摘要:
An approach for allocating computing resources based on a confidence level associated with responses to queries is provided. In a typical embodiment, a query is received from a querying user, and a search for a response to the query is conducted. A confidence level associated with the response is then determined. If the confidence level of the response does not meet a predetermined threshold, additional computing resources are allocated, and the search and corresponding response are updated (e.g., iteratively). An updated confidence level based on the updated response is then determined. Once the predetermined threshold has been met by the confidence level of the response, the response can be returned to the querying user.
摘要:
An approach that provides a seamless conversation service between interacting environments is described. In one embodiment, there is a seamless conversation service tool that includes a conversation commencement component configured to facilitate commencement of a conversation between two or more parties occurring over a communication path in one of two or more interacting environments. A user context monitoring component is configured to monitor a user context associated with the conversation. A user context change identification component is configured to identify a change in the user context of the conversation. A conversation transfer component is configured to transfer the conversation between the two or more interacting environments in response to the identified change in the user context, while maintaining a transparency of functionality of the communication path.
摘要:
A method for providing route plans for a plug-in hybrid electric vehicle (PHEV) includes: receiving a destination from a user of the PHEV; determining a route from a current location of the PHEV to the destination; determining locations of one or more external power sources that can provide power to recharge batteries of the PHEV and that are located along the route; forming, with a computing device, a travel plan that includes at least one of: planned recharging stops selected from the locations, modes of operation for the PHEV along the route, and an order in which power provided by the external sources is used by the PHEV.
摘要:
An approach for cloning and merging avatars that are online in a virtual universe is described. In one embodiment, there is an avatar identification component which is configured to create an identification number associated with a second avatar, a GUI partitioning component configured to partition the graphic user interface of a virtual universe, an avatar rendering component configured to render a second avatar, a communication channel component configured to manage the second avatar's communication channel, and an inventory management component configured to manage the second avatar's inventory.
摘要:
A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining.
摘要:
Virtual universe customer service representatives are cloned and assigned as a function of observing customer behavior, retrieving historical data and creating a customer profile. Preferential subavatar assignment parameters are determined for a customer as a function of the customer profile, choosing a subavatar from a plurality of subavatars as a function of a correlation of a subavatar performance characteristic with the preferential subavatar assignment parameter and a store objective, and the clone is populated with the chosen subavatar. Choosing a subavatar may comprise preferentially rating subavatars and determining an appropriateness threshold as a function of the subavatar assignment parameter, the performance characteristics and the store objective. Some embodiments reset a threshold in response to time-in-queue or to repetitively observing customer behavior, retrieving customer data, determining a subavatar assignment parameter and choosing a highest-rated available subavatar meeting a revised threshold. Subavatars may comprise automated, customer service representative-controlled and jointly-controlled subavatars.
摘要:
The present invention provides asynchronous immersive communication in a virtual universe. In one embodiment, there is a method for transmitting an asynchronous immersive communication in a virtual universe. The method includes receiving an asynchronous immersive communication created by a resident of a virtual universe, transmitting the asynchronous immersive communication to a recipient and enabling the recipient to access the asynchronous immersive communication.
摘要:
A system and method of decreasing server loads and, more particularly, to decrease server load by automatically determining subgroups based on object interactions and computational expenditures. The system includes a plurality of servers; a subgroup optimization module configured to segment a plurality of objects into optimal subgroups; and a server transfer module configured to apportion one or more of the optimal subgroups between the plurality of servers based on a load of each of the plurality of servers. The method includes determining a relationship amongst a plurality of objects; segmenting the objects into optimized subgroups based on the relationships; and apportioning the optimized subgroups amongst a plurality of servers based on server load.
摘要:
An invention for detecting a phishing virtual entity in a virtual universe is disclosed. A virtual entity may be registered as authentic and be identified with multiple physical characteristics thereof. Another virtual entity will be monitored to detect whether it includes a physical characteristic that is sufficiently similar to that of a registered virtual entity to cause confusion. A phishing virtual entity is detected based on the monitoring and phishing prevention processes may be implemented on the phishing virtual entity.
摘要:
An approach that automatically transforms an inventory item of an avatar that is online in a virtual universe without requiring manual changes is described. In one embodiment, there is an avatar locator component configured to locate an avatar that is online in the virtual universe. An inventory item transforming component is configured to automatically transform an inventory item associated with the located avatar that is visual, functional, security or linguistic in nature.