摘要:
An improved method manages the storage of document images so as to minimize the average access time while minimizing overall storage costs, consistent with the probable usage of the documents for a particular application. Document images can be selectively stored on high speed, low capacity magnetic DASD or alternately on low speed, high capacity optical storage. DASD storage is more expensive than optical storage for a document image. By characterizing the probable use of a document image in association with a case processing work flow within which the document image is to participate, optimum document storage can be achieved. When a case has a predefined plurality of document image types, and a particular document image type is missing, the case can be placed in a pending state while awaiting the receipt of the missing document image. In the pending state, the documents which are members of the pended case can be removed from the DASD and retained on the optical storage device. A notation as to the missing document type is associated with the pended case. When the missing document type is received, the case of which it is to be a member, is reactivated by accessing the existing documents for the case from the optical storage and transferring them to the DASD, along with storing the newly received missing document. The case with its full complement of documents is then made available to the user. Provision is made for prohibiting the deletion of a document image from the DASD when other active cases have that document as a member.
摘要:
Techniques are disclosed for analyzing a “context window” of a search query to determine a semantic meaning of a search word and to filter search results based upon the semantic meaning. Generally, a lexicon may be used to store forms, meanings, and usages of words and phrases. When a user specifies a query, a semantic analyzer obtains all of the word senses for a search word. The semantic analyzer applies lexical analysis techniques to the search word and context window to obtain a total score for each word sense and selects the word sense with the highest total score. After query results such as documents containing the search words are obtained, the semantic analyzer applies lexical analysis techniques to filter the results so that only documents which use the search terms, according to the selected word sense are returned.
摘要:
Techniques are provided for processing a search request. One or more indexed levels of access control list information are stored in a search index for each document identified in the search index. An interim result set is generated by matching the one or more indexed levels of access control list information associated with each said document to one or more security groups associated with the search request. A final result set is generated from the interim result set by performing impersonation.
摘要:
Provided are a computer program product, system, and method for generating visualizations of facet values for facets defined over a collection of objects. The objects are processed to determine facet values for the objects for a specified facet. A first visualization is generated of representations of the determined facet values for the objects. User selection is received of one of the facet values represented in the generated first visualization. A determination is made of objects having the user selected facet value and a determination is made of at least one facet value for the specified facet for each of the determined objects having the selected facet value. A second visualization of representations of the determined at least one facet value is generated.
摘要:
Techniques are provided for processing a search request. One or more indexed levels of access control list information are stored in a search index for each document identified in the search index. An interim result set is generated by matching the one or more indexed levels of access control list information associated with each said document to one or more security groups associated with the search request. A final result set is generated from the interim result set by performing impersonation.
摘要:
A plurality of users in a virtual reality environment are registered over a network to share information. A three dimensional representation of information to be shared over the network is placed into a shared area of the virtual reality environment. The information is then transferred to all of the registered users. The registered users may be listed on a whiteboard visible to all in the environment. The information to be shared may be placed onto a conference table metaphor to indicate it is available for all registered users.