摘要:
Methods and systems for optimizing the retrieval of data from multiple sources are described. A slot map including slots for the storage of data elements can be obtained. The data elements associated with the slots can be prioritized by weighting values with costs of retrieving the data elements from respective data sources. Each value can be associated with a different data element and can indicate a respective degree of importance of the associated data element. Further, the systems and methods can direct the retrieval of data elements from the respective data sources in an order in accordance with the priority of the data elements to optimize the quality of data obtainable within a critical time constraint. In addition, the retrieved data elements can be stored in corresponding slots on a storage medium.
摘要:
Methods and systems for optimizing the retrieval of data from multiple sources are described. A slot map including slots for the storage of data elements can be obtained. The data elements associated with the slots can be prioritized by weighting values with costs of retrieving the data elements from respective data sources. Each value can be associated with a different data element and can indicate a respective degree of importance of the associated data element. Further, the systems and methods can direct the retrieval of data elements from the respective data sources in an order in accordance with the priority of the data elements to optimize the quality of data obtainable within a critical time constraint. In addition, the retrieved data elements can be stored in corresponding slots on a storage medium.
摘要:
A method resolves ambiguous spotted entity names in a data corpus by determining an activation level value for each of a plurality of nodes corresponding to a single ambiguous entity name. The activation levels for each of the nodes may be modified by inputting outside domain knowledge corresponding to the nodes to increase the activation value of the nodes, spotting entity names corresponding to the nodes to increase the activation value of the nodes, searching the data corpus to spot newly posted entity names to increase the activation value of the nodes, and searching the data corpus to reduce or deactivate the activation value of the nodes by eliminating false positives. The ambiguous entity name is assigned to the node determined to have the highest activation level and is then outputted to a user.
摘要:
Methods for providing a privacy setting for a target user in a social network utilizing an electronic computing device are presented, the method including: causing the electronic computing device to retrieve a current privacy setting for a common profile item, where the common profile item corresponds with the target user and each of a number of users, and where the common profile item is one of a number of common profile items; causing the electronic computing device to calculate a common profile item sensitivity value for the common profile item based on the current privacy setting; causing the electronic computing device to calculate a common profile item visibility value for the common profile item based on the a current privacy setting and the sensitivity value for the common profile item; and causing the electronic computing device to calculate the privacy score of the target user.
摘要:
A computer program product and a system are provided. The product and system provide associations between individuals having health care needs and available social services. The providing is efficient and cost effective.
摘要:
Systems and methods for managing security and/or privacy settings are described. In one embodiment, the method may include communicably coupling a first client to a second client. The method may further include propagating a portion of a plurality of security and/or privacy settings for the first client from the first client to the second client. The method may also include, upon receiving at the second client the portion of the plurality of security and/or privacy settings for the first client, incorporating the received portion of the plurality of security and/or privacy settings for the first client into a plurality of security and/or privacy settings for the second client.
摘要:
Methods for managing privacy settings for a social network using an electronic computing device are presented including: causing the electronic computing device to receive a triggering event on the social network; and causing the electronic computing device to determine a number of privacy indices in response to the triggering event, where the number of privacy indices correspond with at least one target user, where the number of privacy indices are normalized from a summation of a number of privacy scores, where the number of privacy scores are each derived from a sum of attribute scores, and where the sum of attribute scores are each derived from a weighted sensitivity value of an attribute and a user relationship distance value of a user and the target user.
摘要:
A system for transforming domain specific unstructured data into structured data including an intake platform controlled by feed back from a control platform. The intake platform includes an intake acquisition module for acquiring data building baseline data related to a domain and problem of interest, an intake pre-processing module, an intake language module, an intake application descriptors module, and an intake adjudication module. The control platform includes a control data acquisition module, a control data consistency collator, a control auditor, a control event definition and policy repository, an error resolver, and an output that outputs results of the workflow into structured data enabled to be used in data analytics.