摘要:
A system and a method for identifying computer users having files with common attributes are provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A system and a method for identifying computer users having files with common attributes are provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A system and a method for identifying computer users having files with common attributes are provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
Interface mechanism for quickly accessing recently used artifacts in a computer desktop environment. The interface mechanism integrates across a multitude of tools available in a computer desktop environment to present a list of recently used computer artifacts that can be automatically sorted or filtered in useful ways. Examples of computer-based artifacts that the interface can present include objects that relate to people, events, URLs, email messages, attachments, shared objects or shared activities. Filtering and sorting operations enable the interface mechanism to provide a list of the computer artifacts in a manner that is useful to the user. Also, the interface mechanism permits to perform frequently desired operations beyond opening a file or application such as dragging and dropping items for copying and pasting into the user's current context.
摘要:
A method for assisting an administrator to identify files suspected of causing instability on a personal computer comprises periodically creating file content sharing logs concurrently with archiving files of a plurality of personal computers by de-duplicating, when a notification is received regarding instability of a personal computer, then analyzing archive file content sharing log of the personal computer made immediately after receiving the notification for unique system and program files, missing files and newly installed files to generate an instability report. A missing or corrupted file can be restored back on the unstable personal computer by performing a backup restore operation on the unstable personal computer.
摘要:
A method for assisting an administrator to identify files suspected of causing instability on a personal computer comprises periodically creating file content sharing logs concurrently with archiving files of a plurality of personal computers by de-duplicating, when a notification is received regarding instability of a personal computer, then analyzing archive file content sharing log of the personal computer made immediately after receiving the notification for unique system and program files, missing files and newly installed files to generate an instability report. A missing or corrupted file can be restored back on the unstable personal computer by performing a backup restore operation on the unstable personal computer.
摘要:
Embodiments herein provide a method that maintains computerized scripts. The scripts provide assistance to users with respect to using at least one computer software application that is operating on a computerized device. The method receives, from the user, at least one trigger. This process creates or “authors” the trigger. This “trigger” is an item that automatically initiates at least one of the scripts for the user. In addition, the method adds the trigger to the computer software application (not automatically, but instead based on user input). Thus, when initiated by the trigger, the script automatically outputs assistance (text, sounds, illustrations, educational videos, etc.) to the user through the computerized interface of the computerized device, so as to provide the needed assistance to the user.
摘要:
Various embodiments of the invention relate to estimating the location of social network users. In one embodiment, a plurality of social media messages generated by a given user is received. A plurality of location features is extracted from the social media messages. Each of the location features is processed with at least one classifier from an ensemble of classifiers. A location classification is generated by each of the classifiers for each of the social media messages. Each classification comprises a location and a weight associated with that location. One of the locations is selected from the location classifications as the location of the given user based on a combination of the weights of the location classifications.