of the at least one application type. 3. The system of claim 1 , wherein the runtime engine also generates a model that employs the behaviors based on execution of the rules associated with the instance of the at least one application type. | 0.5 |
1. A computer-implemented method, comprising: receiving, by a computing system, text of a message entered by a user into a communication application program, wherein the text represents typed or audibly spoken content input by the user; determining, by a computing system, a level of randomness of characters in a portion of the text; identifying a threshold level of randomness from a plurality of different threshold levels of randomness based at least in part on a particular label of a text entry field into which the portion of the text was input; determining, by a computing system, whether the level of randomness of the characters in the portion of the text satisfies the threshold level of randomness; and responsive to determining that the level of randomness of the characters in the portion of the text satisfies the threshold level of randomness, precluding, by a computing system, a text processing system from performing a spell checking procedure on the portion of the text or from performing a word auto complete procedure on the portion of the text. | 1. A computer-implemented method, comprising: receiving, by a computing system, text of a message entered by a user into a communication application program, wherein the text represents typed or audibly spoken content input by the user; determining, by a computing system, a level of randomness of characters in a portion of the text; identifying a threshold level of randomness from a plurality of different threshold levels of randomness based at least in part on a particular label of a text entry field into which the portion of the text was input; determining, by a computing system, whether the level of randomness of the characters in the portion of the text satisfies the threshold level of randomness; and responsive to determining that the level of randomness of the characters in the portion of the text satisfies the threshold level of randomness, precluding, by a computing system, a text processing system from performing a spell checking procedure on the portion of the text or from performing a word auto complete procedure on the portion of the text. 6. The computer-implemented method of claim 1 , further comprising identifying, by a computing system, whether the portion of the text is a contiguous set of characters that are without intervening spaces and that is bounded by spaces. | 0.695045 |
21. A computer-implemented method of social query response comprising: a) monitoring, by a computer, queries from users, each query submitted to a vendor via an interactive chat feature of an external electronic communication platform, b) monitoring, by the computer, human responses to the queries, c) monitoring, by the computer, subsequent communications conducted via the electronic communication platform until each query is resolved; d) applying, by the computer, a first machine learning algorithm to the monitored communications to identify a query susceptible to response automation; e) applying, by the computer, a second machine learning algorithm to the query susceptible to response automation to identify one or more responses likely to resolve the query; and f) either i) notifying, by the computer, a human to respond to the query susceptible to response automation with the one or more responses likely to resolve the query, or ii) instantiating, by the computer, an autonomous software agent configured to respond to the query susceptible to response automation with the one or more responses likely to resolve the query. | 21. A computer-implemented method of social query response comprising: a) monitoring, by a computer, queries from users, each query submitted to a vendor via an interactive chat feature of an external electronic communication platform, b) monitoring, by the computer, human responses to the queries, c) monitoring, by the computer, subsequent communications conducted via the electronic communication platform until each query is resolved; d) applying, by the computer, a first machine learning algorithm to the monitored communications to identify a query susceptible to response automation; e) applying, by the computer, a second machine learning algorithm to the query susceptible to response automation to identify one or more responses likely to resolve the query; and f) either i) notifying, by the computer, a human to respond to the query susceptible to response automation with the one or more responses likely to resolve the query, or ii) instantiating, by the computer, an autonomous software agent configured to respond to the query susceptible to response automation with the one or more responses likely to resolve the query. 29. The method of claim 21 , wherein the second machine learning algorithm utilizes a glossary, knowledge base, or enterprise database. | 0.629951 |
12. A computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code comprising: (a) program code for providing a plurality of documents as a stream of characters; (b) program code for splitting said stream into a plurality of serialized data lines; (c) program code for inserting said plurality of serialized data lines into a list; (d) program code for grouping duplicate serialized data lines in said list with an indication of a frequency of occurrence for each said serialized data line in said stream; (e) program code for eliminating serialized data lines having a threshold frequency below a predefined threshold from said list; (f) program code for grouping remaining serialized data lines to represent the template; (g) program code for calculating a hash value for each said serialized data line in the template; (h) program code for inserting each said hash value into a hash map of a template set; (i) program code for checking for hash values of a new document in said hash map; (j) program code for determining a similarity match to a particular template based on a predefined threshold of template hash values, of said template set, being found in said new document; and (k) program code for, based on said similarity match, executing a security policy for said new document. | 12. A computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code comprising: (a) program code for providing a plurality of documents as a stream of characters; (b) program code for splitting said stream into a plurality of serialized data lines; (c) program code for inserting said plurality of serialized data lines into a list; (d) program code for grouping duplicate serialized data lines in said list with an indication of a frequency of occurrence for each said serialized data line in said stream; (e) program code for eliminating serialized data lines having a threshold frequency below a predefined threshold from said list; (f) program code for grouping remaining serialized data lines to represent the template; (g) program code for calculating a hash value for each said serialized data line in the template; (h) program code for inserting each said hash value into a hash map of a template set; (i) program code for checking for hash values of a new document in said hash map; (j) program code for determining a similarity match to a particular template based on a predefined threshold of template hash values, of said template set, being found in said new document; and (k) program code for, based on said similarity match, executing a security policy for said new document. 13. The storage medium of claim 12 , wherein said security policy includes at least one of the enforcement actions selected from the group consisting of: quarantining said new document, blocking said new document from being transmitted, releasing said new document for transmission only upon administrator approval, notifying an intended recipient of a document status of said new document, requesting additional user credentials in order to allow transmission of said new document, and applying an encryption protocol for securely transmitting said new document. | 0.5 |
11. A method performed by a computer executing instructions of a computer program for identifying explanatory text for a display page, the method comprising: identifying repeated patterns of elements within a display page by comparing elements of the display page to other elements of the display page, a repeated pattern having an anchor along with text associated, the anchor being an element that includes a reference to a referenced display page, wherein patterns of elements are considered to be repeated when the patterns have the same number of elements and the patterns have an edit distance that is within a threshold; finding a dominant anchor within a repeated pattern by when the repeated pattern includes multiple anchors, when only one anchor of the repeated pattern contains a block element and has text associated with the anchor, designating that anchor as the dominant anchor; and when more than one anchor of the repeated pattern contains a block element and has text associated with the anchor, designating no anchor as the dominant anchor; extracting from a repeated pattern the text associated with the dominant anchor, wherein the extracted text represents explanatory text for the referenced display page; and generating a summary of a display page based on the extracted explanatory text. | 11. A method performed by a computer executing instructions of a computer program for identifying explanatory text for a display page, the method comprising: identifying repeated patterns of elements within a display page by comparing elements of the display page to other elements of the display page, a repeated pattern having an anchor along with text associated, the anchor being an element that includes a reference to a referenced display page, wherein patterns of elements are considered to be repeated when the patterns have the same number of elements and the patterns have an edit distance that is within a threshold; finding a dominant anchor within a repeated pattern by when the repeated pattern includes multiple anchors, when only one anchor of the repeated pattern contains a block element and has text associated with the anchor, designating that anchor as the dominant anchor; and when more than one anchor of the repeated pattern contains a block element and has text associated with the anchor, designating no anchor as the dominant anchor; extracting from a repeated pattern the text associated with the dominant anchor, wherein the extracted text represents explanatory text for the referenced display page; and generating a summary of a display page based on the extracted explanatory text. 19. The method of claim 11 wherein a display page is represented as a tag tree with nodes representing elements and the identifying of repeated patterns identifies a reference explanatory text node as a collection of adjacent, sibling nodes with a subtree of one node containing a reference node with associated text and identifies a reference explanatory text region as a collection of adjacent, sibling reference explanatory text nodes that have the same length and are within a threshold edit distance that varies based on the number of block nodes within the reference explanatory text nodes. | 0.549392 |
25. The non-transitory computer readable storage media of claim 23 , the asymmetric service further comprising: automatically identifying, by a computer, electronic mail users with an electronic mail address referenced in at least one electronic mail message stored in an electronic mail folder of the first member by data-mining the electronic mail messages within the first member's electronic mail folders for adding the identified electronic mail users to a contact list of the first member, the contact list comprising contact information for a subset of the electronic mail users of the public network; and receiving input from the first member for personalizing an invitation to join the private network, the invitation to join the private network for transmission to the subset of electronic mail users in the first member's contact list. | 25. The non-transitory computer readable storage media of claim 23 , the asymmetric service further comprising: automatically identifying, by a computer, electronic mail users with an electronic mail address referenced in at least one electronic mail message stored in an electronic mail folder of the first member by data-mining the electronic mail messages within the first member's electronic mail folders for adding the identified electronic mail users to a contact list of the first member, the contact list comprising contact information for a subset of the electronic mail users of the public network; and receiving input from the first member for personalizing an invitation to join the private network, the invitation to join the private network for transmission to the subset of electronic mail users in the first member's contact list. 26. The non-transitory computer readable storage media of claim 25 , the asymmetric service further comprising: composing the invitation to join the private network with a subset of aesthetic appeal related features from a variety of aesthetic appeal related features, the subset of the aesthetic appeal related features selected based on empiric data showing the subset of the aesthetic appeal related features statistically determined to prompt a response to the invitation to join the network; and analyzing the electronic mail messages within the first member's electronic mail folders to select electronic mail users that are non-members of the private network and who based on the analysis are determined to be likely to respond to an invitation to join the network, the analysis including producing a report in the form of a frequency bar graphically representing the frequency of electronic email communication with the selected electronic mail users, wherein the requesting information from the non-member via a public communications protocol includes transmitting an electronic mail message including the invitation to join the private network. | 0.5 |
9. A fault detection device comprising: a processor; and a memory communicatively coupled to the processor, wherein the memory stores processor instructions, which, on execution, causes the processor to: extract a diagnostic log for at least one video conference session from a video conferencing system, wherein the diagnostic log comprises unstructured textual information; convert the diagnostic log into a uniform time zone diagnostic log comprising structured textual information; collect Quality of Service (QoS) metrics associated with the at least one video conference session and event parameters associated with at least one live event within the at least one video conference session; process the uniform time zone diagnostic log, the QoS metrics, and the event parameters based on at least one of a plurality of analytics rules stored in an analytics rule database, wherein the plurality of analytics rules in the analytics rule database are created based on machine learning performed on the uniform time zone diagnostic log, the QoS metrics, and the event parameters; and perform at least one predefined action based on a result of the processing. | 9. A fault detection device comprising: a processor; and a memory communicatively coupled to the processor, wherein the memory stores processor instructions, which, on execution, causes the processor to: extract a diagnostic log for at least one video conference session from a video conferencing system, wherein the diagnostic log comprises unstructured textual information; convert the diagnostic log into a uniform time zone diagnostic log comprising structured textual information; collect Quality of Service (QoS) metrics associated with the at least one video conference session and event parameters associated with at least one live event within the at least one video conference session; process the uniform time zone diagnostic log, the QoS metrics, and the event parameters based on at least one of a plurality of analytics rules stored in an analytics rule database, wherein the plurality of analytics rules in the analytics rule database are created based on machine learning performed on the uniform time zone diagnostic log, the QoS metrics, and the event parameters; and perform at least one predefined action based on a result of the processing. 10. The fault detection device of claim 9 , wherein the diagnostic log is converted into the uniform time zone diagnostic log based on at least one of logging time of each participant, time zone of the video conferencing system, time zone of each participant, or relevant day light savings, and wherein the uniform time zone diagnostic log comprises a plurality of fields comprising at least one of a severity classification of error messages, time stamp of each error message, or actual verbose description of an error message or an event. | 0.516218 |
11. A system comprising: a processor; a model generation engine stored on a memory and executed by the processor, the model generation engine for generating a model for a user comprising an interest of the user and prior interaction of the user with heterogeneous data sources; a scoring engine stored on the memory and executed by the processor, the scoring engine coupled to the model generation engine for obtaining a group of candidate content items for one or more streams of content from the heterogeneous data sources, computing an interestingness score for each candidate content item in the group by combining properties of each candidate content item over single-attribute properties using the model and based upon interestingness of each candidate content item to the user and an extent to which the candidate content item's popularity has changed within a geographic area associated with the user and comparing the interestingness score for each candidate content item with a threshold for a first interest type and a second interest type to determine which candidate content items have an interestingness score that exceeds the threshold for the first interest type or the second interest type; and a user interface engine coupled to the scoring engine, the user interface engine for organizing a first content item and a second content item in a first stream of content based on candidate content items that have an interestingness score that exceeds the threshold for the first interest type or the second interest type, providing the first stream of content for presentation in a first direction to the user, generating a user interface for configuring the one or more streams of content, the user interface comprising the first content item, the second content item and a marker, the marker associated with the second content item for the user to request a third content item related to the second content item, and responsive to receiving a selection of the marker associated with the second content item from the user, organizing the second and third content items in a second stream of content, providing the second stream of content for presentation in a second direction to the user, and updating the user interface to include the second stream of content. | 11. A system comprising: a processor; a model generation engine stored on a memory and executed by the processor, the model generation engine for generating a model for a user comprising an interest of the user and prior interaction of the user with heterogeneous data sources; a scoring engine stored on the memory and executed by the processor, the scoring engine coupled to the model generation engine for obtaining a group of candidate content items for one or more streams of content from the heterogeneous data sources, computing an interestingness score for each candidate content item in the group by combining properties of each candidate content item over single-attribute properties using the model and based upon interestingness of each candidate content item to the user and an extent to which the candidate content item's popularity has changed within a geographic area associated with the user and comparing the interestingness score for each candidate content item with a threshold for a first interest type and a second interest type to determine which candidate content items have an interestingness score that exceeds the threshold for the first interest type or the second interest type; and a user interface engine coupled to the scoring engine, the user interface engine for organizing a first content item and a second content item in a first stream of content based on candidate content items that have an interestingness score that exceeds the threshold for the first interest type or the second interest type, providing the first stream of content for presentation in a first direction to the user, generating a user interface for configuring the one or more streams of content, the user interface comprising the first content item, the second content item and a marker, the marker associated with the second content item for the user to request a third content item related to the second content item, and responsive to receiving a selection of the marker associated with the second content item from the user, organizing the second and third content items in a second stream of content, providing the second stream of content for presentation in a second direction to the user, and updating the user interface to include the second stream of content. 15. The system of claim 11 , wherein the first direction is vertical and the second direction is horizontal. | 0.545142 |
6. The computer program product of claim 5 , further comprising: automatically generating machine instructions of said test case in a predetermined programming language via a plurality of modules comprising: a first module adapted to parse and load the XML file; a second module adapted to create a programming language independent object model of said test case; a third module adapted to produce said machine instructions in a predetermined programming language by using the independent object model; a fourth module adapted to compile and build said machine instructions associated with said test case, said fourth module adapted to initialize components of said test case in a file; and a fifth module adapted to execute said machine instructions, said fifth module adapted to log results obtained from said predetermined software system, wherein the machine instructions are generated based on the XML file. | 6. The computer program product of claim 5 , further comprising: automatically generating machine instructions of said test case in a predetermined programming language via a plurality of modules comprising: a first module adapted to parse and load the XML file; a second module adapted to create a programming language independent object model of said test case; a third module adapted to produce said machine instructions in a predetermined programming language by using the independent object model; a fourth module adapted to compile and build said machine instructions associated with said test case, said fourth module adapted to initialize components of said test case in a file; and a fifth module adapted to execute said machine instructions, said fifth module adapted to log results obtained from said predetermined software system, wherein the machine instructions are generated based on the XML file. 7. The computer program product of claim 6 , further comprising: causing said machine instructions to be transmitted as a signal to an information device adapted to execute said machine instructions; automatically validating said machine instructions; executing said machine instructions via said information device; automatically obtaining data from said predetermined software system responsive to said machine instructions; automatically obtaining a verdict from said predetermined software system responsive to said machine instructions, said verdict adapted to be analyzed by an Arbiter, said verdict indicative of whether said predetermined software system functioned in a predetermined manner responsive said machine instructions; and rendering the verdict via a user interface. | 0.800609 |
6. A vehicle comprising: a context model created by modeling each name included in a phone book; a model creator configured to classify the phone book according to a length of syllables of each name, and to create a context model for each length of syllables; and a voice recognizer configured to create a phone number candidate group corresponding to a received voice signal based on an acoustic model and the context model for each length of syllables, calculate a length of speech based on a Begin of Speech (BoS) and an End of Speech (EoS), and to respectively apply different reliability weight values determined according to the length of speech to phone number candidates in the phone number candidate group. | 6. A vehicle comprising: a context model created by modeling each name included in a phone book; a model creator configured to classify the phone book according to a length of syllables of each name, and to create a context model for each length of syllables; and a voice recognizer configured to create a phone number candidate group corresponding to a received voice signal based on an acoustic model and the context model for each length of syllables, calculate a length of speech based on a Begin of Speech (BoS) and an End of Speech (EoS), and to respectively apply different reliability weight values determined according to the length of speech to phone number candidates in the phone number candidate group. 10. The vehicle according to claim 6 , wherein if the length of speech is longer than a threshold length, the voice recognizer applies the reliability weight values such that a phone number candidate of a monosyllable in the phone number candidate group has a low degree of reliability. | 0.524151 |
1. A system for generating a ‘snapshot’ of a learning object, comprising: an interface, receiving: a target object, corresponding to a category, comprising a plurality of sentences and multimedia data, wherein the sentences comprise at least one target object keyword; and a user identification number; a learning object database, comprising: a plurality of learning objects, wherein each of the learning objects corresponds to at least one category and comprises at least one learning object keyword; a user's historical learning record, comprising a track record of learning objects used corresponding to the user identification number; and a user keyword input by a user; a script preview unit, selecting at least one of the sentences of the target object as a preview sentence according to the user's historical learning record corresponding to the user identification number, the script preview unit performing steps of: calculating the amount of information contained in the plurality of sentences of the target object; which includes: calculating a relationship matrix of the plurality of sentences in the target object, wherein the relationship matrix comprises a relationship value for each pair of the plurality of sentences; and calculating a sum of the relationship values of each of the plurality of sentences and other sentences of the plurality of sentences as a value specifying the amount of information thereof; selecting at least one pertinent keyword relating to the target object from the plurality of learning objects according to the user's historical learning record corresponding to the user identification number; and selecting the sentence, among the plurality of sentences, that contains the largest amount of information and the user keyword or the pertinent keyword as the preview sentence; a multimedia preview unit, selecting one of the multimedia data of the target object as a preview multimedia data, wherein the selected multimedia data is highly related to the selected sentence; and a ‘snapshot’ generator, generating a ‘snapshot’ of the target object by combining the preview sentence and the preview multimedia data, and directing a display device to display the ‘snapshot’. | 1. A system for generating a ‘snapshot’ of a learning object, comprising: an interface, receiving: a target object, corresponding to a category, comprising a plurality of sentences and multimedia data, wherein the sentences comprise at least one target object keyword; and a user identification number; a learning object database, comprising: a plurality of learning objects, wherein each of the learning objects corresponds to at least one category and comprises at least one learning object keyword; a user's historical learning record, comprising a track record of learning objects used corresponding to the user identification number; and a user keyword input by a user; a script preview unit, selecting at least one of the sentences of the target object as a preview sentence according to the user's historical learning record corresponding to the user identification number, the script preview unit performing steps of: calculating the amount of information contained in the plurality of sentences of the target object; which includes: calculating a relationship matrix of the plurality of sentences in the target object, wherein the relationship matrix comprises a relationship value for each pair of the plurality of sentences; and calculating a sum of the relationship values of each of the plurality of sentences and other sentences of the plurality of sentences as a value specifying the amount of information thereof; selecting at least one pertinent keyword relating to the target object from the plurality of learning objects according to the user's historical learning record corresponding to the user identification number; and selecting the sentence, among the plurality of sentences, that contains the largest amount of information and the user keyword or the pertinent keyword as the preview sentence; a multimedia preview unit, selecting one of the multimedia data of the target object as a preview multimedia data, wherein the selected multimedia data is highly related to the selected sentence; and a ‘snapshot’ generator, generating a ‘snapshot’ of the target object by combining the preview sentence and the preview multimedia data, and directing a display device to display the ‘snapshot’. 3. The system for generating a ‘snapshot’ of a learning object of claim 1 , wherein the script preview unit further performs the following steps when selecting at least one pertinent keyword relating to the target object from the plurality of learning objects: (A) selecting the learning objects which have the category identical with the target object, and have been used by a user identified by the user identification number, from the plurality of learning objects according to the user's historical learning record; (B) selecting the learning object comprising the target object keyword from the learning objects selected in step (A); (C) searching for the learning object keyword comprised in the learning objects selected in step (B), and selecting the learning object keyword that is not comprised in the target object as the pertinent keyword. | 0.5 |
17. A system for restricting the customizability of a base metadata document, the base metadata document defining one or more characteristics of at least a portion of a software application, the system comprising: a processor configured to: receive a type-level customization policy defined for a first object type of an object included in the base metadata document, the type-level customization policy indicating whether instances of objects having the object type may be customized by a first set of one or more users of the software application; receive an instance-level customization policy defined for the object included in the base metadata document, the instance-level customization policy indicating whether an instance of the object may be customized by a second set of one or more users of the software application; and enforce the type-level customization policy and the instance-level customization policy at runtime of the software application to create or update a customization, the customization defining modifications to the base metadata document, the enforcing comprising: determining whether the instance of the object may be customized by a current user, based on how the object is instantiated, the type-level customization policy, the instance-level customization policy, and a set of precedence rules for the type-level customization policy and the instance-level customization policy, wherein how the object is instantiated comprises whether the object is instantiated as the first object type or as a second object type that is based on the first object type, wherein the set of precedence rules for the type-level customization policy and the instance-level customization policy comprises one or more rules providing for a first case where the type-level customization policy and the instance-level customization policy apply without conflict, and one or more rules providing for a second case where the type-level customization policy and the instance-level customization policy apply with conflicting restrictions; determining whether a restriction of one of the type-level customization policy or the instance-level customization policy takes a higher precedence with respect to a conflicting restriction of the other of the type-level customization policy or the instance-level customization policy; wherein the customization is stored separately from the base metadata document, and wherein the customization is applied to the base metadata document to generate a customized metadata document used by the software application. | 17. A system for restricting the customizability of a base metadata document, the base metadata document defining one or more characteristics of at least a portion of a software application, the system comprising: a processor configured to: receive a type-level customization policy defined for a first object type of an object included in the base metadata document, the type-level customization policy indicating whether instances of objects having the object type may be customized by a first set of one or more users of the software application; receive an instance-level customization policy defined for the object included in the base metadata document, the instance-level customization policy indicating whether an instance of the object may be customized by a second set of one or more users of the software application; and enforce the type-level customization policy and the instance-level customization policy at runtime of the software application to create or update a customization, the customization defining modifications to the base metadata document, the enforcing comprising: determining whether the instance of the object may be customized by a current user, based on how the object is instantiated, the type-level customization policy, the instance-level customization policy, and a set of precedence rules for the type-level customization policy and the instance-level customization policy, wherein how the object is instantiated comprises whether the object is instantiated as the first object type or as a second object type that is based on the first object type, wherein the set of precedence rules for the type-level customization policy and the instance-level customization policy comprises one or more rules providing for a first case where the type-level customization policy and the instance-level customization policy apply without conflict, and one or more rules providing for a second case where the type-level customization policy and the instance-level customization policy apply with conflicting restrictions; determining whether a restriction of one of the type-level customization policy or the instance-level customization policy takes a higher precedence with respect to a conflicting restriction of the other of the type-level customization policy or the instance-level customization policy; wherein the customization is stored separately from the base metadata document, and wherein the customization is applied to the base metadata document to generate a customized metadata document used by the software application. 20. The system of claim 17 , wherein the type-level policy is implemented as one or more type annotations to the object type. | 0.570562 |
6. A system comprising: one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising: identifying a plurality of client devices, each client device of the plurality of client devices having a respective web browser installed, the web browser comprising a plurality of components including a web page renderer component for rendering web pages, a first translator component for translating programs in a portable format to a machine-specific instruction set, and a sandbox component for executing programs translated to the machine-specific instruction set on the client device using software-based fault isolation; identifying one or more second client devices, from among the plurality of client devices, that have a given hardware configuration; and transmitting a second translator component and a second sandbox component to each of the second client devices wherein each of the second client devices is configured to: (i) receive the second translator component and the second sandbox component, and (ii) configure the respective web browser of the second client device to use the second translator component instead of using the first translator component to translate programs in the portable format to a machine-specific instruction set of the second client device and to use the second sandbox component instead of using the first sandbox component to execute programs translated to the machine-specific instruction set of the second client device. | 6. A system comprising: one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising: identifying a plurality of client devices, each client device of the plurality of client devices having a respective web browser installed, the web browser comprising a plurality of components including a web page renderer component for rendering web pages, a first translator component for translating programs in a portable format to a machine-specific instruction set, and a sandbox component for executing programs translated to the machine-specific instruction set on the client device using software-based fault isolation; identifying one or more second client devices, from among the plurality of client devices, that have a given hardware configuration; and transmitting a second translator component and a second sandbox component to each of the second client devices wherein each of the second client devices is configured to: (i) receive the second translator component and the second sandbox component, and (ii) configure the respective web browser of the second client device to use the second translator component instead of using the first translator component to translate programs in the portable format to a machine-specific instruction set of the second client device and to use the second sandbox component instead of using the first sandbox component to execute programs translated to the machine-specific instruction set of the second client device. 8. The system of claim 6 wherein identifying the one or more second client devices that have the given hardware configuration comprises selecting the second client devices based on a model type of the second client devices. | 0.602419 |
2. The method as recited in claim 1 which further comprises the steps of: responsive to an absence of a corresponding audio voice, calculating a weighted average of the data in the first I/O instruction and selecting an audio voice as a closest match having a value closest to the weighted average; and, transmitting audio data corresponding to the audio voice which is the closest match to the second type of audio card coupled to the computer system and an expected I/O instruction to the audio application. | 2. The method as recited in claim 1 which further comprises the steps of: responsive to an absence of a corresponding audio voice, calculating a weighted average of the data in the first I/O instruction and selecting an audio voice as a closest match having a value closest to the weighted average; and, transmitting audio data corresponding to the audio voice which is the closest match to the second type of audio card coupled to the computer system and an expected I/O instruction to the audio application. 5. The method as recited in claim 2 wherein the data in the first I/0 instruction is a plurality of values for a set of parameters and each audio voice corresponds to a plurality of values for the set of parameters and the method further comprises the step of: if a weighted average of the values of the set of parameters for the closest match exceeds a predetermined difference from the weighted average of the first I/O instruction, selecting the audio voice whose value for a first audio parameter matches the value of the first parameter in the first I/O instruction. | 0.759866 |
16. A method, comprising: obtaining, by a search interface component executed by at least one computing device, a search query from a search component; validating, by the search interface component, the search query in response to an authentication of a key associated with the search component; searching, by the search interface component, a search index for first application content that corresponds to the search query and second application content that corresponds to the search query, wherein the first application content is secured within a first sandbox for a first application and the second application content is secured within a second sandbox for a second application; and providing, by the search interface component, at least one search result to the search component based upon the search index, wherein the at least one search result is based at least in part on the first application content that corresponds to the search query or the second application content that corresponds to the search query. | 16. A method, comprising: obtaining, by a search interface component executed by at least one computing device, a search query from a search component; validating, by the search interface component, the search query in response to an authentication of a key associated with the search component; searching, by the search interface component, a search index for first application content that corresponds to the search query and second application content that corresponds to the search query, wherein the first application content is secured within a first sandbox for a first application and the second application content is secured within a second sandbox for a second application; and providing, by the search interface component, at least one search result to the search component based upon the search index, wherein the at least one search result is based at least in part on the first application content that corresponds to the search query or the second application content that corresponds to the search query. 17. The method of claim 16 , further comprising updating, by the at least one computing device, the search index based at least in part on crawling restricted application content stored in the computing device. | 0.607631 |
18. The system of claim 9 , wherein the data processor is configured to perform operations further comprising receiving, from the computerized device, another request to retrieve another annotations collection from among the plurality of annotations collections stored at the annotation information repository, the other annotations collection having been authored by another annotations author different from the specified author and corresponding to the specified webpage, verifying permissions of the specified author to retrieve the other annotations collection using verification information included in the other annotations collection, and responding to the request of the computerized device based on a result of said verifying the permissions. | 18. The system of claim 9 , wherein the data processor is configured to perform operations further comprising receiving, from the computerized device, another request to retrieve another annotations collection from among the plurality of annotations collections stored at the annotation information repository, the other annotations collection having been authored by another annotations author different from the specified author and corresponding to the specified webpage, verifying permissions of the specified author to retrieve the other annotations collection using verification information included in the other annotations collection, and responding to the request of the computerized device based on a result of said verifying the permissions. 20. The system of claim 18 , wherein the data processor is configured to perform operations further comprising in response to said verifying the permissions, determining that the specified author lacks permissions to retrieve the other annotations collection, and to perform said responding to the request, the data processor is configured to perform operations further comprising transmitting, to the computerized device, a response informing the specified author of said determining that the specified author lacks permissions to retrieve the other annotations collection. | 0.856963 |
1. An apparatus comprising: a sensor configured to capture an image of an object; a processor configured to receive the captured image; a memory configured to store information comprising at least one of an image, a video, an audio file, and text; a display configured to display information; and a user interface configured to allow a user to control the sensor to capture the image, the processor to search for information related to the object in the memory, and the display to show information related to the object found by the processor; and a transceiver configured to (a) wirelessly transmit the captured image to a communication system and (b) wirelessly receive titles of information related to the object in the captured image from the communication system, the display being configured to display the titles received from the communication system, the user interface being configured to allow a user to select a title among the received titles, the display being configured to show information related to the selected title. | 1. An apparatus comprising: a sensor configured to capture an image of an object; a processor configured to receive the captured image; a memory configured to store information comprising at least one of an image, a video, an audio file, and text; a display configured to display information; and a user interface configured to allow a user to control the sensor to capture the image, the processor to search for information related to the object in the memory, and the display to show information related to the object found by the processor; and a transceiver configured to (a) wirelessly transmit the captured image to a communication system and (b) wirelessly receive titles of information related to the object in the captured image from the communication system, the display being configured to display the titles received from the communication system, the user interface being configured to allow a user to select a title among the received titles, the display being configured to show information related to the selected title. 2. The apparatus of claim 1 , wherein the user interface is configured to receive at least one search word from the user and send the word to the processor, the processor being configured to use the search word to search for information related to the object in the memory. | 0.55997 |
5. The method of claim 1 , wherein the plurality of predetermined correspondences are established by: obtaining access information for a plurality of webpages corresponding to a plurality of products under the product category, wherein the access information includes one or more of: total page views, transaction record, and mean browsing time for each of the plurality of products; determining, using one or more processors, an access rank for each of the plurality of webpages based at least in part on the access information for each of the plurality of webpages; extracting a primary font information from the webpage with a highest access rank; and establishing a predetermined correspondence between the product category and the extracted primary font information. | 5. The method of claim 1 , wherein the plurality of predetermined correspondences are established by: obtaining access information for a plurality of webpages corresponding to a plurality of products under the product category, wherein the access information includes one or more of: total page views, transaction record, and mean browsing time for each of the plurality of products; determining, using one or more processors, an access rank for each of the plurality of webpages based at least in part on the access information for each of the plurality of webpages; extracting a primary font information from the webpage with a highest access rank; and establishing a predetermined correspondence between the product category and the extracted primary font information. 7. The method of claim 5 , wherein the access rank of a first product webpage and a second product webpage in the product category is determined based at least in part on a comparison of a first mean browsing time for the first product webpage and a second mean browsing time for the second product webpage. | 0.877971 |
3. The method of claim 1 , wherein receiving the set of descriptors further comprises: compiling the set of descriptors into a set of compiled annotation descriptors and compiled object descriptors. | 3. The method of claim 1 , wherein receiving the set of descriptors further comprises: compiling the set of descriptors into a set of compiled annotation descriptors and compiled object descriptors. 4. The method of claim 3 , wherein using the set of descriptors to identify content elements in the POD further comprises: applying the set of compiled annotation descriptors to the POD to create the SSDM. | 0.941812 |
8. A computer-readable storage medium tangibly embodying a program of instructions executable by a processor to perform steps comprising: searching an inverted index formed from words recognized from audio signals to locate query terms in a search query and producing query matches for occurrences of the query terms in the inverted index; identifying text snippets from the query matches, each text snippet containing at least one query term and at least one word that is not part of the search query, all of the text snippets for an audio signal together representing less than the duration of the audio signal; displaying the query terms that were used to perform the search; displaying the text snippets associated with a selected audio signal such that a displayed query term in a displayed text snippet is a selectable link such that when a user selects the query term, playback of the audio signal is initiated at a start time of the query term in the audio signal; displaying a timeline having a length representing the duration of the selected audio signal and displaying a separate marker for each query match on the timeline to indicate the temporal position of each query match in the selected audio signal, wherein displaying a marker on the timeline comprises multiplying the ratio of the temporal position of the query term to the duration of the selected audio signal by the length of the displayed timeline to determine a location for the marker on the timeline and wherein displaying a marker comprises setting the height of the marker based on a word score for the search match such that the marker is taller for higher word scores and such that different markers on the timeline have different heights; based on an indication that a user has selected a word in a text snippet, requesting a segment of an audio signal, the segment containing less than the entire time span of the audio signal and starting at the start time of the query term; and based on an indication that a user has selected a marker on the timeline, requesting a second segment of the audio signal, the second segment containing less than the entire time span of the audio signal. | 8. A computer-readable storage medium tangibly embodying a program of instructions executable by a processor to perform steps comprising: searching an inverted index formed from words recognized from audio signals to locate query terms in a search query and producing query matches for occurrences of the query terms in the inverted index; identifying text snippets from the query matches, each text snippet containing at least one query term and at least one word that is not part of the search query, all of the text snippets for an audio signal together representing less than the duration of the audio signal; displaying the query terms that were used to perform the search; displaying the text snippets associated with a selected audio signal such that a displayed query term in a displayed text snippet is a selectable link such that when a user selects the query term, playback of the audio signal is initiated at a start time of the query term in the audio signal; displaying a timeline having a length representing the duration of the selected audio signal and displaying a separate marker for each query match on the timeline to indicate the temporal position of each query match in the selected audio signal, wherein displaying a marker on the timeline comprises multiplying the ratio of the temporal position of the query term to the duration of the selected audio signal by the length of the displayed timeline to determine a location for the marker on the timeline and wherein displaying a marker comprises setting the height of the marker based on a word score for the search match such that the marker is taller for higher word scores and such that different markers on the timeline have different heights; based on an indication that a user has selected a word in a text snippet, requesting a segment of an audio signal, the segment containing less than the entire time span of the audio signal and starting at the start time of the query term; and based on an indication that a user has selected a marker on the timeline, requesting a second segment of the audio signal, the second segment containing less than the entire time span of the audio signal. 12. The computer-readable storage medium of claim 8 wherein the computer-executable instructions provide for the further step of displaying a selectable item to allow a user to change a term confidence level that is used to identify matches between the query terms and text recognized from the audio signal. | 0.5 |
1. A method of representing user tasks to be performed by one or more of a plurality of electronic devices in a task orchestration system, the method comprising: employing a controller device for: obtaining device function descriptions, wherein each device function description describes a function that a device can perform; obtaining task descriptions from multiple electronic devices of a plurality of electronic devices, wherein the task descriptions are dynamically determined at run-time of the task orchestration system, wherein each task description describes the device functionality a certain task requires; generating task suggestions based on the obtained task descriptions and device function descriptions, wherein each task suggestion represents a user task as an abstraction of one or more of the obtained device functions descriptions and task descriptions; applying user preferences over the generated task suggestions to determine a rank order for the generated task suggestions; and displaying task suggestions in the rank order on a display for the user to select from, wherein the user selected task suggestion is to be performed by one or more of the devices. | 1. A method of representing user tasks to be performed by one or more of a plurality of electronic devices in a task orchestration system, the method comprising: employing a controller device for: obtaining device function descriptions, wherein each device function description describes a function that a device can perform; obtaining task descriptions from multiple electronic devices of a plurality of electronic devices, wherein the task descriptions are dynamically determined at run-time of the task orchestration system, wherein each task description describes the device functionality a certain task requires; generating task suggestions based on the obtained task descriptions and device function descriptions, wherein each task suggestion represents a user task as an abstraction of one or more of the obtained device functions descriptions and task descriptions; applying user preferences over the generated task suggestions to determine a rank order for the generated task suggestions; and displaying task suggestions in the rank order on a display for the user to select from, wherein the user selected task suggestion is to be performed by one or more of the devices. 2. The method of claim 1 , wherein a task suggestion is represented using a language structure organized as a set of terms to describe user tasks as abstractions of the obtained device function descriptions and task descriptions. | 0.507435 |
1. A method of translating an imperative language function into a hardware component, comprising the steps of: using a formal imperative function argument to represent at least one among a component input port and a component parameter; distinguishing between formal imperative function arguments intended as component parameters and formal imperative function arguments intended as component input ports within an instantiating framework; and translating imperative language functions to hardware description language for runtime operation. | 1. A method of translating an imperative language function into a hardware component, comprising the steps of: using a formal imperative function argument to represent at least one among a component input port and a component parameter; distinguishing between formal imperative function arguments intended as component parameters and formal imperative function arguments intended as component input ports within an instantiating framework; and translating imperative language functions to hardware description language for runtime operation. 4. The method of claim 1 , wherein the method further comprises the step of enabling an assignment of code for actual imperative function arguments. | 0.685979 |
1. A system, comprising: an intellectual property (IP) marketplace processor, a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising: determining, by the processor, a channel rating for a first channel, wherein the first channel is one of a plurality of channels comprising at least one of an IP asset distribution channel, a product distribution channel, an IP asset marketing channel, a service provider tool and an IP analysis tool; determining, by the processor and based on input from a user, a channel rating threshold; determining, by the processor, that the channel rating for the first channel is greater than the channel rating threshold; including, by the processor and based on the first channel rating and the channel rating threshold, the first channel in a channel guide interface; analyzing, by the processor, the channel to determine a first channel relevancy; and providing, by the processor, the channel guide interface to the user, wherein the channel guide interface presents the first channel based on the first channel rating and the first channel relevancy. | 1. A system, comprising: an intellectual property (IP) marketplace processor, a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising: determining, by the processor, a channel rating for a first channel, wherein the first channel is one of a plurality of channels comprising at least one of an IP asset distribution channel, a product distribution channel, an IP asset marketing channel, a service provider tool and an IP analysis tool; determining, by the processor and based on input from a user, a channel rating threshold; determining, by the processor, that the channel rating for the first channel is greater than the channel rating threshold; including, by the processor and based on the first channel rating and the channel rating threshold, the first channel in a channel guide interface; analyzing, by the processor, the channel to determine a first channel relevancy; and providing, by the processor, the channel guide interface to the user, wherein the channel guide interface presents the first channel based on the first channel rating and the first channel relevancy. 16. The system of claim 1 , further comprising retrieving, by the processor, user profile data from a user database, wherein the user profile data comprises at least one of company information, a company hierarchy, affiliate information, partner information, transaction data, associated buyers, associated sellers, associated inventors, an industry, a technology, a marketplace strategy, business rules, and a marketplace workflow; and retrieving IP asset data, based on the user profile data, from an intellectual property (IP) asset database; and determining the first channel relevancy rating based on the user profile data. | 0.5 |
13. A computer-readable storage device having instructions stored which, when executed by a computing device, cause the computing device to perform operations comprising: receiving a multimedia signal comprising information in a source language; extracting source language text from the information in the multimedia signal; translating the source language text to target language text; and sending the multimedia signal, having the information in the source language, and the target language text to a multimedia device for output, at a scheduled time, to a subscriber, wherein the multimedia signal comprises a commercial message selected based on contents of the target language text to output to the subscriber in exchange for the translating. | 13. A computer-readable storage device having instructions stored which, when executed by a computing device, cause the computing device to perform operations comprising: receiving a multimedia signal comprising information in a source language; extracting source language text from the information in the multimedia signal; translating the source language text to target language text; and sending the multimedia signal, having the information in the source language, and the target language text to a multimedia device for output, at a scheduled time, to a subscriber, wherein the multimedia signal comprises a commercial message selected based on contents of the target language text to output to the subscriber in exchange for the translating. 16. The computer-readable storage device of claim 13 , having additional instructions stored which result in operations comprising: transmitting the target language text to a remote processing device via a network for translation; and receiving the target language text via the network from the remote processing device. | 0.5 |
1. A method for identifying, extracting using a processor, capturing, and leveraging expertise and knowledge comprising: observing, between and among peers and experts who show high affinity with regard to any of the users, assets, and topics/terms, a user heartbeat which comprises user activity, including mouse movement and stable pauses on an asset, while the asset is in a user display foreground; based upon the observing, detecting user think time for the asset; employing automatic techniques to extract patterns from at least the user think time; and learning affinities between and among any of the users, assets and topics/terms from the extracted patterns for any of: automatically determining each user's peer group, predicting a desired destination of the users in a navigation context, calculating an expert and peer impact factor, an asset impact factor, or rareness, determining importance of an asset and/or expertise that individuals possess, without asking the individuals directly, automatically disambiguating query terms in an online search, and/or effecting a predictive query by suggesting search terms to the users or automatically inserting search terms into user queries to expand a search, wherein learning affinities includes applying a formula to lower weights of the term as the terms become associated with more assets. | 1. A method for identifying, extracting using a processor, capturing, and leveraging expertise and knowledge comprising: observing, between and among peers and experts who show high affinity with regard to any of the users, assets, and topics/terms, a user heartbeat which comprises user activity, including mouse movement and stable pauses on an asset, while the asset is in a user display foreground; based upon the observing, detecting user think time for the asset; employing automatic techniques to extract patterns from at least the user think time; and learning affinities between and among any of the users, assets and topics/terms from the extracted patterns for any of: automatically determining each user's peer group, predicting a desired destination of the users in a navigation context, calculating an expert and peer impact factor, an asset impact factor, or rareness, determining importance of an asset and/or expertise that individuals possess, without asking the individuals directly, automatically disambiguating query terms in an online search, and/or effecting a predictive query by suggesting search terms to the users or automatically inserting search terms into user queries to expand a search, wherein learning affinities includes applying a formula to lower weights of the term as the terms become associated with more assets. 5. The method of claim 1 , further comprising: for a given user who may be anonymous, the user visiting a particular site, and a given context comprising any of what page the user is on and how the user got there, providing recommendations to the user that allow the user to navigate the site more efficiently. | 0.595611 |
15. A system comprising: one or more computer memories collectively storing content items and instructions configured to cause one or more processors to control performance of a method comprising: associating subsets of content items with corresponding strings of one or more overloaded keys of a keypad so that the subsets of content items are directly mapped to the corresponding strings of one or more overloaded keys by a direct mapping, wherein at least one overloaded key of the one or more overloaded keys is associated with a plurality of alphabetical and/or numerical symbols; ranking content items within at least one of the subsets of content items according to one or more ordering criteria; subsequent to the associating and ranking, receiving entry of a first overloaded key, selecting and presenting a first of the subsets of content items that is associated with the first overloaded key based on the direct mapping, subsequent to receiving entry of the first overloaded key, receiving entry of a second overloaded key the same as or different than the first overloaded key, the second overloaded key forming a string with the first overloaded key, and selecting and presenting a second of the subsets of content items that is associated with the string of overloaded keys formed by the first overloaded key and the second overloaded key based on the direct mapping. | 15. A system comprising: one or more computer memories collectively storing content items and instructions configured to cause one or more processors to control performance of a method comprising: associating subsets of content items with corresponding strings of one or more overloaded keys of a keypad so that the subsets of content items are directly mapped to the corresponding strings of one or more overloaded keys by a direct mapping, wherein at least one overloaded key of the one or more overloaded keys is associated with a plurality of alphabetical and/or numerical symbols; ranking content items within at least one of the subsets of content items according to one or more ordering criteria; subsequent to the associating and ranking, receiving entry of a first overloaded key, selecting and presenting a first of the subsets of content items that is associated with the first overloaded key based on the direct mapping, subsequent to receiving entry of the first overloaded key, receiving entry of a second overloaded key the same as or different than the first overloaded key, the second overloaded key forming a string with the first overloaded key, and selecting and presenting a second of the subsets of content items that is associated with the string of overloaded keys formed by the first overloaded key and the second overloaded key based on the direct mapping. 16. The system of claim 15 wherein said one or more ordering criteria include one or more of: temporal relevance, location relevance, popularity, personal preferences and/or character count. | 0.585433 |
1. A method for transcribing speech in a communication session comprising: transmitting a virtual communication session in substantially real-time to a plurality of end user devices; receiving, by one or more processors, a combined media stream comprising a plurality of media sub-streams each associated with one of the plurality of end user devices, wherein each of the plurality of media sub-streams in the combined media stream comprises a respective video component and a respective audio component; for each of the plurality of media sub-streams, separating, by the one or more processors, the respective audio component from the respective video component; for each separate audio component, transcribing, by the one or more processors, at least a portion of speech from the audio component to text; providing a transcription in substantially real-time; and annotating the text for the audio component of each respective media sub-stream to include additional content, wherein annotating the text comprises: determining one or more keywords of the text; selecting, based on the one or more keywords, one or more advertisements or a link; and updating the transcription with the one or more advertisements or the link in association with at least a portion of the text. | 1. A method for transcribing speech in a communication session comprising: transmitting a virtual communication session in substantially real-time to a plurality of end user devices; receiving, by one or more processors, a combined media stream comprising a plurality of media sub-streams each associated with one of the plurality of end user devices, wherein each of the plurality of media sub-streams in the combined media stream comprises a respective video component and a respective audio component; for each of the plurality of media sub-streams, separating, by the one or more processors, the respective audio component from the respective video component; for each separate audio component, transcribing, by the one or more processors, at least a portion of speech from the audio component to text; providing a transcription in substantially real-time; and annotating the text for the audio component of each respective media sub-stream to include additional content, wherein annotating the text comprises: determining one or more keywords of the text; selecting, based on the one or more keywords, one or more advertisements or a link; and updating the transcription with the one or more advertisements or the link in association with at least a portion of the text. 5. The method of claim 1 , wherein: determining the one or more keywords of the text includes determining that the one or more keywords include a phone number; and the link is for dialing the phone number. | 0.595158 |
1. A processor-implemented method for generating a multi-document summary, the method comprising: receiving, by a processor, a query statement, one or more documents, one or more summary constraints, and one or more goals; identifying one or more keywords within the query statement; performing a sentence selection from the one or more documents based on the one or more identified keywords; generating a plurality of candidate summaries of the one or more documents based on the performed sentence selection, the one or more goals, and a fully-polynomial randomized approximation scheme (FPRAS) cross entropy method; calculating a quality score for each of the plurality of generated candidate summaries using a plurality of quality features; and selecting a candidate summary from the plurality of generated candidate summaries with the highest calculated quality score that also satisfies a quality score threshold. | 1. A processor-implemented method for generating a multi-document summary, the method comprising: receiving, by a processor, a query statement, one or more documents, one or more summary constraints, and one or more goals; identifying one or more keywords within the query statement; performing a sentence selection from the one or more documents based on the one or more identified keywords; generating a plurality of candidate summaries of the one or more documents based on the performed sentence selection, the one or more goals, and a fully-polynomial randomized approximation scheme (FPRAS) cross entropy method; calculating a quality score for each of the plurality of generated candidate summaries using a plurality of quality features; and selecting a candidate summary from the plurality of generated candidate summaries with the highest calculated quality score that also satisfies a quality score threshold. 5. The method of claim 1 , further comprising: extracting each candidate summary based on the quality score associated with each candidate summary satisfying a filter threshold; identifying one or more frequently appearing sentences within plurality of filtered candidate summaries; and updating an algorithm used by the cross entropy method based on the one or more identified frequently appearing sentences. | 0.843631 |
12. A computer-readable storage medium containing a program which, when executed, performs an operation to reduce storage and transmission costs associated with remote error recreation for abstract database applications, the operation comprising: upon detecting an error condition when an application executes an abstract query against an abstract database having an underlying physical database in a first computing environment, generating, by operation of one or more computer processors when executing the program and not in response to any user request, an abstract database application extraction sufficient to recreate the error condition and comprising at least a portion of each of the application, the abstract database, and the physical database, respectively, wherein the portion of the abstract database includes a definition of at least one logical field used by the abstract query and excludes a definition of at least one logical field not used by the abstract query; sending the abstract database application extraction for execution in a second computing environment different from the first computing environment; and recreating the error condition from the abstract database application extraction in order to facilitate resolving the error condition, whereby storage and transmission costs associated with recreating the error condition in the second computing environment are reduced relative to providing the entirety of each of the application, the abstract database, and the physical database, respectively, for execution in the second computing environment. | 12. A computer-readable storage medium containing a program which, when executed, performs an operation to reduce storage and transmission costs associated with remote error recreation for abstract database applications, the operation comprising: upon detecting an error condition when an application executes an abstract query against an abstract database having an underlying physical database in a first computing environment, generating, by operation of one or more computer processors when executing the program and not in response to any user request, an abstract database application extraction sufficient to recreate the error condition and comprising at least a portion of each of the application, the abstract database, and the physical database, respectively, wherein the portion of the abstract database includes a definition of at least one logical field used by the abstract query and excludes a definition of at least one logical field not used by the abstract query; sending the abstract database application extraction for execution in a second computing environment different from the first computing environment; and recreating the error condition from the abstract database application extraction in order to facilitate resolving the error condition, whereby storage and transmission costs associated with recreating the error condition in the second computing environment are reduced relative to providing the entirety of each of the application, the abstract database, and the physical database, respectively, for execution in the second computing environment. 13. The computer-readable storage medium of claim 12 , wherein the error condition is selected from at least: (i) an error in converting the abstract query to a concrete query; (ii) an error in executing the concrete query against the physical database; (iii) an error in retrieving query results from the physical database; and (iv) an error in converting the query results from the physical database to a logical representation. | 0.736519 |
1. A method performed on at least one processor for dynamically updating a group of similarly situated user profiles, the method comprising the steps of: receiving over a communication link at least one profile change to an originating user profile entered by a user at a client device; evaluating the efficiency of the at least one profile change; determining that the at least one profile change is applicable to at least one similarly situated user profile based at least in part on the evaluated efficiency; transmitting over the communication link the at least one profile change to a destination user profile to automatically update the destination user profile, wherein the group of similarly situated user profiles is updated dynamically based on the at least one profile change to the destination user profile, wherein the updated destination user profile is used to train and update a language model for a speech recognition engine, wherein the updated language model is utilized, by the speech recognition engine, to transcribe speech into text, and wherein the transcribed text is displayed on a user device. | 1. A method performed on at least one processor for dynamically updating a group of similarly situated user profiles, the method comprising the steps of: receiving over a communication link at least one profile change to an originating user profile entered by a user at a client device; evaluating the efficiency of the at least one profile change; determining that the at least one profile change is applicable to at least one similarly situated user profile based at least in part on the evaluated efficiency; transmitting over the communication link the at least one profile change to a destination user profile to automatically update the destination user profile, wherein the group of similarly situated user profiles is updated dynamically based on the at least one profile change to the destination user profile, wherein the updated destination user profile is used to train and update a language model for a speech recognition engine, wherein the updated language model is utilized, by the speech recognition engine, to transcribe speech into text, and wherein the transcribed text is displayed on a user device. 13. The method of claim 1 wherein the at least one profile change is selected from a group of profile changes consisting of: shortcuts, macros, hot key sequences upload, commands, navigation, or a combination thereof. | 0.542205 |
1. A computing device for determination of keywords, the computing device comprising: a processor to: determine a total number of occurrences of a particular word in a plurality of documents, determine a document-specific number of occurrences of the particular word in a particular document of the plurality of documents, determine a weight of meaningfulness for the particular word based on a relationship between the document-specific number of occurrences and an expected value of the document-specific number of occurrences determined using the total number of occurrences, wherein weight of meaningfulness for the particular word is determined according to: weight of meaningfulness = K ! m ! ( K - m ) ! · 1 N m - 1 , where: K is the total number of occurrences of the particular word, m is the document-specific number of occurrences, and N is a total number of documents, and selectively add the particular word to a set of keywords for the particular document based on the weight of meaningfulness determined for the particular word. | 1. A computing device for determination of keywords, the computing device comprising: a processor to: determine a total number of occurrences of a particular word in a plurality of documents, determine a document-specific number of occurrences of the particular word in a particular document of the plurality of documents, determine a weight of meaningfulness for the particular word based on a relationship between the document-specific number of occurrences and an expected value of the document-specific number of occurrences determined using the total number of occurrences, wherein weight of meaningfulness for the particular word is determined according to: weight of meaningfulness = K ! m ! ( K - m ) ! · 1 N m - 1 , where: K is the total number of occurrences of the particular word, m is the document-specific number of occurrences, and N is a total number of documents, and selectively add the particular word to a set of keywords for the particular document based on the weight of meaningfulness determined for the particular word. 7. The computing device of claim 1 , wherein the processor is further configured to: determine the total number of occurrences, the document-specific number of occurrences, and the weight of meaningfulness for each remaining word in the particular document, and selectively add each remaining word to the set of keywords for the particular document based on each determined weight of meaningfulness. | 0.594147 |
4. The method according to claim 1 , further comprising the steps, to be performed by the computer, of: extracting an appearance number of a set of elements having a hierarchical structure in the structured document; and extracting another set of elements for which the index is created based on the logical structure index, by comparing the appearance number of the set of elements and a second predetermined threshold. | 4. The method according to claim 1 , further comprising the steps, to be performed by the computer, of: extracting an appearance number of a set of elements having a hierarchical structure in the structured document; and extracting another set of elements for which the index is created based on the logical structure index, by comparing the appearance number of the set of elements and a second predetermined threshold. 6. The method according to claim 4 , further comprising the step, to be performed by the computer, of, outputting a display screen including the extracted element included in the set of elements and having larger than the second predetermined threshold. | 0.869498 |
12. The article of manufacture of claim 10 , wherein the content to provide instructions for initiating the multiple work actions comprises content to provide instructions for generating the distributed workflow with multiple work actions from reusable workflow building block components stored in and managed by the enterprise system. | 12. The article of manufacture of claim 10 , wherein the content to provide instructions for initiating the multiple work actions comprises content to provide instructions for generating the distributed workflow with multiple work actions from reusable workflow building block components stored in and managed by the enterprise system. 13. The article of manufacture of claim 12 , wherein the content to provide instructions for generating the distributed workflow comprises content to provide instructions for generating the distributed workflow with request-to-perform relationships relating the components, wherein each component represents a phase of the distributed workflow in which a work action is to be completed, and wherein transition between phases of the distributed workflow occur by generation of a request by a first performer of the work action for a second performer to perform a second work action. | 0.849131 |
52. The computer storage medium of claim 49 , wherein: a first name-context pair is derived from texts from multiple text sources; and the operations further comprise modifying the score for the first name-context pair to reflect a similarity of the texts from which the first name-context pair was derived. | 52. The computer storage medium of claim 49 , wherein: a first name-context pair is derived from texts from multiple text sources; and the operations further comprise modifying the score for the first name-context pair to reflect a similarity of the texts from which the first name-context pair was derived. 53. The computer storage medium of claim 52 , wherein the operations further comprise: determining a fingerprint bucket for each text from which the first name-context pair is derived; analyzing a distribution of the fingerprint buckets to determine that the distribution is skewed from a normal distribution; and modifying the score by discounting the score. | 0.813815 |
10. The computer-implemented method of claim 1 further comprising maintaining historical data associated with previously presented suggested entries associated with the user or the business process. | 10. The computer-implemented method of claim 1 further comprising maintaining historical data associated with previously presented suggested entries associated with the user or the business process. 12. The computer-implemented method of claim 10 , wherein the historical data associated with previously presented suggested entries is updated after receiving a selection from the user for the suggested entry. | 0.922711 |
1. A method of using a network connection for a fast-and-engaging, real time voice translation, the method comprising: loading an executable program from a network connection into a non-transitory computer readable storage medium; executing the executable program through a processor, the executing comprising: accessing a multilanguage database embodied in a non-transitory computer readable storage medium including a plurality of phrase templates associated with a respective plurality of phrases; choosing a source language from a plurality of source languages and a destination language from a plurality of destination languages; inputting a source phrase spoken in the source language; transmitting the source phrase (i) to a speech recognition module embodied in a non-transitory computer readable storage medium for converting the spoken source phrase into a recognized source phrase; (ii) a translation engine embodied in a non-transitory computer readable storage medium for translating the recognized source phrase in the selected source language into a destination phrase in a destination language selected from multiple languages, wherein the plurality of phrases in the multilanguage database include the destination phrase; (iii) a template look-up engine embodied in a non-transitory computer readable storage medium for finding the phrase template associated with the destination phrase from among the multiple languages; and, outputting the destination phrase template as a spoken translation in the selected destination language; wherein, a total time is required between the input of the source phrase and output of the destination phrase, the total time being no slower than 0.010 seconds. | 1. A method of using a network connection for a fast-and-engaging, real time voice translation, the method comprising: loading an executable program from a network connection into a non-transitory computer readable storage medium; executing the executable program through a processor, the executing comprising: accessing a multilanguage database embodied in a non-transitory computer readable storage medium including a plurality of phrase templates associated with a respective plurality of phrases; choosing a source language from a plurality of source languages and a destination language from a plurality of destination languages; inputting a source phrase spoken in the source language; transmitting the source phrase (i) to a speech recognition module embodied in a non-transitory computer readable storage medium for converting the spoken source phrase into a recognized source phrase; (ii) a translation engine embodied in a non-transitory computer readable storage medium for translating the recognized source phrase in the selected source language into a destination phrase in a destination language selected from multiple languages, wherein the plurality of phrases in the multilanguage database include the destination phrase; (iii) a template look-up engine embodied in a non-transitory computer readable storage medium for finding the phrase template associated with the destination phrase from among the multiple languages; and, outputting the destination phrase template as a spoken translation in the selected destination language; wherein, a total time is required between the input of the source phrase and output of the destination phrase, the total time being no slower than 0.010 seconds. 12. A device for practicing the method of claim 1 , the device comprising: a non-transitory computer readable storage medium for receiving the executable program; an input for receiving the source phrase; a processor for executing the executable program; and, an output for providing the spoken translation. | 0.659566 |
1. A computer-implemented method of aligning fragments of a first text in a first language with corresponding fragments of a second text, which is a translation of the first text into a second language, comprising: preliminarily dividing the first and second texts into fragments; generating a hypothesis about correspondence between at least first fragment in the first text and at least second fragment in the second text; determining estimations reflecting correspondence between the first and the second fragments, wherein each estimation is based at least on a ratio between: (a) a number of words in at least one of the first segment or the second segment; and (b) a number of words in the first fragment that have a corresponding translation in the second fragment according to a normalized one-to-one dictionary; determining a degree of correspondence between the first and the second fragments based on the estimations, including adjusting the estimations by using weight coefficients selected on the basis of heuristics or training; and comparing the degree of correspondence to a predetermined threshold. | 1. A computer-implemented method of aligning fragments of a first text in a first language with corresponding fragments of a second text, which is a translation of the first text into a second language, comprising: preliminarily dividing the first and second texts into fragments; generating a hypothesis about correspondence between at least first fragment in the first text and at least second fragment in the second text; determining estimations reflecting correspondence between the first and the second fragments, wherein each estimation is based at least on a ratio between: (a) a number of words in at least one of the first segment or the second segment; and (b) a number of words in the first fragment that have a corresponding translation in the second fragment according to a normalized one-to-one dictionary; determining a degree of correspondence between the first and the second fragments based on the estimations, including adjusting the estimations by using weight coefficients selected on the basis of heuristics or training; and comparing the degree of correspondence to a predetermined threshold. 2. The method of claim 1 , wherein the fragments are sentences. | 0.739384 |
13. The method of claim 12 , further comprising an act of presenting the set of candidate entities to an operator for validation of the set of entities. | 13. The method of claim 12 , further comprising an act of presenting the set of candidate entities to an operator for validation of the set of entities. 14. The method of claim 13 , further comprising an act of receiving feedback from the operator regarding the search results and updating the domain knowledge database based on the feedback from the operator. | 0.934796 |
1. A method of integrated automatic support and assistance, comprising: identifying a user, wherein identifying the user includes retrieving models representing a device, apparatus, service, or system operated by the user; receiving a query or statement from the user, the query or statement being related to a question about or a problem with at least one component on the system; determining a set of response time expectations based upon the received query or statement; relaying the set of response time expectations to the user; receiving feedback from the user based on the relaying; determining a user satisfaction value from the feedback; storing the user satisfaction value in the user profile for subsequent queries; determining if the received query or statement is a machine translatable query or statement; restructuring machine translatable terms of the received query or statement into semantic components based upon the retrieved models; determining a set of candidate knowledge bases both internal and external to the assistance providing computer system related to the semantic components; submitting the machine translatable query or statement to each knowledge base of the set of candidate knowledge bases; receiving a set of responses from each knowledge base of the set of knowledge bases in response to the submitting; formatting the set of responses; submitting the formatted set of responses to the user; determining if a response of the submitted formatted set of responses is accepted by the user; applying updated weights within the formatted set of responses; and storing the updated weights for future queries. | 1. A method of integrated automatic support and assistance, comprising: identifying a user, wherein identifying the user includes retrieving models representing a device, apparatus, service, or system operated by the user; receiving a query or statement from the user, the query or statement being related to a question about or a problem with at least one component on the system; determining a set of response time expectations based upon the received query or statement; relaying the set of response time expectations to the user; receiving feedback from the user based on the relaying; determining a user satisfaction value from the feedback; storing the user satisfaction value in the user profile for subsequent queries; determining if the received query or statement is a machine translatable query or statement; restructuring machine translatable terms of the received query or statement into semantic components based upon the retrieved models; determining a set of candidate knowledge bases both internal and external to the assistance providing computer system related to the semantic components; submitting the machine translatable query or statement to each knowledge base of the set of candidate knowledge bases; receiving a set of responses from each knowledge base of the set of knowledge bases in response to the submitting; formatting the set of responses; submitting the formatted set of responses to the user; determining if a response of the submitted formatted set of responses is accepted by the user; applying updated weights within the formatted set of responses; and storing the updated weights for future queries. 12. The method of claim 1 , wherein if a response of the submitted set of responses is not accepted by the user, querying the user to determine if a user-based solution is effective, and storing the user-based solution in a knowledge base of the plurality of knowledge bases for subsequent queries. | 0.681504 |
2. A method, for a second participant in a secure document workflow, of authenticating a document image, the method comprising: receiving the document image from a first workflow participant; receiving workflow information relating to the document image, including: a document image descriptor, dependent upon the appearance of the document image for verifying the authenticity of a version of the document image that has been printed and scanned, and a first digital signature generated by the first participant, derived from at least the document image descriptor; verifying the authenticity of the image descriptor, wherein the verification comprises verifying the digital signature; and verifying the integrity of the received document image, wherein the verification comprises electronically comparing or combining the received document image with the verified image descriptor. | 2. A method, for a second participant in a secure document workflow, of authenticating a document image, the method comprising: receiving the document image from a first workflow participant; receiving workflow information relating to the document image, including: a document image descriptor, dependent upon the appearance of the document image for verifying the authenticity of a version of the document image that has been printed and scanned, and a first digital signature generated by the first participant, derived from at least the document image descriptor; verifying the authenticity of the image descriptor, wherein the verification comprises verifying the digital signature; and verifying the integrity of the received document image, wherein the verification comprises electronically comparing or combining the received document image with the verified image descriptor. 7. The method of claim 2 , wherein: the step of receiving the document image from the first workflow participant comprises scanning a printed copy of the document; and the step of receiving the workflow information comprises decoding a portion of the workflow information printed in a machine-readable form on the printed copy. | 0.608537 |
6. The method of claim 1 , wherein analyzing data associated with items includes analyzing content of the items and identifying a geographic attribute in the content. | 6. The method of claim 1 , wherein analyzing data associated with items includes analyzing content of the items and identifying a geographic attribute in the content. 7. The method of claim 6 , wherein the item includes textual content and the geographic attribute is identified in the textual content. | 0.921228 |
1. A computer-aided design (CAD) system, comprising: a computing device comprising a processor configured to execute: a parametric geometry engine configured for creating a historic instruction list of feature-based geometry of a CAD object such that modification of an earlier-created feature in the instruction list causes the parametric geometry engine to recalculate later-created geometric features to carry through the effects of the change to the earlier-created feature; a parametric modeling user interface configured for creating a history-dependent parametric feature constraint of the CAD object corresponding to the historic instruction list; and a direct modeling user interface for modifying the CAD object based on added geometry features agnostic of all associative geometric relationships within the CAD object, wherein the parametric geometry engine is configured to enforce the feature constraint in the direct modeling user interface, responsive to an attempt to modify the geometry via the direct modeling user interface, wherein the parametric geometry engine is configured to prevent or reject the attempt to modify the CAD object, responsive to the attempt to modify the geometry, and wherein the parametric geometry engine is configured to allow the user to override or modify the feature constraint in the direct modeling user interface. | 1. A computer-aided design (CAD) system, comprising: a computing device comprising a processor configured to execute: a parametric geometry engine configured for creating a historic instruction list of feature-based geometry of a CAD object such that modification of an earlier-created feature in the instruction list causes the parametric geometry engine to recalculate later-created geometric features to carry through the effects of the change to the earlier-created feature; a parametric modeling user interface configured for creating a history-dependent parametric feature constraint of the CAD object corresponding to the historic instruction list; and a direct modeling user interface for modifying the CAD object based on added geometry features agnostic of all associative geometric relationships within the CAD object, wherein the parametric geometry engine is configured to enforce the feature constraint in the direct modeling user interface, responsive to an attempt to modify the geometry via the direct modeling user interface, wherein the parametric geometry engine is configured to prevent or reject the attempt to modify the CAD object, responsive to the attempt to modify the geometry, and wherein the parametric geometry engine is configured to allow the user to override or modify the feature constraint in the direct modeling user interface. 5. The system of claim 1 , wherein the attempt to modify the CAD object comprises an attempt to modify geometry of the CAD object or a feature of the CAD object. | 0.748447 |
29. A computerized apparatus for spotting an at least one call interaction out of a multiplicity of call interactions in which a target speaker participates, the apparatus comprising: a training computerized component configured for generating a multiplicity of speaker models based on a multiplicity of speaker speech samples from the at least one call interaction; and a speaker spotting computerized component configured for matching the target speaker speech sample with speaker models of the multiplicity of speaker models to determine a target speaker model, determining a score for each call interaction of the multiplicity of call interactions according to a comparison between the target speaker model and the multiplicity of speaker models, and based on scores that are higher than a predetermined threshold, determining call interactions, of the multiplicity of call interactions, and in which the at least one target speaker participates. | 29. A computerized apparatus for spotting an at least one call interaction out of a multiplicity of call interactions in which a target speaker participates, the apparatus comprising: a training computerized component configured for generating a multiplicity of speaker models based on a multiplicity of speaker speech samples from the at least one call interaction; and a speaker spotting computerized component configured for matching the target speaker speech sample with speaker models of the multiplicity of speaker models to determine a target speaker model, determining a score for each call interaction of the multiplicity of call interactions according to a comparison between the target speaker model and the multiplicity of speaker models, and based on scores that are higher than a predetermined threshold, determining call interactions, of the multiplicity of call interactions, and in which the at least one target speaker participates. 37. The apparatus of claim 29 further comprising a call logging system for capturing the target speaker speech sample or at least one of the multiplicity of call interactions. | 0.616253 |
4. The computer-implemented method of claim 1 , further comprising: sending the existing translation to a validation process using the processor; and linking the text string with the existing translation, using the processor, if the validation process validates the existing translation. | 4. The computer-implemented method of claim 1 , further comprising: sending the existing translation to a validation process using the processor; and linking the text string with the existing translation, using the processor, if the validation process validates the existing translation. 5. The computer-implemented method of claim 4 , further comprising: linking the text string with an alternate translation from the validation process, using the processor, if the validation process fails to validate the existing translation. | 0.927021 |
14. The method of claim 11 , the method further comprising: identifying at least one term having a semantic relationship with the at least one semantic token generated from the natural language query. | 14. The method of claim 11 , the method further comprising: identifying at least one term having a semantic relationship with the at least one semantic token generated from the natural language query. 15. The method of claim 14 , wherein identifying data in a knowledge base comprises identifying data in a knowledge base using the at least one semantic token and the at least one semantically-related term. | 0.924805 |
1. A method comprising: selecting a first configuration item from a source dataset; failing to identify the first configuration item with configuration items in a target dataset of a configuration management database using identification rules without automatically modifiable acceptance criteria; evaluating a rule against the first configuration item and a second configuration item of the target dataset; marking the first configuration item as identified with the second configuration item upon successful evaluation of the rule if a threshold value for the rule exceeds a predetermined acceptance value; and automatically adjusting the threshold value responsive to the act of marking. | 1. A method comprising: selecting a first configuration item from a source dataset; failing to identify the first configuration item with configuration items in a target dataset of a configuration management database using identification rules without automatically modifiable acceptance criteria; evaluating a rule against the first configuration item and a second configuration item of the target dataset; marking the first configuration item as identified with the second configuration item upon successful evaluation of the rule if a threshold value for the rule exceeds a predetermined acceptance value; and automatically adjusting the threshold value responsive to the act of marking. 11. The method of claim 1 , wherein the act of selecting the first configuration item from the source dataset comprises: selecting the first configuration item from a plurality of configuration items of the source dataset marked for statistical identification. | 0.766834 |
18. A computer-implemented method comprising: receiving, by a media content trend analysis system comprising at least one physical processor, a first set of media content streams representative of a first set of media programs; recording, by the media content trend analysis system, the first set of media content streams; receiving, by the media content trend analysis system, a second set of media content streams representative of a second set of media programs; detecting, by the media content trend analysis system during the receiving of the second set of media content streams, caption data included in the second set of media content streams and associated with the second set of media programs; identifying, by the media content trend analysis system based on the detected caption data, a trending topic; and identifying, by the media content trend analysis system, a media program clip associated with the trending topic and included in the first set of media programs, the identifying of the media program clip associated with the trending topic comprising: detecting, within caption data included in a media content stream representative of a media program and included in the first set of media content streams, one or more keywords associated with the trending topic, identifying, within the media content stream based on the detected one or more keywords, a first timestamp corresponding to the one or more keywords associated with the trending topic and a second timestamp corresponding to the one or more keywords associated with the trending topic, determining a start timestamp based on the first timestamp and an end timestamp based on the second timestamp, and designating a portion of the media content stream defined by the start timestamp and the end timestamp as the media program clip associated with the trending topic. | 18. A computer-implemented method comprising: receiving, by a media content trend analysis system comprising at least one physical processor, a first set of media content streams representative of a first set of media programs; recording, by the media content trend analysis system, the first set of media content streams; receiving, by the media content trend analysis system, a second set of media content streams representative of a second set of media programs; detecting, by the media content trend analysis system during the receiving of the second set of media content streams, caption data included in the second set of media content streams and associated with the second set of media programs; identifying, by the media content trend analysis system based on the detected caption data, a trending topic; and identifying, by the media content trend analysis system, a media program clip associated with the trending topic and included in the first set of media programs, the identifying of the media program clip associated with the trending topic comprising: detecting, within caption data included in a media content stream representative of a media program and included in the first set of media content streams, one or more keywords associated with the trending topic, identifying, within the media content stream based on the detected one or more keywords, a first timestamp corresponding to the one or more keywords associated with the trending topic and a second timestamp corresponding to the one or more keywords associated with the trending topic, determining a start timestamp based on the first timestamp and an end timestamp based on the second timestamp, and designating a portion of the media content stream defined by the start timestamp and the end timestamp as the media program clip associated with the trending topic. 20. The method of claim 18 , further comprising recommending, by the media content trend analysis system, the media program clip associated with the trending topic for access by a user of a media content processing device. | 0.5 |
1. A method of performing speech recognition using an electronic interactive agent, comprising: forming a communications link between a client device and a server system adapted for streaming speech data; providing a distributed speech recognition engine using resources from both the client device and the server system; presenting the electronic interactive agent in a form perceptible to a user of the client device; soliciting natural language speech utterance data in the form of continuous speech from the user of the device using the electronic interactive agent; recognizing said speech utterance data using said distributed speech recognition engine to generate a recognized speech statement and processing said recognized speech statement using a natural language engine to identify a best response to said recognized speech statement among a number of predefined, stored queries and associated answers, the natural language engine being adapted to consider words not in said queries and associated answers to determine the best response; if the best response is not identified with a specified confidence level using the natural language engine, presenting the recognized speech statement to one or more additional natural language engines; controlling the electronic interactive agent to communicate the best response to the recognized speech statement generated by the server system; wherein the electronic interactive agent is adapted to mimic behavior of a human agent through a natural language query session conducted with the user. | 1. A method of performing speech recognition using an electronic interactive agent, comprising: forming a communications link between a client device and a server system adapted for streaming speech data; providing a distributed speech recognition engine using resources from both the client device and the server system; presenting the electronic interactive agent in a form perceptible to a user of the client device; soliciting natural language speech utterance data in the form of continuous speech from the user of the device using the electronic interactive agent; recognizing said speech utterance data using said distributed speech recognition engine to generate a recognized speech statement and processing said recognized speech statement using a natural language engine to identify a best response to said recognized speech statement among a number of predefined, stored queries and associated answers, the natural language engine being adapted to consider words not in said queries and associated answers to determine the best response; if the best response is not identified with a specified confidence level using the natural language engine, presenting the recognized speech statement to one or more additional natural language engines; controlling the electronic interactive agent to communicate the best response to the recognized speech statement generated by the server system; wherein the electronic interactive agent is adapted to mimic behavior of a human agent through a natural language query session conducted with the user. 3. The method of claim 1 , wherein the electronic interactive agent and distributed speech recognition engine are implemented as software routines. | 0.503139 |
1. A method for collaborative note taking based on a speech of a speaker and providing a summary to a user in an audience of the speaker, the method comprising: receiving a first set of information from the speech; performing speech recognition on the first set of information and determining selected portions of the speech; determining portions of context information corresponding to a domain information from a presentation information source temporally associated with the selected portions of the speech; determining at least one language model based on the selected portions of the speech and the temporally associated portions of context information from the presentation information source, wherein the at least one language model is dynamically determined; applying the language model to the first set of information to extract salient tokens from the first set of information; verifying relevance of the salient tokens based on the presentation information source to obtain verified tokens; generating the summary including the extracted salient tokens, wherein generating the summary includes assembling the verified tokens; displaying the summary to the user; and receiving collaborative user feedback information relating to the summary and adjusting the language model according to the collaborative user feedback, wherein the method is implemented by a computer. | 1. A method for collaborative note taking based on a speech of a speaker and providing a summary to a user in an audience of the speaker, the method comprising: receiving a first set of information from the speech; performing speech recognition on the first set of information and determining selected portions of the speech; determining portions of context information corresponding to a domain information from a presentation information source temporally associated with the selected portions of the speech; determining at least one language model based on the selected portions of the speech and the temporally associated portions of context information from the presentation information source, wherein the at least one language model is dynamically determined; applying the language model to the first set of information to extract salient tokens from the first set of information; verifying relevance of the salient tokens based on the presentation information source to obtain verified tokens; generating the summary including the extracted salient tokens, wherein generating the summary includes assembling the verified tokens; displaying the summary to the user; and receiving collaborative user feedback information relating to the summary and adjusting the language model according to the collaborative user feedback, wherein the method is implemented by a computer. 6. The method of claim 1 , wherein the language model is a composite language model. | 0.549346 |
1. A method comprising: receiving, at a computing system, a set of one or more area description files from a set of one or more first mobile devices, each area description file representing a point cloud of spatial features detected by a corresponding first mobile device at an area; generating, at the computing system, a localization area description file for the area from the set of one or more area description files, the localization area description file representing a point cloud of spatial features for the area; and providing the localization area description file from the computing system to a second mobile device, wherein: the set of one or more area description files comprises a plurality of area description files; and generating the localization area description file comprises: identifying the plurality of area description files as being associated with the area; deduplicating the point clouds represented by the plurality of area description files; determining a relative alignment of the point clouds represented by the plurality of area description files; and incorporating the point clouds in the localization area description file. | 1. A method comprising: receiving, at a computing system, a set of one or more area description files from a set of one or more first mobile devices, each area description file representing a point cloud of spatial features detected by a corresponding first mobile device at an area; generating, at the computing system, a localization area description file for the area from the set of one or more area description files, the localization area description file representing a point cloud of spatial features for the area; and providing the localization area description file from the computing system to a second mobile device, wherein: the set of one or more area description files comprises a plurality of area description files; and generating the localization area description file comprises: identifying the plurality of area description files as being associated with the area; deduplicating the point clouds represented by the plurality of area description files; determining a relative alignment of the point clouds represented by the plurality of area description files; and incorporating the point clouds in the localization area description file. 7. The method of claim 1 , further comprising: receiving, at the computing system, feedback data from the second mobile device, the feedback data identifying whether one or more of the spatial features represented by the localization area description file was detected by the second mobile device while in the area; updating, at the computing system, the localization area description file based on the feedback data to generate an updated localization area description file; and providing the updated localization area description file from the computing system to a third mobile device. | 0.710005 |
1. A method of signing a document by a plurality of contracting users, wherein said contracting users are pre-registered users and have associated electronic pen devices such that each contracting user among the contracting users has an associated electronic pen device among the electronic pen devices, the method comprising the following steps: a) receiving at a secure server, from a first user, an invitation request of signing the document for the purpose of approving content of the document by a plurality of contracting users; b) receiving, at the secure sever, user identification information associated with the contracting users; c) generating, by the secure server, a unique document identifier in connection with said document to be signed; d) transmitting, by the secure server, an invitation to sign the document to the contracting users through their associated electronic pen devices along with the unique document identifier such that each contracting user among the contracting users receives said invitation to sign the document at an electronic pen device associated therewith; wherein the electronic pen devices are configured for receiving signature requests from the contracting users for signing the document, for the purpose of approving the content of the document, the signature requests comprising first authentication information associated with said contracting users, and wherein the electronic pen devices are configured for transmitting the first authentication information to the secure server for authenticating the contracting users; e) authenticating by the secure server the contracting users using said first authentication information comprising inquiring an authentication database at the secure sever storing second authentication information in connection with the contracting users for determining if there is a match between the first authentication information and the second authentication information; f) rejecting, by the secure server, signature requests associated with unsuccessfully authenticated contracting users; g) for successfully authenticated contracting users, automatically transmitting by the secure server to electronic pen devices associated with said successfully authenticated contracting users notifications of successful authentication and said associated electronic pen devices accepting signature requests from their respective contracting users to sign the document, receiving by the associated electronic pen devices and transmitting to the secure server handwritten signatures of the authenticated contracting users approving content of the document, automatically storing by the secure server said handwritten signatures inside a signature registration database, automatically generating by said secure server a unique signature identifier and associating said unique signature identifier to said handwritten signatures, and automatically communicating said unique signature identifier to said associated electronic pen devices, and communicating said unique signature identifier by the associated electronic pen devices to the successfully authenticated contracting users for indication on the document in order to be used as a reference during future authentication of said document; and h) during authentication of the document, providing access to said signature registration database for enabling an authenticating party to authenticate said document, where said authentication of said document comprises obtaining the unique signature identifier as indicated on the document; querying the secure server using this unique signature identifier to retrieve the stored signature associated with the unique signature identifier and determining if there is an exact match between the signature stored in the server and the signature appearing on said document. | 1. A method of signing a document by a plurality of contracting users, wherein said contracting users are pre-registered users and have associated electronic pen devices such that each contracting user among the contracting users has an associated electronic pen device among the electronic pen devices, the method comprising the following steps: a) receiving at a secure server, from a first user, an invitation request of signing the document for the purpose of approving content of the document by a plurality of contracting users; b) receiving, at the secure sever, user identification information associated with the contracting users; c) generating, by the secure server, a unique document identifier in connection with said document to be signed; d) transmitting, by the secure server, an invitation to sign the document to the contracting users through their associated electronic pen devices along with the unique document identifier such that each contracting user among the contracting users receives said invitation to sign the document at an electronic pen device associated therewith; wherein the electronic pen devices are configured for receiving signature requests from the contracting users for signing the document, for the purpose of approving the content of the document, the signature requests comprising first authentication information associated with said contracting users, and wherein the electronic pen devices are configured for transmitting the first authentication information to the secure server for authenticating the contracting users; e) authenticating by the secure server the contracting users using said first authentication information comprising inquiring an authentication database at the secure sever storing second authentication information in connection with the contracting users for determining if there is a match between the first authentication information and the second authentication information; f) rejecting, by the secure server, signature requests associated with unsuccessfully authenticated contracting users; g) for successfully authenticated contracting users, automatically transmitting by the secure server to electronic pen devices associated with said successfully authenticated contracting users notifications of successful authentication and said associated electronic pen devices accepting signature requests from their respective contracting users to sign the document, receiving by the associated electronic pen devices and transmitting to the secure server handwritten signatures of the authenticated contracting users approving content of the document, automatically storing by the secure server said handwritten signatures inside a signature registration database, automatically generating by said secure server a unique signature identifier and associating said unique signature identifier to said handwritten signatures, and automatically communicating said unique signature identifier to said associated electronic pen devices, and communicating said unique signature identifier by the associated electronic pen devices to the successfully authenticated contracting users for indication on the document in order to be used as a reference during future authentication of said document; and h) during authentication of the document, providing access to said signature registration database for enabling an authenticating party to authenticate said document, where said authentication of said document comprises obtaining the unique signature identifier as indicated on the document; querying the secure server using this unique signature identifier to retrieve the stored signature associated with the unique signature identifier and determining if there is an exact match between the signature stored in the server and the signature appearing on said document. 12. The method as claimed in claim 1 , wherein the document is an administrative document, an agreement document between two or more parties, a unilateral document, a contract document or a cheque. | 0.534063 |
8. A non-transitory computer readable storage medium storing executable program instructions, which, when executed by an electronic device with one or more processors, memory, and a touch-sensitive display, cause the electronic device to: receive data relating to device movement and data relating to device orientation; receive a touch input on the touch-sensitive display; process the received data relating to device movement and the received data relating to device orientation to determine whether the electronic device is in one of a first or second state based on the received data relating to device movement and the received data relating to device orientation, wherein the first state occurs when a user is looking at the electronic device; if it is determined that the electronic device is in the first state, process the touch input as an intentional touch input; if it is determined that the electronic device is in the second state, process the touch input as an unintentional touch input; and in response to detecting a first change in the received data relating to device movement and the received data relating to device orientation, determine that the device has changed from the second state to the first state. | 8. A non-transitory computer readable storage medium storing executable program instructions, which, when executed by an electronic device with one or more processors, memory, and a touch-sensitive display, cause the electronic device to: receive data relating to device movement and data relating to device orientation; receive a touch input on the touch-sensitive display; process the received data relating to device movement and the received data relating to device orientation to determine whether the electronic device is in one of a first or second state based on the received data relating to device movement and the received data relating to device orientation, wherein the first state occurs when a user is looking at the electronic device; if it is determined that the electronic device is in the first state, process the touch input as an intentional touch input; if it is determined that the electronic device is in the second state, process the touch input as an unintentional touch input; and in response to detecting a first change in the received data relating to device movement and the received data relating to device orientation, determine that the device has changed from the second state to the first state. 12. The non-transitory computer readable storage medium of claim 8 , wherein the executable program instructions further cause the electronic device to: if it is determined that the electronic device is in the first state, display information on the touch-sensitive display in a first display state, wherein the first display state is a regular power mode; and if it is determined that the electronic device is in the second state, enter into a second display state different from the first display state, wherein the second display state is a low-power mode. | 0.5 |
1. A computer-implemented method for managing message communications, comprising: receiving, by a computing device, a first message, wherein the first message is addressed to or received by multiple recipients, wherein the first message includes an email, a chat, SMS, or other message communication formats; registering, by the computing device, a user action to reply to the first message; creating and displaying in a user interface, by the computing device, a message composition or editing interface in response to the user action; distinguishing at least two operation modes of replying to a multi-recipient message, wherein the two operation modes comprises a first operation mode and a second operation mode, wherein the first operation mode comprises a reply only to the sender of the multi-recipient message, and the second operation mode comprises a reply to multiple recipients of the multi-recipient message; detecting, by the computing device, whether the user is replying only to the sender of the first message as in the first operation mode, or to multiple recipients of the first message as in the second operation mode; and displaying, by the computing device, a notification, wherein the notification indicates whether the user is replying in the first operation mode or in the second operation mode. | 1. A computer-implemented method for managing message communications, comprising: receiving, by a computing device, a first message, wherein the first message is addressed to or received by multiple recipients, wherein the first message includes an email, a chat, SMS, or other message communication formats; registering, by the computing device, a user action to reply to the first message; creating and displaying in a user interface, by the computing device, a message composition or editing interface in response to the user action; distinguishing at least two operation modes of replying to a multi-recipient message, wherein the two operation modes comprises a first operation mode and a second operation mode, wherein the first operation mode comprises a reply only to the sender of the multi-recipient message, and the second operation mode comprises a reply to multiple recipients of the multi-recipient message; detecting, by the computing device, whether the user is replying only to the sender of the first message as in the first operation mode, or to multiple recipients of the first message as in the second operation mode; and displaying, by the computing device, a notification, wherein the notification indicates whether the user is replying in the first operation mode or in the second operation mode. 2. The method of claim 1 , wherein it is detected that the user is replying only to the sender of the first message, or is replying in the first operation mode, wherein the notification indicates that the message being composed will not be sent to multiple recipients of the first message, or will be sent to the sender of the first message only. | 0.573791 |
1. A method of generating a search result list in response to a search query from a searcher using a computer network, the method executed with a computer having a processor, the method comprising: (a) maintaining a first database including a first plurality of search listings comprising sponsored search listings having a sponsored content; (b) maintaining a second database including documents having a general web content; (c) receiving, by the processor, a search query from the searcher; (d) identifying, by the processor, from the first database a first set of search listings comprising sponsored search listings having documents generating a match with the search query, and from the second database a second set of search listings comprising general web listings having documents generating a match with the same search query as used to identify the sponsored first set of search listings; (e) determining, by the processor, a confidence score for each listing from the first set of search listings, wherein the confidence score is determined in accordance with a relevance of each listing when compared to the listings of the second set of search listings after execution of step (d); (f) ranking, by the processor, the sponsored first set of search listings in accordance, at least in part, with the confidence score for each search listing thereof, wherein the processor associates the sponsored first set of search listings with at least one feature different than the relevance of each search listing when compared to the listings of the second set of search listings, and the processor further orders the sponsored first set of search listings in accordance with the at least one feature, the at least one feature comprising any of a number of clicks, a click-through rate, and a conversion rate derived from historical click-through and conversion data from user activity on the sponsored first set of search listings; (g) computing a plurality of demotion terms related to a plurality of the top-ranked sponsored first set of search listings, wherein the demotion terms capture non-ideal characteristics thereof; (h) updating the confidence score of each of the top-ranked sponsored first set of search listings based on the plurality of demotion terms; and (i) re-ranking the top-ranked sponsored first set of search listings according to the updated confidence scores. | 1. A method of generating a search result list in response to a search query from a searcher using a computer network, the method executed with a computer having a processor, the method comprising: (a) maintaining a first database including a first plurality of search listings comprising sponsored search listings having a sponsored content; (b) maintaining a second database including documents having a general web content; (c) receiving, by the processor, a search query from the searcher; (d) identifying, by the processor, from the first database a first set of search listings comprising sponsored search listings having documents generating a match with the search query, and from the second database a second set of search listings comprising general web listings having documents generating a match with the same search query as used to identify the sponsored first set of search listings; (e) determining, by the processor, a confidence score for each listing from the first set of search listings, wherein the confidence score is determined in accordance with a relevance of each listing when compared to the listings of the second set of search listings after execution of step (d); (f) ranking, by the processor, the sponsored first set of search listings in accordance, at least in part, with the confidence score for each search listing thereof, wherein the processor associates the sponsored first set of search listings with at least one feature different than the relevance of each search listing when compared to the listings of the second set of search listings, and the processor further orders the sponsored first set of search listings in accordance with the at least one feature, the at least one feature comprising any of a number of clicks, a click-through rate, and a conversion rate derived from historical click-through and conversion data from user activity on the sponsored first set of search listings; (g) computing a plurality of demotion terms related to a plurality of the top-ranked sponsored first set of search listings, wherein the demotion terms capture non-ideal characteristics thereof; (h) updating the confidence score of each of the top-ranked sponsored first set of search listings based on the plurality of demotion terms; and (i) re-ranking the top-ranked sponsored first set of search listings according to the updated confidence scores. 7. The method of claim 1 , comprising discarding at least one of the sponsored first set of search listings in accordance with a list of negative keywords. | 0.551047 |
1. A system for guiding the progressive development and documentation of user thinking and knowledge about an inquiry based project according to exemplary approaches used by experts, comprising: An interface; A process manager system executable on at least one processor and operable to execute activities comprising: receiving user specification of an initial stage of understanding regarding an arbitrary problem or inquiry based project according to at least one of a plurality of entry or starting points; Providing at least one of an interactive workspace or a suggestion to a user, or both, to facilitate the further development of the understanding regarding an arbitrary problem or inquiry project towards a completion stage; Providing an integrated archetype based model of user understanding regarding the arbitrary problem or inquiry based project, in display or output or both. | 1. A system for guiding the progressive development and documentation of user thinking and knowledge about an inquiry based project according to exemplary approaches used by experts, comprising: An interface; A process manager system executable on at least one processor and operable to execute activities comprising: receiving user specification of an initial stage of understanding regarding an arbitrary problem or inquiry based project according to at least one of a plurality of entry or starting points; Providing at least one of an interactive workspace or a suggestion to a user, or both, to facilitate the further development of the understanding regarding an arbitrary problem or inquiry project towards a completion stage; Providing an integrated archetype based model of user understanding regarding the arbitrary problem or inquiry based project, in display or output or both. 22. The system of claim 1 further comprising the automatic entry to an additional information source or search field or both. | 0.937992 |
1. At a computer system including a processor and system memory, a computer-implemented method for providing debugging functionality for debugging a programming language within an interactive development environment, the method comprising: an act of displaying an interactive development environment including a programming language grammar input receiving area that allows a user to view and interact with grammar inputs defining a particular programming language, a programming language input receiving area that allows the user to view and interact with programming language inputs that use the particular programming language as defined by the grammar inputs, and a parse output area that allows the user to view the current state of a parser, wherein the grammar input receiving area, the language input receiving area, and the parse output area are each displayed simultaneously; an act of receiving a step input from the user indicating that the interactive development environment is to begin stepping through each language input to determine whether the language inputs have created an error relative to the grammar that defines acceptable language inputs; and an act of presenting the resulting output for each language input, such that as the user provides subsequent step inputs, the interactive development environment successively steps through each language input and simultaneously presents, at each step: an indication within the language input receiving area of a present language input that is being parsed by the parser, an indication within the grammar input receiving area of at least one grammar rule that is being applied to the present language input, the indication visually distinguishing the at least one grammar rule that is being applied to the present language input from other grammar inputs, and corresponding output in the parse output area. | 1. At a computer system including a processor and system memory, a computer-implemented method for providing debugging functionality for debugging a programming language within an interactive development environment, the method comprising: an act of displaying an interactive development environment including a programming language grammar input receiving area that allows a user to view and interact with grammar inputs defining a particular programming language, a programming language input receiving area that allows the user to view and interact with programming language inputs that use the particular programming language as defined by the grammar inputs, and a parse output area that allows the user to view the current state of a parser, wherein the grammar input receiving area, the language input receiving area, and the parse output area are each displayed simultaneously; an act of receiving a step input from the user indicating that the interactive development environment is to begin stepping through each language input to determine whether the language inputs have created an error relative to the grammar that defines acceptable language inputs; and an act of presenting the resulting output for each language input, such that as the user provides subsequent step inputs, the interactive development environment successively steps through each language input and simultaneously presents, at each step: an indication within the language input receiving area of a present language input that is being parsed by the parser, an indication within the grammar input receiving area of at least one grammar rule that is being applied to the present language input, the indication visually distinguishing the at least one grammar rule that is being applied to the present language input from other grammar inputs, and corresponding output in the parse output area. 5. The method of claim 1 , further comprising displaying within the input text in the language input receiving area the current location of the parser. | 0.674343 |
8. A translation server system, comprising: a Web server; a phrasebook storing a plurality of source phrases in a source natural language dialect, and a plurality of translated phrases, each of the plurality of translated phrases being a translation into a first target dialect of one of the plurality of source phrases; an application database server comprising an application database; an application server configured to access the application database and to generate a dynamic Web page content for Internet banking in response to a content request from a user of a financial institution, received by the Web server, said dynamic Web page content comprising a first source phrase and a second source phrase; the application server further comprising a translation engine configured to: process the dynamic Web page content into at least a first token and a second token; determine the first token is translatable, wherein the first token comprises the first source phrase; determine the second token is non-translatable, wherein the second token comprises the second source phrase; determine, in response to the determination the first token is translatable, the first source phrase has a corresponding translated phrase from the plurality of translated phrases in the phrasebook; and translate the first token by replacing the first source phrase with the corresponding translated phrase from the plurality of translated phrases in the phrasebook; the application server further configured to generate a translated dynamic Web page, wherein the translated dynamic Web page comprises the corresponding translated phrase and the second token comprising the second source phrase; determining the second token contains sensitive content based at least in part on the user, and performing security measures by replacing the second token with content-neutral text; determining whether the first source phrase is associated with a uniform resource identifier (URI), wherein the URI is associated with the Web page requested by the user; associating, by the one or more computers, the first source phrase to the URI if the first source phrase was not associated with the URI; determining the first target dialect is associated with a target language based at least in part on a location of the financial institution; determining a second dialect associated with the target language; determining a plurality of second-dialect translated phrases, wherein each of the plurality of second-dialect translated phrases corresponds to a translation into the second dialect of one of the plurality of source phrases; determining one or more of the plurality of source phrases having a corresponding target-dialect translated phrase and a corresponding second-dialect translated phrase; selecting the corresponding target-dialect translated phrase based on the location of the financial institution; selecting the corresponding second-dialect translated phrase when no corresponding target-dialect translated phrase exists; and providing the translated dynamic Web page to the user of the financial institution. | 8. A translation server system, comprising: a Web server; a phrasebook storing a plurality of source phrases in a source natural language dialect, and a plurality of translated phrases, each of the plurality of translated phrases being a translation into a first target dialect of one of the plurality of source phrases; an application database server comprising an application database; an application server configured to access the application database and to generate a dynamic Web page content for Internet banking in response to a content request from a user of a financial institution, received by the Web server, said dynamic Web page content comprising a first source phrase and a second source phrase; the application server further comprising a translation engine configured to: process the dynamic Web page content into at least a first token and a second token; determine the first token is translatable, wherein the first token comprises the first source phrase; determine the second token is non-translatable, wherein the second token comprises the second source phrase; determine, in response to the determination the first token is translatable, the first source phrase has a corresponding translated phrase from the plurality of translated phrases in the phrasebook; and translate the first token by replacing the first source phrase with the corresponding translated phrase from the plurality of translated phrases in the phrasebook; the application server further configured to generate a translated dynamic Web page, wherein the translated dynamic Web page comprises the corresponding translated phrase and the second token comprising the second source phrase; determining the second token contains sensitive content based at least in part on the user, and performing security measures by replacing the second token with content-neutral text; determining whether the first source phrase is associated with a uniform resource identifier (URI), wherein the URI is associated with the Web page requested by the user; associating, by the one or more computers, the first source phrase to the URI if the first source phrase was not associated with the URI; determining the first target dialect is associated with a target language based at least in part on a location of the financial institution; determining a second dialect associated with the target language; determining a plurality of second-dialect translated phrases, wherein each of the plurality of second-dialect translated phrases corresponds to a translation into the second dialect of one of the plurality of source phrases; determining one or more of the plurality of source phrases having a corresponding target-dialect translated phrase and a corresponding second-dialect translated phrase; selecting the corresponding target-dialect translated phrase based on the location of the financial institution; selecting the corresponding second-dialect translated phrase when no corresponding target-dialect translated phrase exists; and providing the translated dynamic Web page to the user of the financial institution. 12. The system of claim 8 wherein the application database comprises the phrasebook. | 0.536421 |
1. A method of collaboratively authoring a data file, comprising: displaying the data file in an authoring window within a user interface; presenting to a user an interface enabling selection between displaying an editing conflict and hiding the editing conflict; in response to receiving a selection to display an editing conflict, displaying the authoring window and a conflict summary window within the user interface, the conflict summary window including a listing of unresolved editing conflicts and identifying a type of editing operation for each of the unresolved editing conflicts, wherein the type of editing operation identifies whether an edit was inserted, deleted or revised; in response to receiving a selection of one of the unresolved editing conflicts, displaying an accept control and a reject control; and allowing the user to select the accept control, resulting in accepting the editing conflict, or the reject control, resulting in rejecting the editing conflict. | 1. A method of collaboratively authoring a data file, comprising: displaying the data file in an authoring window within a user interface; presenting to a user an interface enabling selection between displaying an editing conflict and hiding the editing conflict; in response to receiving a selection to display an editing conflict, displaying the authoring window and a conflict summary window within the user interface, the conflict summary window including a listing of unresolved editing conflicts and identifying a type of editing operation for each of the unresolved editing conflicts, wherein the type of editing operation identifies whether an edit was inserted, deleted or revised; in response to receiving a selection of one of the unresolved editing conflicts, displaying an accept control and a reject control; and allowing the user to select the accept control, resulting in accepting the editing conflict, or the reject control, resulting in rejecting the editing conflict. 6. The method of claim 1 , further comprising visually alerting the user when the editing conflict is identified. | 0.573478 |
8. The method of claim 5 , wherein each comment is classified as more urgent or less urgent such that a first comment is classified as more urgent and a second comment is classified as less urgent, wherein said sending notification comprises sending notification to each reviewer by a first notification method for each comment classified as more urgent and by a second notification method for each comment classified as less urgent, and wherein the second notification method differs from the first notification method. | 8. The method of claim 5 , wherein each comment is classified as more urgent or less urgent such that a first comment is classified as more urgent and a second comment is classified as less urgent, wherein said sending notification comprises sending notification to each reviewer by a first notification method for each comment classified as more urgent and by a second notification method for each comment classified as less urgent, and wherein the second notification method differs from the first notification method. 9. The method of claim 8 , wherein the first notification method is an instant messaging notification method, and wherein the second notification method is an email notification method. | 0.896288 |
9. A non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to: cause a mediator module to receive user session data from a mashup maker; and cause the mediator module to provide one or more services to the mashup maker in response to a determination that the one or more services are associated with the user session data based on one or more of a policy and a role, wherein the one or more services comprise one or more controlled services registered with the mediator module by one or more remote service providers, and wherein the controlled services are operating in a secure environment and are financial services; cause the mediator module to provide access to the one or more services during development of a mashup application; cause a component gateway module to provide one or more of policy based categorization of one or more controlled services and role based categorization of one or more controlled services; and cause the component gateway module to filter the one or more controlled services based on one or more of the policy based categorization and the role based categorization. | 9. A non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to: cause a mediator module to receive user session data from a mashup maker; and cause the mediator module to provide one or more services to the mashup maker in response to a determination that the one or more services are associated with the user session data based on one or more of a policy and a role, wherein the one or more services comprise one or more controlled services registered with the mediator module by one or more remote service providers, and wherein the controlled services are operating in a secure environment and are financial services; cause the mediator module to provide access to the one or more services during development of a mashup application; cause a component gateway module to provide one or more of policy based categorization of one or more controlled services and role based categorization of one or more controlled services; and cause the component gateway module to filter the one or more controlled services based on one or more of the policy based categorization and the role based categorization. 12. The computer readable storage medium according to claim 9 , wherein the computer readable program code is further configured to cause the mediator module to provide the one or more services for off line use. | 0.625315 |
1. A computer server system comprising: a memory server system configured to include an original document object model that comprises a data structure for representing documents on the computer server system; and a processing server system configured to communicate with the memory server system and with a client computing system comprising a duplicate copy of the original document object model and the processing server system is configured to implement the steps of: receive information from the client computing system, the information representing a change in a state of a software component of the original document object model; update portions of the original document object model based on the change; translate only the updated portions of the original document object model into a mark-up language string; and transmit the string to the client computing system for incorporation into the duplicate copy of the original document object model. | 1. A computer server system comprising: a memory server system configured to include an original document object model that comprises a data structure for representing documents on the computer server system; and a processing server system configured to communicate with the memory server system and with a client computing system comprising a duplicate copy of the original document object model and the processing server system is configured to implement the steps of: receive information from the client computing system, the information representing a change in a state of a software component of the original document object model; update portions of the original document object model based on the change; translate only the updated portions of the original document object model into a mark-up language string; and transmit the string to the client computing system for incorporation into the duplicate copy of the original document object model. 4. The computer system of claim 1 , wherein the original document object model represents a software object that implements a user interface object. | 0.525196 |
10. A computing system comprising: one or more processors; one or more computer-readable tangible storage devices; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to receive a search term; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to identify instances of the search term in a source text; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to identify, for each of the instances of the search term identified in the source text, a prefix string comprising a plurality of tokens preceding the search term in the source text, and to identify a suffix string comprising a plurality of tokens subsequent to the search term in the source text; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to provide data to display on a display device a visualization interface that comprises the search term within a combined tree diagram comprising a prefix tree extending to a first side of the search term, and a suffix tree extending to a second side of the search term, such that the prefix tree displays, in tree diagram format, the prefix strings for the instances of the search term identified in the source text, and the suffix tree displays, in tree diagram format, the suffix strings for the instances of the search term identified in the source text, wherein the prefix tree comprises tokens that are shared in common among the prefix strings as nodes connected to adjacent tokens by branches, and the suffix tree comprises tokens that are shared in common among the suffix strings as nodes connected to adjacent tokens by branches, wherein the branches in the prefix tree and the suffix tree are user-selectable in the visualization interface; and program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to provide, in response to receiving, through a user input device, a user input selecting one of the branches in the prefix tree or in the suffix tree, and for each of one or more matching sequences that are connected through the selected branch, data to display a visual indication of a particular prefix string and a particular suffix string in the visualization interface that form a unique matching sequence of the particular prefix string, the search term, and the particular suffix string that occur together in the source text, wherein each of the one or more matching sequences forms a unique matching sequence from the source text, and wherein the visual indication comprises a unique graphical indicator applied to each unique matching sequence through the corresponding nodes in the prefix tree, the search term, and the corresponding nodes in the suffix tree for each of the unique matching sequences that comprise the search term and the selected branch. | 10. A computing system comprising: one or more processors; one or more computer-readable tangible storage devices; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to receive a search term; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to identify instances of the search term in a source text; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to identify, for each of the instances of the search term identified in the source text, a prefix string comprising a plurality of tokens preceding the search term in the source text, and to identify a suffix string comprising a plurality of tokens subsequent to the search term in the source text; program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to provide data to display on a display device a visualization interface that comprises the search term within a combined tree diagram comprising a prefix tree extending to a first side of the search term, and a suffix tree extending to a second side of the search term, such that the prefix tree displays, in tree diagram format, the prefix strings for the instances of the search term identified in the source text, and the suffix tree displays, in tree diagram format, the suffix strings for the instances of the search term identified in the source text, wherein the prefix tree comprises tokens that are shared in common among the prefix strings as nodes connected to adjacent tokens by branches, and the suffix tree comprises tokens that are shared in common among the suffix strings as nodes connected to adjacent tokens by branches, wherein the branches in the prefix tree and the suffix tree are user-selectable in the visualization interface; and program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to provide, in response to receiving, through a user input device, a user input selecting one of the branches in the prefix tree or in the suffix tree, and for each of one or more matching sequences that are connected through the selected branch, data to display a visual indication of a particular prefix string and a particular suffix string in the visualization interface that form a unique matching sequence of the particular prefix string, the search term, and the particular suffix string that occur together in the source text, wherein each of the one or more matching sequences forms a unique matching sequence from the source text, and wherein the visual indication comprises a unique graphical indicator applied to each unique matching sequence through the corresponding nodes in the prefix tree, the search term, and the corresponding nodes in the suffix tree for each of the unique matching sequences that comprise the search term and the selected branch. 14. The computing system of claim 10 , wherein the selected branch is a first selected branch, the method further comprising: program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to receive a user input selecting another one of the branches in the prefix tree or in the suffix tree as a second selected branch; and program instructions, stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, to provide data to display visual indications of prefix strings and suffix strings in the visualization interface that form unique matching sequences of prefix string, search term, and suffix string that occur together in the source text, for each of one or more of the unique matching sequences that comprises the first selected branch and the second selected branch. | 0.503956 |
1. A method for routing calls comprising: receiving a call from a customer; extracting features from an utterance of the call; based on the extracted features, predicting a class and a complexity of a dialogue to be conducted between the customer and an agent, wherein the class c of the dialogue is computed according to Equation 1: p θ ( c ❘ d ) = 1 1 + e - ( θ 0 c + θ 1 c · ϕ ( d ) ) ( 1 ) where φ(d) is a feature vector derived from the features extracted from the utterance d; θ c vector of parameters to learn for each dialogue class c; and θ 0 c is a regularization vector; with a routing model, generating a routing strategy for steering the call to one of a plurality of types of agent, based on the predicted class and complexity of the dialogue and a cost assigned to the type of agent, a first of the plurality of types of agent being assigned a higher cost than a second of the types of agent; and outputting the routing strategy, wherein at least one of the extracting features, predicting the class and the complexity, and generating the routing strategy is performed with a processor. | 1. A method for routing calls comprising: receiving a call from a customer; extracting features from an utterance of the call; based on the extracted features, predicting a class and a complexity of a dialogue to be conducted between the customer and an agent, wherein the class c of the dialogue is computed according to Equation 1: p θ ( c ❘ d ) = 1 1 + e - ( θ 0 c + θ 1 c · ϕ ( d ) ) ( 1 ) where φ(d) is a feature vector derived from the features extracted from the utterance d; θ c vector of parameters to learn for each dialogue class c; and θ 0 c is a regularization vector; with a routing model, generating a routing strategy for steering the call to one of a plurality of types of agent, based on the predicted class and complexity of the dialogue and a cost assigned to the type of agent, a first of the plurality of types of agent being assigned a higher cost than a second of the types of agent; and outputting the routing strategy, wherein at least one of the extracting features, predicting the class and the complexity, and generating the routing strategy is performed with a processor. 2. The method of claim 1 , further comprising learning a dialogue class model based on a corpus of dialogues, each dialogue in the corpus being annotated with a class from a plurality of classes, the prediction of the class of the dialogue being performed with the dialogue class model. | 0.62226 |
2. The apparatus of claim 1 , wherein said learning file analyzer is configured generate a model of a statistical distribution of said input values during normal process behavior. | 2. The apparatus of claim 1 , wherein said learning file analyzer is configured generate a model of a statistical distribution of said input values during normal process behavior. 3. The apparatus of claim 2 , wherein said model comprises a joint probability density of occurrence of constellations of parameter values during said normal process behavior. | 0.902104 |
4. The server of claim 1 , wherein the server communicates with a plurality of first remote devices, the plurality of first remote devices including the remote device, each of the plurality of first remote devices include a first dictionary, respectively, including the remote device including the dictionary, wherein the server further comprises a dictionary database having a plurality of second dictionaries, wherein each second dictionary of the plurality of second dictionaries is associated with one of the first dictionary, respectively, of the plurality of first remote devices. | 4. The server of claim 1 , wherein the server communicates with a plurality of first remote devices, the plurality of first remote devices including the remote device, each of the plurality of first remote devices include a first dictionary, respectively, including the remote device including the dictionary, wherein the server further comprises a dictionary database having a plurality of second dictionaries, wherein each second dictionary of the plurality of second dictionaries is associated with one of the first dictionary, respectively, of the plurality of first remote devices. 5. The server of claim 4 , wherein the context-aware dictionary manager is further configured to update one of the plurality of second dictionaries with the entry, wherein the updated one of the plurality of second dictionaries is associated with the dictionary of the remote device. | 0.813218 |
1. A method for evaluating compliance of at least one agent reading at least one script to at least one client, the method comprising at least the following: conducting at least one voice interaction between the at least one agent and the at least one client, wherein the at least one agent follows the at least one script at an agent workstation; evaluating the at least one voice interaction with at least one automatic speech recognition component adapted to analyze the at least one voice interaction, wherein the at least one voice interaction is divided into viewable panel-level segments and a panel-level time displacement stamp is assigned to each panel of the panel-level segments, wherein each panel-level segment is compared with a corresponding expected text, wherein a confidence level threshold of the automatic speech recognition component is used to evaluate the accuracy of each panel-level segment based on an output of a comparison between each panel-level segment and its corresponding expected text, wherein a score is assigned to each panel-level segment, each score indicating a match accuracy between the panel-level segment to which it is assigned and its assigned panel-level segment's corresponding expected text, wherein the scores are evaluated against a standard, the standard defining a required score for each of the panel-level segments to be declared as a match to their corresponding expected texts; and determining whether the at least one agent has adequately followed the at least one script wherein a set of action rules is applied to the output of the determining, wherein the set of action rules includes a quality assurance action to be taken. | 1. A method for evaluating compliance of at least one agent reading at least one script to at least one client, the method comprising at least the following: conducting at least one voice interaction between the at least one agent and the at least one client, wherein the at least one agent follows the at least one script at an agent workstation; evaluating the at least one voice interaction with at least one automatic speech recognition component adapted to analyze the at least one voice interaction, wherein the at least one voice interaction is divided into viewable panel-level segments and a panel-level time displacement stamp is assigned to each panel of the panel-level segments, wherein each panel-level segment is compared with a corresponding expected text, wherein a confidence level threshold of the automatic speech recognition component is used to evaluate the accuracy of each panel-level segment based on an output of a comparison between each panel-level segment and its corresponding expected text, wherein a score is assigned to each panel-level segment, each score indicating a match accuracy between the panel-level segment to which it is assigned and its assigned panel-level segment's corresponding expected text, wherein the scores are evaluated against a standard, the standard defining a required score for each of the panel-level segments to be declared as a match to their corresponding expected texts; and determining whether the at least one agent has adequately followed the at least one script wherein a set of action rules is applied to the output of the determining, wherein the set of action rules includes a quality assurance action to be taken. 5. The script compliance method of claim 1 , wherein conducting at least one voice interaction includes conducting the at least one voice interaction at least in part on a publicly switched telephone network (PSTN). | 0.578362 |
4. The method for language processing of claim 3 , further comprising tokenizing the raw natural language processing text using the automatic speech recognition dictionary. | 4. The method for language processing of claim 3 , further comprising tokenizing the raw natural language processing text using the automatic speech recognition dictionary. 5. The method for language processing of claim 4 , further comprising collecting tokenized words that appear more than a threshold number of times. | 0.943555 |
6. The method of claim 4 , further comprising: authorizing access to a second user account; receiving an indication of a selection of a second selected one of the subset of the electronic media files by a second user of the second user account; and storing the second selected electronic media file in the session. | 6. The method of claim 4 , further comprising: authorizing access to a second user account; receiving an indication of a selection of a second selected one of the subset of the electronic media files by a second user of the second user account; and storing the second selected electronic media file in the session. 12. The method of claim 6 , further comprising: prompting the second user to enter a second description explaining why the second selected electronic media file is being selected for inclusion in the session; and causing to be displayed on the display device the second description with the thumbnail image corresponding to the second selected electronic media file. | 0.866079 |
1. A method comprising: identifying a speed of a caller in a communication session; classifying a background environment of the caller based at least in part on the speed of the caller, to yield a background environment classification; selecting an acoustic model matched to the background environment classification from a plurality of acoustic models; and performing speech recognition on a received audio signal from the caller using the acoustic model. | 1. A method comprising: identifying a speed of a caller in a communication session; classifying a background environment of the caller based at least in part on the speed of the caller, to yield a background environment classification; selecting an acoustic model matched to the background environment classification from a plurality of acoustic models; and performing speech recognition on a received audio signal from the caller using the acoustic model. 7. The method of claim 1 , wherein the acoustic features comprise one of estimates of background energy, signal-to-noise ratio, and spectral characteristics of the background environment. | 0.759135 |
5. The method of claim 4 , wherein the loss function is a function of a minimum of the difference between the decompositional model and a product of the latent variable models, conditioned by weights that increase the weight some of the state descriptor features, and optionally a function of regularization terms which are each a function of one of the latent variable models. | 5. The method of claim 4 , wherein the loss function is a function of a minimum of the difference between the decompositional model and a product of the latent variable models, conditioned by weights that increase the weight some of the state descriptor features, and optionally a function of regularization terms which are each a function of one of the latent variable models. 7. The method of claim 5 , wherein the weights that increase the weight some of the state descriptor features increase the weight of some of the features of the final state descriptor more than the corresponding weights of features of the initial state descriptor. | 0.867299 |
1. A reading aloud support apparatus for supporting a speech synthesis device performing to read aloud a character string in a document as a voice, comprising: a reception unit configured to receive an instruction from a user to generate an instruction signal; a first extraction unit configured to extract, as a partial document, a part of the document which corresponds to a range of words including a first word and one or more second words preceding the first word, if the instruction signal is received while the speech synthesis device performs to read aloud the first word of the document; a second extraction unit configured to perform morphological analysis on a sentence included in the partial document and to extract one or more words as one or more candidate words, the candidate words which belong to a word class corresponding to target start positions for re-reading of the partial document; an acquisition unit configured to acquire, for each of the candidate words, attribute information items relating to the candidate words, the attribute information items including reading candidates; a generation unit configured to perform, for each of the candidate words, weighting relating to a value corresponding a distance, the distance indicating a number of characters between each of the candidate words and the first word, to determine each of the candidate words to be preferentially presented based on the weighting, and to generate a presentation order; and a speech synthesis unit configured to present the candidate words and the attribute information items corresponding to the candidate words as a voice in accordance with the presentation order. | 1. A reading aloud support apparatus for supporting a speech synthesis device performing to read aloud a character string in a document as a voice, comprising: a reception unit configured to receive an instruction from a user to generate an instruction signal; a first extraction unit configured to extract, as a partial document, a part of the document which corresponds to a range of words including a first word and one or more second words preceding the first word, if the instruction signal is received while the speech synthesis device performs to read aloud the first word of the document; a second extraction unit configured to perform morphological analysis on a sentence included in the partial document and to extract one or more words as one or more candidate words, the candidate words which belong to a word class corresponding to target start positions for re-reading of the partial document; an acquisition unit configured to acquire, for each of the candidate words, attribute information items relating to the candidate words, the attribute information items including reading candidates; a generation unit configured to perform, for each of the candidate words, weighting relating to a value corresponding a distance, the distance indicating a number of characters between each of the candidate words and the first word, to determine each of the candidate words to be preferentially presented based on the weighting, and to generate a presentation order; and a speech synthesis unit configured to present the candidate words and the attribute information items corresponding to the candidate words as a voice in accordance with the presentation order. 5. The apparatus according to claim 1 , further comprising a determination unit configured to determine a type of the document to obtain a determination result, and wherein the generation unit changes the presentation order of the candidate words and the presentation order of the attribute information items for the candidate words, with reference to the determination result and a model in which associates the presentation order of the candidate words corresponding to the type of the document with the attribute information items on the candidate words. | 0.5 |
13. The computer-readable storage medium of claim 12 , wherein the joined relation comprises a second joined tuple which is joined based on the first tuple selected from the second set of tuples and a third tuple selected from the third set of tuples. | 13. The computer-readable storage medium of claim 12 , wherein the joined relation comprises a second joined tuple which is joined based on the first tuple selected from the second set of tuples and a third tuple selected from the third set of tuples. 14. The computer-readable storage medium of claim 13 , wherein a second value of the skyline probability attribute of the second joined tuple includes the product of the value of the plurality of the first existence probability attributes and the value of the plurality of the second existence probability attributes. | 0.940132 |
4. Apparatus for securely transporting and printing documents in a networked environment, the apparatus comprising: a policy server configured for storing at least one decryption key for at least one document, wherein said at least one decryption key is used in enforcing a corresponding set of print access rules; wherein an access-managing user defines said corresponding set of print access rules for the at least one document through the policy server; wherein the corresponding set of print access rules include rules relating to a number of times a document may be printed, wherein the corresponding set of print access rules include rules relating to an expiration date after which the document may no longer be printed; wherein the print access rules apply to any of: an individual user and a group of users at a receiving computer; wherein the policy server stores the corresponding set of print access rules and the at least one decryption key for the document; wherein the computer of the access-managing user is configured for encrypting the at least one document and attach any of the policy server's name, IP address or URL address to the document; said access-managing user's computer configured for sending the encrypted document to a receiving user's computer; wherein the receiving user's computer stores the document locally for later access; wherein the receiving user's computer is configured for retrieving the at least one document from local storage, contacting the policy server, and requesting therefrom said corresponding set of print access rules and the at least one decryption key for the at least one document, responsive to the receiving user requesting, at a later time than when said document was locally stored, the at least one document be printed, wherein the policy server references the document, an identifier of the receiving user, and a computer ID of the user's computer to retrieve the decryption key and access rules for the document and wherein the policy server tracks which computers can print the document and which printer that the user's computer is connected to can print the document; wherein the receiving user's computer is configured for decrypting, at the receiving user's computer, the at least one document using the at least one document's at least one decryption key from the policy server, responsive to said receiving user's computer receiving said corresponding set of print access rules and the at least one decryption key; and wherein the receiving user's computer is configured for evaluating the print access rules for the at least one document in relation to the receiving user and the receiving user's computer and for sending the pages of the at least one document that are printable by the receiving user and receiving user's computer to a printer for printing; and wherein the printer is configured to print the pages that are printable. | 4. Apparatus for securely transporting and printing documents in a networked environment, the apparatus comprising: a policy server configured for storing at least one decryption key for at least one document, wherein said at least one decryption key is used in enforcing a corresponding set of print access rules; wherein an access-managing user defines said corresponding set of print access rules for the at least one document through the policy server; wherein the corresponding set of print access rules include rules relating to a number of times a document may be printed, wherein the corresponding set of print access rules include rules relating to an expiration date after which the document may no longer be printed; wherein the print access rules apply to any of: an individual user and a group of users at a receiving computer; wherein the policy server stores the corresponding set of print access rules and the at least one decryption key for the document; wherein the computer of the access-managing user is configured for encrypting the at least one document and attach any of the policy server's name, IP address or URL address to the document; said access-managing user's computer configured for sending the encrypted document to a receiving user's computer; wherein the receiving user's computer stores the document locally for later access; wherein the receiving user's computer is configured for retrieving the at least one document from local storage, contacting the policy server, and requesting therefrom said corresponding set of print access rules and the at least one decryption key for the at least one document, responsive to the receiving user requesting, at a later time than when said document was locally stored, the at least one document be printed, wherein the policy server references the document, an identifier of the receiving user, and a computer ID of the user's computer to retrieve the decryption key and access rules for the document and wherein the policy server tracks which computers can print the document and which printer that the user's computer is connected to can print the document; wherein the receiving user's computer is configured for decrypting, at the receiving user's computer, the at least one document using the at least one document's at least one decryption key from the policy server, responsive to said receiving user's computer receiving said corresponding set of print access rules and the at least one decryption key; and wherein the receiving user's computer is configured for evaluating the print access rules for the at least one document in relation to the receiving user and the receiving user's computer and for sending the pages of the at least one document that are printable by the receiving user and receiving user's computer to a printer for printing; and wherein the printer is configured to print the pages that are printable. 5. The apparatus of claim 4 , wherein the receiving user is notified when the at least one document is not printable. | 0.624204 |
16. The apparatus of claim 15 wherein said first marker audio data is delivered on said user interface as a selectable connection which when selected will enable said processor to deliver to said user interface corresponding said third marker visual data. | 16. The apparatus of claim 15 wherein said first marker audio data is delivered on said user interface as a selectable connection which when selected will enable said processor to deliver to said user interface corresponding said third marker visual data. 18. The apparatus of claim 16 wherein the insertion of said second markers in the text are based on at least one of time, sections, patterns, letters, words, sentences, paragraphs, alphanumeric characters, metadata, and statistics of contextual information. | 0.865271 |
1. A computer-implemented method comprising: automatically selecting, by a computer, from a keyword store a set of one or more target words stored in the keyword store, each respective target word having a word difficulty score based upon one or more skill scores of a learner-record stored in a learner database, wherein the keyword store is configured to store a plurality of target words extracted from one or more resources, and metadata associated with each respective target word, and wherein the metadata associated with each respective target word in the keyword word store indicates the word difficulty score of the respective target word; generating, by the computer, a set of one or more semantic distractors comprising one or more words having a definition that is related to a target word; identifying, by the computer, in a dictionary source a plurality of words having an edit distance based upon the target word, wherein the edit distance of a word is an amount of letter-insertions and letter-deletions required for the word to be the target word; generating, by the computer, a set of one or more orthographic distractors comprising one or more words of the plurality of words, wherein the edit distance of each respective word in the set of orthographic distractors satisfies an edit distance amount setting, and wherein the edit distance amount setting limits the edit distance of the respective word based upon the one or more skill scores of the learner-record; generating, by the computer, a set of phonetic distractors comprising one or more homophones of the target word, based upon the one or more skill scores of the learner-record; extracting, by the computer, a plurality of target words from one or more resources; for each respective target word: determining, by the computer, the word difficulty score based upon one or more characteristics of the target word; generating, by the computer, the metadata of the target word, the metadata indicating the word difficulty score and a resource containing the target word; and storing, by the computer, the target word and the metadata associated with the target word into the keyword store; receiving, by the computer, the resource of the one or more resources containing the respective target word of the set of one or more target words from a computing device; determining, by the computer, a resource difficulty score associated with the resource based upon one or more characteristics of the resource; and storing, by the computer, into a resource store configured to store the one or more resources, at least a portion of the resource and metadata indicating the resource difficulty score. | 1. A computer-implemented method comprising: automatically selecting, by a computer, from a keyword store a set of one or more target words stored in the keyword store, each respective target word having a word difficulty score based upon one or more skill scores of a learner-record stored in a learner database, wherein the keyword store is configured to store a plurality of target words extracted from one or more resources, and metadata associated with each respective target word, and wherein the metadata associated with each respective target word in the keyword word store indicates the word difficulty score of the respective target word; generating, by the computer, a set of one or more semantic distractors comprising one or more words having a definition that is related to a target word; identifying, by the computer, in a dictionary source a plurality of words having an edit distance based upon the target word, wherein the edit distance of a word is an amount of letter-insertions and letter-deletions required for the word to be the target word; generating, by the computer, a set of one or more orthographic distractors comprising one or more words of the plurality of words, wherein the edit distance of each respective word in the set of orthographic distractors satisfies an edit distance amount setting, and wherein the edit distance amount setting limits the edit distance of the respective word based upon the one or more skill scores of the learner-record; generating, by the computer, a set of phonetic distractors comprising one or more homophones of the target word, based upon the one or more skill scores of the learner-record; extracting, by the computer, a plurality of target words from one or more resources; for each respective target word: determining, by the computer, the word difficulty score based upon one or more characteristics of the target word; generating, by the computer, the metadata of the target word, the metadata indicating the word difficulty score and a resource containing the target word; and storing, by the computer, the target word and the metadata associated with the target word into the keyword store; receiving, by the computer, the resource of the one or more resources containing the respective target word of the set of one or more target words from a computing device; determining, by the computer, a resource difficulty score associated with the resource based upon one or more characteristics of the resource; and storing, by the computer, into a resource store configured to store the one or more resources, at least a portion of the resource and metadata indicating the resource difficulty score. 7. The method according to claim 1 , further comprising identifying, by the computer, in a dictionary data source, the one or more homophones of the target word having a comparatively small edit distance amount identified in the dictionary source. | 0.505791 |
15. A method comprising the steps of: establishing a user profile in connection with a specific client device; receiving a plurality of time stamps indicating times between updates for every dynamic list of search suggestions as received by the specific client device; receiving a plurality of time stamps indicating each time a link is chosen from the dynamic list of search suggestions; receiving a plurality of time stamps indicating each time an action signifying an invalid selection is performed after the link is chosen from the dynamic list of search suggestions; using a computer-implemented learning system to determine a user-specific threshold for an invalid selection, the user-specific threshold for the invalid selection being a function of time versus a probability of being invalid, the function of time being a difference between a time stamp for presenting a most recent dynamic list update and a time stamp for an input selecting a search suggestion, the input being invalid when the difference satisfies the user-specific threshold; establishing an invalid-selection module based upon attributes learned by the system, the module determining a probability a selection is invalid; and sending the invalid-selection module to the specific client device. | 15. A method comprising the steps of: establishing a user profile in connection with a specific client device; receiving a plurality of time stamps indicating times between updates for every dynamic list of search suggestions as received by the specific client device; receiving a plurality of time stamps indicating each time a link is chosen from the dynamic list of search suggestions; receiving a plurality of time stamps indicating each time an action signifying an invalid selection is performed after the link is chosen from the dynamic list of search suggestions; using a computer-implemented learning system to determine a user-specific threshold for an invalid selection, the user-specific threshold for the invalid selection being a function of time versus a probability of being invalid, the function of time being a difference between a time stamp for presenting a most recent dynamic list update and a time stamp for an input selecting a search suggestion, the input being invalid when the difference satisfies the user-specific threshold; establishing an invalid-selection module based upon attributes learned by the system, the module determining a probability a selection is invalid; and sending the invalid-selection module to the specific client device. 16. The method of claim 15 further comprising the step of: receiving at least one of a user's age, a type of device, a type of connection, a network carrier, a user location, and a signal strength. | 0.671717 |
1. A computer-implemented method performed at a server system having one or more processors and memory, the method comprising: responding to a single search query, including: searching a message repository to identify a plurality of conversations relevant to the search query, wherein each of the plurality of the identified conversations includes one or more messages sharing a common set of characteristics that meet predefined criteria, and wherein each of the plurality of the identified conversations includes a respective conversation identifier, and sending a list of conversations representing at least a subset of the identified conversations, wherein at least one of the conversations in the list includes a plurality of email messages; providing content of a selected conversation from the list of conversations including text formatted so as to differentiate between first text of the selected conversation and second text of the selected conversation; wherein the second text includes text matching the search query and the first text does not include text matching the search query; and providing formatting information for the first text in a first format and providing formatting information for the second text in a second format; wherein the first format differs from the second format in a visually distinctive manner. | 1. A computer-implemented method performed at a server system having one or more processors and memory, the method comprising: responding to a single search query, including: searching a message repository to identify a plurality of conversations relevant to the search query, wherein each of the plurality of the identified conversations includes one or more messages sharing a common set of characteristics that meet predefined criteria, and wherein each of the plurality of the identified conversations includes a respective conversation identifier, and sending a list of conversations representing at least a subset of the identified conversations, wherein at least one of the conversations in the list includes a plurality of email messages; providing content of a selected conversation from the list of conversations including text formatted so as to differentiate between first text of the selected conversation and second text of the selected conversation; wherein the second text includes text matching the search query and the first text does not include text matching the search query; and providing formatting information for the first text in a first format and providing formatting information for the second text in a second format; wherein the first format differs from the second format in a visually distinctive manner. 18. The method of claim 1 further comprising: providing the content of the selected conversation including text formatted so as to differentiate between first text of the selected conversation and second text of the selected conversation by highlighting the second text. | 0.554985 |
1. An alignment method comprising: with a computing device, for a source sentence in a source language, prior to word level alignment of the source sentence with a target sentence in a target language, identifying whether the sentence includes at least one candidate term comprising a contiguous subsequence of words of the source sentence; aligning the target sentence in the target language with the source sentence, comprising: developing a probabilistic model which models conditional probability distributions for alignments between words of the source sentence and words of the target sentence; and generating an optimal alignment based on the probabilistic model, including, where the source sentence includes the at least one candidate term, enforcing a contiguity constraint which requires that all the words of the target sentence which are aligned with an identified candidate term form a contiguous subsequence of the target sentence. | 1. An alignment method comprising: with a computing device, for a source sentence in a source language, prior to word level alignment of the source sentence with a target sentence in a target language, identifying whether the sentence includes at least one candidate term comprising a contiguous subsequence of words of the source sentence; aligning the target sentence in the target language with the source sentence, comprising: developing a probabilistic model which models conditional probability distributions for alignments between words of the source sentence and words of the target sentence; and generating an optimal alignment based on the probabilistic model, including, where the source sentence includes the at least one candidate term, enforcing a contiguity constraint which requires that all the words of the target sentence which are aligned with an identified candidate term form a contiguous subsequence of the target sentence. 6. The alignment method of claim 1 , wherein the probabilistic model is a Hidden Markov Model. | 0.652859 |
23. An image viewing system comprising: an image analyzer configured to (i) detect and identify one or more objects in a captured image and (ii) to associate stored data corresponding to the captured image with information that identifies the one or more objects; a memory that stores (I) an image file of the data corresponding to the captured image, and (ii) the information that identifies the one or more objects; and a user-interface configured (i) to present the captured image, (ii) to identify and make selectable the one or more objects from the remainder of the image, and (iii) to perform an action in response to detecting the selection of one of the objects. | 23. An image viewing system comprising: an image analyzer configured to (i) detect and identify one or more objects in a captured image and (ii) to associate stored data corresponding to the captured image with information that identifies the one or more objects; a memory that stores (I) an image file of the data corresponding to the captured image, and (ii) the information that identifies the one or more objects; and a user-interface configured (i) to present the captured image, (ii) to identify and make selectable the one or more objects from the remainder of the image, and (iii) to perform an action in response to detecting the selection of one of the objects. 25. The image viewing system of claim 23 , wherein the information that identifies the one or more objects in the image file is stored external to the image file. | 0.70409 |
1. A non-transitory computer-readable storage medium for designing a mashup, the non-transitory computer-readable storage medium storing instructions which, when executed by one or more processors, cause the performance of: prior to run-time: receiving first user input that relates a first Graphical User Interface (GUI) object, that represents a first widget, to a second GUI object that represents a second widget; wherein the first widget and the second widget are to be included in the mashup; wherein the first widget conforms to a first widget specification and the second widget conforms to a second widget specification that is different than the first widget specification; in response to receiving the first user input: defining a first variable in the mashup based on the first user input, wherein the first variable is configured to store a first variable value at run-time, and wherein, at run-time, the first variable value of the first variable will be replaced by a value of an output parameter of the first widget and the first variable value of the first variable will be used as an input parameter of the second widget; based on the first user input, generating an event definition that defines an event which, when detected at run-time, causes contents of at least one of the first widget and the second widget to be refreshed; storing a binding definition that associates the event definition of the event, the first variable, the output parameter of the first widget, and the input parameter of the second widget; and generating a definition of the mashup, wherein generating the definition of the mashup comprises including the binding definition in the definition of the mashup; at run-time: receiving second user input comprising a data value; in response to receiving the second user input, replacing the data value to the first variable value of the first variable, using the first variable value as the input parameter to the second widget to refresh contents of the second widget. | 1. A non-transitory computer-readable storage medium for designing a mashup, the non-transitory computer-readable storage medium storing instructions which, when executed by one or more processors, cause the performance of: prior to run-time: receiving first user input that relates a first Graphical User Interface (GUI) object, that represents a first widget, to a second GUI object that represents a second widget; wherein the first widget and the second widget are to be included in the mashup; wherein the first widget conforms to a first widget specification and the second widget conforms to a second widget specification that is different than the first widget specification; in response to receiving the first user input: defining a first variable in the mashup based on the first user input, wherein the first variable is configured to store a first variable value at run-time, and wherein, at run-time, the first variable value of the first variable will be replaced by a value of an output parameter of the first widget and the first variable value of the first variable will be used as an input parameter of the second widget; based on the first user input, generating an event definition that defines an event which, when detected at run-time, causes contents of at least one of the first widget and the second widget to be refreshed; storing a binding definition that associates the event definition of the event, the first variable, the output parameter of the first widget, and the input parameter of the second widget; and generating a definition of the mashup, wherein generating the definition of the mashup comprises including the binding definition in the definition of the mashup; at run-time: receiving second user input comprising a data value; in response to receiving the second user input, replacing the data value to the first variable value of the first variable, using the first variable value as the input parameter to the second widget to refresh contents of the second widget. 17. The non-transitory computer-readable storage medium of claim 1 , further comprising instructions which, when executed by the one or more processors, cause the performance of: based on one or more of a first contract for the first widget and a second contract for the second widget, generating one or more configuration GUIs that allow a user, who is designing the mashup, to configure properties of at least one of the first widget and the second widget; displaying the one or more configuration GUIs to the user; and receiving the first user input through the one or more configuration GUIs. | 0.594319 |
25. A non-transitory computer readable storage medium storing one or more programs configured for execution by a computer, the one or more programs comprising instructions for: partitioning a set of monotonically ordered document identification tags into a plurality of segments, each segment associated with a respective subset of the set of monotonically ordered document identification tags; subdividing each of the segments into a plurality of tiers, wherein each tier is associated with a respective subset of the set of document identification tags, and wherein the plurality of tiers are monotonically ordered with respect to a query-independent document importance metric; receiving query-independent information about a new document, the information including a value of the query-independent document importance metric and a globally unique document identifier for the new document; selecting, based at least in part on the globally unique document identifier, one of the segments; selecting, based at least on the query-independent information, one of the tiers associated with the selected segment; assigning to the new document a document identification tag from the respective subset of document identification tags associated with the selected tier, the assigned document identification tag not previously assigned to any of the documents in a collection of documents; repeating the receiving, selecting a segment, selecting a tier, and assigning, with respect to one or more additional new documents; and wherein the assigned document identification tags are assigned to documents in the collection of documents having globally unique document identifiers associated with the respective segment. | 25. A non-transitory computer readable storage medium storing one or more programs configured for execution by a computer, the one or more programs comprising instructions for: partitioning a set of monotonically ordered document identification tags into a plurality of segments, each segment associated with a respective subset of the set of monotonically ordered document identification tags; subdividing each of the segments into a plurality of tiers, wherein each tier is associated with a respective subset of the set of document identification tags, and wherein the plurality of tiers are monotonically ordered with respect to a query-independent document importance metric; receiving query-independent information about a new document, the information including a value of the query-independent document importance metric and a globally unique document identifier for the new document; selecting, based at least in part on the globally unique document identifier, one of the segments; selecting, based at least on the query-independent information, one of the tiers associated with the selected segment; assigning to the new document a document identification tag from the respective subset of document identification tags associated with the selected tier, the assigned document identification tag not previously assigned to any of the documents in a collection of documents; repeating the receiving, selecting a segment, selecting a tier, and assigning, with respect to one or more additional new documents; and wherein the assigned document identification tags are assigned to documents in the collection of documents having globally unique document identifiers associated with the respective segment. 34. The non-transitory computer readable storage medium of claim 25 , wherein the globally unique identifiers are URL fingerprints. | 0.632901 |
16. The method according to claim 15 , further comprising: evaluating, by the delivery agent component, third delivery criteria to determine whether to deliver a third transcription product of the one or more transcription products; evaluating, by the delivery agent component, fourth delivery criteria to determine whether to deliver a fourth transcription product of the one or more transcription products; and transmitting, by the delivery agent component, at least one of the third transcription product and the fourth transcription product in response to determining that at least one of the second delivery criteria and the third delivery criteria is satisfied. | 16. The method according to claim 15 , further comprising: evaluating, by the delivery agent component, third delivery criteria to determine whether to deliver a third transcription product of the one or more transcription products; evaluating, by the delivery agent component, fourth delivery criteria to determine whether to deliver a fourth transcription product of the one or more transcription products; and transmitting, by the delivery agent component, at least one of the third transcription product and the fourth transcription product in response to determining that at least one of the second delivery criteria and the third delivery criteria is satisfied. 17. The method according to claim 16 , further comprising: generating, by the editor interface component, QA transcription information that represents a QA transcription of the content; deriving, by the delivery agent component, the first transcription product from the draft transcription information; deriving, by the delivery agent component, the third transcription product from the edited transcription information; and deriving, by the delivery agent component, the fourth transcription product from the QA transcription information. | 0.727754 |
1. A computer-implemented method comprising: receiving audio data that encodes an utterance; providing the audio data to multiple speech recognizers that are each trained on a different dialect or accent of a same language; receiving, from each of the multiple speech recognizers that are each trained on a different dialect or accent of a same language, (i) a transcription of the utterance, and (ii) a speech recognition confidence score; selecting, from among the transcriptions of the utterance that are received from the multiple speech recognizers, one or more particular transcriptions that were each generated by two or more of the multiple speech recognizers; selecting, from among the one or more particular transcriptions that were each generated by two or more of the multiple speech recognizers, a representative transcription based at least on the speech recognition confidence scores associated with the particular transcriptions; and providing the representative transcription for output. | 1. A computer-implemented method comprising: receiving audio data that encodes an utterance; providing the audio data to multiple speech recognizers that are each trained on a different dialect or accent of a same language; receiving, from each of the multiple speech recognizers that are each trained on a different dialect or accent of a same language, (i) a transcription of the utterance, and (ii) a speech recognition confidence score; selecting, from among the transcriptions of the utterance that are received from the multiple speech recognizers, one or more particular transcriptions that were each generated by two or more of the multiple speech recognizers; selecting, from among the one or more particular transcriptions that were each generated by two or more of the multiple speech recognizers, a representative transcription based at least on the speech recognition confidence scores associated with the particular transcriptions; and providing the representative transcription for output. 9. The method of claim 1 , wherein the multiple speech recognizers that are each trained on a different dialect or accent of a same language are constituents of a single, composite speech recognizer for a language. | 0.674817 |
1. An electronic device, comprising: a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: providing a plurality of media items wherein at least some of the media items are each associated with one or more respective tags; providing a natural language text string corresponding to a search query for one or more media items, wherein the search query includes one or more query terms; identifying, based on the search query, a first media item of the plurality of media items, wherein the first media item is associated with user-generated information and wherein the user-generated information matches a query term of the one or more query terms; comparing the respective tags of the identified first media item to the respective tags of one or more other media items of the plurality of media items to identify a second media item, wherein the respective tags of the identified first media item are not generated based on the search query; and facilitating a presentation of the first media item and the second media item to a user. | 1. An electronic device, comprising: a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: providing a plurality of media items wherein at least some of the media items are each associated with one or more respective tags; providing a natural language text string corresponding to a search query for one or more media items, wherein the search query includes one or more query terms; identifying, based on the search query, a first media item of the plurality of media items, wherein the first media item is associated with user-generated information and wherein the user-generated information matches a query term of the one or more query terms; comparing the respective tags of the identified first media item to the respective tags of one or more other media items of the plurality of media items to identify a second media item, wherein the respective tags of the identified first media item are not generated based on the search query; and facilitating a presentation of the first media item and the second media item to a user. 17. The electronic device of claim 1 , wherein the one or more programs further include instructions for: receiving a speech input from a user, wherein the natural language text string corresponds to the speech input. | 0.539124 |
15. A method of generating an abstract query from a physical query, comprising: receiving, from a requesting entity, a physical query composed in a query language used to query a physical database; generating, from the physical query, an intermediate representation of the physical query that indicates (i) data sources within the physical database containing data queried by the physical query, (ii) conditions specified by the physical query on the data queried and (iii) relationships between the data sources queried by the physical query; and generating, from the intermediate representation, an abstract query composed from a plurality of logical fields, wherein each logical field specifies (i) a name used to identify the logical field, and (ii) an access method that maps the logical field to data in the physical database. | 15. A method of generating an abstract query from a physical query, comprising: receiving, from a requesting entity, a physical query composed in a query language used to query a physical database; generating, from the physical query, an intermediate representation of the physical query that indicates (i) data sources within the physical database containing data queried by the physical query, (ii) conditions specified by the physical query on the data queried and (iii) relationships between the data sources queried by the physical query; and generating, from the intermediate representation, an abstract query composed from a plurality of logical fields, wherein each logical field specifies (i) a name used to identify the logical field, and (ii) an access method that maps the logical field to data in the physical database. 16. The method of claim 15 , further comprising, returning the abstract query to the requesting entity, and providing an indication of whether any data source queried by the physical query could not be used to generate a corresponding portion of the abstract query. | 0.9163 |
9. A computer-implemented method of advertising content to customers of a retail establishment, comprising: a sensor system comprising one or more sensors, collecting sensor information at the retail establishment about at least one individual of the retail establishment; processing the sensor information to derive characteristics of the at least one individual, the processing comprising, in part, making inferences about the at least one individual from the sensor information collected at the retail establishment, historical data and transaction data associated with the at least one individual to arrive at the characteristics of the at least one individual; generating, by a customer component executed at least in part by a processor, a profile for the at least one individual based on the characteristics of the at least one individual; selecting one or more advertisements for presentation to the at least one individual based on the profile for the at least one individual; and displaying the one or more advertisements to the at least one individual via a display when the at least one individual is proximate the display. | 9. A computer-implemented method of advertising content to customers of a retail establishment, comprising: a sensor system comprising one or more sensors, collecting sensor information at the retail establishment about at least one individual of the retail establishment; processing the sensor information to derive characteristics of the at least one individual, the processing comprising, in part, making inferences about the at least one individual from the sensor information collected at the retail establishment, historical data and transaction data associated with the at least one individual to arrive at the characteristics of the at least one individual; generating, by a customer component executed at least in part by a processor, a profile for the at least one individual based on the characteristics of the at least one individual; selecting one or more advertisements for presentation to the at least one individual based on the profile for the at least one individual; and displaying the one or more advertisements to the at least one individual via a display when the at least one individual is proximate the display. 15. The computer-readable storage media of claim 9 , wherein the one or more advertisements selected in the act of selecting are based on preferences of an entity user. | 0.604953 |
1. A computer system implemented method for deploying data science transformations from a development computing environment into a production computing environment, comprising: receiving, with one or more first computing systems, first transformation data representing one or more first transformations defined in a first programming language, the one or more first transformations operable on one or more operands to generate one or more results, wherein the one or more first computing systems are a development computing environment; receiving second transformation data representing one or more second transformations defined in a second programming language, the one or more second transformations operable on the one or more operands to generate the one or more results, wherein each of the one or more second transformations defined in the second programming language mirrors a corresponding one of the one or more first transformations defined in the first programming language, further wherein the second transformation data includes one or more configuration parameters for configuring physical and/or virtual resources to execute one or more transformations; associating the first transformation data with the second transformation data in a transformations data structure to associate the one or more first transformations with the one or more second transformations; storing the transformations data structure to one or more sections of memory associated with the one or more computing systems; receiving macro-transformation data representing a macro-transformation in the first programming language, the macro-transformation being a combination of multiple ones of the one or more first transformations that are logically connected to receive operand data for the macro-transformation and are logically connected to provide output data from the macro-transformation; compiling the first programming language macro-transformation data to generate executable code for the macro-transformation in the second programming language to enable deployment of the macro-transformation into one or more second computing systems while preserving a relational complexity of the combination of multiple ones of the one or more first transformations of the macro-transformation, wherein compiling the macro-transformation data at least partially includes accessing contents of the transformations data structure that is stored in the one or more sections of memory; and deploying the executable code to the one or more second computing systems to enable the one or more second computing systems to interpret and execute the macro-transformation in the second programming language to provide services to a plurality of users that is at least partially based on a functionality of the macro-transformation, wherein the one or more second computing systems are the production environment. | 1. A computer system implemented method for deploying data science transformations from a development computing environment into a production computing environment, comprising: receiving, with one or more first computing systems, first transformation data representing one or more first transformations defined in a first programming language, the one or more first transformations operable on one or more operands to generate one or more results, wherein the one or more first computing systems are a development computing environment; receiving second transformation data representing one or more second transformations defined in a second programming language, the one or more second transformations operable on the one or more operands to generate the one or more results, wherein each of the one or more second transformations defined in the second programming language mirrors a corresponding one of the one or more first transformations defined in the first programming language, further wherein the second transformation data includes one or more configuration parameters for configuring physical and/or virtual resources to execute one or more transformations; associating the first transformation data with the second transformation data in a transformations data structure to associate the one or more first transformations with the one or more second transformations; storing the transformations data structure to one or more sections of memory associated with the one or more computing systems; receiving macro-transformation data representing a macro-transformation in the first programming language, the macro-transformation being a combination of multiple ones of the one or more first transformations that are logically connected to receive operand data for the macro-transformation and are logically connected to provide output data from the macro-transformation; compiling the first programming language macro-transformation data to generate executable code for the macro-transformation in the second programming language to enable deployment of the macro-transformation into one or more second computing systems while preserving a relational complexity of the combination of multiple ones of the one or more first transformations of the macro-transformation, wherein compiling the macro-transformation data at least partially includes accessing contents of the transformations data structure that is stored in the one or more sections of memory; and deploying the executable code to the one or more second computing systems to enable the one or more second computing systems to interpret and execute the macro-transformation in the second programming language to provide services to a plurality of users that is at least partially based on a functionality of the macro-transformation, wherein the one or more second computing systems are the production environment. 14. The computer system implemented method of claim 1 , wherein the one or more second computing systems include a cloud computing environment with dynamically allocable virtual assets. | 0.605123 |
1. A computer-readable medium storing computer-executable instructions for performing the steps of: receiving a first width, a character position, and a vertical position associated with a candidate rectangle; receiving parameters defining a constraint that intersects with the candidate rectangle; fitting a first text string to the candidate rectangle; determining a first height associated with the first text string; conducting a preliminary text assignment to identify an unobstructed span corresponding to the candidate rectangle, the unobstructed span associated with a second height; comparing the second height to the first height; if the second height is equal to the first height, determining whether a second text string fitted to the unobstructed span ends in a delimiter, and if the second text string ends in a delimiter, assigning the second text string to the unobstructed span; if the second height is greater than the first height, declaring the candidate rectangle invalid and advancing the vertical position by a predetermined amount; and if the second height is less than the first height refining the unobstructed span. | 1. A computer-readable medium storing computer-executable instructions for performing the steps of: receiving a first width, a character position, and a vertical position associated with a candidate rectangle; receiving parameters defining a constraint that intersects with the candidate rectangle; fitting a first text string to the candidate rectangle; determining a first height associated with the first text string; conducting a preliminary text assignment to identify an unobstructed span corresponding to the candidate rectangle, the unobstructed span associated with a second height; comparing the second height to the first height; if the second height is equal to the first height, determining whether a second text string fitted to the unobstructed span ends in a delimiter, and if the second text string ends in a delimiter, assigning the second text string to the unobstructed span; if the second height is greater than the first height, declaring the candidate rectangle invalid and advancing the vertical position by a predetermined amount; and if the second height is less than the first height refining the unobstructed span. 9. The computer-readable medium of claim 1, wherein the step of identifying the unobstructed span corresponding to the candidate rectangle comprises the steps of: determining intersections between the constraint and an infinite horizontal line; and based on the intersections between the constraint and an infinite horizontal line, excluding interior portions of the constraint from the candidate rectangle. | 0.734381 |
2. The method according to claim 1 , wherein the selecting the subset of the plurality of template models includes: generating a fingerprint histogram of the received image; determining, for each of the plurality of template models, a match quality between the fingerprint histogram of the received image and a fingerprint histogram of the template model; and, determining the candidate template models based on the determined match qualities, the candidate template models including template models of the plurality of template models with best match qualities. | 2. The method according to claim 1 , wherein the selecting the subset of the plurality of template models includes: generating a fingerprint histogram of the received image; determining, for each of the plurality of template models, a match quality between the fingerprint histogram of the received image and a fingerprint histogram of the template model; and, determining the candidate template models based on the determined match qualities, the candidate template models including template models of the plurality of template models with best match qualities. 3. The method according to claim 2 , wherein the generation of the fingerprint histogram of the received image includes: extracting line-art junctions from received image; generating fingerprints from the extracted line-art junctions, the extracted line-art junctions being keypoints of the fingerprints; for each of the generated fingerprints, determining a match count indicating the number of times the fingerprint appears in the received image; and, combining the generated fingerprints and the determined match counts into the fingerprint histogram of the received image. | 0.764082 |
7. The method of claim 1 , further comprising presenting to the user another list of the user's misspelled words. | 7. The method of claim 1 , further comprising presenting to the user another list of the user's misspelled words. 8. The method of claim 7 , wherein said other list includes words that the user either most frequently misspells or has most recently misspelled. | 0.909765 |
14. A memory device storing instructions that, when executed by a processor of a computer, cause the computer to fulfill a literal query by: identifying, for the literal query, at least two literal query results; generate result probabilities for the at least two literal query results based on results that were previously selected by other users who previously submitted the literal query, the result probabilities reflecting a probability that a corresponding literal query result matches an intent of the user in submitting the literal query; identifying a sort order according to the result probabilities of the at least two literal query results; determining, for the literal query, an adjusted query; evaluate the adjusted query in order to identify, for the adjusted query, one or more adjusted query results; generate an interpreted probability for the adjusted query based on result probabilities of at least some of the adjusted query results, the interpreted probability reflecting a probability that the user intended the adjusted query; identifying, within the sort order, an adjustment position that is between a first literal query result having a higher result probability than the interpreted probability, and a second literal query result having a lower result probability than the interpreted probability; presenting the at least two literal query results and inserting, at the adjustment position, an adjustment option describing the adjusted query. | 14. A memory device storing instructions that, when executed by a processor of a computer, cause the computer to fulfill a literal query by: identifying, for the literal query, at least two literal query results; generate result probabilities for the at least two literal query results based on results that were previously selected by other users who previously submitted the literal query, the result probabilities reflecting a probability that a corresponding literal query result matches an intent of the user in submitting the literal query; identifying a sort order according to the result probabilities of the at least two literal query results; determining, for the literal query, an adjusted query; evaluate the adjusted query in order to identify, for the adjusted query, one or more adjusted query results; generate an interpreted probability for the adjusted query based on result probabilities of at least some of the adjusted query results, the interpreted probability reflecting a probability that the user intended the adjusted query; identifying, within the sort order, an adjustment position that is between a first literal query result having a higher result probability than the interpreted probability, and a second literal query result having a lower result probability than the interpreted probability; presenting the at least two literal query results and inserting, at the adjustment position, an adjustment option describing the adjusted query. 18. The memory device of claim 14 , wherein the determining the adjusted query further comprises: determining, for the literal query, at least two adjusted queries that respectively each describe result categories that differ from result categories of others of the at least two adjusted queries. | 0.606428 |
1. A method for extracting conveyance records from unstructured text documents, the method comprising: obtaining, with one or more processors, a plurality of scanned, optical-character-recognized (OCR) documents, each having OCR-produced English language text describing, in unstructured form, one or more conveyances of interest in real property, wherein each document is associated with metadata identifying a jurisdiction in which the respective real property is located; determining, with one or more processors, for each of the documents, a respective jurisdiction based on the metadata; selecting, with one or more processors, from a plurality of language processing models for the English language, a respective language processing model for each of the documents based on the respective determined jurisdiction, wherein a first language processing model is selected for at least some of the documents associated with a first jurisdiction and a second language processing model, different from the first language processing model, is selected for at least some of the documents associated with a second jurisdiction that is different from the first jurisdiction, and wherein each language processing model is configured to extract structured data from unstructured text, and wherein each language processing model is configured to detect different terminology used in different jurisdictions with different frequencies; extracting, with one or more processors, for each of the documents, from the respective OCR-produced English language text describing, in unstructured form, one or more conveyances of interest in real property, a plurality of structured conveyance records from each of the plurality of documents by applying the language processing model selected for the respective document based on the jurisdiction associated with the document, wherein each extracted conveyance record identifies land in which an interest is conveyed by the respective document, identifies a grantor of the conveyance, identifies a grantee of the conveyance, and identifies the interest conveyed; and storing, with one or more processors, the extracted, structured conveyance records in memory. | 1. A method for extracting conveyance records from unstructured text documents, the method comprising: obtaining, with one or more processors, a plurality of scanned, optical-character-recognized (OCR) documents, each having OCR-produced English language text describing, in unstructured form, one or more conveyances of interest in real property, wherein each document is associated with metadata identifying a jurisdiction in which the respective real property is located; determining, with one or more processors, for each of the documents, a respective jurisdiction based on the metadata; selecting, with one or more processors, from a plurality of language processing models for the English language, a respective language processing model for each of the documents based on the respective determined jurisdiction, wherein a first language processing model is selected for at least some of the documents associated with a first jurisdiction and a second language processing model, different from the first language processing model, is selected for at least some of the documents associated with a second jurisdiction that is different from the first jurisdiction, and wherein each language processing model is configured to extract structured data from unstructured text, and wherein each language processing model is configured to detect different terminology used in different jurisdictions with different frequencies; extracting, with one or more processors, for each of the documents, from the respective OCR-produced English language text describing, in unstructured form, one or more conveyances of interest in real property, a plurality of structured conveyance records from each of the plurality of documents by applying the language processing model selected for the respective document based on the jurisdiction associated with the document, wherein each extracted conveyance record identifies land in which an interest is conveyed by the respective document, identifies a grantor of the conveyance, identifies a grantee of the conveyance, and identifies the interest conveyed; and storing, with one or more processors, the extracted, structured conveyance records in memory. 9. The method of claim 1 , wherein the extracted conveyance record includes a plurality of parameters, including an identifier of a grantor, an identifier of a grantee, an identifier of an interest conveyed, and wherein at least one of the parameters is associated with a link to a supporting document from which the parameter is extracted. | 0.56162 |
23. A method for evaluating a request for a policy-based service management decision by a hardware-based policy management interface subsystem, comprising: receiving, using a processor, a request from a policy enforcement element for a service management decision associated with an access attempt to a network or a network resource by a subscriber device; retrieving, using a processor, one or more policy instances comprising of one or more rule definitions necessary to process the service management decision request, wherein the policy instance determines a set of actions, and wherein one or more rule definitions contain one or more rule definition variables wherein the rule definition variable is associated with a value selected from a user-defined value set; retrieving, using a processor, the user-defined value set for each variable defined in one or more retrieved rule definitions; substituting, using a processor, one or more values in the user-defined value set corresponding to each rule definition variable into the rule definitions in real-time as the rule is being evaluated; evaluating, using a processor, each of the retrieved policy instances to determine if the set of actions defined in the policy is to be performed by the policy enforcement element; and communicating a result of the evaluation to the policy enforcement element. | 23. A method for evaluating a request for a policy-based service management decision by a hardware-based policy management interface subsystem, comprising: receiving, using a processor, a request from a policy enforcement element for a service management decision associated with an access attempt to a network or a network resource by a subscriber device; retrieving, using a processor, one or more policy instances comprising of one or more rule definitions necessary to process the service management decision request, wherein the policy instance determines a set of actions, and wherein one or more rule definitions contain one or more rule definition variables wherein the rule definition variable is associated with a value selected from a user-defined value set; retrieving, using a processor, the user-defined value set for each variable defined in one or more retrieved rule definitions; substituting, using a processor, one or more values in the user-defined value set corresponding to each rule definition variable into the rule definitions in real-time as the rule is being evaluated; evaluating, using a processor, each of the retrieved policy instances to determine if the set of actions defined in the policy is to be performed by the policy enforcement element; and communicating a result of the evaluation to the policy enforcement element. 24. The method of claim 23 , wherein the request includes information about the subscriber. | 0.542779 |
9. A computer-implemented method for identifying documents matching a document metaprint, comprising: creating a metaprint for each document in a corpus of documents, comprising: extracting metadata keywords from the document; calculating a word frequency of occurrence of each of the metadata keywords extracted from the document; generating a metaprint forward index for the document comprising a list of metadata of the document and the calculated word frequency of each of the metadata keywords of the document; and resorting and merging the metaprint forward indexes across all of the documents in the corpus into a metadata search index comprising: storing the word frequency for each of the metadata keywords into the metadata search index; supplementing each metadata keyword with one or more synonyms of the metadata keyword; and storing the synonyms into the metadata search index keyed on the metadata keyword and generating the metaprint for the document, generating a search index comprising one or more words that are not the metadata keywords extracted from those documents in the corpus; receiving a search query comprising one or more search terms from a user; applying the search query to the metadata search index; identifying one or more of the metadata keywords matching the one or more of the search terms; retrieving the metaprint associated with each of the matched metadata keywords; generating a metaprint search query from the retrieved metaprint associated with each of the matched metadata keywords and the synonyms for each of the matched metadata keywords; applying the metaprint search query to the search index and identifying documents that contain similar word frequencies or metaprints with the metaprint search query; and obtaining search results comprising documents matching the metaprint search query. | 9. A computer-implemented method for identifying documents matching a document metaprint, comprising: creating a metaprint for each document in a corpus of documents, comprising: extracting metadata keywords from the document; calculating a word frequency of occurrence of each of the metadata keywords extracted from the document; generating a metaprint forward index for the document comprising a list of metadata of the document and the calculated word frequency of each of the metadata keywords of the document; and resorting and merging the metaprint forward indexes across all of the documents in the corpus into a metadata search index comprising: storing the word frequency for each of the metadata keywords into the metadata search index; supplementing each metadata keyword with one or more synonyms of the metadata keyword; and storing the synonyms into the metadata search index keyed on the metadata keyword and generating the metaprint for the document, generating a search index comprising one or more words that are not the metadata keywords extracted from those documents in the corpus; receiving a search query comprising one or more search terms from a user; applying the search query to the metadata search index; identifying one or more of the metadata keywords matching the one or more of the search terms; retrieving the metaprint associated with each of the matched metadata keywords; generating a metaprint search query from the retrieved metaprint associated with each of the matched metadata keywords and the synonyms for each of the matched metadata keywords; applying the metaprint search query to the search index and identifying documents that contain similar word frequencies or metaprints with the metaprint search query; and obtaining search results comprising documents matching the metaprint search query. 10. A computer-implemented method according to claim 9 , further comprising: executing the search query against the corpus of documents; and obtaining the search results comprising each of the documents in the corpus that matches at least one of the search terms. | 0.619736 |
4. A method for generating speech based on text, implemented at least in part by a computer, the method comprising: building a first language specific decision tree; building a second language specific decision tree; mapping a leaf node from the first tree to a leaf node of the second tree using a Kullback-Leibler divergence (KLD) technique based on a spectral feature located in a subset of less than all of a frequency range for measuring the KLD between two hidden Markov models (HMMs); receiving text in the second language; and generating speech in the second language, for the received text, based at least in part on the mapping the leaf node from the first tree to the leaf node of the second tree. | 4. A method for generating speech based on text, implemented at least in part by a computer, the method comprising: building a first language specific decision tree; building a second language specific decision tree; mapping a leaf node from the first tree to a leaf node of the second tree using a Kullback-Leibler divergence (KLD) technique based on a spectral feature located in a subset of less than all of a frequency range for measuring the KLD between two hidden Markov models (HMMs); receiving text in the second language; and generating speech in the second language, for the received text, based at least in part on the mapping the leaf node from the first tree to the leaf node of the second tree. 6. The method of claim 4 wherein multiple leaf nodes of one decision tree map to a single leaf node of another decision tree. | 0.85906 |
8. The computer-implemented network structure of claim 1 , wherein The first node monitors nodes within a vicinity to be monitored, wherein the first node performs the operations on nodes within a vicinity to be shaped, and wherein the first node determines a new time-variable state based on the existing time-variable state and on the nodes within the vicinity to be monitored. | 8. The computer-implemented network structure of claim 1 , wherein The first node monitors nodes within a vicinity to be monitored, wherein the first node performs the operations on nodes within a vicinity to be shaped, and wherein the first node determines a new time-variable state based on the existing time-variable state and on the nodes within the vicinity to be monitored. 9. The computer-implemented network structure of claim 8 , wherein a plurality of nodes is linked to The first node, and wherein the vicinity to be monitored encompasses a subset of the plurality of nodes. | 0.809846 |
29. The method of claim 26 , associating a first weight with the click count, a second weight with the skip count, and a third weight with the fake skip count. | 29. The method of claim 26 , associating a first weight with the click count, a second weight with the skip count, and a third weight with the fake skip count. 30. The method of claim 29 , wherein the score for the query term proximity rule satisfies ( click_count * W 1 ) ( click_count * W 1 ) + ( skip_count * W 2 ) + ( fake_skip _count * W 3 ) wherein W1 represents the first weight associated with the click count, W2 represents the second weight associated with the skip count, and W3 represents the third weight associated with the fake skip count. | 0.859197 |
8. A non-transitory computer readable storage medium storing a program of instructions executable by a machine to perform a method of communicating social media content over a computer network via one or more social media services, the method comprising: receiving content from a first node of an online social network; generating automatically a set of topics in the content; inspecting a target audience of the content by monitoring online activities of the target audience, the monitoring online activities comprising monitoring processor threads running on the one or more processors; determining, based on the monitoring of the online activities, topic popularity corresponding to a topic in the set of topics over a plurality of time ranges, the topic popularity indicating a degree to which the topic is popular with the target audience at a given time range; generating a trending metric associated with the topic, the trending metric indicating a degree to which the topic is currently popular among all users of the online social network; generating a weighted topic popularity for a respective one of the plurality of time ranges, as a function of the topic popularity, the trending metric, and an elapsed time between time associated with the respective time range and a preferred time for posting the content; selecting a time range from the plurality of time ranges based on the weighted topic popularity; and posting the content at the selected time range on the online social network. | 8. A non-transitory computer readable storage medium storing a program of instructions executable by a machine to perform a method of communicating social media content over a computer network via one or more social media services, the method comprising: receiving content from a first node of an online social network; generating automatically a set of topics in the content; inspecting a target audience of the content by monitoring online activities of the target audience, the monitoring online activities comprising monitoring processor threads running on the one or more processors; determining, based on the monitoring of the online activities, topic popularity corresponding to a topic in the set of topics over a plurality of time ranges, the topic popularity indicating a degree to which the topic is popular with the target audience at a given time range; generating a trending metric associated with the topic, the trending metric indicating a degree to which the topic is currently popular among all users of the online social network; generating a weighted topic popularity for a respective one of the plurality of time ranges, as a function of the topic popularity, the trending metric, and an elapsed time between time associated with the respective time range and a preferred time for posting the content; selecting a time range from the plurality of time ranges based on the weighted topic popularity; and posting the content at the selected time range on the online social network. 12. The non-transitory computer readable storage medium of claim 8 , further comprising: determining the subset of the second nodes to direct the content based on an interest metric respectively associated with one or more of the second nodes. | 0.817618 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.