-
公开(公告)号:US11645335B2
公开(公告)日:2023-05-09
申请号:US16776910
申请日:2020-01-30
Applicant: International Business Machines Corporation
Inventor: Ching-Wei Cheng , Tzuching Kuo , June-Ray Lin , Yi Chun Tsai
IPC: G06F16/901 , G06Q30/016 , G06N5/02 , G06F16/22
CPC classification number: G06F16/9027 , G06F16/2246 , G06N5/02 , G06Q30/016
Abstract: Generating a solution keyword tag cloud is provided. The solution keyword tag cloud is generated for a product based on matching keywords identified in a question asking how to resolve an issue experienced by a user with the product with keyword tags included in a set of condition-solution trees corresponding to the product. In response to receiving an indication that a tried solution in the solution keyword tag cloud did not resolve the issue experienced by the user, the solution keyword tag cloud is graphically updated by moving the tried solution that failed to resolve the issue from a solution section of the solution keyword tag cloud to a condition section of the solution keyword tag cloud. The solution keyword tag cloud is presented in a graphical user interface display on a client device corresponding to the user.
-
公开(公告)号:US11645032B1
公开(公告)日:2023-05-09
申请号:US17932020
申请日:2022-09-14
Applicant: International Business Machines Corporation
Inventor: June-Ray Lin , Li Na Wang , Ju Ling Liu , Ye Chuan Wang , Nan Chen , Yu Zhu
IPC: G06F3/14 , G06F3/04815
CPC classification number: G06F3/1446 , G06F3/04815
Abstract: Embodiments of the invention are directed to a computer-implemented method of operating a multi-screen virtual reality environment. The computer-implemented method includes performing a wall arrangement and transmission (WA&T) protocol that includes receiving at a second module a function transmitted by a first module over a network to the second module. The second module and the function received over the network are used to generate priority data that identifies a priority of each of a plurality of individual video streams generated by a plurality of video sources. Based at least in part on the priority, the second module is used to generate reduced-size video streams that include selected ones of the plurality of individual video streams. The second module transmits the priority data and a multi-screen video stream that includes the reduced-size video streams and non-reduced-size video streams of the plurality of individual video streams.
-
公开(公告)号:US20230100947A1
公开(公告)日:2023-03-30
申请号:US17489725
申请日:2021-09-29
Applicant: International Business Machines Corporation
Inventor: Yu-Siang Chen , Ci-Hao Wu , Ying-Chen Yu , Pao-Chuan Liao , June-Ray Lin
Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
-
公开(公告)号:US11558467B2
公开(公告)日:2023-01-17
申请号:US15834134
申请日:2017-12-07
Applicant: International Business Machines Corporation
Inventor: Hsiao-Yung Chen , Tzu-Ching Kuo , June-Ray Lin , Yi-Chun Tsai
IPC: H04L67/141 , G10L15/22 , G10L15/18 , G10L15/30
Abstract: Providing inter-virtual agent communication between communication devices owned by different users is provided. A first communication channel and a second communication channel are established with a remote data processing system. A virtual agent-to-virtual agent handshake is performed during establishment of the first communication channel. Virtual agent commands are exchanged with a remote virtual agent located on the remote data processing system via the first communication channel. An action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system is performed while a human conversation is conducted via the second communication channel.
-
公开(公告)号:US20220335310A1
公开(公告)日:2022-10-20
申请号:US17230072
申请日:2021-04-14
Applicant: International Business Machines Corporation
Inventor: June-Ray Lin , Jing Xu , Si Er Han , Xue Ying Zhang
Abstract: An approach is provided in which a method, system, and program product identify a plurality of models to test a set of data. Each one of the plurality of models produces one of a plurality of predictions corresponding to one of a plurality of targets. The method, system, and program product detect one or more conflicts between the plurality of predictions in response to testing the set of data against each of plurality of models. The method, system, and program product report an un-inferable result of the testing in response to detecting the one or more conflicts.
-
公开(公告)号:US11328228B2
公开(公告)日:2022-05-10
申请号:US16390155
申请日:2019-04-22
Applicant: International Business Machines Corporation
Inventor: Ying-Chen Yu , June-Ray Lin , Yi-Chun Tsai , Tzu-Ching Kuo
Abstract: In an approach location allocation planning, one or more computing units determine at least one location matching model for a first current participating entity of a plurality of current participating entities of a current event, wherein an output of the location matching model indicates a matching degree between the first current participating entity and a current event location. The one or more computing units create at least one initial location allocation plan for the plurality of current participating entities of the event based, at least in part, on the at least one location matching model. The one or more computing units receive feedback from at least one of the plurality of current participating entities. Responsive to the feedback indicating acceptance of the initial location allocation plan, the one or more computing units determine a final location allocation plan based on the initial location allocation plan.
-
公开(公告)号:US11074366B2
公开(公告)日:2021-07-27
申请号:US16599677
申请日:2019-10-11
Applicant: International Business Machines Corporation
Inventor: Ching-Wei Cheng , Tzu-Ching Kuo , June-Ray Lin , Yi-Chun Tsai
Abstract: A masking system and method for automatically masking sensitive user information on a webpage is provided. The method includes the steps of identifying a location of the first user data of the first type of sensitive user information on the webpage, updating an initial path to the first user data to account for changes to the initial path detected in response to repeated visits to the webpage, wherein the updated initial path to the first user data is stored as a stable path, locating a second user data associated with a second type of sensitive user information on the webpage, by accessing a central database containing path information to a location of the second user data on the webpage, and masking the first user data and the second user data on the webpage, using the stable path and the path information obtained from the central database.
-
公开(公告)号:US11017083B2
公开(公告)日:2021-05-25
申请号:US16162597
申请日:2018-10-17
Applicant: International Business Machines Corporation
Inventor: Ci-Hao Wu , Ying-Chen Yu , June-Ray Lin , Hsieh-Lung Yang , Chen-Yu Huang , Chia-Heng Lin , Kuei-Ching Lee
IPC: G06F21/56 , G06N3/04 , G06N3/08 , G06F16/901 , G06F40/289
Abstract: Provided are systems, methods, and media for multiphase graph partitioning for malware entity detection. An example method includes receiving an input string associated with the malware entity. A determination is made as to whether the input string includes a symbolic word, a non-symbolic word, a symbolic phrase, or a non-symbolic phrase. A branching graph is formed based on a combination of the input string and a plurality of stored strings that are each associated with the malware entity to determine whether the input string is a valid detection name of the malware entity, in which the branching graph is formed by at least performing a first graph partitioning stage and a second graph partitioning stage. The input string is then labeled based on the formed branching graph and then outputted to a malware detection engine.
-
公开(公告)号:US10922550B2
公开(公告)日:2021-02-16
申请号:US16408616
申请日:2019-05-10
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ying-Chen Yu , Chih-Wen Su , Jeff Hsueh-Chang Kuo , June-Ray Lin
Abstract: Methods, systems and computer program products for flagging abnormal videos are provided. Aspects include training an image recognition model based on a plurality of images that depict one or more of a plurality of subjects. Aspects also include generating a normal subject relationship graph representing normal relationships between the plurality of subjects by applying the image recognition model to a plurality of training videos and a test subject relationship graph representing test relationships between subjects depicted in a test video by applying the image recognition model to the test video. Each normal relationship is associated with a strength value. Responsive to determining that a difference between a strength value associated with a first normal relationship and a strength value associated with a corresponding first test relationship exceeds a predetermined threshold, aspects include flagging the test video as being abnormal.
-
公开(公告)号:US10783128B2
公开(公告)日:2020-09-22
申请号:US15648618
申请日:2017-07-13
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Guo Qiang Li , June-Ray Lin , Chih-Hsiung Liu , Hao-Ting Shih
Abstract: A computer-implemented method and a computer system are proposed. According to the method, content and a rule are obtained. The rule specifies a condition associated with the content and an action to be performed if the condition is satisfied. A profile, instructions and chain code are determined at least based on the rule. The profile is used for recording a result of the action. The instructions are used for monitoring whether the condition is satisfied and for updating the profile. The chain code is used for operating a blockchain. In response to the condition being satisfied, the profile is updated and the updated profile is stored in association with the content and the rule into the blockchain by the chain code.
-
-
-
-
-
-
-
-
-