摘要:
Embodiments herein provide a method that maintains computerized scripts. The scripts provide assistance to users with respect to using at least one computer software application that is operating on a computerized device. The method receives, from the user, at least one trigger. This process creates or “authors” the trigger. This “trigger” is an item that automatically initiates at least one of the scripts for the user. In addition, the method adds the trigger to the computer software application (not automatically, but instead based on user input). Thus, when initiated by the trigger, the script automatically outputs assistance (text, sounds, illustrations, educational videos, etc.) to the user through the computerized interface of the computerized device, so as to provide the needed assistance to the user.
摘要:
A computer-implemented method for automatically generating a script for a target web interface instance. Embodiments include receiving a task description of a task to be completed on a target web interface instance. The computer-implemented method also includes repeating steps until the task is completed. The repeating steps include determining from the target web interface instance a plurality of actions that may be performed on the target web interface instance and using the task description, predicting which action of the plurality of actions from the target web interface instance is an action most likely to be selected. The repeating steps also include performing the action most likely to be selected, thus proceeding to a first web interface instance and setting the first web interface instance as the target web interface instance.
摘要:
A method for assisting an administrator to identify files suspected of causing instability on a personal computer comprises periodically creating file content sharing logs concurrently with archiving files of a plurality of personal computers by de-duplicating, when a notification is received regarding instability of a personal computer, then analyzing archive file content sharing log of the personal computer made immediately after receiving the notification for unique system and program files, missing files and newly installed files to generate an instability report. A missing or corrupted file can be restored back on the unstable personal computer by performing a backup restore operation on the unstable personal computer.
摘要:
A method for assisting an administrator to identify files suspected of causing instability on a personal computer comprises periodically creating file content sharing logs concurrently with archiving files of a plurality of personal computers by de-duplicating, when a notification is received regarding instability of a personal computer, then analyzing archive file content sharing log of the personal computer made immediately after receiving the notification for unique system and program files, missing files and newly installed files to generate an instability report. A missing or corrupted file can be restored back on the unstable personal computer by performing a backup restore operation on the unstable personal computer.
摘要:
Various embodiments of the invention relate to estimating the location of social network users. In one embodiment, a plurality of social media messages generated by a given user is received. A plurality of location features is extracted from the social media messages. Each of the location features is processed with at least one classifier from an ensemble of classifiers. A location classification is generated by each of the classifiers for each of the social media messages. Each classification comprises a location and a weight associated with that location. One of the locations is selected from the location classifications as the location of the given user based on a combination of the weights of the location classifications.
摘要:
Various embodiments relate to estimating the location of social network users. In one embodiment, a plurality of social media messages generated by a given user is received. A plurality of location features is extracted from the social media messages. Each of the location features is processed with at least one classifier from an ensemble of classifiers. A location classification is generated by each of the classifiers for each of the social media messages. Each classification comprises a location and a weight associated with that location. One of the locations is selected from the location classifications as the location of the given user based on a combination of the weights of the location classifications.
摘要:
A method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A system and a method for identifying computer users having files with common attributes are provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A system and a method for identifying computer users having files with common attributes are provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
摘要:
A method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.