摘要:
A role tree having nodes corresponding to semantic roles in a hierarchy is defined. A posting list is generated for each association of a term and a semantic role in the hierarchy. The posting lists are stored contiguously on a physical storage medium such that a subtree of the hierarchy of semantic roles can be loaded from the storage medium as a single contiguous block. The posting lists for a subtree of the hierarchy are retrieved by obtaining data identifying the beginning location on the physical storage medium of the posting lists for the term at the top of a desired subtree of the hierarchy and data identifying the length of the posting lists of the desired subtree of the hierarchy. A single contiguous block that includes the posting lists for the desired subtree of the hierarchy is then retrieved from the beginning location through the specified length.
摘要:
A role tree having nodes corresponding to semantic roles in a hierarchy is defined. A posting list is generated for each association of a term and a semantic role in the hierarchy. The posting lists are stored contiguously on a physical storage medium such that a subtree of the hierarchy of semantic roles can be loaded from the storage medium as a single contiguous block. The posting lists for a subtree of the hierarchy are retrieved by obtaining data identifying the beginning location on the physical storage medium of the posting lists for the term at the top of a desired subtree of the hierarchy and data identifying the length of the posting lists of the desired subtree of the hierarchy. A single contiguous block that includes the posting lists for the desired subtree of the hierarchy is then retrieved from the beginning location through the specified length.
摘要:
Computer-readable media, computerized methods, and computer systems for conducting semantic processes to present search results that include highlighted regions which are relevant to a conceptual meaning of a query are provided. Initially, content of document(s) is accessed and semantic representations are derived by distilling linguistic representations from the content. These semantic representations may be stored at a semantic index. Also, a proposition is derived from the query by parsing search terms of the query, and distilling the proposition from the search terms. Typically, the proposition is a logical representation of the conceptual meaning of the query. The proposition is compared against the semantic representations at the semantic index to identify a matching set. Regions of the content within the document, from which the matching set of semantic representations are derived, are targeted. Accordingly, highlighting may be applied to the targeted regions when presenting or displaying the search results.
摘要:
Computer-readable media, computerized methods, and computer systems for conducting semantic processes to present search results that include highlighted regions which are relevant to a conceptual meaning of a query are provided. Initially, content of document(s) is accessed and semantic representations are derived by distilling linguistic representations from the content. These semantic representations may be stored at a semantic index. Also, a proposition is derived from the query by parsing search terms of the query, and distilling the proposition from the search terms. Typically, the proposition is a logical representation of the conceptual meaning of the query. The proposition is compared against the semantic representations at the semantic index to identify a matching set. Regions of the content within the document, from which the matching set of semantic representations are derived, are targeted. Accordingly, highlighting may be applied to the targeted regions when presenting or displaying the search results.
摘要:
Systems and methods for providing concurrent access to a resource via multiple user identities via a single client entity. The client entity is allowed access to the resource utilizing a first user identity. An attempt to access the resource with the client entity utilizing a second user identity is detected. The second user identity is a child identity of the first user identity. The attempt to access the resource is restructured as an attempt to access the resource with a third user identity that is not a child identity of the first user identity. The restructured request is forwarded to the resource using the third user entity to access the resource. A response from the resource is restructured as a response to the client entity accessing the resource utilizing the second user identity. The restructured response is sent to the client entity accessing the resource utilizing the second user identity.
摘要:
A method and apparatus are provided for controlling services provided at a first electronic device at a second electronic device. A plurality of electronic devices connected to a network provide services in the form of providing data to the network, or allowing the data to be manipulated. Each service is represented as a manipulable data object created at the device providing the service. Each object contains sufficient information to allow the service the object represents to be controlled. The objects are transmitted over the network and are stored in an object list maintained by a master device. Any compatible device may then retrieve an object from the object list and use the information contained in it to fully control the service.
摘要:
A gaming system and method are disclosed that include anonymous and identified player tracking, wherein gaming data is collected over one, two, or more gaming sessions, the data is analyzed to determine whether a selected criterion or selected criteria have been met, and if so, then initiating a response, such as triggering a flag or transmitting a notification to an operator.
摘要:
A gaming system and method are disclosed that include anonymous and identified player tracking, wherein gaming data is collected over one, two, or more gaming sessions, the data is analyzed to determine whether a selected criterion or selected criteria have been met, and if so, then initiating a response, such as triggering a flag or transmitting a notification to an operator.
摘要:
A method for detecting potential money-laundering activities or other illegal activities in the use of a gaming accounting system includes collecting data regarding a player's activity in a gaming system. The gaming system activity data is collected in terms of a gaming activity network, that is, a series of linked activities or events, and/or objects associated with activities or events. In response to a predefined event such as a cash out or credit redemption transaction request initiated by the player, the method includes evaluating the collected data to identify potentially illegal or prohibited activity. In the event illegal activity is indicated, the method includes taking some corrective action such as producing an operator alert to the potential illegal activity.
摘要:
Systems and methods for providing concurrent access to a resource via multiple user identities via a single client entity. The client entity is allowed access to the resource utilizing a first user identity. An attempt to access the resource with the client entity utilizing a second user identity is detected. The second user identity is a child identity of the first user identity. The attempt to access the resource is restructured as an attempt to access the resource with a third user identity that is not a child identity of the first user identity. The restructured request is forwarded to the resource using the third user entity to access the resource. A response from the resource is restructured as a response to the client entity accessing the resource utilizing the second user identity. The restructured response is sent to the client entity accessing the resource utilizing the second user identity.