sentence1
stringlengths 40
15.9k
| sentence2
stringlengths 88
20k
| label
float64 0.5
0.99
|
---|---|---|
9. The method of claim 1 , further comprising: determining a character count for the financial image document by summing character counts of text chunks in the financial document image.
|
9. The method of claim 1 , further comprising: determining a character count for the financial image document by summing character counts of text chunks in the financial document image. 10. The method of claim 9 , further comprising: determining whether the character count for the financial image document meets a minimum character count threshold; and when the character count for the financial image document meets the minimum character count threshold: performing further image processing on the financial document image; and when the character count for the financial image document does not meet the minimum character count threshold: rejecting the financial document image.
| 0.777165 |
9. A method in a user computing device for selecting content items from a source web page and posting content items to web logs, comprising: loading, by the user computing device, a source web page; displaying, by the user computing device, the loaded source web page to provide a plurality of displayed content items; receiving, via a user pointing device of the user computing device, input selecting one or more selected content items from among the plurality of displayed content items, the selected content items being selectable exclusive of non-selected content items among the plurality of display content items; receiving access credentials for a web log; accessing the web log at a network location by communicating the received access credentials to the web log; receiving, from one or more blog servers, web log publication information associated with the web log, the web log publication information including a web log ID and a corresponding URL; comparing the URL of the web log publication information with a URL of the access credentials; determining that the URL of the web log publication information matches the URL of the access credentials; and transmitting, by the user computing device, the web log ID and a post including a definition of the selected content items to the web log in a format suitable for receipt and posting of the selected content items on the web log.
|
9. A method in a user computing device for selecting content items from a source web page and posting content items to web logs, comprising: loading, by the user computing device, a source web page; displaying, by the user computing device, the loaded source web page to provide a plurality of displayed content items; receiving, via a user pointing device of the user computing device, input selecting one or more selected content items from among the plurality of displayed content items, the selected content items being selectable exclusive of non-selected content items among the plurality of display content items; receiving access credentials for a web log; accessing the web log at a network location by communicating the received access credentials to the web log; receiving, from one or more blog servers, web log publication information associated with the web log, the web log publication information including a web log ID and a corresponding URL; comparing the URL of the web log publication information with a URL of the access credentials; determining that the URL of the web log publication information matches the URL of the access credentials; and transmitting, by the user computing device, the web log ID and a post including a definition of the selected content items to the web log in a format suitable for receipt and posting of the selected content items on the web log. 12. The method of claim 9 , further comprising: receiving access credentials and network locations for a plurality of web logs; receiving user input selecting at least one of the plurality of web logs; and broadcasting the definition of the selected content items to the selected web logs.
| 0.703426 |
15. A non-transitory computer-readable storage medium having stored thereon computer executable program code, which, when executed by a computer, causes the computer to: receive a SPARQL query having one or more query parameters on the multidimensional database comprising references to one or more fact tables and one or more dimension tables in the multidimensional database, the multidimensional database having one or more native query languages to access the multidimensional database, none of which are SPARQL; generate a native query from the SPARQL query using a mapping file comprising metadata that describes the multidimensional database, including: automatically mapping one or more columns in the multidimensional database to the one or more query parameters in the SPARQL query; wherein the mapping is serialized with a target vocabulary; and the target vocabulary includes one of: a R2RML vocabulary, a D2RQ vocabulary, or a QB4OLAP vocabulary; wherein the native query is expressed in one of the native query languages of the multidimensional database; execute the native query on the multidimensional database; receive a native result comprising data stored in the multidimensional database resulting from execution of the native query against the multidimensional database; and generate a SPARQL result from the native result using the mapping file, the SPARQL result representing a response to the SPARQL query.
|
15. A non-transitory computer-readable storage medium having stored thereon computer executable program code, which, when executed by a computer, causes the computer to: receive a SPARQL query having one or more query parameters on the multidimensional database comprising references to one or more fact tables and one or more dimension tables in the multidimensional database, the multidimensional database having one or more native query languages to access the multidimensional database, none of which are SPARQL; generate a native query from the SPARQL query using a mapping file comprising metadata that describes the multidimensional database, including: automatically mapping one or more columns in the multidimensional database to the one or more query parameters in the SPARQL query; wherein the mapping is serialized with a target vocabulary; and the target vocabulary includes one of: a R2RML vocabulary, a D2RQ vocabulary, or a QB4OLAP vocabulary; wherein the native query is expressed in one of the native query languages of the multidimensional database; execute the native query on the multidimensional database; receive a native result comprising data stored in the multidimensional database resulting from execution of the native query against the multidimensional database; and generate a SPARQL result from the native result using the mapping file, the SPARQL result representing a response to the SPARQL query. 17. The non-transitory computer-readable storage medium of claim 15 wherein the multidimensional database is organized in a star schema or a snowflake schema.
| 0.863636 |
1. A processor-implemented method for verifying the correctness of query results, comprising: receiving a query at a data repository; indexing the data repository; dividing the index of the data repository into index segments; updating the index segments after an input of data into the data repository; executing the received query using a query logic; producing a query output that includes a query result and verification information associated with the query result; transferring the query output to a verification system; and verifying the integrity and completeness of the query result using the verification information included in the query output, wherein verifying the integrity includes verifying that the query result has not been tampered with, and wherein verifying the completeness of the query result includes verifying that there are no additions or omissions to the query result, and verifying completeness of the query result includes verifying legitimacy of the updates to the index segments by calculating a root hash of a hash tree from a previous content of a metadata page in the data repository and from nodes along a path from a previous content of the metadata page to a root.
|
1. A processor-implemented method for verifying the correctness of query results, comprising: receiving a query at a data repository; indexing the data repository; dividing the index of the data repository into index segments; updating the index segments after an input of data into the data repository; executing the received query using a query logic; producing a query output that includes a query result and verification information associated with the query result; transferring the query output to a verification system; and verifying the integrity and completeness of the query result using the verification information included in the query output, wherein verifying the integrity includes verifying that the query result has not been tampered with, and wherein verifying the completeness of the query result includes verifying that there are no additions or omissions to the query result, and verifying completeness of the query result includes verifying legitimacy of the updates to the index segments by calculating a root hash of a hash tree from a previous content of a metadata page in the data repository and from nodes along a path from a previous content of the metadata page to a root. 2. The method of claim 1 including computing a secure one-way hash of one of the data records during an insertion of said one of the data records into the data repository, wherein the query result includes data records that satisfy the received query.
| 0.547111 |
38. The method recited in claim 37 wherein the step of comparing the video envelope of two non-consecutive frames includes the step of comparing the video envelopes of two frames spaced at approximately a twenty to forty frame interval.
|
38. The method recited in claim 37 wherein the step of comparing the video envelope of two non-consecutive frames includes the step of comparing the video envelopes of two frames spaced at approximately a twenty to forty frame interval. 39. The method recited in claim 38 wherein the step of comparing the video envelope of two frames includes the step of sampling said video envelope and comparing counterpart samples.
| 0.875 |
3. A computer implemented method for developing a classifier for classifying electronic communications comprising: querying a user for a phrase that indicates that a communication is not related to a concept; receiving a user identification of the phrase; (a) presenting electronic communications to a user for labeling as relevant or irrelevant, the electronic communications being selected from groups of user-generated electronic communications including: a training set group of electronic communications, the training set group of electronic communications being selected by an active learning algorithm; a test set group of electronic communications, the test set group of electronic communications for testing the accuracy of a current state of a classifier being developed; and a previously-labeled set of electronic communications previously labeled by at least one of the user, the system and another user; (b) developing the classifier for classifying electronic communications based upon the phrase and the relevant labels and the irrelevant labels assigned by the user; (c) deploying the classifier for use in classifying electronic communications based upon the relevant labels and the irrelevant labels; and (d) storing a set of electronic communications labeled by the classifier in a memory.
|
3. A computer implemented method for developing a classifier for classifying electronic communications comprising: querying a user for a phrase that indicates that a communication is not related to a concept; receiving a user identification of the phrase; (a) presenting electronic communications to a user for labeling as relevant or irrelevant, the electronic communications being selected from groups of user-generated electronic communications including: a training set group of electronic communications, the training set group of electronic communications being selected by an active learning algorithm; a test set group of electronic communications, the test set group of electronic communications for testing the accuracy of a current state of a classifier being developed; and a previously-labeled set of electronic communications previously labeled by at least one of the user, the system and another user; (b) developing the classifier for classifying electronic communications based upon the phrase and the relevant labels and the irrelevant labels assigned by the user; (c) deploying the classifier for use in classifying electronic communications based upon the relevant labels and the irrelevant labels; and (d) storing a set of electronic communications labeled by the classifier in a memory. 8. The method of claim 3 wherein presenting the electronic communications to the user includes: assessing a first value that labeling a first set of electronic communications from a first one of the training set group, the system-labeled set, the test set group, the faulty set, or the random set will provide to the classifier being developed; assessing a second value related to performance that labeling a second set of electronic communications from a second one of the training set group, the system-labeled set, the test set group, the faulty set, or the random set provides to the classifier being developed; and selecting a next group for labeling based upon the greatest of the first value and the second value that will be provided to the classifier being developed from the assessing.
| 0.545164 |
1. A system, comprising: a memory comprising program instructions; and one or more processors coupled to said memory, wherein the program instructions are executable by at least one of said one or more processors to implement a search result conditioning component configured to: determine a search result group comprising a plurality of search results, wherein the plurality of search results are results of a search query, wherein the search result group includes a connected graph comprising multiple nodes and multiple edges each connecting a distinct pair of nodes, wherein each node represents a search result of said plurality of search results, wherein each node includes a search result identifier that is different than the other nodes of the multiple nodes, wherein each edge indicates the pair of nodes connected by that edge are similar search results with a measure of similarity between the pair of nodes greater than a requisite measure of similarity; for each node representing a given search result of the search result group: apply one or more similarity criteria to each of the multiple nodes of the connected graph to identify a respective similar group of nodes that are similar to the given search result; sort the nodes of the similar group of nodes and the node representing the given search result into an order based on the respective search result identifiers of the nodes of the similar group of nodes and the node representing the given search result such that each sorted group includes a respective first node occurring before the one or more other nodes within the order of the sorted group; and responsive to the order of nodes resulting from the sort, label the given search result with the search result identifier of the respective first node from the sorted similar group of nodes; wherein at least some search results of the search result group are assigned the same label; modify the search result group, wherein to modify the search result group the search result conditioning component is configured to remove at least one search result from the search result group dependent upon the label assigned to the at least one search result being shared with at least one other search result of the search result group; and output the modified search result group.
|
1. A system, comprising: a memory comprising program instructions; and one or more processors coupled to said memory, wherein the program instructions are executable by at least one of said one or more processors to implement a search result conditioning component configured to: determine a search result group comprising a plurality of search results, wherein the plurality of search results are results of a search query, wherein the search result group includes a connected graph comprising multiple nodes and multiple edges each connecting a distinct pair of nodes, wherein each node represents a search result of said plurality of search results, wherein each node includes a search result identifier that is different than the other nodes of the multiple nodes, wherein each edge indicates the pair of nodes connected by that edge are similar search results with a measure of similarity between the pair of nodes greater than a requisite measure of similarity; for each node representing a given search result of the search result group: apply one or more similarity criteria to each of the multiple nodes of the connected graph to identify a respective similar group of nodes that are similar to the given search result; sort the nodes of the similar group of nodes and the node representing the given search result into an order based on the respective search result identifiers of the nodes of the similar group of nodes and the node representing the given search result such that each sorted group includes a respective first node occurring before the one or more other nodes within the order of the sorted group; and responsive to the order of nodes resulting from the sort, label the given search result with the search result identifier of the respective first node from the sorted similar group of nodes; wherein at least some search results of the search result group are assigned the same label; modify the search result group, wherein to modify the search result group the search result conditioning component is configured to remove at least one search result from the search result group dependent upon the label assigned to the at least one search result being shared with at least one other search result of the search result group; and output the modified search result group. 2. The system of claim 1 , wherein for each node representing the given search result and the respective group of similar nodes, the sorting performed by the search result conditioning component is a lexicographical sorting based on the search result identifiers of the nodes of the similar group of nodes and the node representing the given search result.
| 0.5476 |
4. The method of claim 1 , wherein the context data partition is created for each fuzzy term.
|
4. The method of claim 1 , wherein the context data partition is created for each fuzzy term. 5. The method of claim 4 , wherein each fuzzy term has a plurality of context data partitions created for the fuzzy term and associated with the fuzzy term.
| 0.943403 |
4. The method of claim 2 , where comparing the set of liaoalphagrams associated with the query term to the sets of liaoalphagrams associated with the candidate correctly spelled words includes computing a liaoalphagram similarity score.
|
4. The method of claim 2 , where comparing the set of liaoalphagrams associated with the query term to the sets of liaoalphagrams associated with the candidate correctly spelled words includes computing a liaoalphagram similarity score. 5. The method of claim 4 , the liaoalphagram similarity score being based, at least in part, on a Jaccard distance.
| 0.968547 |
15. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to: receive a map-reduce job written in a first map-reduce language, wherein the map-reduce job is to be performed in parallel on a plurality of nodes of a plurality of clusters, wherein the first map-reduce language is a general map-reduce language that describes functions supported by multiple map-reduce frameworks but is not specific to any of the multiple map-reduce frameworks; select, by the processing device, one or more clusters from the plurality of clusters to run the map-reduce job, wherein the selected one or more clusters of the plurality of clusters operate a different map-reduce framework from other clusters of the plurality of clusters; identify a second map-reduce language associated with the selected one or more clusters; convert the first map-reduce language of the map-reduce job into the second map-reduce language; and cause the map-reduce job in the second map-reduce language to be run on the plurality of nodes of the selected one or more clusters.
|
15. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to: receive a map-reduce job written in a first map-reduce language, wherein the map-reduce job is to be performed in parallel on a plurality of nodes of a plurality of clusters, wherein the first map-reduce language is a general map-reduce language that describes functions supported by multiple map-reduce frameworks but is not specific to any of the multiple map-reduce frameworks; select, by the processing device, one or more clusters from the plurality of clusters to run the map-reduce job, wherein the selected one or more clusters of the plurality of clusters operate a different map-reduce framework from other clusters of the plurality of clusters; identify a second map-reduce language associated with the selected one or more clusters; convert the first map-reduce language of the map-reduce job into the second map-reduce language; and cause the map-reduce job in the second map-reduce language to be run on the plurality of nodes of the selected one or more clusters. 17. The non-transitory computer readable storage medium of claim 15 , wherein to identify the second map-reduce language associated with the selected one or more clusters, the processing device further to: identify a software framework being run on the selected one or more clusters, wherein the second map-reduce language corresponds to the identified software framework.
| 0.5 |
1. A method comprising: generating a sequence of tokens, each token being an integer representation of a respective sequence of characters that is included in a style sheet, each token corresponding to a respective character position that indicates a position of that token in the style sheet; identifying a designated token in the sequence of tokens that includes a user-initiated change, the designated token following a first subset of the tokens in the sequence of tokens and preceding a second subset of the tokens in the sequence of tokens; determining whether the user-initiated change is identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens; and determining whether the second subset of the tokens is to be re-tokenized, including: determining that the second subset of the tokens is not to be re-tokenized if the user-initiated change is identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens, but determining that the second subset of the tokens is to be re-tokenized if the user-initiated change is not identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens.
|
1. A method comprising: generating a sequence of tokens, each token being an integer representation of a respective sequence of characters that is included in a style sheet, each token corresponding to a respective character position that indicates a position of that token in the style sheet; identifying a designated token in the sequence of tokens that includes a user-initiated change, the designated token following a first subset of the tokens in the sequence of tokens and preceding a second subset of the tokens in the sequence of tokens; determining whether the user-initiated change is identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens; and determining whether the second subset of the tokens is to be re-tokenized, including: determining that the second subset of the tokens is not to be re-tokenized if the user-initiated change is identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens, but determining that the second subset of the tokens is to be re-tokenized if the user-initiated change is not identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens. 3. The method of claim 1 , wherein determining whether the user-initiated change is identified as a type of change that changes no attributes, other than the character positions, of the tokens in the second subset of the tokens, comprises: determining that the user-initiated change is at least one of an addition of at least one character or a subtraction of at least one character in a comment or a string within the designated token; wherein determining whether the second subset of the tokens is to be re-tokenized, comprises: determining that the second subset of the tokens is not to be re-tokenized in response to determining that the user-initiated change is at least one of an addition of at least one character or a subtraction of at least one character in a comment or a string within the designated token; and wherein the method further comprises: updating the character positions of the tokens in the second subset of the tokens to take into consideration the user-initiated change.
| 0.619932 |
13. A method of variably assembling a package, comprising: receiving a user input; determining a set of intents based on the user input, wherein the set of intents comprises an anticipated use of a three dimensional package; querying a knowledge base to obtain a two dimensional package model based on a known three dimensional package model and the set of intents; converting a three dimensional graphic representation to a two dimensional graphic representation using a semantic reasoner; accessing a packaging rule set to obtain one or more rules for assembly of the three dimensional package from the two dimensional package model; instructing one or more printing devices to apply the two dimensional graphic representation of the three dimensional graphic to the two dimensional package model; and instructing one or more assembly devices to apply the one or more rules for assembly to create the three dimensional package from the two dimensional package model.
|
13. A method of variably assembling a package, comprising: receiving a user input; determining a set of intents based on the user input, wherein the set of intents comprises an anticipated use of a three dimensional package; querying a knowledge base to obtain a two dimensional package model based on a known three dimensional package model and the set of intents; converting a three dimensional graphic representation to a two dimensional graphic representation using a semantic reasoner; accessing a packaging rule set to obtain one or more rules for assembly of the three dimensional package from the two dimensional package model; instructing one or more printing devices to apply the two dimensional graphic representation of the three dimensional graphic to the two dimensional package model; and instructing one or more assembly devices to apply the one or more rules for assembly to create the three dimensional package from the two dimensional package model. 14. The method of claim 13 , further comprising: monitoring operation of the one or more assembly devices and the one or more printing devices to determine whether modification of the application of the one or more rules is required; and modifying the application of the rules.
| 0.536948 |
3. The method of claim 1 , further comprising: obtaining an indication that the pre-registered bundle is not available; providing a request to register a new bundle, upon obtaining the indication that the pre-registered bundle is not available, the request including the input string; and obtaining and indication that the new bundle has been registered.
|
3. The method of claim 1 , further comprising: obtaining an indication that the pre-registered bundle is not available; providing a request to register a new bundle, upon obtaining the indication that the pre-registered bundle is not available, the request including the input string; and obtaining and indication that the new bundle has been registered. 4. The method of claim 3 , further comprising: obtaining a bundle identification corresponding to the new bundle, upon obtaining the indication that the new bundle has been registered; and replacing the input string in the API call with the bundle identification of the new bundle.
| 0.89771 |
6. The method as recited in claim 5 wherein generating the first context object comprises generating the first context object from intent objects identified from the first search request.
|
6. The method as recited in claim 5 wherein generating the first context object comprises generating the first context object from intent objects identified from the first search request. 7. The method as recited in claim 6 wherein the intent objects comprise at least one of media type, genre, channel, content rating, date, episode, title and team.
| 0.883333 |
7. The method of claim 1 , further comprising: generating a score for the comment with respect to one of the first document or the one of the one or more second documents; and determining whether to present the comment or a manner in which to present the comment based on the score.
|
7. The method of claim 1 , further comprising: generating a score for the comment with respect to one of the first document or the one of the one or more second documents; and determining whether to present the comment or a manner in which to present the comment based on the score. 8. The method of claim 7 , where generating the score for the comment includes: assigning a score to the comment based on one or more of: user feedback received in connection with the comment, an identity of an author who created the comment, a timestamp indicating a date or time at which the comment was created, or a degree of match between the first document and the one of the one or more second documents.
| 0.862575 |
5. The method of claim 4 , wherein the tokens belong to one of a plurality of buffers, wherein the plurality of buffers include at least one of text, HTML tag name, HTML attribute name, HTML attribute value, CSS selector, CSS property name, and CSS property value.
|
5. The method of claim 4 , wherein the tokens belong to one of a plurality of buffers, wherein the plurality of buffers include at least one of text, HTML tag name, HTML attribute name, HTML attribute value, CSS selector, CSS property name, and CSS property value. 6. The method of claim 5 , further comprising a conversion of buffers into nodes and subsequently appending those nodes to the token stream.
| 0.827051 |
28. A computer system including at least one processor for rendering page images on a display, comprising: an external component encapsulating code for modifying a behavior of one or more elements, the external component operable to be instantiated multiple times and operable to modify elements in a plurality of different HTML documents while being external to the HTML documents and wherein information associating the one or more elements with the external component is maintained in a cascading style sheet, wherein code for determining a behavior of the one or more elements is included in one or more extensible markup language (XML) namespaces that are defined externally to the HTML documents and that are associated with the external component; and at least one processing unit comprising a renderer connected to the display for rendering the page images, the renderer being configured to: modify one or more of the page images by accessing one or more of the XML namespaces associated with the external component to initiate drawing of information on the one or more of the page images based at least in part on code included in the one or more XML namespaces; make a plurality of calls to the one or more XML namespaces to initiate the drawing of the information on the one or more of the page images; and draw the information on the one or more of the page image responsive to one or more of the plurality of calls to the one or more XML namespaces; the renderer being further configured to: instantiate the external component to reveal one or more of the XML namespaces associated with the external component the one or more of the XML namespaces being external to the HTML document and specifying one or more behaviors to be applied to the one or more elements; and access the one or more XML namespaces to retrieve a new behavior to be applied to the representation of the one or more elements rendered on the page image, the new behavior being configured to enhance a default behavior for the one or more elements.
|
28. A computer system including at least one processor for rendering page images on a display, comprising: an external component encapsulating code for modifying a behavior of one or more elements, the external component operable to be instantiated multiple times and operable to modify elements in a plurality of different HTML documents while being external to the HTML documents and wherein information associating the one or more elements with the external component is maintained in a cascading style sheet, wherein code for determining a behavior of the one or more elements is included in one or more extensible markup language (XML) namespaces that are defined externally to the HTML documents and that are associated with the external component; and at least one processing unit comprising a renderer connected to the display for rendering the page images, the renderer being configured to: modify one or more of the page images by accessing one or more of the XML namespaces associated with the external component to initiate drawing of information on the one or more of the page images based at least in part on code included in the one or more XML namespaces; make a plurality of calls to the one or more XML namespaces to initiate the drawing of the information on the one or more of the page images; and draw the information on the one or more of the page image responsive to one or more of the plurality of calls to the one or more XML namespaces; the renderer being further configured to: instantiate the external component to reveal one or more of the XML namespaces associated with the external component the one or more of the XML namespaces being external to the HTML document and specifying one or more behaviors to be applied to the one or more elements; and access the one or more XML namespaces to retrieve a new behavior to be applied to the representation of the one or more elements rendered on the page image, the new behavior being configured to enhance a default behavior for the one or more elements. 39. The system of claim 28 including a custom tag for associating the one or more elements with the external component.
| 0.548983 |
8. A method of training a speech recognition learning system either offline or online, the method comprising: generating at least one text to speech output to an utterance using a user simulator during the training, the output having qualities comprising at least one of a voice, a pitch, a rate or a volume; identifying speech features related to the utterance using a speech model or using a dialog action model; identifying the utterance that is in need of clarification by initiating a repair dialog, wherein the utterance associated with the repair dialog is identified includes: determining what states of the repair dialog are reached from other states, the dialog system learns which states to go to when observing an appropriate speech and dialog features by trying all repair paths using the user simulator where a user's voice is generated using various text-to-speech (TTS) engines at adjustable levels; and determining which states of the repair dialog are failures or successes; performing an action related to the speech features; and updating the dialog action model, the speech model or both, based at least in part on the speech features, the action, or a combination thereof.
|
8. A method of training a speech recognition learning system either offline or online, the method comprising: generating at least one text to speech output to an utterance using a user simulator during the training, the output having qualities comprising at least one of a voice, a pitch, a rate or a volume; identifying speech features related to the utterance using a speech model or using a dialog action model; identifying the utterance that is in need of clarification by initiating a repair dialog, wherein the utterance associated with the repair dialog is identified includes: determining what states of the repair dialog are reached from other states, the dialog system learns which states to go to when observing an appropriate speech and dialog features by trying all repair paths using the user simulator where a user's voice is generated using various text-to-speech (TTS) engines at adjustable levels; and determining which states of the repair dialog are failures or successes; performing an action related to the speech features; and updating the dialog action model, the speech model or both, based at least in part on the speech features, the action, or a combination thereof. 13. The method of claim 8 , wherein the speech model is modified with data collected from the training.
| 0.931308 |
1. Device for providing a continuous playable video sequence which is modifiable, the modified sequence being provided in renderable manner, the device comprising: an input configured for obtaining playable objects, each object being independently playable, a providing unit configured to provide a plurality of defined functions, said functions applying playable effects to modify play of said playable objects, said playable objects being part of an underlying object-orientated model, said plurality of defined functions being provided to said playable objects as markup when selected, a time unit configured for adding time boundaries to said defined functions, to provide time bounded functions having respective beginning and end time boundaries, an ordering unit configured for ordering said defined time bounded functions with said objects into a sequence, thereby to place said objects with and without said functions at different times in said sequence, and a translation unit configured for applying translations to said playable objects in accordance with said playable effects, by rendering said playable objects in accordance with said markup, thereby to modify play of said playable objects at respective times within said sequence, said device thereby using said time boundaries and said ordering to combine a timeline synchronization framework with said underlying object-orientated model, wherein said ordering unit comprises a layered model for layering said time bounded defined functions to define interrelationships between said functions, said rendering being to form the continuous playable video sequence as a continuous linear sequence of said playable objects.
|
1. Device for providing a continuous playable video sequence which is modifiable, the modified sequence being provided in renderable manner, the device comprising: an input configured for obtaining playable objects, each object being independently playable, a providing unit configured to provide a plurality of defined functions, said functions applying playable effects to modify play of said playable objects, said playable objects being part of an underlying object-orientated model, said plurality of defined functions being provided to said playable objects as markup when selected, a time unit configured for adding time boundaries to said defined functions, to provide time bounded functions having respective beginning and end time boundaries, an ordering unit configured for ordering said defined time bounded functions with said objects into a sequence, thereby to place said objects with and without said functions at different times in said sequence, and a translation unit configured for applying translations to said playable objects in accordance with said playable effects, by rendering said playable objects in accordance with said markup, thereby to modify play of said playable objects at respective times within said sequence, said device thereby using said time boundaries and said ordering to combine a timeline synchronization framework with said underlying object-orientated model, wherein said ordering unit comprises a layered model for layering said time bounded defined functions to define interrelationships between said functions, said rendering being to form the continuous playable video sequence as a continuous linear sequence of said playable objects. 11. The device of claim 1 , wherein said objects are for location in a virtual universe, said virtual universe having a universe system for defining transformations of objects therewithin, and defining a snapshot thereof.
| 0.515924 |
1. A method for extracting quotations related to a product from a document, comprising: building a span query relevant to a feature associated with the product and a sentiment about the feature by: building syntactic templates from a lexicography relevant to the feature and the sentiment about the feature, wherein each syntactic template corresponds to multiple phrasings of the same meaning, and determining a first semantic template relevant to the syntactic templates; receiving a document; applying the span query to the document to generate a span query result, wherein the span query result includes a quotation from the document relevant to the feature and the sentiment about the feature, the quotation satisfying the first semantic template and including words within relative positions as constrained by the span query; and storing the span query result.
|
1. A method for extracting quotations related to a product from a document, comprising: building a span query relevant to a feature associated with the product and a sentiment about the feature by: building syntactic templates from a lexicography relevant to the feature and the sentiment about the feature, wherein each syntactic template corresponds to multiple phrasings of the same meaning, and determining a first semantic template relevant to the syntactic templates; receiving a document; applying the span query to the document to generate a span query result, wherein the span query result includes a quotation from the document relevant to the feature and the sentiment about the feature, the quotation satisfying the first semantic template and including words within relative positions as constrained by the span query; and storing the span query result. 3. The method of claim 1 wherein determining a first semantic template comprises resolving a conflict between a second and a third semantic template.
| 0.67184 |
15. A computer-implemented method for extracting personal information from a family history document, comprising: applying optical character recognition (OCR) to a digital image of a family history document to create an OCR copy; identifying a person's name in the digital image; extracting name data from the OCR copy representing the name, wherein extracting name data includes highlighting the identified name, manually selecting the highlighted name, and mapping to data in the OCR copy representing the identified name; confirming accuracy of the extracted name data; publishing the extracted name data in a searchable format.
|
15. A computer-implemented method for extracting personal information from a family history document, comprising: applying optical character recognition (OCR) to a digital image of a family history document to create an OCR copy; identifying a person's name in the digital image; extracting name data from the OCR copy representing the name, wherein extracting name data includes highlighting the identified name, manually selecting the highlighted name, and mapping to data in the OCR copy representing the identified name; confirming accuracy of the extracted name data; publishing the extracted name data in a searchable format. 19. The method of claim 15 , further comprising comparing the person's name with a database of names to assess correct spelling of the person's name, wherein the names in the database are organized by at least one of a historical time period, a gender, and a location.
| 0.621274 |
13. A system comprising: means for extracting, with a preprocessor in a computer system, macroinstructions that are hard-coded into parser code of a command line interface (CLI) parser, wherein the macroinstructions define a proper CLI syntax for CLI commands input to a CLI prompt and include parse nodes used by the CLI parser to analyze whether one or more CLI commands input to the CLI prompt have proper CLI syntax, and wherein the macroinstructions are written according to a first computer system language; means for converting, with the preprocessor, the macroinstructions into at least one parse graph having an Extensible Markup Language (XML) format, wherein the means for converting includes means for encapsulating the parse nodes of the macroinstructions with XML tags and means for stitching together the encapsulated parse nodes of the macroinstructions to generate the parse graph, and wherein the first computer system language is different than an Extensible Markup Language (XML) language associated with the parse graph; and means for generating, with the preprocessor, an exportable representation of the at least one parse graph and outputting the exportable representation of the at least one parse graph from the computer system.
|
13. A system comprising: means for extracting, with a preprocessor in a computer system, macroinstructions that are hard-coded into parser code of a command line interface (CLI) parser, wherein the macroinstructions define a proper CLI syntax for CLI commands input to a CLI prompt and include parse nodes used by the CLI parser to analyze whether one or more CLI commands input to the CLI prompt have proper CLI syntax, and wherein the macroinstructions are written according to a first computer system language; means for converting, with the preprocessor, the macroinstructions into at least one parse graph having an Extensible Markup Language (XML) format, wherein the means for converting includes means for encapsulating the parse nodes of the macroinstructions with XML tags and means for stitching together the encapsulated parse nodes of the macroinstructions to generate the parse graph, and wherein the first computer system language is different than an Extensible Markup Language (XML) language associated with the parse graph; and means for generating, with the preprocessor, an exportable representation of the at least one parse graph and outputting the exportable representation of the at least one parse graph from the computer system. 16. The system of claim 13 further comprising means for associating Extensible Markup Language tags with elements of the macroinstructions.
| 0.802165 |
1. A computer-implemented method comprising: analyzing, by a computer system, a codebase comprising a first dynamically-typed variable or function; determining, by the computer system, a first set of characteristics relating to the codebase based on the analyzing the codebase, wherein the analyzing the codebase includes performing one or more scans with respect to the codebase to determine the first set of characteristics, and wherein the first set of characteristics comprises information regarding usage of the first dynamically-typed variable or function in the codebase; determining, by the computer system, a first set of potential data types for the first dynamically-typed variable or function based on the first set of characteristics; determining, by the computer system, a first candidate data type for the first dynamically-typed variable or function based on the first set of potential data types, wherein the first candidate data type is a superclass of data types in the first set of potential data types, and wherein each of the data types in the first set of potential data types is a subclass of the first candidate data type; converting, by the computer system, the first dynamically-typed variable or function in the codebase to a first statically-typed variable or function in the codebase based on the first candidate data type; and checking, by the computer system, the codebase for one or more errors in response to the converting the first dynamically-typed variable or function to the first statically-typed variable or function.
|
1. A computer-implemented method comprising: analyzing, by a computer system, a codebase comprising a first dynamically-typed variable or function; determining, by the computer system, a first set of characteristics relating to the codebase based on the analyzing the codebase, wherein the analyzing the codebase includes performing one or more scans with respect to the codebase to determine the first set of characteristics, and wherein the first set of characteristics comprises information regarding usage of the first dynamically-typed variable or function in the codebase; determining, by the computer system, a first set of potential data types for the first dynamically-typed variable or function based on the first set of characteristics; determining, by the computer system, a first candidate data type for the first dynamically-typed variable or function based on the first set of potential data types, wherein the first candidate data type is a superclass of data types in the first set of potential data types, and wherein each of the data types in the first set of potential data types is a subclass of the first candidate data type; converting, by the computer system, the first dynamically-typed variable or function in the codebase to a first statically-typed variable or function in the codebase based on the first candidate data type; and checking, by the computer system, the codebase for one or more errors in response to the converting the first dynamically-typed variable or function to the first statically-typed variable or function. 18. The computer-implemented method of claim 1 , wherein the codebase relates to a social networking system.
| 0.701341 |
14. The method of claim 13 , wherein the learned model parser comprises at least one class-level multi-token language model-based feature harvested from a structured query log.
|
14. The method of claim 13 , wherein the learned model parser comprises at least one class-level multi-token language model-based feature harvested from a structured query log. 15. The method of claim 14 , wherein the structured query log comprises a class-based log from a form-based query system.
| 0.976088 |
12. A system that facilitates the generation of an event document, comprising a processor and a computer memory having stored thereon the following components: an access component that accesses at least one of a public data source and a private data source for event information related to an event; an event component that detects a trigger; and a consolidation component that compiles and consolidates the event information into a meeting document based on the occurrence of a trigger associated with a user within an organizational chart, wherein profiles for the event attendees are arranged in descending order of their respective organizational chart distance to the user, wherein the organizational chart distance between the user and a second person is a shortest path within the organizational chart, obtained by summing the user's and the second person's organizational chart distance to a manager shared by the user and the second person.
|
12. A system that facilitates the generation of an event document, comprising a processor and a computer memory having stored thereon the following components: an access component that accesses at least one of a public data source and a private data source for event information related to an event; an event component that detects a trigger; and a consolidation component that compiles and consolidates the event information into a meeting document based on the occurrence of a trigger associated with a user within an organizational chart, wherein profiles for the event attendees are arranged in descending order of their respective organizational chart distance to the user, wherein the organizational chart distance between the user and a second person is a shortest path within the organizational chart, obtained by summing the user's and the second person's organizational chart distance to a manager shared by the user and the second person. 17. The system of claim 12 , the meeting document is generated in a personalized format for a given user.
| 0.599918 |
10. The method of claim 8 , wherein the neural network is implemented on a server cluster.
|
10. The method of claim 8 , wherein the neural network is implemented on a server cluster. 12. The method of claim 10 , wherein the search query is sent via a secure connection.
| 0.969149 |
2. The method of claim 1 , wherein said automatically generating the modified model comprises for each one of the different types of data nodes in the first data tree: identifying a corresponding configuration node, if any, of the plurality of configuration nodes; and performing a data transform operation on a data node associated with the corresponding configuration node, the data transform operation being based on the definition associated with the corresponding configuration node.
|
2. The method of claim 1 , wherein said automatically generating the modified model comprises for each one of the different types of data nodes in the first data tree: identifying a corresponding configuration node, if any, of the plurality of configuration nodes; and performing a data transform operation on a data node associated with the corresponding configuration node, the data transform operation being based on the definition associated with the corresponding configuration node. 3. The method of claim 2 , wherein the data transform operation comprises creating a new topology object.
| 0.930661 |
1. A touch sensitive display device, comprising: a display unit configured to display a graphic user interface; a sensor unit configured to sense a contact with the display unit; and a controller configured to control the display unit and the sensor unit, wherein the graphic user interface comprises a first area of a virtual keyboard and a second area of a digital content containing at least one text, wherein the controller: detects a first contact in the first area; displays and moves a word-selecting interface according to the first contact moving from the first area to the second area, converts at least one word within the at least one text to at least one soft button, the at least one word overlapped by the word-selecting interface in the digital content, displays the at least one soft button, the at least one soft button including the converted at least one word respectively, detects a second contact selecting a soft button among the at least one soft button, and inputs a word corresponding to the soft button into a text input box.
|
1. A touch sensitive display device, comprising: a display unit configured to display a graphic user interface; a sensor unit configured to sense a contact with the display unit; and a controller configured to control the display unit and the sensor unit, wherein the graphic user interface comprises a first area of a virtual keyboard and a second area of a digital content containing at least one text, wherein the controller: detects a first contact in the first area; displays and moves a word-selecting interface according to the first contact moving from the first area to the second area, converts at least one word within the at least one text to at least one soft button, the at least one word overlapped by the word-selecting interface in the digital content, displays the at least one soft button, the at least one soft button including the converted at least one word respectively, detects a second contact selecting a soft button among the at least one soft button, and inputs a word corresponding to the soft button into a text input box. 2. The touch sensitive display device of claim 1 , wherein the control unit converts the at least one word overlapped by the word-selecting interface in response to a position from which the first contact is detected in the virtual keyboard of the first area and wherein the controller displays the converted at least one word in the at least one soft button, respectively.
| 0.518805 |
2. A method according to claim 1 , wherein the information of the start position of said speech region is provided by a speech recognition engine which performs said speech recognition.
|
2. A method according to claim 1 , wherein the information of the start position of said speech region is provided by a speech recognition engine which performs said speech recognition. 3. A method according to claim 2 , wherein the information of the start position of said speech region is obtained by performing a recognition process on a first speech data by using said speech recognition engine, or is obtained by averaging speech data for several pieces of data from the start which have been subjected to the recognition processing.
| 0.897806 |
14. A non-transitory computer readable medium including instructions that, when executed by an electronic device, enable the electronic device to perform steps for providing a report describing a status of an electronic envelope including a first electronic document to be distributed for electronic signature and an electronic signing template defining a set of at least one task that must be performed by an executor of the first electronic document to complete the electronic signature, the first electronic document being subject to a document-execution workflow comprising a plurality of events including the at least one task, the first electronic document including an embedded activatable control, the steps comprising: receiving from a monitoring entity an electronic selection of an identifier of at least one event of the plurality of events, wherein the electronic selection of the identifier is provided via a graphical user interface that is configured to: display identifiers of the plurality of events including envelope sent, envelope delivered, and envelope signed; receive selections of identifiers of each of the plurality of events; and receive from a user a selection of an identifier of the at least one event of the plurality of events; monitoring, over a network, progress of the first electronic document through the workflow; determining that the at least one event has occurred with respect to the first electronic document, by receiving an indication that the control has been activated; and in response to determining that the at least one event has occurred with respect to the first electronic document, notifying the monitoring entity that the at least one event has occurred with respect to the first electronic document.
|
14. A non-transitory computer readable medium including instructions that, when executed by an electronic device, enable the electronic device to perform steps for providing a report describing a status of an electronic envelope including a first electronic document to be distributed for electronic signature and an electronic signing template defining a set of at least one task that must be performed by an executor of the first electronic document to complete the electronic signature, the first electronic document being subject to a document-execution workflow comprising a plurality of events including the at least one task, the first electronic document including an embedded activatable control, the steps comprising: receiving from a monitoring entity an electronic selection of an identifier of at least one event of the plurality of events, wherein the electronic selection of the identifier is provided via a graphical user interface that is configured to: display identifiers of the plurality of events including envelope sent, envelope delivered, and envelope signed; receive selections of identifiers of each of the plurality of events; and receive from a user a selection of an identifier of the at least one event of the plurality of events; monitoring, over a network, progress of the first electronic document through the workflow; determining that the at least one event has occurred with respect to the first electronic document, by receiving an indication that the control has been activated; and in response to determining that the at least one event has occurred with respect to the first electronic document, notifying the monitoring entity that the at least one event has occurred with respect to the first electronic document. 18. The non-transitory computer readable medium of claim 14 , wherein the at least one event comprises completion of the electronic signature of the first electronic document.
| 0.618468 |
5. The method of claim 1 wherein the first-language prioritization protocol is updatable through at least one feedback path including a human-to-machine interface.
|
5. The method of claim 1 wherein the first-language prioritization protocol is updatable through at least one feedback path including a human-to-machine interface. 6. The method of claim 5 wherein the first-language prioritization protocol is updatable through the input of at least one of text, images, and sound.
| 0.985425 |
21. A system having a memory and a processor, the system comprising: a component configured to, for each of a plurality of values of an attribute of documents, the values having an ordering: determine a number of different encrypted instances of the value to generate, wherein the number of different encrypted instances determined for at least one of the plurality of values is greater than one, generate the determined number of different encrypted instances of the value so that the value serves as a basis for generating each of the determined number of different encrypted instances of the value, wherein more than one encrypted instance of the at least one of the plurality of values is generated, and store the generated encrypted instances of the value, wherein each encrypted instance of the value can be decrypted into the value; a component configured to generate a mapping of the values of the attribute to each document having that value for the attribute, wherein the mapping maps different encrypted instances of a value to different documents; a component configured to provide the generated mapping to a document storage service; and a component configured to identify an encrypted document that matches a query that specified a value for the attribute, wherein the component configured to identify the encrypted document that matches a query that specified a value for the attribute is further configured to: determine a lower bound on encrypted instances associated with the value specified by the query, determine an upper bound on encrypted instances associated with the value specified by the query, send the determined lower and upper bounds to a document storage service, and receive from the document storage service an indication of at least one document associated with an encrypted instance between the lower and upper bounds wherein each of the components comprises computer-executable instructions stored in the memory for execution by the system.
|
21. A system having a memory and a processor, the system comprising: a component configured to, for each of a plurality of values of an attribute of documents, the values having an ordering: determine a number of different encrypted instances of the value to generate, wherein the number of different encrypted instances determined for at least one of the plurality of values is greater than one, generate the determined number of different encrypted instances of the value so that the value serves as a basis for generating each of the determined number of different encrypted instances of the value, wherein more than one encrypted instance of the at least one of the plurality of values is generated, and store the generated encrypted instances of the value, wherein each encrypted instance of the value can be decrypted into the value; a component configured to generate a mapping of the values of the attribute to each document having that value for the attribute, wherein the mapping maps different encrypted instances of a value to different documents; a component configured to provide the generated mapping to a document storage service; and a component configured to identify an encrypted document that matches a query that specified a value for the attribute, wherein the component configured to identify the encrypted document that matches a query that specified a value for the attribute is further configured to: determine a lower bound on encrypted instances associated with the value specified by the query, determine an upper bound on encrypted instances associated with the value specified by the query, send the determined lower and upper bounds to a document storage service, and receive from the document storage service an indication of at least one document associated with an encrypted instance between the lower and upper bounds wherein each of the components comprises computer-executable instructions stored in the memory for execution by the system. 26. The system of claim 21 , wherein the indication of the at least one document is a document identifier.
| 0.590794 |
33. The method of claim 30 , wherein the step of choosing the particular query comprises: if a cost for the query satisfies a second particular mathematical relationship with the current-best cost, then establishing as the particular query the current-best query; and if the cost for the query does not satisfy the second particular mathematical relationship with the current-best cost, then establishing the query as the particular query.
|
33. The method of claim 30 , wherein the step of choosing the particular query comprises: if a cost for the query satisfies a second particular mathematical relationship with the current-best cost, then establishing as the particular query the current-best query; and if the cost for the query does not satisfy the second particular mathematical relationship with the current-best cost, then establishing the query as the particular query. 34. The method of claim 33 , wherein the second particular mathematical relationship is “greater than”.
| 0.942212 |
24. The storage device of claim 23 , wherein the instructions cause the machine to perform operations comprising determining a justified side of the text block to which the text lines are justified and an unjustified side of the text block opposite the justified side.
|
24. The storage device of claim 23 , wherein the instructions cause the machine to perform operations comprising determining a justified side of the text block to which the text lines are justified and an unjustified side of the text block opposite the justified side. 25. The storage device of claim 24 , wherein the instructions cause the machine to perform operations comprising identifying a candidate boundary aligned with a maximal edge of ones of the bounding rectangles on the unjustified side of the text block.
| 0.759615 |
5. A computer-implemented method comprising: executing code of a network crawler, the executing launching the network crawler, the network crawler configured to access a network document and to perform a test for an object of the network document based at least in part on a test document, the test document stored separately from the code and specifying the test for the object of the network document, the test document further specifying a user state for accessing the network document, and the test identifying an expected outcome associated with performing an action on the object; providing a network location of the network document and an identifier of the network document to the network crawler, wherein the network crawler accesses the test document from the network location, accesses the network document based at least in part on the identifier and the user state, identifies the object from the test document, and performs the action on the object based at least in part on the test document; accessing a result of the test performed by the network crawler, the result comprising an indication that an outcome different from the expected outcome occurred based at least in part on the action being performed on the object, the result further identifying a second object of the network document not identified in the test document; generating a report associated with the network document based at least in part on the result of the test, the report identifying a correction to the object such that the expected outcome occurs when the action is performed, the report further comprising a metric for the second object based at least in part on the result, wherein the network document is updated by at least updating the object according to the correction; and receiving a second test document for testing the second object based at least in part on the metric.
|
5. A computer-implemented method comprising: executing code of a network crawler, the executing launching the network crawler, the network crawler configured to access a network document and to perform a test for an object of the network document based at least in part on a test document, the test document stored separately from the code and specifying the test for the object of the network document, the test document further specifying a user state for accessing the network document, and the test identifying an expected outcome associated with performing an action on the object; providing a network location of the network document and an identifier of the network document to the network crawler, wherein the network crawler accesses the test document from the network location, accesses the network document based at least in part on the identifier and the user state, identifies the object from the test document, and performs the action on the object based at least in part on the test document; accessing a result of the test performed by the network crawler, the result comprising an indication that an outcome different from the expected outcome occurred based at least in part on the action being performed on the object, the result further identifying a second object of the network document not identified in the test document; generating a report associated with the network document based at least in part on the result of the test, the report identifying a correction to the object such that the expected outcome occurs when the action is performed, the report further comprising a metric for the second object based at least in part on the result, wherein the network document is updated by at least updating the object according to the correction; and receiving a second test document for testing the second object based at least in part on the metric. 7. The computer-implemented method of claim 5 , further comprising: storing codes for a plurality of network crawlers that have crawling states and that are configured to crawl web pages based at least in part on the crawling states; and selecting the network crawler from the plurality of network crawlers based at least in part on the user state defined in the test document and a crawling state of the network crawler.
| 0.585833 |
1. A method for generating a transcription of a videoconference, comprising: matching human speech of a videoconference to writable symbols, the human speech encoded in audio data of the videoconference; determining a probability that a portion of the human speech matches a profile of a participant of a plurality of participants of the videoconference, the profile stored in tangible computer-readable memory; if the probability is less than a predetermined threshold, using video data of the videoconference to determine which participant of the plurality of participants of the videoconference is the most likely source of the portion of the human speech; and generating a transcription of the videoconference that identifies an association of the portion of the human speech and the participant of the plurality of participants of the videoconference determined to be the most likely source of the portion of human speech.
|
1. A method for generating a transcription of a videoconference, comprising: matching human speech of a videoconference to writable symbols, the human speech encoded in audio data of the videoconference; determining a probability that a portion of the human speech matches a profile of a participant of a plurality of participants of the videoconference, the profile stored in tangible computer-readable memory; if the probability is less than a predetermined threshold, using video data of the videoconference to determine which participant of the plurality of participants of the videoconference is the most likely source of the portion of the human speech; and generating a transcription of the videoconference that identifies an association of the portion of the human speech and the participant of the plurality of participants of the videoconference determined to be the most likely source of the portion of human speech. 6. The method of claim 1 , further comprising generating at least a portion of the profile after the videoconference has terminated.
| 0.705628 |
15. The system of claim 7, wherein said language editor comprises a vocabulary checker and a grammar checker.
|
15. The system of claim 7, wherein said language editor comprises a vocabulary checker and a grammar checker. 21. The system of claim 15, wherein said vocabulary checker is configured to identify words not included in said constrained source language.
| 0.97533 |
8. The computer readable storage medium of claim 7 wherein each of the pointers includes a third indication of a classification of the word.
|
8. The computer readable storage medium of claim 7 wherein each of the pointers includes a third indication of a classification of the word. 10. The computer readable storage medium of claim 8 wherein the classification comprises one of tonal and inflection features.
| 0.963351 |
18. A method for providing captioned telephone service, the method comprising: initiating a first captioned telephone service call; during the first captioned telephone service call, creating a first set of captions using a human captioner; simultaneous with creating the first set of captions using a human captioner, creating a second set of captions using an automated speech recognition captioner; comparing the first set of captions and the second set of captions using a scoring algorithm; determining whether the first set of captions is outside of a predetermined range of scores; and in response to the score of first set of captions being outside of a predetermined range of scores, setting an electronic flag indicative of the human captioner being in need of corrective action.
|
18. A method for providing captioned telephone service, the method comprising: initiating a first captioned telephone service call; during the first captioned telephone service call, creating a first set of captions using a human captioner; simultaneous with creating the first set of captions using a human captioner, creating a second set of captions using an automated speech recognition captioner; comparing the first set of captions and the second set of captions using a scoring algorithm; determining whether the first set of captions is outside of a predetermined range of scores; and in response to the score of first set of captions being outside of a predetermined range of scores, setting an electronic flag indicative of the human captioner being in need of corrective action. 20. The method of claim 18 , in which the corrective action comprises providing additional training to the human captioner.
| 0.680218 |
8. A corpus generation method for generating accurate corpus data of presentation targets for use in a search operation for the presentation targets, the corpus generation method comprising: a web page acquisition step of acquiring a web page including description sentence data regarding a presentation target; a reference word acquisition step of acquiring a reference word that is an attribute value regarding the presentation target from the web page; an attachment step of extracting an broader word belonging to a layer above the reference word acquired in the reference word acquisition step from a storage that stores hierarchical relationship information indicating a hierarchical relationship between attribute values, and attaching an attribute tag, indicating an attribute name, corresponding to the reference word to the broader word included in the description sentence data when the broader word is included in the description sentence data; an output step of outputting, as corpus data, the description sentence data to which the attribute tag is attached in the attachment step; and a storing step of storing, in a presentation target information registration storage, a set of the attribute name and the attribute value regarding the presentation target acquired from the corpus data output, in the output step, in association with the web page, wherein, when a search for the presentation target is requested, the presentation target is searched by referring to the presentation target information registration storage based on the attribute name and the attribute value regarding the presentation target.
|
8. A corpus generation method for generating accurate corpus data of presentation targets for use in a search operation for the presentation targets, the corpus generation method comprising: a web page acquisition step of acquiring a web page including description sentence data regarding a presentation target; a reference word acquisition step of acquiring a reference word that is an attribute value regarding the presentation target from the web page; an attachment step of extracting an broader word belonging to a layer above the reference word acquired in the reference word acquisition step from a storage that stores hierarchical relationship information indicating a hierarchical relationship between attribute values, and attaching an attribute tag, indicating an attribute name, corresponding to the reference word to the broader word included in the description sentence data when the broader word is included in the description sentence data; an output step of outputting, as corpus data, the description sentence data to which the attribute tag is attached in the attachment step; and a storing step of storing, in a presentation target information registration storage, a set of the attribute name and the attribute value regarding the presentation target acquired from the corpus data output, in the output step, in association with the web page, wherein, when a search for the presentation target is requested, the presentation target is searched by referring to the presentation target information registration storage based on the attribute name and the attribute value regarding the presentation target. 9. The corpus generation method of claim 8 , wherein the web page acquisition step comprises receiving the web page from a server.
| 0.709406 |
1. A computer-implemented method for performing an analysis of model metadata in a modeling environment, said method including: reading, by a computer-based system for performing said analysis of said model metadata in said modeling environment, a request from a client, wherein said request includes a model identifier and a presentation parameter; reading, by said computer-based system, a variable identifier, wherein said variable identifier is associated with said model identifier; reading, by said computer-based system, variable metadata, wherein said variable metadata is associated with said variable identifier; and, formatting, by said computer-based system, said variable identifier and said variable metadata in accordance with said presentation parameter to create model metadata.
|
1. A computer-implemented method for performing an analysis of model metadata in a modeling environment, said method including: reading, by a computer-based system for performing said analysis of said model metadata in said modeling environment, a request from a client, wherein said request includes a model identifier and a presentation parameter; reading, by said computer-based system, a variable identifier, wherein said variable identifier is associated with said model identifier; reading, by said computer-based system, variable metadata, wherein said variable metadata is associated with said variable identifier; and, formatting, by said computer-based system, said variable identifier and said variable metadata in accordance with said presentation parameter to create model metadata. 17. The method of claim 1 , further including: reading model data corresponding to said model identifier, wherein said model data includes last usage date for each of a said plurality of simulation models; and, categorizing each of a plurality of simulation models according to said last usage date a variable usage type.
| 0.637401 |
1. A handwriting input method of an electronic device using a touch pen, the handwriting input method comprising: displaying an execution screen of an application on a touch screen in response to the application being executed; overlapping a handwriting input layer, which is configured for a handwriting input, with the execution screen; inputting a handwriting image on an area of the handwriting input layer using the touch pen; determining a data type of the input handwriting image as a text or an image based on an attribute of an area of the execution screen, overlapping with the area of the handwriting input layer in which the handwriting input image has been input, and recognizing the input handwriting image as the determined data type; and applying a recognized result of the determined data type to the application, wherein the recognizing comprises: converting the input handwriting image into the text and recognizing the converted text, in response to determining the data type of the input handwriting image as the text, and recognizing an image corresponding to the input handwriting image, without text conversion, in response to determining the data type of the input handwriting image as the image.
|
1. A handwriting input method of an electronic device using a touch pen, the handwriting input method comprising: displaying an execution screen of an application on a touch screen in response to the application being executed; overlapping a handwriting input layer, which is configured for a handwriting input, with the execution screen; inputting a handwriting image on an area of the handwriting input layer using the touch pen; determining a data type of the input handwriting image as a text or an image based on an attribute of an area of the execution screen, overlapping with the area of the handwriting input layer in which the handwriting input image has been input, and recognizing the input handwriting image as the determined data type; and applying a recognized result of the determined data type to the application, wherein the recognizing comprises: converting the input handwriting image into the text and recognizing the converted text, in response to determining the data type of the input handwriting image as the text, and recognizing an image corresponding to the input handwriting image, without text conversion, in response to determining the data type of the input handwriting image as the image. 2. The handwriting input method of claim 1 , wherein the application is an application that displays a web screen provided by a server which is positioned outside the electronic device, wherein the determining comprises: determining the data type of the input handwriting image based on a type of data input to a component of a hypertext markup language (HTML) document in an area of the web screen, and recognizing the input handwriting image as the determined data type.
| 0.61303 |
20. The computer real-time analysis system according to claim 13 further comprising: a) at least one computer processor adapted for parallel evaluation of such at least two timeframes within at least one plurality of timeframes comprising discrete periods of time, each of substantially different time lengths than each other, and each ending at the present time, from at least one minute to at least one year; b) at least one computer processor adapted for calculating, in substantially real-time, any historically time-relevant trading trends, at least whether bearish trends or bullish trends, within each timeframe of such at least one plurality of timeframes signals; c) at least one computer processor adapted for comparing each such calculation of such trading trends in such each timeframe with at least one trading trend in at least one timeframe prior to such each timeframe; and d) at least one computer processor adapted for notifying such at least one trader of any such comparisons comprising a change in such trading trend (bearish versus bullish).
|
20. The computer real-time analysis system according to claim 13 further comprising: a) at least one computer processor adapted for parallel evaluation of such at least two timeframes within at least one plurality of timeframes comprising discrete periods of time, each of substantially different time lengths than each other, and each ending at the present time, from at least one minute to at least one year; b) at least one computer processor adapted for calculating, in substantially real-time, any historically time-relevant trading trends, at least whether bearish trends or bullish trends, within each timeframe of such at least one plurality of timeframes signals; c) at least one computer processor adapted for comparing each such calculation of such trading trends in such each timeframe with at least one trading trend in at least one timeframe prior to such each timeframe; and d) at least one computer processor adapted for notifying such at least one trader of any such comparisons comprising a change in such trading trend (bearish versus bullish). 21. The computer real-time analysis system according to claim 20 wherein each such prior timeframe, compared to each such timeframe, comprises at least one time-adjacent and equal-length timeframe as each such timeframe.
| 0.895145 |
1. A computer-implemented error checking system, comprising: a duration component for computing word duration probability data based on a speech model, and a corpus of transcription data and wave data; a confidence component for computing a confidence score based on recognition processing of the speech model and wave data, and alignment output of the transcription data and the wave data; an error component for detecting error based on the duration probability data and the confidence score; and a training component for retraining the speech model based on removal of the error from the corpus.
|
1. A computer-implemented error checking system, comprising: a duration component for computing word duration probability data based on a speech model, and a corpus of transcription data and wave data; a confidence component for computing a confidence score based on recognition processing of the speech model and wave data, and alignment output of the transcription data and the wave data; an error component for detecting error based on the duration probability data and the confidence score; and a training component for retraining the speech model based on removal of the error from the corpus. 5. The system of claim 1 , further comprising a recognition component for performing the recognition processing on the wave data and the speech model using a word loop grammar and generating a word lattice graph.
| 0.528937 |
1. A localization system, comprising: a plurality of localization components providing localized data that is localized to one or more distinct markets; a translation matching component that receives a localization request corresponding to input data to be localized, accesses the plurality of localization components based on the localization request, and selects and outputs localized data from one or more of the plurality of localization components based on predetermined criteria; wherein selecting the localized data comprises utilizing a computer processor that is a functional component of a computing device to evaluate an indication of an efficiency with which a particular item of localized data can be retrieved, and then not selecting the particular item as the localized data based on a determination that the indication shows that the efficiency is not sufficient in terms of quickness; and wherein the localization components comprise at least one machine translation system that provides a certain kind of localized data for selection by the translation matching component, the certain kind being prepared data stores of automatically generated translations of data from a first spoken language into a different second spoken language, and wherein the translation matching component selects localized data from the machine translation system upon a determination that no desired alternative localized data is located in the plurality of data stores.
|
1. A localization system, comprising: a plurality of localization components providing localized data that is localized to one or more distinct markets; a translation matching component that receives a localization request corresponding to input data to be localized, accesses the plurality of localization components based on the localization request, and selects and outputs localized data from one or more of the plurality of localization components based on predetermined criteria; wherein selecting the localized data comprises utilizing a computer processor that is a functional component of a computing device to evaluate an indication of an efficiency with which a particular item of localized data can be retrieved, and then not selecting the particular item as the localized data based on a determination that the indication shows that the efficiency is not sufficient in terms of quickness; and wherein the localization components comprise at least one machine translation system that provides a certain kind of localized data for selection by the translation matching component, the certain kind being prepared data stores of automatically generated translations of data from a first spoken language into a different second spoken language, and wherein the translation matching component selects localized data from the machine translation system upon a determination that no desired alternative localized data is located in the plurality of data stores. 18. The system of claim 1 , wherein selecting the localized data further comprises selecting a locked item of localized data, and wherein the system is configured to prohibit textual modifications to the locked item of localized data.
| 0.674511 |
5. A computer program product, comprising a computer readable hardware storage device storing a computer readable program code, said computer readable program code comprising an algorithm that when executed by a computer processor of a computing device implements a method, said method comprising: receiving, by said computer processor for a user, an email comprising first data; generating, by said computer processor in response to a command and reply data from said user, a reply email associated with said email, said reply email comprising said reply data and said first data; enabling, by said computer processor, email reply check functionality; identifying from a body and a subject section of a recent history section of said reply email, by said computer processor in response to said enabling, a first group of sentences comprising every sentence from said first data within said recent history section of said reply email; identifying from a body and a subject section of a reply section the reply email, by said computer processor in response to said enabling, a second group of sentences comprising every sentence from said reply data of said reply email; validating, by said computer processor, said first group of sentences with respect to said second group of sentences via a phrase percentage matching method; determining, by said computer processor based on results of said validating, discrepancies between said first group of sentences with respect to said second group of sentences, wherein said discrepancies comprise subject item text from said email that have not been addressed in said reply email; generating, by said computer processor, an alert based interface, presenting said discrepancies; presenting, by said computer processor to said user via said alert based interface, an editing option associated with addressing said discrepancies; receiving, by said computer processor from said user, a replacement sentence associated with said first group of sentences; and generating, by said computer processor, a modified reply email, wherein said generating said modified replay email comprises replacing one of said first group of sentences with said replacement sentence.
|
5. A computer program product, comprising a computer readable hardware storage device storing a computer readable program code, said computer readable program code comprising an algorithm that when executed by a computer processor of a computing device implements a method, said method comprising: receiving, by said computer processor for a user, an email comprising first data; generating, by said computer processor in response to a command and reply data from said user, a reply email associated with said email, said reply email comprising said reply data and said first data; enabling, by said computer processor, email reply check functionality; identifying from a body and a subject section of a recent history section of said reply email, by said computer processor in response to said enabling, a first group of sentences comprising every sentence from said first data within said recent history section of said reply email; identifying from a body and a subject section of a reply section the reply email, by said computer processor in response to said enabling, a second group of sentences comprising every sentence from said reply data of said reply email; validating, by said computer processor, said first group of sentences with respect to said second group of sentences via a phrase percentage matching method; determining, by said computer processor based on results of said validating, discrepancies between said first group of sentences with respect to said second group of sentences, wherein said discrepancies comprise subject item text from said email that have not been addressed in said reply email; generating, by said computer processor, an alert based interface, presenting said discrepancies; presenting, by said computer processor to said user via said alert based interface, an editing option associated with addressing said discrepancies; receiving, by said computer processor from said user, a replacement sentence associated with said first group of sentences; and generating, by said computer processor, a modified reply email, wherein said generating said modified replay email comprises replacing one of said first group of sentences with said replacement sentence. 6. The computer program product of claim 5 , wherein said method further comprises: second validating, by said computer processor, said replacement sentence with respect to said first group of sentences via said phrase percentage matching method; determining, by said computer processor based on results of said second validating, that said replacement sentence in reply to a sentence of said first group of sentences; and transmitting, by said computer processor to an original composer of said email, said modified reply email.
| 0.5 |
5. An apparatus for determining search term hit counts in an electronic discovery system, the apparatus comprising: a computing platform including at least one processor and a memory; and a search term hit count engine stored in the memory, executable by the at least one processor and configured to cause the at least one processor to: identify an electronic data set comprising data items for collection by an electronic discovery system; determine an estimated size of memory required to collect the data items of the electronic data set; determine whether or not the estimated size of memory required to collect the data items of the electronic data set is below a predetermined threshold; collect the data items in response to determining that the estimated size of memory required to collect the data items of the electronic data set is below the predetermined threshold, thus resulting in a collected data set; receive a search term set that includes a plurality of search terms associated with a case in the electronic discovery system, and wherein a search term is defined as a word or phrase associated with the case for identifying data items in the collected data set; prior to finalizing the search term set that will be applied to all of the electronic data associated with the case, determine a plurality of search term hit counts by applying the search term set to a portion of the collected data set, wherein the search term hit counts are defined as a number of data items in the portion of the collected data set in which (1) a specific search term included in the search term set occurs or (2) any one of the search terms in the search term set occur, and wherein the search term hit counts include: a per-data type search term hit count for one or more data types in the collected data set, wherein the one or more data types include electronic mail data and electronic file data, and a per-custodian search term hit count for each custodian associated with the case, wherein determining the per-data type search term hit count for one or more data types in the collected data set further comprises determining for each of the one or more data types in the collected data set a number of occurrences of the search term in each of the one or more data types, and wherein the per-custodian search term hit count is defined as a number of data items in the portion of the collected data set in which (1) the specific search term included in the search term set occurs or (2) any one of the search terms in the search term set occur and the data items in the search term hit count are also associated with a corresponding custodian; predict, for an entirety of the collected data set based on results of applying the search term set to the portion of the collected data set, the volume of the collected data set required to be reviewed; determine for each of the plurality of search terms, a file size, each file size corresponding to an amount of storage space occupied by each of the data items that comprise a corresponding search term; and store, in computing device memory, the plurality of search term hit counts and the associated file size, wherein storing includes storing the per-custodian search term hit counts in a corresponding custodian profile within a custodian database and storing all of the search term hit counts in an associated search term file within the electronic discovery system.
|
5. An apparatus for determining search term hit counts in an electronic discovery system, the apparatus comprising: a computing platform including at least one processor and a memory; and a search term hit count engine stored in the memory, executable by the at least one processor and configured to cause the at least one processor to: identify an electronic data set comprising data items for collection by an electronic discovery system; determine an estimated size of memory required to collect the data items of the electronic data set; determine whether or not the estimated size of memory required to collect the data items of the electronic data set is below a predetermined threshold; collect the data items in response to determining that the estimated size of memory required to collect the data items of the electronic data set is below the predetermined threshold, thus resulting in a collected data set; receive a search term set that includes a plurality of search terms associated with a case in the electronic discovery system, and wherein a search term is defined as a word or phrase associated with the case for identifying data items in the collected data set; prior to finalizing the search term set that will be applied to all of the electronic data associated with the case, determine a plurality of search term hit counts by applying the search term set to a portion of the collected data set, wherein the search term hit counts are defined as a number of data items in the portion of the collected data set in which (1) a specific search term included in the search term set occurs or (2) any one of the search terms in the search term set occur, and wherein the search term hit counts include: a per-data type search term hit count for one or more data types in the collected data set, wherein the one or more data types include electronic mail data and electronic file data, and a per-custodian search term hit count for each custodian associated with the case, wherein determining the per-data type search term hit count for one or more data types in the collected data set further comprises determining for each of the one or more data types in the collected data set a number of occurrences of the search term in each of the one or more data types, and wherein the per-custodian search term hit count is defined as a number of data items in the portion of the collected data set in which (1) the specific search term included in the search term set occurs or (2) any one of the search terms in the search term set occur and the data items in the search term hit count are also associated with a corresponding custodian; predict, for an entirety of the collected data set based on results of applying the search term set to the portion of the collected data set, the volume of the collected data set required to be reviewed; determine for each of the plurality of search terms, a file size, each file size corresponding to an amount of storage space occupied by each of the data items that comprise a corresponding search term; and store, in computing device memory, the plurality of search term hit counts and the associated file size, wherein storing includes storing the per-custodian search term hit counts in a corresponding custodian profile within a custodian database and storing all of the search term hit counts in an associated search term file within the electronic discovery system. 6. The apparatus of claim 5 , wherein the search term hit count engine is further configured to determine the plurality of search term hit counts associated with the portion of the electronic data set including the per-custodian search term hit count for each of the one or more data types.
| 0.722857 |
1. A method comprising: receiving a partial query entered by a user into a search field in a user interface on a computing device, and receiving data indicating a document displayed on the computing device during entry of the partial query, wherein the user interface displays the document within an application different from an application including the search field, wherein at least one of the applications is different from a web browser, wherein the document includes content comprising metadata and text, and wherein the text includes terms; identifying query completions for the partial query based on one or more terms of the partial query, wherein at least one query completion of the query completions includes the one or more terms of the partial query and at least one term from the document that is different and in addition to the one or more terms of the partial query; identifying initial ranking scores for the query completions, wherein the initial ranking score for the at least one query completion is based at least in part on popularity of the at least one query completion; calculating similarity scores for the query completions, wherein calculating a similarity score for a given query completion of the query completions is based at least in part on similarity between the given query completion and the content in the displayed document; ranking the query completions based on the similarity scores and the initial ranking scores; selecting one or more of the query completions as refined query completions for the partial query based at least in part on the ranking; and providing the refined query completions for display on the computing device.
|
1. A method comprising: receiving a partial query entered by a user into a search field in a user interface on a computing device, and receiving data indicating a document displayed on the computing device during entry of the partial query, wherein the user interface displays the document within an application different from an application including the search field, wherein at least one of the applications is different from a web browser, wherein the document includes content comprising metadata and text, and wherein the text includes terms; identifying query completions for the partial query based on one or more terms of the partial query, wherein at least one query completion of the query completions includes the one or more terms of the partial query and at least one term from the document that is different and in addition to the one or more terms of the partial query; identifying initial ranking scores for the query completions, wherein the initial ranking score for the at least one query completion is based at least in part on popularity of the at least one query completion; calculating similarity scores for the query completions, wherein calculating a similarity score for a given query completion of the query completions is based at least in part on similarity between the given query completion and the content in the displayed document; ranking the query completions based on the similarity scores and the initial ranking scores; selecting one or more of the query completions as refined query completions for the partial query based at least in part on the ranking; and providing the refined query completions for display on the computing device. 2. The method of claim 1 , wherein the number of refined query completions is less than the number of query completions initially obtained for the partial query.
| 0.593668 |
4. The machine translation method according to claim 1 , wherein the information output device has a processor and a display; and wherein the machine translation method further comprises: displaying the plurality of backward-translated sentences in a first area on the display; and displaying the translation-source sentence in a second area on the display, the second area being different from the first area.
|
4. The machine translation method according to claim 1 , wherein the information output device has a processor and a display; and wherein the machine translation method further comprises: displaying the plurality of backward-translated sentences in a first area on the display; and displaying the translation-source sentence in a second area on the display, the second area being different from the first area. 5. The machine translation method according to claim 4 , further comprising: displaying, in a third area on the display, the forward-translated sentence corresponding to the selected backward-translated sentence.
| 0.88468 |
1. A computer-readable storage medium which stores a hypertext conversion program characterized by causing a computer to execute a processing starting part determination step in which a processing starting part is determined in an original hypertext serving as a processing object; a processing range determination step in which a processing range including an original anchor in the original hypertext is determined based on the processing starting part; a link destination hypertext acquisition step in which a link destination hypertext of the original anchor present in the processing range is acquired; a link destination anchor information extraction step in which link destination anchor information composed of a pair of a character string and a link destination URL of a link destination anchor is extracted from the link destination hypertext; an original anchor effective range determination step in which an original anchor effective range is determined which serves as a candidate character string range to which a new anchor is added in the original hypertext; a character string comparison step in which a character string present in the original anchor effective range is compared with the character string present in the link destination anchor information, and in which a matched range in the original anchor effective range is determined; a new anchor information generation step in which the link destination URL paired with the link destination character string of the link destination anchor information which is matched in the character string comparison is set as a new link destination URL, and in which new anchor information is generated composed of a pair of the matched range and the new link destination URL; and a new anchor attachment step in which a new anchor describing the new link destination URL in the new anchor information is attached to a character string of the original hypertext present in the matched range in the new anchor information, so as to convert the original hypertext to a new hypertext.
|
1. A computer-readable storage medium which stores a hypertext conversion program characterized by causing a computer to execute a processing starting part determination step in which a processing starting part is determined in an original hypertext serving as a processing object; a processing range determination step in which a processing range including an original anchor in the original hypertext is determined based on the processing starting part; a link destination hypertext acquisition step in which a link destination hypertext of the original anchor present in the processing range is acquired; a link destination anchor information extraction step in which link destination anchor information composed of a pair of a character string and a link destination URL of a link destination anchor is extracted from the link destination hypertext; an original anchor effective range determination step in which an original anchor effective range is determined which serves as a candidate character string range to which a new anchor is added in the original hypertext; a character string comparison step in which a character string present in the original anchor effective range is compared with the character string present in the link destination anchor information, and in which a matched range in the original anchor effective range is determined; a new anchor information generation step in which the link destination URL paired with the link destination character string of the link destination anchor information which is matched in the character string comparison is set as a new link destination URL, and in which new anchor information is generated composed of a pair of the matched range and the new link destination URL; and a new anchor attachment step in which a new anchor describing the new link destination URL in the new anchor information is attached to a character string of the original hypertext present in the matched range in the new anchor information, so as to convert the original hypertext to a new hypertext. 6. The storage medium according to claim 1 , characterized by further including a recursive processing step in which the new anchor information generated in the new anchor information generation step is considered as an original anchor in the original hypertext, and the processes of the processing starting part determination step, the processing range determination step, the link destination hypertext acquisition step, the link destination anchor information extraction step, the anchor effective range determination step, the character string comparison step, the new anchor information generation step, and the new anchor attachment step are recursively executed.
| 0.5 |
1. A method for providing a speech output for a speech-enabled application, the method comprising: receiving from the speech-enabled application a text input comprising a text transcription of a desired speech output; selecting, using at least one computer system, a sequence of audio recordings for concatenation to produce the desired speech output, the selected sequence of audio recordings comprising a first audio recording for concatenation with one or more other audio recordings in the selected sequence of audio recordings, the first audio recording selected for being of a speaker speaking a plurality of words in the text transcription, wherein selecting the sequence of audio recordings comprises applying one or more selection criteria that favor the selected sequence of audio recordings for being a smaller number of audio recordings than other candidate sequences of audio recordings for producing the desired speech output; generating a speech output by concatenating the selected sequence of audio recordings; and providing the generated speech output for the speech-enabled application.
|
1. A method for providing a speech output for a speech-enabled application, the method comprising: receiving from the speech-enabled application a text input comprising a text transcription of a desired speech output; selecting, using at least one computer system, a sequence of audio recordings for concatenation to produce the desired speech output, the selected sequence of audio recordings comprising a first audio recording for concatenation with one or more other audio recordings in the selected sequence of audio recordings, the first audio recording selected for being of a speaker speaking a plurality of words in the text transcription, wherein selecting the sequence of audio recordings comprises applying one or more selection criteria that favor the selected sequence of audio recordings for being a smaller number of audio recordings than other candidate sequences of audio recordings for producing the desired speech output; generating a speech output by concatenating the selected sequence of audio recordings; and providing the generated speech output for the speech-enabled application. 8. The method of claim 1 , wherein applying the one or more selection criteria to select the sequence of audio recordings comprises optimizing a cost function minimizing a number of concatenations between audio recordings in the sequence of audio recordings.
| 0.703661 |
2. The method of claim 1 , wherein the external program environment is a late bound programming environment.
|
2. The method of claim 1 , wherein the external program environment is a late bound programming environment. 3. The method of claim 2 , further comprising executing the late bound function call from within the external program environment using the interface.
| 0.930654 |
1. A computer-implemented method for processing user entered query data to improve results of a search of pages using a local search database, when searching the internet, comprising: (a) receiving the user entered query data and parsing each word of the query data; (b) examining each word to determine if the word is associated with one of an intent name, a city name or a state name, the examining using a probabilistic dictionary to determine a likelihood that the word is one of the intent name, the city name or the state name, and associating the words that were determined to be, (i) the intent name with an intent name tag to create one or more tagged intent terms; (ii) the city name with a city name tag to create one or more tagged city terms; or (iii) the state name with a state name tag to create one or more tagged state terms; (c) normalizing each of the tagged intent terms, the tagged city terms and the tagged state terms, the normalizing including boosting information if found in the local search database and determining proximity between selected ones of the tagged intent, city or state terms; and (d) generating an optimized internal search query that incorporates constraints and ranking based on at least the boosting information and the determined proximity between the selected tagged intent, city or state terms, the optimized internal search query being applied to the internet to enable search results to be produced and displayed to the user in response to the entered query data, where operations defined by the computer-implemented method are executed by a processor.
|
1. A computer-implemented method for processing user entered query data to improve results of a search of pages using a local search database, when searching the internet, comprising: (a) receiving the user entered query data and parsing each word of the query data; (b) examining each word to determine if the word is associated with one of an intent name, a city name or a state name, the examining using a probabilistic dictionary to determine a likelihood that the word is one of the intent name, the city name or the state name, and associating the words that were determined to be, (i) the intent name with an intent name tag to create one or more tagged intent terms; (ii) the city name with a city name tag to create one or more tagged city terms; or (iii) the state name with a state name tag to create one or more tagged state terms; (c) normalizing each of the tagged intent terms, the tagged city terms and the tagged state terms, the normalizing including boosting information if found in the local search database and determining proximity between selected ones of the tagged intent, city or state terms; and (d) generating an optimized internal search query that incorporates constraints and ranking based on at least the boosting information and the determined proximity between the selected tagged intent, city or state terms, the optimized internal search query being applied to the internet to enable search results to be produced and displayed to the user in response to the entered query data, where operations defined by the computer-implemented method are executed by a processor. 2. A computer-implemented method for processing user entered query data as recited in claim 1 , wherein the intent name is a descriptive word or words of places, things, or events, which can include business names.
| 0.525934 |
16. A system for updating a trust score, the system comprising: processing circuitry configured to: access a database storing data associated with a network community, the data identifying paths from a first entity to a second entity; calculate a network connectivity score based on the identified paths; receive data about the second entity from a remote source; calculate a ratings score based on the received data from the remote source; calculate a trust score for the second entity by calculating a weighted sum of the network connectivity score and the ratings score using a first set of weights; receive an indication of an activity to be performed in the future between the first entity and the second entity; select a second set of weights corresponding to the activity to be performed in the future, the second set of weights being different than the first set of weights; and recalculate the trust score by recalculating the weighted sum of the network connectivity score and the ratings score using the second set of weights.
|
16. A system for updating a trust score, the system comprising: processing circuitry configured to: access a database storing data associated with a network community, the data identifying paths from a first entity to a second entity; calculate a network connectivity score based on the identified paths; receive data about the second entity from a remote source; calculate a ratings score based on the received data from the remote source; calculate a trust score for the second entity by calculating a weighted sum of the network connectivity score and the ratings score using a first set of weights; receive an indication of an activity to be performed in the future between the first entity and the second entity; select a second set of weights corresponding to the activity to be performed in the future, the second set of weights being different than the first set of weights; and recalculate the trust score by recalculating the weighted sum of the network connectivity score and the ratings score using the second set of weights. 27. The system of claim 16 , wherein the trust score for the second entity comprises a confidence range determined based on the network connectivity score and the ratings score.
| 0.596633 |
1. A computer-implemented method for querying an opendata provider in communication with a server via an electronic communication network, the method comprising: receiving at the server a relational database query from an application running on a client computer coupled to the electronic communication network; parsing by a parsing engine the relational database query; creating an execution plan based on the results of the parsing step; transmitting an opendata query to the opendata provider, the opendata query including at least a portion of the execution plan; retrieving, at the server, document metadata from the opendata provider; building an internal model of the document metadata; mapping content of at least one opendata entity data model located at the opendata provider and the document metadata to at least one relational model catalog; transforming at the server a response from the opendata provider into a relational format; and providing the transformed response to the client computer application.
|
1. A computer-implemented method for querying an opendata provider in communication with a server via an electronic communication network, the method comprising: receiving at the server a relational database query from an application running on a client computer coupled to the electronic communication network; parsing by a parsing engine the relational database query; creating an execution plan based on the results of the parsing step; transmitting an opendata query to the opendata provider, the opendata query including at least a portion of the execution plan; retrieving, at the server, document metadata from the opendata provider; building an internal model of the document metadata; mapping content of at least one opendata entity data model located at the opendata provider and the document metadata to at least one relational model catalog; transforming at the server a response from the opendata provider into a relational format; and providing the transformed response to the client computer application. 2. The method of claim 1 , wherein the parsing step further includes creating an abstract syntax tree based on objects of the relational database query.
| 0.601455 |
7. The method of claim 1 , further comprising: determining a probability of each candidate word given the sequence of contact inputs, wherein ranking the plurality of candidate words is based on the probability of each candidate word given the sequence of contact inputs.
|
7. The method of claim 1 , further comprising: determining a probability of each candidate word given the sequence of contact inputs, wherein ranking the plurality of candidate words is based on the probability of each candidate word given the sequence of contact inputs. 9. The method of claim 7 , further comprising: determining a probability of each candidate word of the plurality of candidate words given a respective character string of the plurality of character strings, wherein the probability of each candidate word of the plurality of candidate words given the sequence of contact inputs is determined based on the probability of each candidate word of the plurality of candidate words given a respective character string of the plurality of character strings.
| 0.838814 |
10. A computerized method for use by a voice recognition system for a vehicle, the method comprising: receiving speech from a user at a microphone; identifying the user; loading a first set of user-specific commands or names associated with the identified user from a user specific voice recognition setting database in memory; conducting a first voice recognition pass by comparing a representation of the received speech to the loaded first set of commands or names to obtain a first proposed match and a first confidence; determining whether the first proposed match is a first match between the first set and the representation of the received speech if the first confidence meets or exceeds a first confidence level; when the first proposed match is not determined to be a first match, conducting a second voice recognition pass by comparing the representation of the received speech to a second set of user-specific at least one command or at least one name not included in the first set, the second set associated with the user in the user specific voice recognition setting database, to obtain a second proposed match and a second confidence; determining whether the second proposed match is a second match between the second set and the representation of the received speech if the second confidence meets or exceeds a second confidence level; and at least one of: (a) outputting an indication of the first match or the second match for user confirmation if the first match or the second match is determined, or (b) executing a vehicle function based on the first match or the second match if the first match or the second match is determined.
|
10. A computerized method for use by a voice recognition system for a vehicle, the method comprising: receiving speech from a user at a microphone; identifying the user; loading a first set of user-specific commands or names associated with the identified user from a user specific voice recognition setting database in memory; conducting a first voice recognition pass by comparing a representation of the received speech to the loaded first set of commands or names to obtain a first proposed match and a first confidence; determining whether the first proposed match is a first match between the first set and the representation of the received speech if the first confidence meets or exceeds a first confidence level; when the first proposed match is not determined to be a first match, conducting a second voice recognition pass by comparing the representation of the received speech to a second set of user-specific at least one command or at least one name not included in the first set, the second set associated with the user in the user specific voice recognition setting database, to obtain a second proposed match and a second confidence; determining whether the second proposed match is a second match between the second set and the representation of the received speech if the second confidence meets or exceeds a second confidence level; and at least one of: (a) outputting an indication of the first match or the second match for user confirmation if the first match or the second match is determined, or (b) executing a vehicle function based on the first match or the second match if the first match or the second match is determined. 19. The method of claim 10 , wherein the first set of commands or names for voice recognition comprise at least one of: (a) a set of most frequently used commands, (b) a set of most frequently used voice tags, and (c) a set of most frequently used contacts or phonebook names.
| 0.5 |
23. The data processing system of claim 22, which further comprises: said first processor means coupled to said second processor means, for receiving said new value for said adaptive probability weighting factor and computing a recognition means choice confidence factor in said data processing system, as a product of said new value for said adaptive probability weighting factor, times a difference between said first confidence value and said second confidence value.
|
23. The data processing system of claim 22, which further comprises: said first processor means coupled to said second processor means, for receiving said new value for said adaptive probability weighting factor and computing a recognition means choice confidence factor in said data processing system, as a product of said new value for said adaptive probability weighting factor, times a difference between said first confidence value and said second confidence value. 25. The data processing system of claim 23, which further comprises: an automatic monitoring and correcting means in said data processing system, coupled to said selection means, for automatically detecting an error in said first guess character and generating a corrected character to substitute for said first guess character.
| 0.901379 |
11. A system constructed and arranged to generate knowledge-based authentication (KBA) questions, the system comprising: a network interface; memory; and a controller including controlling circuitry coupled to the memory, the controlling circuitry being constructed and arranged to: obtain, from a user device, an activity log of a user, the activity log including pointers to a set of external fact sources; derive external facts from each external fact source of the set of external fact sources; and generate a set of KBA questions from the external facts, wherein the activity log of the user includes-a web browsing history of the user, wherein the pointers to the set of external fact sources include a list of addresses, within the web browsing history, of websites corresponding to the respective addresses and previously visited by the user, the set of external fact sources including the websites addressed by the list of addresses, wherein controlling circuitry constructed and arranged to derive the set of external facts is further constructed and arranged to access, over a network, each of the websites addressed by the list of addresses and acquiring the external facts from the websites, and wherein the KBA questions are generated by a KBA server from content of websites distinct from the user device, pointed to by the web browsing history on the user device, and visited by the KBA server connecting to the websites over the network.
|
11. A system constructed and arranged to generate knowledge-based authentication (KBA) questions, the system comprising: a network interface; memory; and a controller including controlling circuitry coupled to the memory, the controlling circuitry being constructed and arranged to: obtain, from a user device, an activity log of a user, the activity log including pointers to a set of external fact sources; derive external facts from each external fact source of the set of external fact sources; and generate a set of KBA questions from the external facts, wherein the activity log of the user includes-a web browsing history of the user, wherein the pointers to the set of external fact sources include a list of addresses, within the web browsing history, of websites corresponding to the respective addresses and previously visited by the user, the set of external fact sources including the websites addressed by the list of addresses, wherein controlling circuitry constructed and arranged to derive the set of external facts is further constructed and arranged to access, over a network, each of the websites addressed by the list of addresses and acquiring the external facts from the websites, and wherein the KBA questions are generated by a KBA server from content of websites distinct from the user device, pointed to by the web browsing history on the user device, and visited by the KBA server connecting to the websites over the network. 12. A system as in claim 11 , wherein each address of the list of addresses includes metadata indicating a time at which the user visited the website to which the address corresponds; wherein the controlling circuitry constructed and arranged to acquire the web browsing history is further constructed and arranged to: for each address of the list of addresses of the web browsing history: select the address when the metadata indicates that the user visited the website to which the address corresponds later than a threshold time, and not select the address when the metadata indicates that the user visited the website to which the address corresponds earlier than the threshold time.
| 0.5 |
1. A method for estimating automatic speech recognition (ASR) accuracy, the method comprising: obtaining transcriptions of utterances in a conversation over two channels; sorting the transcriptions along a time axis using a forced alignment; training a language model with the sorted transcriptions; performing ASR for utterances in a conversation between a first user and a second user, the second user being a target of ASR accuracy estimation; determining whether an ASR result of the second user is consistent or inconsistent with an ASR result of the first user using the trained language model; listing word sequences that have at least one word from the first user followed by a word from the second user; and estimating the ASR result of the second user as poor responsive to the ASR result of the second user being as inconsistent with the ASR result of the first user.
|
1. A method for estimating automatic speech recognition (ASR) accuracy, the method comprising: obtaining transcriptions of utterances in a conversation over two channels; sorting the transcriptions along a time axis using a forced alignment; training a language model with the sorted transcriptions; performing ASR for utterances in a conversation between a first user and a second user, the second user being a target of ASR accuracy estimation; determining whether an ASR result of the second user is consistent or inconsistent with an ASR result of the first user using the trained language model; listing word sequences that have at least one word from the first user followed by a word from the second user; and estimating the ASR result of the second user as poor responsive to the ASR result of the second user being as inconsistent with the ASR result of the first user. 2. The method of claim 1 , wherein said obtaining, sorting, and training steps correspond to a training stage of the method, and said performing, determining, and estimating steps correspond to a call selection stage of the method.
| 0.641249 |
78. A computer-readable medium, containing a program for performing a method of fitting graphical objects within a plurality of separate graphical frames in a document, each frame being associated with at least one value associated with a fitting attribute for fitting one or more of the graphical objects in the frame, the method comprising: specifying details concerning the values of the attributes for the frames in a user interface; using an algorithm to automatically determine an optimized at least one value, wherein using the algorithm comprises: determining a plurality of intermediate optimized values, wherein each intermediate optimized value is associated with a particular frame; and selecting the optimized at least one value from said plurality of intermediate values, wherein said selecting is based on the specified details; and applying the optimized at least one value to each frame of the plurality of separate graphical frames to fit one or more of the graphical objects in each of the frames without modifying the size of the plurality of separate graphical frames.
|
78. A computer-readable medium, containing a program for performing a method of fitting graphical objects within a plurality of separate graphical frames in a document, each frame being associated with at least one value associated with a fitting attribute for fitting one or more of the graphical objects in the frame, the method comprising: specifying details concerning the values of the attributes for the frames in a user interface; using an algorithm to automatically determine an optimized at least one value, wherein using the algorithm comprises: determining a plurality of intermediate optimized values, wherein each intermediate optimized value is associated with a particular frame; and selecting the optimized at least one value from said plurality of intermediate values, wherein said selecting is based on the specified details; and applying the optimized at least one value to each frame of the plurality of separate graphical frames to fit one or more of the graphical objects in each of the frames without modifying the size of the plurality of separate graphical frames. 80. The computer-readable medium of claim 78 , wherein the details comprises a permissible range by which the at least one value may be modified during optimization.
| 0.595336 |
16. The system of claim 14 , comprising an action component operable to cause at least one action to be taken.
|
16. The system of claim 14 , comprising an action component operable to cause at least one action to be taken. 18. The system of claim 16 , wherein the at least one action is at least one signal transmitted to the at least one agent.
| 0.939434 |
1. A method of providing voicemail to a mobile telephone, in which a caller initiates a voice call to the mobile telephone, but that call is diverted to a voicemail server, with the caller then leaving a voice message on the voicemail server, the method comprising the steps of: when a recording time of the voice message exceeds a maximum time, sending a standard notification to the mobile telephone indicating that an end-user of the mobile telephone has a new voicemail to listen to; when the recording time of the voice message is less than a maximum time: converting the voice message to an audio file format; sending or streaming the audio file to a voice to text transcription system comprising at least one computer adapted to play back the voice message to an operator to enable the operator to transcribe the voice message into the computer to generate a transcribed text message; including a unique identification in the transcribed text message that links the text message to the voice message held at the voicemail server; sending the transcribed text message to the mobile phone; and providing the voice message held at the server to the mobile telephone when the end-user of the mobile telephone selects or uses the unique identification.
|
1. A method of providing voicemail to a mobile telephone, in which a caller initiates a voice call to the mobile telephone, but that call is diverted to a voicemail server, with the caller then leaving a voice message on the voicemail server, the method comprising the steps of: when a recording time of the voice message exceeds a maximum time, sending a standard notification to the mobile telephone indicating that an end-user of the mobile telephone has a new voicemail to listen to; when the recording time of the voice message is less than a maximum time: converting the voice message to an audio file format; sending or streaming the audio file to a voice to text transcription system comprising at least one computer adapted to play back the voice message to an operator to enable the operator to transcribe the voice message into the computer to generate a transcribed text message; including a unique identification in the transcribed text message that links the text message to the voice message held at the voicemail server; sending the transcribed text message to the mobile phone; and providing the voice message held at the server to the mobile telephone when the end-user of the mobile telephone selects or uses the unique identification. 15. The method of claim 1 , wherein the maximum time is user-defined.
| 0.57231 |
1. A system for using a computer to improve a precision ratio when searching a resume database, comprising: a memory device resident in the computer; and a processor disposed in communication with the memory device, the processor configured to: receive a resume; parse the resume to: locate at least one skill or experience-related phrase in the resume; determine an experience range for each said at least one skill or experience-related phrase by examining a use of each said at least one skill or experience-related phrase in the resume; and compute a term of experience for each said at least one skill or experience-related phrase based on the experience range, wherein the term of experience for each said at least one skill or experience-related phrase is a summation of the term of experience for each occurrence of the phrase associated with a different experience range; store the resume in the resume database; create a parsed resume based on the resume, the parsed resume including each said at least one skill or experience-related phrase located in the resume, the term of experience computed for each said at least one skill or experience-related phrase, and a relationship between the term of experience and each said at least one skill or experience-related phrase; store the parsed resume in the resume database; send a database query to the resume database, the database query including a job description that includes at least one job requirement, each said at least one job requirement including a required skill or experience-related phrase, and a required term of experience; and receive a result set in response to the database query, wherein the result set includes the resume when the parsed resume satisfies the job description.
|
1. A system for using a computer to improve a precision ratio when searching a resume database, comprising: a memory device resident in the computer; and a processor disposed in communication with the memory device, the processor configured to: receive a resume; parse the resume to: locate at least one skill or experience-related phrase in the resume; determine an experience range for each said at least one skill or experience-related phrase by examining a use of each said at least one skill or experience-related phrase in the resume; and compute a term of experience for each said at least one skill or experience-related phrase based on the experience range, wherein the term of experience for each said at least one skill or experience-related phrase is a summation of the term of experience for each occurrence of the phrase associated with a different experience range; store the resume in the resume database; create a parsed resume based on the resume, the parsed resume including each said at least one skill or experience-related phrase located in the resume, the term of experience computed for each said at least one skill or experience-related phrase, and a relationship between the term of experience and each said at least one skill or experience-related phrase; store the parsed resume in the resume database; send a database query to the resume database, the database query including a job description that includes at least one job requirement, each said at least one job requirement including a required skill or experience-related phrase, and a required term of experience; and receive a result set in response to the database query, wherein the result set includes the resume when the parsed resume satisfies the job description. 12. The system of claim 1 , wherein to store the resume, the processor is further configured to: store the resume as a public resume, wherein the resume database is accessible by at least one recruiter, and the public resume is accessible by every recruiter.
| 0.64833 |
9. A method for generating a visual display having a plurality of windows displayed on a desktop background the method operating in a hardware and software environment with a processor, a storage attached to and under the control of the processor, the storage having a screen buffer, means for displaying screen information in the screen buffer and an object-oriented operating system resident in the storage for controlling the processor, the method comprising the steps of: (a) simultaneously executing in the processor a plurality of application programs, each of the application programs generating information to be displayed on a display screen in one of the plurality of windows; (b) instantiating in the storage a view system object for each of the plurality of application programs, the view system object containing a view hierarchy structure having a plurality of levels; (c) storing view object class information stored in the storage, the view object class information including a data structure for holding screen information for one of the plurality of windows and an object constructor method including a virtual initialization method;. (d) instantiating at least one view object for each of the plurality of application programs by executing the object constructor method which, in turn, invokes the virtual initialization method (b) to insert the at least one view object in a level of a view hierarchy structure in a view system object instantiated for the each application program; (e) storing screen information in the at least one view object; and (f) transferring the screen information stored in the at least one view object to the screen buffer to generate a visual display in one of the plurality of windows.
|
9. A method for generating a visual display having a plurality of windows displayed on a desktop background the method operating in a hardware and software environment with a processor, a storage attached to and under the control of the processor, the storage having a screen buffer, means for displaying screen information in the screen buffer and an object-oriented operating system resident in the storage for controlling the processor, the method comprising the steps of: (a) simultaneously executing in the processor a plurality of application programs, each of the application programs generating information to be displayed on a display screen in one of the plurality of windows; (b) instantiating in the storage a view system object for each of the plurality of application programs, the view system object containing a view hierarchy structure having a plurality of levels; (c) storing view object class information stored in the storage, the view object class information including a data structure for holding screen information for one of the plurality of windows and an object constructor method including a virtual initialization method;. (d) instantiating at least one view object for each of the plurality of application programs by executing the object constructor method which, in turn, invokes the virtual initialization method (b) to insert the at least one view object in a level of a view hierarchy structure in a view system object instantiated for the each application program; (e) storing screen information in the at least one view object; and (f) transferring the screen information stored in the at least one view object to the screen buffer to generate a visual display in one of the plurality of windows. 10. The method of claim 9, wherein step (a) comprises the steps of: (a1) executing in the processor at least one multithreaded application program having a plurality of application threads, each of the plurality of application threads running independently of other application threads and displaying information in one of the plurality of windows; and wherein step (d) comprises the step of: (d1) instantiating for each of the plurality of application threads a corresponding view object.
| 0.5 |
2. The method of claim 1, wherein the step of segmenting comprises: identifying a number of classes that the acoustic input can be classified into that represent the most acoustically dissimilar classes possible.
|
2. The method of claim 1, wherein the step of segmenting comprises: identifying a number of classes that the acoustic input can be classified into that represent the most acoustically dissimilar classes possible. 6. The method of claim 2, wherein the step of giving a type identifier tag comprises: assuming that the input data is produced by a parallel combination of models, each model corresponding to one of the predetermined classes; the identifier tag assigned to a segment being the class identifier tag of the model that gives the segment the highest probability, subject to certain constraints.
| 0.820225 |
1. A method for building an optimal group of cubes based upon historical queries to a database for answering a greatest number of future queries from a database, comprising the steps of: identifying a set of grouping patterns in accordance with a plurality of historical queries to the database for grouping components of the historical queries; defining one or more constraints to be applied to the set of grouping patterns, the one or more constraints being selected so as to optimize one or more parameters associated with the answering of a future query; determining an optimal set of grouping patterns in accordance with the defined constraints, each grouping pattern comprising a multi-dimensional database; wherein the determining of the optimal set of grouping patterns further comprises iterating the steps of: determining a plurality of grouping patterns or combined cubes in accordance with the plurality of historical queries and one or more knowledge modeling constructs defining a schema for data stored within the database; combining two or more of the plurality of grouping patterns or combined cubes that are determined to provide overlapping components so that, when combined into a larger combined cube, allow for a larger percentage of the historical queries to be answered in accordance with the defined constraints in a more efficient manner; and removing one or more the plurality of grouping patterns or combined cubes that comprise a completely defined subset of the larger combined cube in accordance with a plurality of overlapping components; and wherein the steps for creating the cubes are iterated until an optimal set of combined cubes is generated able to answer a greatest percentage of historical questions.
|
1. A method for building an optimal group of cubes based upon historical queries to a database for answering a greatest number of future queries from a database, comprising the steps of: identifying a set of grouping patterns in accordance with a plurality of historical queries to the database for grouping components of the historical queries; defining one or more constraints to be applied to the set of grouping patterns, the one or more constraints being selected so as to optimize one or more parameters associated with the answering of a future query; determining an optimal set of grouping patterns in accordance with the defined constraints, each grouping pattern comprising a multi-dimensional database; wherein the determining of the optimal set of grouping patterns further comprises iterating the steps of: determining a plurality of grouping patterns or combined cubes in accordance with the plurality of historical queries and one or more knowledge modeling constructs defining a schema for data stored within the database; combining two or more of the plurality of grouping patterns or combined cubes that are determined to provide overlapping components so that, when combined into a larger combined cube, allow for a larger percentage of the historical queries to be answered in accordance with the defined constraints in a more efficient manner; and removing one or more the plurality of grouping patterns or combined cubes that comprise a completely defined subset of the larger combined cube in accordance with a plurality of overlapping components; and wherein the steps for creating the cubes are iterated until an optimal set of combined cubes is generated able to answer a greatest percentage of historical questions. 2. The method of claim 1 , wherein the process of determining the optimal set of grouping patterns continues until no additional combinations of grouping patterns and combined cubes allows for a larger percentage of the historical queries to be answered.
| 0.661685 |
2. The method of claim 1 , wherein flagging the chunk inconsistencies comprises an automated comparison of the chunking applied to similar sets of characters from the one or more corpora.
|
2. The method of claim 1 , wherein flagging the chunk inconsistencies comprises an automated comparison of the chunking applied to similar sets of characters from the one or more corpora. 3. The method of claim 2 , wherein flagging the chunk inconsistencies further comprises automatically providing, to an output device, indications of similar sets of characters that have been chunked differently.
| 0.948809 |
14. In a general purpose computer, a method for automatically testing a business intelligence artifact in a business intelligence system, comprising: authoring a business intelligence artifact in the business intelligence system, wherein the business intelligence artifact produces output when the business intelligence artifact is executed in the business intelligence system, and wherein the business intelligence artifact is selected from the group consisting of: a report specification and an analysis cube; executing the business intelligence artifact in the business intelligence system to generate a business intelligence output; creating at least one assertion with conditions to verify the desired function of the business intelligence artifact when executed in the business intelligence system; testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact for problems by determining whether the business intelligence output generated by the business intelligence artifact satisfies the conditions of the at least one assertion after execution of the business intelligence artifact in the business intelligence system; and reporting if the conditions of the at least one assertion are not satisfied after execution of the business intelligence artifact in the business intelligence system.
|
14. In a general purpose computer, a method for automatically testing a business intelligence artifact in a business intelligence system, comprising: authoring a business intelligence artifact in the business intelligence system, wherein the business intelligence artifact produces output when the business intelligence artifact is executed in the business intelligence system, and wherein the business intelligence artifact is selected from the group consisting of: a report specification and an analysis cube; executing the business intelligence artifact in the business intelligence system to generate a business intelligence output; creating at least one assertion with conditions to verify the desired function of the business intelligence artifact when executed in the business intelligence system; testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact for problems by determining whether the business intelligence output generated by the business intelligence artifact satisfies the conditions of the at least one assertion after execution of the business intelligence artifact in the business intelligence system; and reporting if the conditions of the at least one assertion are not satisfied after execution of the business intelligence artifact in the business intelligence system. 17. The method of claim 14 , wherein the conditions of the at least one assertion comprise expectations pertaining to the data content in the business intelligence output.
| 0.516382 |
7. The method of claim 1 , wherein the first content comprises event information according to General Event Notification Architecture (GENA) protocol, wherein the event information is mapped to a GENA stanza comprising at least one appropriate<iq/>stanza according to XMPP.
|
7. The method of claim 1 , wherein the first content comprises event information according to General Event Notification Architecture (GENA) protocol, wherein the event information is mapped to a GENA stanza comprising at least one appropriate<iq/>stanza according to XMPP. 8. The method of claim 7 , wherein the<iq/>stanza embeds a subscription message in GENA protocol of the first UPnP entity to receive event data, wherein hyper-text transfer protocol (HTTP) headers according to GENA protocol are reformatted as XML according to XMPP.
| 0.820853 |
32. The non-transitory computer readable storage medium of claim 31 , wherein the one or more programs further include instructions, which when executed by the electronic device, cause the device to, when the structured electronic document is enlarged and translated so that the first box of content is displayed on the touch screen display and the second box of content is not displayed on the touch screen display, detect a second gesture on the touch screen display and, in response to detecting the second gesture, scroll the structured electronic document on the touch screen display.
|
32. The non-transitory computer readable storage medium of claim 31 , wherein the one or more programs further include instructions, which when executed by the electronic device, cause the device to, when the structured electronic document is enlarged and translated so that the first box of content is displayed on the touch screen display and the second box of content is not displayed on the touch screen display, detect a second gesture on the touch screen display and, in response to detecting the second gesture, scroll the structured electronic document on the touch screen display. 33. The non-transitory computer readable storage medium of claim 32 , wherein the first gesture and the second gesture are different types of gesture.
| 0.840354 |
22. An integrated computer browsing system, for building a multi-inheritance taxonomy of product categories, organizing such categories into hierarchies, comprising: a computer controlled user interface display, means for presenting hierarchies of data having a complex lattice data structure in a tree data structure, browsing means for navigating through said data structure by means of multi-navigation paths, means for using said multi-inheritance taxonomy, means for providing multiple parents in said taxonomy, means for storing the nodes of each of said multiple parents wherein each node is stored at a single location, each of said parents being displayed in said taxonomy a plurality of times, and means for finding information in said taxonomy without expanding said tree by displaying categories of information located beyond currently displayed information, wherein an indicator means is used for finding information in said taxonomy without expanding said tree by displaying categories of information located beyond currently displayed information.
|
22. An integrated computer browsing system, for building a multi-inheritance taxonomy of product categories, organizing such categories into hierarchies, comprising: a computer controlled user interface display, means for presenting hierarchies of data having a complex lattice data structure in a tree data structure, browsing means for navigating through said data structure by means of multi-navigation paths, means for using said multi-inheritance taxonomy, means for providing multiple parents in said taxonomy, means for storing the nodes of each of said multiple parents wherein each node is stored at a single location, each of said parents being displayed in said taxonomy a plurality of times, and means for finding information in said taxonomy without expanding said tree by displaying categories of information located beyond currently displayed information, wherein an indicator means is used for finding information in said taxonomy without expanding said tree by displaying categories of information located beyond currently displayed information. 25. The system as recited in claim 22 wherein said means for finding information in said taxonomy, comprising floating menus associated with particular nodes which are displayed by means of clicking on said nodes.
| 0.557899 |
14. The method of claim 1 , where analyzing data or attributes associated with the document further comprises: analyzing links to the document contained in other documents or in an electronic message.
|
14. The method of claim 1 , where analyzing data or attributes associated with the document further comprises: analyzing links to the document contained in other documents or in an electronic message. 15. The method of claim 14 , further comprising: determining if the links to the document attempt to convey that the document is a trusted document when the document is not a trusted document.
| 0.960918 |
1. A voice messaging system for converting an audio message from a caller into text, the voice messaging system comprising: at least one automatic speech recognition (ASR) system to automatically recognize at least some of the audio message; a computer implemented preprocessing front-end to process the audio message from the caller and to detect if the audio message contains no voice content, wherein: if the preprocessing front-end detects that the audio message contains no voice content, the preprocessing front-end does not provide the audio message to the ASR component; and if the preprocessing front-end detects that the audio message contains voice content, the front-end provides the audio message to the ASR component, and wherein the computer implemented preprocessing front-end comprises a computer implemented speech quality detector to determine at least one measure of speech quality of the voice content of the audio message, and wherein the speech quality detector detects drop-outs, estimates noise levels and/or calculates an overall measure of voice quality using an adaptive threshold to reject lowest quality messages.
|
1. A voice messaging system for converting an audio message from a caller into text, the voice messaging system comprising: at least one automatic speech recognition (ASR) system to automatically recognize at least some of the audio message; a computer implemented preprocessing front-end to process the audio message from the caller and to detect if the audio message contains no voice content, wherein: if the preprocessing front-end detects that the audio message contains no voice content, the preprocessing front-end does not provide the audio message to the ASR component; and if the preprocessing front-end detects that the audio message contains voice content, the front-end provides the audio message to the ASR component, and wherein the computer implemented preprocessing front-end comprises a computer implemented speech quality detector to determine at least one measure of speech quality of the voice content of the audio message, and wherein the speech quality detector detects drop-outs, estimates noise levels and/or calculates an overall measure of voice quality using an adaptive threshold to reject lowest quality messages. 4. The system of claim 1 , wherein the preprocessing front-end further comprises a computer implemented inadvertent call detector to detect inadvertent calls.
| 0.549301 |
11. The system of claim 7 , wherein a key is displayed explaining the color, the size, and the thickness.
|
11. The system of claim 7 , wherein a key is displayed explaining the color, the size, and the thickness. 12. The system of claim 11 , wherein an area exists encompassed by lines of a particular color.
| 0.973869 |
11. The system for generating a transliteration font as recited in claim 7 , wherein the first language is Arabic.
|
11. The system for generating a transliteration font as recited in claim 7 , wherein the first language is Arabic. 12. The system for generating a transliteration font as recited in claim 11 , wherein the second language is English.
| 0.979173 |
17. The method of claim 9 , wherein generating, using one or more computing devices, a set of one or more potential alternative NL queries comprises receiving one or more of the following information: data from a news source; data from a blogging service; data from a social networking service; data from a community-based news article website; data from a news aggregator; trend data from a web-based reference source, the trend data describing recent search statistics related to the web-based reference source; and trend data from a search engine, the trend data describing recent search statistics related to the search engine.
|
17. The method of claim 9 , wherein generating, using one or more computing devices, a set of one or more potential alternative NL queries comprises receiving one or more of the following information: data from a news source; data from a blogging service; data from a social networking service; data from a community-based news article website; data from a news aggregator; trend data from a web-based reference source, the trend data describing recent search statistics related to the web-based reference source; and trend data from a search engine, the trend data describing recent search statistics related to the search engine. 18. The method of claim 17 , wherein the received data are received by one of a search bot, a web feed, and a news feed.
| 0.848754 |
1. A method comprising: starting initialization of a first server; retrieving a statement of compatibility from a remote storage location; checking an expiration of the statement of compatibility; checking compatibility between an update for software of the first server and software of a second collaborating server based on the statement of compatibility, the statement of compatibility defining sets of compatible versions of the software; selecting automatically one of a parallel update process and a rolling update process to install the update based on the checking of the compatibility, the parallel update process to update the software of the first server for an update that is incompatible with the software of the second collaborating server by updating the software of the first server and the second collaborating server at a same time and the rolling update process to update the software of the first server for an update that is compatible with the software of the second collaborating server while the second collaborating server executes another compatible version of the software; scheduling automatically the parallel update process in response to the expiration of the statement of compatibility; and executing a selected update process.
|
1. A method comprising: starting initialization of a first server; retrieving a statement of compatibility from a remote storage location; checking an expiration of the statement of compatibility; checking compatibility between an update for software of the first server and software of a second collaborating server based on the statement of compatibility, the statement of compatibility defining sets of compatible versions of the software; selecting automatically one of a parallel update process and a rolling update process to install the update based on the checking of the compatibility, the parallel update process to update the software of the first server for an update that is incompatible with the software of the second collaborating server by updating the software of the first server and the second collaborating server at a same time and the rolling update process to update the software of the first server for an update that is compatible with the software of the second collaborating server while the second collaborating server executes another compatible version of the software; scheduling automatically the parallel update process in response to the expiration of the statement of compatibility; and executing a selected update process. 3. The method of claim 1 , further comprising: halting initialization or update of the software of the first server if the statement of compatibility is expired.
| 0.790581 |
1. A method for using computer assisted configuration technology to solve product configuration problems using configuration sub-models, the method comprising: performing with the computer assisted configuration technology; receiving one or more configuration queries from one or more computer systems; dividing one or more configuration queries into multiple configuration sub queries, wherein the one or more configuration queries represent one or more questions involving parts and part relationships in a configuration of a configurable product, the multiple configuration sub-queries represent the one or more configuration queries, and the parts represent a composition of matter of the configurable product; processing each sub-query using at least one configuration sub-model per sub-query, wherein the configuration sub-models collectively model a configurable product; generating a response to the one or more configuration queries based upon the processing of each sub-query using at least one configuration sub-model per sub-query; and providing the response to the one or more configuration queries as data for display by one or more display devices.
|
1. A method for using computer assisted configuration technology to solve product configuration problems using configuration sub-models, the method comprising: performing with the computer assisted configuration technology; receiving one or more configuration queries from one or more computer systems; dividing one or more configuration queries into multiple configuration sub queries, wherein the one or more configuration queries represent one or more questions involving parts and part relationships in a configuration of a configurable product, the multiple configuration sub-queries represent the one or more configuration queries, and the parts represent a composition of matter of the configurable product; processing each sub-query using at least one configuration sub-model per sub-query, wherein the configuration sub-models collectively model a configurable product; generating a response to the one or more configuration queries based upon the processing of each sub-query using at least one configuration sub-model per sub-query; and providing the response to the one or more configuration queries as data for display by one or more display devices. 5. The method of claim 1 wherein the one or more configuration queries relate to a configuration validation problem and processing one or more configuration queries further comprises: processing at least one of the sub-queries using different configuration sub-models until a configuration validation answer can be determined.
| 0.547082 |
14. A computing system configured to facilitate custody transfers of electronic signature documents, comprising: a hardware processor to: receive an electronic signature document and associate a custody transfer rule with the electronic signature document from a client device associated with a first user, the custody transfer rule comprising a data structure used by an electronic signature service (ESS) and further comprising: data identifying users in a custody chain for the electronic signature document; and data identifying an event to transition custody of the electronic signature document from a first user of the custody chain to a second user of the custody chain, the custody of the electronic signature document comprising an access right with respect to the electronic signature document, and the event comprising a response to an electronic signature request; transmit the electronic signature request to a client device associated with a third user not included in the custody chain; in response to detecting the event, transfer custody of the electronic signature document from the first user to the second user according to the custody transfer rule; and store data indicating the transfer of custody of the electronic signature document to prevent the client device associated with the first user from accessing the electronic signature document according to the access right with respect to the electronic signature document, and to allow access to the electronic signature document according the access right with respect to the electronic signature document to a client device associated with the second user.
|
14. A computing system configured to facilitate custody transfers of electronic signature documents, comprising: a hardware processor to: receive an electronic signature document and associate a custody transfer rule with the electronic signature document from a client device associated with a first user, the custody transfer rule comprising a data structure used by an electronic signature service (ESS) and further comprising: data identifying users in a custody chain for the electronic signature document; and data identifying an event to transition custody of the electronic signature document from a first user of the custody chain to a second user of the custody chain, the custody of the electronic signature document comprising an access right with respect to the electronic signature document, and the event comprising a response to an electronic signature request; transmit the electronic signature request to a client device associated with a third user not included in the custody chain; in response to detecting the event, transfer custody of the electronic signature document from the first user to the second user according to the custody transfer rule; and store data indicating the transfer of custody of the electronic signature document to prevent the client device associated with the first user from accessing the electronic signature document according to the access right with respect to the electronic signature document, and to allow access to the electronic signature document according the access right with respect to the electronic signature document to a client device associated with the second user. 16. The system of claim 14 , wherein the response to the electronic signature request comprises one of: a receipt of signature of the electronic signature document by the third user; or a refusal of signature of the electronic signature document by the third user.
| 0.561596 |
1. A sound recognition system, comprising: a sound input device; a processing device operatively coupled to said sound input device; and a display operatively coupled to said processing device; wherein: said processing device executes computer readable code to create a first visual representation of a first sound sensed by the sound input device for output on the display; wherein: said first visual representation is evaluated to determine whether a security breach has occurred; and wherein: said first visual representation is generated according to a method comprising the steps of: (a) placing twelve labels in a pattern of a circle, said twelve labels corresponding to twelve respective frequencies, such that moving clockwise or counter-clockwise between adjacent ones of said labels represents a first frequency interval; (b) identifying an occurrence of a first frequency within the first sound; (c) identifying an occurrence of a second frequency within the first sound; (d) identifying a first label corresponding to the first frequency; (e) identifying a second label corresponding to the second frequency; (f) creating a first line connecting the first label and the second label, wherein: (1) the first line is a first color if the first frequency and the second frequency are separated by the first frequency interval; (2) the first line is a second color if the first frequency and the second frequency are separated by a first multiple of the first frequency interval: (3) the first line is a third color if the first frequency and the second frequency are separated by a second multiple of the first frequency interval: (4) the first line is a fourth color if the first frequency and the second frequency are separated by a third multiple of the first frequency interval: (5) the first line is a fifth color if the first frequency and the second frequency are separated by a fourth multiple of the first frequency interval; and (6) the first line is a sixth color if the first frequency and the second frequency are separated by a fifth multiple of the first frequency interval.
|
1. A sound recognition system, comprising: a sound input device; a processing device operatively coupled to said sound input device; and a display operatively coupled to said processing device; wherein: said processing device executes computer readable code to create a first visual representation of a first sound sensed by the sound input device for output on the display; wherein: said first visual representation is evaluated to determine whether a security breach has occurred; and wherein: said first visual representation is generated according to a method comprising the steps of: (a) placing twelve labels in a pattern of a circle, said twelve labels corresponding to twelve respective frequencies, such that moving clockwise or counter-clockwise between adjacent ones of said labels represents a first frequency interval; (b) identifying an occurrence of a first frequency within the first sound; (c) identifying an occurrence of a second frequency within the first sound; (d) identifying a first label corresponding to the first frequency; (e) identifying a second label corresponding to the second frequency; (f) creating a first line connecting the first label and the second label, wherein: (1) the first line is a first color if the first frequency and the second frequency are separated by the first frequency interval; (2) the first line is a second color if the first frequency and the second frequency are separated by a first multiple of the first frequency interval: (3) the first line is a third color if the first frequency and the second frequency are separated by a second multiple of the first frequency interval: (4) the first line is a fourth color if the first frequency and the second frequency are separated by a third multiple of the first frequency interval: (5) the first line is a fifth color if the first frequency and the second frequency are separated by a fourth multiple of the first frequency interval; and (6) the first line is a sixth color if the first frequency and the second frequency are separated by a fifth multiple of the first frequency interval. 8. The method of claim 1 , wherein said sound is not human speech.
| 0.653315 |
1. A method, comprising: receiving a search query comprising at least one query term; identifying a plurality of source documents based on the at least one query term; identifying a relevant portion of a first source document in the plurality of source documents; identifying a view window appropriate to depict the relevant portion of the first source document, wherein an image size of the view window is smaller than an image size of the first source document; rendering a search results image for the relevant portion of the first source document, the search results image having boundaries corresponding to the view window; and rendering the source document in such a way that the portion of the document contained within the view window is visually distinguishable from the remainder of the document; and providing a set of search results, the set of search results including the search results image.
|
1. A method, comprising: receiving a search query comprising at least one query term; identifying a plurality of source documents based on the at least one query term; identifying a relevant portion of a first source document in the plurality of source documents; identifying a view window appropriate to depict the relevant portion of the first source document, wherein an image size of the view window is smaller than an image size of the first source document; rendering a search results image for the relevant portion of the first source document, the search results image having boundaries corresponding to the view window; and rendering the source document in such a way that the portion of the document contained within the view window is visually distinguishable from the remainder of the document; and providing a set of search results, the set of search results including the search results image. 6. The method of claim 1 , wherein the view window encloses at least a portion of text and at least a portion of non-text.
| 0.635634 |
1. A method, comprising: opening a first electronic document; creating a second electronic document superimposed over the first electronic document to receive annotations in reference to the first electronic document; creating, in response to creating the second electronic document to receive annotations, an association between the first electronic document and the second electronic document; saving the second document as a separate document independent of the first document; in response to a second opening of the first electronic document, and based upon the association between the first electronic document and the second electronic document that was annotated during a previous viewing of the first electronic document, automatically opening the second electronic document without user intervention; superimposing the second electronic document with the annotations over the first electronic document; and receiving additional annotations in reference to the first electronic document within the second electronic document concurrently while viewing the first electronic document beneath the second electronic document.
|
1. A method, comprising: opening a first electronic document; creating a second electronic document superimposed over the first electronic document to receive annotations in reference to the first electronic document; creating, in response to creating the second electronic document to receive annotations, an association between the first electronic document and the second electronic document; saving the second document as a separate document independent of the first document; in response to a second opening of the first electronic document, and based upon the association between the first electronic document and the second electronic document that was annotated during a previous viewing of the first electronic document, automatically opening the second electronic document without user intervention; superimposing the second electronic document with the annotations over the first electronic document; and receiving additional annotations in reference to the first electronic document within the second electronic document concurrently while viewing the first electronic document beneath the second electronic document. 6. The method of claim 1 , wherein the first electronic document is a word processing file.
| 0.639771 |
10. A computer readable storage medium carrying one or more sequences of instructions for providing access to a discussion forum over a computer network, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to: configure a web provider to support a discussion forum portlet; receive a first request for a web page from a user, the web page comprising the discussion forum portlet, the discussion forum portlet hosting at least one of the one or more discussion forums, wherein the at least one of the one or more discussion forums comprises restricting access through a password, a moderator alias, and at least one of a Frequently Asked Questions (FAQ) link or announcements for a specified duration; identify the web provider at an application server based on the request; transmit a second request to the web provider for content; parse the second request at the web provider; check, at the web provider, one or more central repositories to determine whether the content exists; fulfill the second request with the content at the web provider; transmit the information satisfying the second request from the web provider to the application server to be assembled in response to the first request for content by using information about the structure appearance and operation of requested web page and the information obtained from the web provider; obtain the content to be displayed in the discussion forum portlet from the web provider; assemble the requested web page at the application server, wherein the application server retrieves information about the structure, appearance, and operation of the web page from a database and thereafter composes the web page with the information and the content from the web provider and the database; and transmit the web page to the user.
|
10. A computer readable storage medium carrying one or more sequences of instructions for providing access to a discussion forum over a computer network, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to: configure a web provider to support a discussion forum portlet; receive a first request for a web page from a user, the web page comprising the discussion forum portlet, the discussion forum portlet hosting at least one of the one or more discussion forums, wherein the at least one of the one or more discussion forums comprises restricting access through a password, a moderator alias, and at least one of a Frequently Asked Questions (FAQ) link or announcements for a specified duration; identify the web provider at an application server based on the request; transmit a second request to the web provider for content; parse the second request at the web provider; check, at the web provider, one or more central repositories to determine whether the content exists; fulfill the second request with the content at the web provider; transmit the information satisfying the second request from the web provider to the application server to be assembled in response to the first request for content by using information about the structure appearance and operation of requested web page and the information obtained from the web provider; obtain the content to be displayed in the discussion forum portlet from the web provider; assemble the requested web page at the application server, wherein the application server retrieves information about the structure, appearance, and operation of the web page from a database and thereafter composes the web page with the information and the content from the web provider and the database; and transmit the web page to the user. 12. The computer-readable storage medium of claim 10 , wherein the web page is transmitted over a wireless network to the user.
| 0.503786 |
8. The method of claim 1 , wherein synthesizing the relationship between the active concept definition and the first concept definition further comprises defining a dimensional axis between the active concept definition and the first concept definition in the dimensional concept hierarchy.
|
8. The method of claim 1 , wherein synthesizing the relationship between the active concept definition and the first concept definition further comprises defining a dimensional axis between the active concept definition and the first concept definition in the dimensional concept hierarchy. 9. The method of claim 8 , further comprising: selecting one or more facet attributes for defining said dimensional axis based on at least one of: (i) the respective priorities of the facet attributes in the facet attribute hierarchy; or (ii) a particular concept definition including the one or more facet attributes to associate a particular meaning to said dimensional axis.
| 0.878829 |
13. A computer-implemented method, comprising: identifying, by a processor, in a document of a plurality of documents, one or more textual sequences; identifying, by the processor, based on the one or more textual sequences, a presence of novel content in the document where the novel content includes content that does not occur in other documents of the plurality of documents; assigning, by the processor, a score to the document based on the identified novel content including each of the one or more textual sequences; and ranking, by the processor, the document among the plurality of documents based on the assigned score.
|
13. A computer-implemented method, comprising: identifying, by a processor, in a document of a plurality of documents, one or more textual sequences; identifying, by the processor, based on the one or more textual sequences, a presence of novel content in the document where the novel content includes content that does not occur in other documents of the plurality of documents; assigning, by the processor, a score to the document based on the identified novel content including each of the one or more textual sequences; and ranking, by the processor, the document among the plurality of documents based on the assigned score. 15. The computer-implemented method of claim 13 , where identifying the presence of novel content further comprises: determining an indication of importance of each of the one or more textual sequences to the document.
| 0.702242 |
1. A method for communicating via an avatar, the method comprising: sending, by one or more processors, an email that includes an embedded avatar from a sender at a first computing device to a recipient at a second computing device; responsive to the recipient at the second computing device selecting the embedded avatar, providing, by one or more processors, an interface through which said recipient interacts to submit a query via the avatar; receiving, by one or more processors, the query via a communication protocol; parsing and analyzing, by one or more processors, the received query; retrieving, by one or more processors, an answer corresponding to the parsed and analyzed query from a mailbox of the sender, wherein the mailbox of the sender includes emails associated with the parsed and analyzed query; sending, by one or more processors, the answer to the second computing device; and initiating, by one or more processors, display of the answer via the avatar on the second computing device.
|
1. A method for communicating via an avatar, the method comprising: sending, by one or more processors, an email that includes an embedded avatar from a sender at a first computing device to a recipient at a second computing device; responsive to the recipient at the second computing device selecting the embedded avatar, providing, by one or more processors, an interface through which said recipient interacts to submit a query via the avatar; receiving, by one or more processors, the query via a communication protocol; parsing and analyzing, by one or more processors, the received query; retrieving, by one or more processors, an answer corresponding to the parsed and analyzed query from a mailbox of the sender, wherein the mailbox of the sender includes emails associated with the parsed and analyzed query; sending, by one or more processors, the answer to the second computing device; and initiating, by one or more processors, display of the answer via the avatar on the second computing device. 2. The method of claim 1 , wherein the embedded avatar represents the sender.
| 0.910774 |
1. A computer-readable storage medium including instructions readable by a computer which, when implemented, provide a text classifier in a natural language interface that receives a natural language user input, the text classifier comprising: a feature extractor extracting a binary feature vector of features from a textual input indicative of the natural language user input; a statistical classifier coupled to the feature extractor, receiving the feature vector of features, and outputting a selected class identifier, the selected class identifier identifying a task to be completed, associated with the textual input, based on the features in the feature vector, the statistical classifier comprising: a plurality of statistical classification components each statistical classification component receiving the feature vector and outputting a respective class identifier based on the feature vector, each respective class identifier representing one of a plurality of tasks to be completed that can be identified using each statistical classification component; and a class selector coupled to the plurality of statistical classification components and selecting one of the respective class identifiers as the selected class identifier identifying the task to be completed wherein the class selector comprises one of a group comprising: a voting component that selects a class identifier that is output by more statistical classification components than other class identifiers; and an additional statistical classifier that receives as an input the class identifiers output from the plurality of statistical classification components and that selects one of the class identifiers received in the input; and a parser that receives the selected class identifier and the textual input and generates a semantic representation of the textual input based on the selected class identifier.
|
1. A computer-readable storage medium including instructions readable by a computer which, when implemented, provide a text classifier in a natural language interface that receives a natural language user input, the text classifier comprising: a feature extractor extracting a binary feature vector of features from a textual input indicative of the natural language user input; a statistical classifier coupled to the feature extractor, receiving the feature vector of features, and outputting a selected class identifier, the selected class identifier identifying a task to be completed, associated with the textual input, based on the features in the feature vector, the statistical classifier comprising: a plurality of statistical classification components each statistical classification component receiving the feature vector and outputting a respective class identifier based on the feature vector, each respective class identifier representing one of a plurality of tasks to be completed that can be identified using each statistical classification component; and a class selector coupled to the plurality of statistical classification components and selecting one of the respective class identifiers as the selected class identifier identifying the task to be completed wherein the class selector comprises one of a group comprising: a voting component that selects a class identifier that is output by more statistical classification components than other class identifiers; and an additional statistical classifier that receives as an input the class identifiers output from the plurality of statistical classification components and that selects one of the class identifiers received in the input; and a parser that receives the selected class identifier and the textual input and generates a semantic representation of the textual input based on the selected class identifier. 4. The text classifier of claim 1 and further comprising: a pre-processor identifying words in the textual input having semantic content.
| 0.520342 |
25. The non-transitory computer readable storage medium of claim 24 , wherein the first dynamic disambiguation threshold is a first speed threshold.
|
25. The non-transitory computer readable storage medium of claim 24 , wherein the first dynamic disambiguation threshold is a first speed threshold. 26. The non-transitory computer readable storage medium of claim 25 , wherein the first dynamic disambiguation threshold is satisfied when a speed of the subsequent portion of the gesture is greater than the first speed threshold.
| 0.929959 |
1. A multi language exchange system comprising: a communication device which displays a screen on which a message in a first language is to be depicted in a second language, said screen displaying a programmable grid or list, wherein each element of the grid or list has at least one sentence, phrase, word, or character of the message displayed in the first language, each grid or list element has an associated indicator indicating to a user the order in which the at least one sentence, phrase, word, or character of the respective grid or list element should be selected relative to the other grid or list elements in order to depict the message in correct grammatical form in said second language; and wherein said communication device depicts on the screen the at least one sentence, phrase, word, or character of the message in the second language and in the order in which the at least one sentence, phrase, word, or character of the message is selected in the first language by the user.
|
1. A multi language exchange system comprising: a communication device which displays a screen on which a message in a first language is to be depicted in a second language, said screen displaying a programmable grid or list, wherein each element of the grid or list has at least one sentence, phrase, word, or character of the message displayed in the first language, each grid or list element has an associated indicator indicating to a user the order in which the at least one sentence, phrase, word, or character of the respective grid or list element should be selected relative to the other grid or list elements in order to depict the message in correct grammatical form in said second language; and wherein said communication device depicts on the screen the at least one sentence, phrase, word, or character of the message in the second language and in the order in which the at least one sentence, phrase, word, or character of the message is selected in the first language by the user. 13. The multi language exchange system of claim 1 , wherein said communication device includes a messaging system to allow said at least one sentence, phrase, word, or character to be forwarded to another user having a similar communication device.
| 0.536036 |
1. In a medical implant assembly having at least two bone anchors cooperating with a longitudinal connecting member, the improvement wherein the longitudinal connecting member comprises: a) first and second segments, the first segment having a first bore formed in a first end surface thereof, the second segment having a second bore formed in a second end surface thereof, the first segment attached to the first bone anchor and the second segment attached to the second bone anchor; b) an inner elongate core partially disposed and slidingly received within each of the bores of the first and second segments; c) at least one spacer member disposed about the core and located between the first and second segments; and d) an elastic structure surrounding the at least one spacer member, the elastic structure gripping at least the first segment, the spacer member being slidable along the inner core with the elastic structure being in a stretched orientation when one of the first and second segments moves away from the other of the first and second segments.
|
1. In a medical implant assembly having at least two bone anchors cooperating with a longitudinal connecting member, the improvement wherein the longitudinal connecting member comprises: a) first and second segments, the first segment having a first bore formed in a first end surface thereof, the second segment having a second bore formed in a second end surface thereof, the first segment attached to the first bone anchor and the second segment attached to the second bone anchor; b) an inner elongate core partially disposed and slidingly received within each of the bores of the first and second segments; c) at least one spacer member disposed about the core and located between the first and second segments; and d) an elastic structure surrounding the at least one spacer member, the elastic structure gripping at least the first segment, the spacer member being slidable along the inner core with the elastic structure being in a stretched orientation when one of the first and second segments moves away from the other of the first and second segments. 5. The improvement of claim 1 wherein the spacer member has opposed parallel end surfaces.
| 0.631883 |
21. The system according to claim 18, wherein said contrasting speech sound is tested in said second speech sound of said words.
|
21. The system according to claim 18, wherein said contrasting speech sound is tested in said second speech sound of said words. 22. The system according to claim 21, said word pairs selected from the group consisting of: bead/bid, seep/soup, peace/pace, neat/net, beak/back, pit/put, mist/must, give/gave, sit/set, lift/laughed, rake/wreck, cape/cope, lake/lack, well/wall, beg/bug, guess/gas, cab/cob, cat/cut, shot/shut, caught/cot, bought/but, note/naught, soak/sock, book/buck, cook/coke, could/cawed, push/posh, pull/pool, ruse/rose, suit/sought, and duke/dock.
| 0.835575 |
15. One or more tangible computer-readable media comprising instructions that are executable by a computer to: identify which human writing system is associated with a string of text characters in a text based on values representing the text characters; when the values are associated with more than one human language, identifying a particular said human language associated with the string by comparing the string with a targeted dictionary including a plurality of strings associated with the more than one said human language; and designate one or more linguistic services that are available for use by an application based on the particular said human language and based on one or more service properties of the one or more linguistic services that correspond with the text characters in the string.
|
15. One or more tangible computer-readable media comprising instructions that are executable by a computer to: identify which human writing system is associated with a string of text characters in a text based on values representing the text characters; when the values are associated with more than one human language, identifying a particular said human language associated with the string by comparing the string with a targeted dictionary including a plurality of strings associated with the more than one said human language; and designate one or more linguistic services that are available for use by an application based on the particular said human language and based on one or more service properties of the one or more linguistic services that correspond with the text characters in the string. 17. One or more tangible computer-readable media as described in claim 15 , wherein the instructions are further executable to select which of the plurality of strings in the targeted dictionary are to be compared based on the values representing the text characters in the string.
| 0.676471 |
6. A system of a plurality of display devices communicatively coupled to a distributed local area communication network, the system comprising: a display device of the plurality of display devices adapted to display text and images; a memory adapted to store instructions; and one or more devices adapted to execute the instructions, which, when executed by the one or more devices, cause the one or more devices to perform operations comprising: obtaining images of a plurality of individuals at an event location, wherein the local area communication network is at the event location; identifying a plurality of individual data objects in a data store, each of the plurality of individual data objects defining features of a respective set of the plurality of individuals using facial recognition of images of the plurality of individuals; identifying a data object of the plurality of individual data objects, the data object identifying a first set of individuals having a first feature; selecting a plurality of content tags based on the first feature; tagging a plurality of content items with one or more of the plurality of content tags; identifying a first content item of the plurality of content items, the first content item being associated with a first content tag, the first content tag being associated with the first set of individuals; selecting a second content item based on the first content tag; generating a display layout for the first and second content items; selecting a display device among the plurality of the display devices communicatively coupled to the distributed local area communication network, wherein a location of the display device is associated with the respective set of the plurality of individuals; transmitting, to the selected display device, the first and second content item, the display layout, and a display time; configuring, over the distributed communication network, a first FPGA chip in the selected display device to display the first and second content items having a look and feel of the generated display layout; configuring a second FPGA chip in the selected display device to display the second content item for the display time, wherein the selecting of the plurality of content tags comprises: for the first feature, determining a respective probability distribution indicating, for each of a respective content tag among the plurality of content tags, a probability that a set of individuals associated with a content tag has the first feature, thereby generating a plurality of probability distributions; using a probabilistic classifier to generate a merged probability distribution based on the plurality of probability distributions; and using a plurality of prediction sets to select the plurality of content tags, the plurality of content tags being associated with the first set of individuals, and wherein the method further comprises, using a Monte Carlo method to generate the plurality of prediction sets based on the merged probability distribution, the prediction sets including a plurality of prediction values for the first set of individuals, each respective prediction value being associated with one of the plurality of content tags.
|
6. A system of a plurality of display devices communicatively coupled to a distributed local area communication network, the system comprising: a display device of the plurality of display devices adapted to display text and images; a memory adapted to store instructions; and one or more devices adapted to execute the instructions, which, when executed by the one or more devices, cause the one or more devices to perform operations comprising: obtaining images of a plurality of individuals at an event location, wherein the local area communication network is at the event location; identifying a plurality of individual data objects in a data store, each of the plurality of individual data objects defining features of a respective set of the plurality of individuals using facial recognition of images of the plurality of individuals; identifying a data object of the plurality of individual data objects, the data object identifying a first set of individuals having a first feature; selecting a plurality of content tags based on the first feature; tagging a plurality of content items with one or more of the plurality of content tags; identifying a first content item of the plurality of content items, the first content item being associated with a first content tag, the first content tag being associated with the first set of individuals; selecting a second content item based on the first content tag; generating a display layout for the first and second content items; selecting a display device among the plurality of the display devices communicatively coupled to the distributed local area communication network, wherein a location of the display device is associated with the respective set of the plurality of individuals; transmitting, to the selected display device, the first and second content item, the display layout, and a display time; configuring, over the distributed communication network, a first FPGA chip in the selected display device to display the first and second content items having a look and feel of the generated display layout; configuring a second FPGA chip in the selected display device to display the second content item for the display time, wherein the selecting of the plurality of content tags comprises: for the first feature, determining a respective probability distribution indicating, for each of a respective content tag among the plurality of content tags, a probability that a set of individuals associated with a content tag has the first feature, thereby generating a plurality of probability distributions; using a probabilistic classifier to generate a merged probability distribution based on the plurality of probability distributions; and using a plurality of prediction sets to select the plurality of content tags, the plurality of content tags being associated with the first set of individuals, and wherein the method further comprises, using a Monte Carlo method to generate the plurality of prediction sets based on the merged probability distribution, the prediction sets including a plurality of prediction values for the first set of individuals, each respective prediction value being associated with one of the plurality of content tags. 7. The system of claim 6 , wherein the first feature comprises a hashtag.
| 0.81439 |
8. A computer-implemented method, comprising: accessing text by a processing system, the text comprising a plurality of words; tagging, by the processing system, each of the plurality of words with one of a plurality of parts of speech (POS) tags; creating, by the processing system, a plurality of tokens, each token comprising one of the plurality of words and its associated POS tag; clustering, by the processing system, one or more of the created tokens into a chunk of tokens, the one or more tokens clustered into the chunk of tokens based on the POS tags of the one or more tokens; and forming, by the processing system, a phrase based on the chunk of tokens, the phrase comprising the words of the one or more tokens clustered into the chunk of tokens.
|
8. A computer-implemented method, comprising: accessing text by a processing system, the text comprising a plurality of words; tagging, by the processing system, each of the plurality of words with one of a plurality of parts of speech (POS) tags; creating, by the processing system, a plurality of tokens, each token comprising one of the plurality of words and its associated POS tag; clustering, by the processing system, one or more of the created tokens into a chunk of tokens, the one or more tokens clustered into the chunk of tokens based on the POS tags of the one or more tokens; and forming, by the processing system, a phrase based on the chunk of tokens, the phrase comprising the words of the one or more tokens clustered into the chunk of tokens. 9. The computer-implemented method of claim 8 , wherein the plurality of POS tags comprises: a POS tag for a proper noun that is a geographic name; a POS tag for a proper noun that is a name of a person; and a POS tag for a proper noun that is can be both a geographic name and a name of a person.
| 0.615458 |
12. The improvements of claim 8 wherein the voice source means comprises: storage means for storing a plurality of different time domain glottal pulses derived from a human source; and means for utilizing the glottal pulses in said storage means to generate a synthetic voice signal.
|
12. The improvements of claim 8 wherein the voice source means comprises: storage means for storing a plurality of different time domain glottal pulses derived from a human source; and means for utilizing the glottal pulses in said storage means to generate a synthetic voice signal. 13. The improvement of claim 12 wherein said storage means comprises: a plurality of memory look-up tables, each table containing a plurality of sample points representing a small group of glottal pulses, in code form.
| 0.791713 |
1. A method, comprising: receiving a database query comprising a logical database table identifier, a data element, and at least one data source assurance indicator at a distributed database device within a distributed network of databases, where the at least one data source assurance indicator comprises a request to encrypt the data element received in the received query for authentication of distributed database devices that process the database query; encrypting the data element received in the received query based upon the at least one data source assurance indicator; forming a data portion of a local query response to the database query comprising data retrieved from a local physical database table mapped by a local logical database table that matches the received logical database table identifier; adding a distributed database device node identifier and the encrypted data element as an authentication portion of the local query response to authenticate the data portion of the local query response; and responding to the database query with at least the authenticated local query response.
|
1. A method, comprising: receiving a database query comprising a logical database table identifier, a data element, and at least one data source assurance indicator at a distributed database device within a distributed network of databases, where the at least one data source assurance indicator comprises a request to encrypt the data element received in the received query for authentication of distributed database devices that process the database query; encrypting the data element received in the received query based upon the at least one data source assurance indicator; forming a data portion of a local query response to the database query comprising data retrieved from a local physical database table mapped by a local logical database table that matches the received logical database table identifier; adding a distributed database device node identifier and the encrypted data element as an authentication portion of the local query response to authenticate the data portion of the local query response; and responding to the database query with at least the authenticated local query response. 7. The method of claim 1 , further comprising: forwarding the database query comprising the logical database table identifier, the data element, and the at least one data source assurance indicator to at least one additional distributed database device within the distributed network of databases; receiving at least one distributed query response comprising a distributed database device node identifier and an additional encrypted data element associated with data returned from each distributed database device that processed the database query; and determining authenticity of each distributed database device that processed the database query based upon the additional encrypted data element and the distributed database device node identifier associated with each distributed database device that processed the database query.
| 0.550437 |
11. In a computing network at which data is made available from a variety of different sources and in a variety of different data types and formats, a physical storage media having stored thereon computer-executable instructions for implementing a method for use at a computer system having a processor and memory, and which is running a database application configured to communicate with a database using at least one of a variety of different database schemas, the computer-implemented method facilitating the ability of the database application to more easily use the data from the variety of different sources, and comprising: receiving at the database application input data from a database; instantiating at the database application a metadata inferring module that infers object relational mapping (ORM) metadata for one or more database objects of the received input data, the ORM metadata inferred from at least one of the database schemas that the database application is configured to use, the inferred ORM metadata including an indication of database object properties and database schema settings associated with one or more database objects of the received input data, thereby allowing the database application to implement ORM capabilities to retrieve and access information from the database; instantiating at the database application an object relational mapping (ORM) query module configured to use ORM metadata to generate information that is used to generate an object graph, the ORM query module processing the ORM metadata for the one or more database objects of the received input data; instantiating an object graph generator and, using the information derived by the ORM query module after processing the ORM metadata, the object graph generator then mapping the one or more database objects of the input data into a graph of objects which enables the mapped one or more database objects to be sent to another application or to be subsequently displayed in an ORM object view.
|
11. In a computing network at which data is made available from a variety of different sources and in a variety of different data types and formats, a physical storage media having stored thereon computer-executable instructions for implementing a method for use at a computer system having a processor and memory, and which is running a database application configured to communicate with a database using at least one of a variety of different database schemas, the computer-implemented method facilitating the ability of the database application to more easily use the data from the variety of different sources, and comprising: receiving at the database application input data from a database; instantiating at the database application a metadata inferring module that infers object relational mapping (ORM) metadata for one or more database objects of the received input data, the ORM metadata inferred from at least one of the database schemas that the database application is configured to use, the inferred ORM metadata including an indication of database object properties and database schema settings associated with one or more database objects of the received input data, thereby allowing the database application to implement ORM capabilities to retrieve and access information from the database; instantiating at the database application an object relational mapping (ORM) query module configured to use ORM metadata to generate information that is used to generate an object graph, the ORM query module processing the ORM metadata for the one or more database objects of the received input data; instantiating an object graph generator and, using the information derived by the ORM query module after processing the ORM metadata, the object graph generator then mapping the one or more database objects of the input data into a graph of objects which enables the mapped one or more database objects to be sent to another application or to be subsequently displayed in an ORM object view. 15. The physical storage media of claim 11 , further comprising an act of tracking one or more input data dependencies in the ORM query module.
| 0.537028 |
9. Non-transitory computer storage that stores executable instructions that direct a computing system to perform a process that comprises: receiving a code that identifies a printed publication, said code obtained from a photograph of a representation of the code on a hardcopy of the printed publication, wherein the code is an ISBN code obtained from an ISBN bar code on the hardcopy; receiving a user-selected content portion of the printed publication, wherein receiving the user-selected content portion comprises receiving a photograph of a user-selected portion of the hardcopy and applying OCR to the photograph to generate textual data; retrieving information regarding the printed publication using said code; generating a bibliographic citation for the content portion using the retrieved information regarding the printed publication; and storing the content portion in association with the bibliographic citation; wherein the executable instructions include instructions of a mobile application that provides functionality for automatically generating citations based on photographic images taken with a mobile device on which the mobile application runs.
|
9. Non-transitory computer storage that stores executable instructions that direct a computing system to perform a process that comprises: receiving a code that identifies a printed publication, said code obtained from a photograph of a representation of the code on a hardcopy of the printed publication, wherein the code is an ISBN code obtained from an ISBN bar code on the hardcopy; receiving a user-selected content portion of the printed publication, wherein receiving the user-selected content portion comprises receiving a photograph of a user-selected portion of the hardcopy and applying OCR to the photograph to generate textual data; retrieving information regarding the printed publication using said code; generating a bibliographic citation for the content portion using the retrieved information regarding the printed publication; and storing the content portion in association with the bibliographic citation; wherein the executable instructions include instructions of a mobile application that provides functionality for automatically generating citations based on photographic images taken with a mobile device on which the mobile application runs. 10. The non-transitory computer storage of claim 9 , wherein the mobile application includes a user interface and associated functionality for inserting the content portion and bibliographic citation into a user-selected document.
| 0.741611 |
2. The system of claim 1 , further comprising: a third module configured to control the processor to detect speaker changes in multi-speaker speech data to obtain an initial segmentation of the multi-speaker speech data, wherein estimated segments are generated by the detected speaker changes; and a fourth module configured to control the processor to cluster the estimated segments into groups of estimated segments, wherein each group of estimated segments is associated with a single speaker.
|
2. The system of claim 1 , further comprising: a third module configured to control the processor to detect speaker changes in multi-speaker speech data to obtain an initial segmentation of the multi-speaker speech data, wherein estimated segments are generated by the detected speaker changes; and a fourth module configured to control the processor to cluster the estimated segments into groups of estimated segments, wherein each group of estimated segments is associated with a single speaker. 6. A system of claim 2 , wherein the fourth module further clusters the estimated segments into groups of estimated segments until all of the estimated segments are merged into a final group, wherein the final group includes one or more clusters that correspond to the groups of estimated segments and wherein each cluster corresponds to a single speaker.
| 0.70108 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.