摘要:
Documents returned by a search engine may be good keyword matches to the search query terms, but may not historically have been very effective in addressing user needs. Documents which have historically been effective in addressing user needs are said to have high efficacy. Disclosed are methods that try to assess the beginning and ending of user search sessions, assume that documents that are the last document looked at are those with the highest efficacy, and incorporate this notion of efficacy in returning-search results.
摘要:
Xml pages are obtained from knowledge bases that contain step by step instructions. The xml pages are presented as “active content,” by which we mean a series of prompted questions and answers. A user's interactions with the active content is recorded so that the results may be copied to the user's clipboard for automatic transfer to a problem management/ticketing system. Active content that contains embedded questions asked of the user may be used to infer answers to some of the questions from a search query, and, thus, alleviate the need for the user to answer them.
摘要:
Xml pages are obtained from knowledge bases that contain step by step instructions. The xml pages are presented as “active content,” by which we mean a series of prompted questions and answers. A user's interactions with the active content is recorded so that the results may be copied to the user's clipboard for automatic transfer to a problem management/ticketing system. Active content that contains embedded questions asked of the user may be used to infer answers to some of the questions from a search query, and, thus, alleviate the need for the user to answer them.
摘要:
Techniques for indexing multimedia data substantially concurrently or contemporaneously with its capture to convert a real world event into an accessible database in real time are provided. The present invention introduces a new paradigm of converting a real world event in real time into a rich multimedia database by processing data from multiple sensors observing the event. Real time analysis of the sensor data, coupled with domain knowledge, results in instant indexing of multimedia data at capture time itself. This yields the semantic information to answer complex queries about the content, and the ability to extract portions of data that correspond to complex actions performed in the real world.
摘要:
Techniques for retrieval of multimedia data through visual representations are provided. Such visual representations, preferably in the form of visual activity maps or spatio-temporal activity maps, serve as an efficient and intuitive graphical user interface for multimedia retrieval, particularly when the media streams are derived from multiple sensors observing a physical environment. An architecture for interactive media retrieval is also provided by combining such visual activity maps with domain specific event information. Visual activity maps are derived from the trajectories of motion of objects in the environment. The visual activity map based techniques significantly help users in quickly and effectively discovering interesting portions of the data, and randomly accessing and retrieving the corresponding portions of the media streams.
摘要:
A method, system and computer program product for increasing the sales of a retailer. A unit, referred to herein as the “retailer promotions device,” generates a group offer for a set of users/customers to purchase a product based on intelligent analytics (e.g., real-time attributes/dynamics such as the strategy in selling the remaining inventory). A group offer refers to an offer to sell a product at a promotional price if a number of users (e.g., users of mobile devices and/or customers online and/or customers in a physical store) agree to purchase the product at the promotional price within a time period. The group offer is sent to targeted users/customers via online and mobile devices as well as via electronic displays and kiosks in the physical store. By using real-time attributes/dynamics to generate group offers that can be sent to targeted users/customers, the sales of the retailer are likely to be increased.
摘要:
A system and method that automatically estimates and chronicles the skills of an individual creating a database of skills that are dynamically updated, and enables the search and viewing of skills along multiple dimensions and at the desired level of detail. The system also provides the playback or reuse of skills such that best practices may be implemented manually or automatically to resolve current problems, and facilitate training and transitioning of resources in order to effectively optimize workforce management. Further, the system automatically reallocates or makes suggestions for the reallocation of resources to meet service level agreement requirements.
摘要:
Techniques are provided for providing physical routes to target locations. The techniques include obtaining at least one target location from at least one user; determining at least one physical route to said at least one target location; and displaying said at least one determined physical route through a sequence of at least one sign display, wherein each sign display are configured to display a plurality of physical routes.
摘要:
A system and method for designing a dial plan for Voice over Internet Protocol (VoIP) systems includes generating an abstract dial plan design which is platform independent, the dial plan including rules for routing communications in a VoIP network structure. The dial plan is validated through simulations prior to deployment to evaluate the dial plan performance under simulated conditions. The dial plan design is translated to provide compatibility with a deployed network using platform specific configuration adaptors.
摘要:
The creation of multiple personae in mobile devices. Access to personae is controlled based on the persona that is currently active. The creation or existence of different personae helps prevent data leakage or loss, in that any or all of the following characteristics, by way of example, may be manifested: business data and applications are firewalled from applications or other items associated with personal use; connectivity of the device is controlled; resources (such cameras, GPS, other sensors, etc.) on the device are controlled; data are protected even if removable storage or the device itself are lost.