OPTIMAL SELECTION OF A SERVICE REQUEST RESPONSE TEAM

    公开(公告)号:US20240070574A1

    公开(公告)日:2024-02-29

    申请号:US17971381

    申请日:2022-10-21

    CPC classification number: G06Q10/063112 G06Q10/20

    Abstract: An embodiment includes creating an action item record corresponding to an action item of an action plan record that is responsive to a service request. The action item record comprises a service requirement of the action item. The embodiment executes a querying process that searches vendor records for candidate vendors associated with the service requirement and returns a set of candidate vendors. The embodiment updates the action item record with the set of candidate vendors and determines an optimal vendor team based at least in part on reputation data and cost data associated with each of the candidate vendors. The embodiment updates the action plan record to include the optimal vendor team, which triggers creation of a vendor team dispatch request.

    SURVEY SAMPLE SELECTOR FOR EXPOSING DISSATISFIED SERVICE REQUESTS

    公开(公告)号:US20190066134A1

    公开(公告)日:2019-02-28

    申请号:US15690884

    申请日:2017-08-30

    Abstract: Embodiments of the present invention disclose a method, computer program product, and system for exposing more dissatisfied service requests through survey sample selection. The computer builds a user dissatisfaction model based on a plurality of historical survey results, and a plurality of historical service request information. The plurality of historic service request information includes at least one dissatisfaction metric, wherein the at least one dissatisfaction metric includes a total time spent resolving a problem, a total travel time, a total onsite time, a at least one part used, and/or a plurality of other metrics. The computer determines a probability of dissatisfaction for each of a plurality of service requests. The computer selects a survey sample that includes a plurality of dissatisfied users based on the determined probability of dissatisfaction for each of the plurality of service requests. The computer transmits a survey to each user of the survey sample.

    AUTOMATED TELLER MACHINE FLOW NETWORK AND CONTROL SYSTEM

    公开(公告)号:US20170308835A1

    公开(公告)日:2017-10-26

    申请号:US15136208

    申请日:2016-04-22

    Abstract: Automatic teller machine network management control system executes a deterministic optimization process based on a deterministic forecasted withdrawal demand to determine a cash refill amount, and executes a stochastic simulation process to determine an overall automatic teller machine network management cost based on a stochastic forecasted withdrawal demand and the cash refill amount. The executing of the deterministic optimization process and the executing of the stochastic simulation process are iterated based on updated scaling parameter from the stochastic simulation process and the cash refill amount determined by the deterministic optimization process at current iteration until a termination threshold is met. A target scaling parameter that minimizes the overall automatic teller machine network management cost out of all iterations is determined, and target cash refill amount and time specification for refilling the automatic teller machine are determined based on executing the deterministic optimization process with the target scaling parameter.

    SECURITY POLICY GENERATION BASED ON SNAPSHOTS OF SIMILAR VIRTUAL MACHINES
    6.
    发明申请
    SECURITY POLICY GENERATION BASED ON SNAPSHOTS OF SIMILAR VIRTUAL MACHINES 有权
    基于类似虚拟机的攻击的安全策略生成

    公开(公告)号:US20160321455A1

    公开(公告)日:2016-11-03

    申请号:US14699251

    申请日:2015-04-29

    Abstract: Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.

    Abstract translation: 确定哪些快照增量趋于发生在:(i)已经受到攻击的健康虚拟机(VM)保持健康,和/或(ii)显然受到攻击不利影响的不健康的虚拟机。 发生在健康VM子集的至少一些(或更优选全部))的快照增量提供关于可能有帮助的软件改变(例如,更新,配置改变)的信息。 发生在至少一些(或更优选全部)不健康的VM子集中的快照三角形提供关于可能无益的软件改变(例如,更新,配置改变)的信息。

    INTRODUCING USER TRUSTWORTHINESS IN IMPLICIT FEEDBACK BASED SEARCH RESULT RANKING
    7.
    发明申请
    INTRODUCING USER TRUSTWORTHINESS IN IMPLICIT FEEDBACK BASED SEARCH RESULT RANKING 审中-公开
    基于隐私反馈的搜索结果排名引入用户信任

    公开(公告)号:US20150332169A1

    公开(公告)日:2015-11-19

    申请号:US14278754

    申请日:2014-05-15

    CPC classification number: G06N20/00

    Abstract: User trustworthiness may be introduced in implicit feedback based supervised machine learning systems. A set of training data examples may be scored based on the trustworthiness of users associated respectively with the training data examples. The training data examples may be sampled into a plurality of training data sets based on a weighted bootstrap sampling technique, where each weight is a probability proportional to trustworthiness score associated with an example. A machine learning algorithm takes the plurality of the training data sets as input and generates a plurality of trained models. Outputs from the plurality of trained models may be ensembled by computing a weighted average of the outputs of the plurality of trained models.

    Abstract translation: 用户可信度可以在基于隐式反馈的监督机器学习系统中引入。 可以基于分别与训练数据示例相关联的用户的可信度来对一组训练数据示例进行评分。 训练数据示例可以基于加权引导抽样技术被采样到多个训练数据集中,其中每个权重是与与示例相关联的可信度得分成比例的概率。 机器学习算法将多个训练数据集作为输入,并产生多个训练模型。 可以通过计算多个训练模型的输出的加权平均来合并来自多个训练模型的输出。

    TRAVERSING SOFTWARE COMPONENTS AND DEPENDENCIES FOR VULNERABILITY ANALYSIS

    公开(公告)号:US20220318396A1

    公开(公告)日:2022-10-06

    申请号:US17222345

    申请日:2021-04-05

    Abstract: Systems, devices, computer-implemented methods, and/or computer program products that facilitate software vulnerability analysis using relationship data extracted from disparate package-related sources. In one example, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components can comprise a knowledge induction component and a vulnerability component. The knowledge induction component can populate a package ontology for a range of packages with relationship data extracted from a plurality of disparate package-related sources. The vulnerability component can identify an implicit vulnerability impacting the range of packages using the package ontology and a vulnerability record regarding an explicit vulnerability for a package within the range of packages.

    Automated teller machine flow network and control system

    公开(公告)号:US10748095B2

    公开(公告)日:2020-08-18

    申请号:US15136208

    申请日:2016-04-22

    Abstract: Automatic teller machine network management control system executes a deterministic optimization process based on a deterministic forecasted withdrawal demand to determine a cash refill amount, and executes a stochastic simulation process to determine an overall automatic teller machine network management cost based on a stochastic forecasted withdrawal demand and the cash refill amount. The executing of the deterministic optimization process and the executing of the stochastic simulation process are iterated based on updated scaling parameter from the stochastic simulation process and the cash refill amount determined by the deterministic optimization process at current iteration until a termination threshold is met. A target scaling parameter that minimizes the overall automatic teller machine network management cost out of all iterations is determined, and target cash refill amount and time specification for refilling the automatic teller machine are determined based on executing the deterministic optimization process with the target scaling parameter.

Patent Agency Ranking