摘要:
According to a present invention embodiment, a system supplements structured information within a data system for entities based on unstructured data. The system analyzes a document with unstructured data and extracts attribute values from the unstructured data for one or more entities of the data system. Entity records with structured information are retrieved from the data system based on the extracted attribute values. Entity references for corresponding entities of the data system are constructed based on a comparison of the retrieved entity records and the extracted attribute values. The entity references are linked to the corresponding entities within the data system, wherein the entity references include extracted attributes from the unstructured data for corresponding linked entities. Embodiments of the present invention further include a method and computer program product for supplementing structured information within a data system for entities based on unstructured data in substantially the same manner described above.
摘要:
According to a present invention embodiment, a system supplements structured information within a data system for entities based on unstructured data. The system analyzes a document with unstructured data and extracts attribute values from the unstructured data for one or more entities of the data system. Entity records with structured information are retrieved from the data system based on the extracted attribute values. Entity references for corresponding entities of the data system are constructed based on a comparison of the retrieved entity records and the extracted attribute values. The entity references are linked to the corresponding entities within the data system, wherein the entity references include extracted attributes from the unstructured data for corresponding linked entities. Embodiments of the present invention further include a method and computer program product for supplementing structured information within a data system for entities based on unstructured data in substantially the same manner described above.
摘要:
A computer receives an electronic document that includes a group of terms. The computer sends the electronic document to an information extraction program that extracts specific terms from the group of terms. Each of the specific terms that match to a certain extent with one of the attribute values in an electronic dictionary is identified. A value associated with the electronic document is generated based on the specific terms that match, and on an end-user that is attempting to access the electronic document.
摘要:
A computer receives an electronic document that includes a group of terms. The computer sends the electronic document to an information extraction program that extracts specific terms from the group of terms. Each of the specific terms that match to a certain extent with one of the attribute values in an electronic dictionary is identified. A value associated with the electronic document is generated based on the specific terms that match, and on an end-user that is attempting to access the electronic document.
摘要:
Provided are techniques for providing personalized recommendations. One or more transactions are received from one or more customer interaction channels. The received one or more transactions are stored in an incremental data store. One or more predictive rules are generated based on the received one or more transactions and based on one or more transactions previously stored in the incremental data store. In real-time, one or more personalized recommendations specific to a user and to the received one or more transactions are generated using the one or more generated predictive rules.
摘要:
Provided are techniques for providing personalized recommendations. One or more transactions are received from one or more customer interaction channels. The received one or more transactions are stored in an incremental data store. One or more predictive rules are generated based on the received one or more transactions and based on one or more transactions previously stored in the incremental data store. In real-time, one or more personalized recommendations specific to a user and to the received one or more transactions are generated using the one or more generated predictive rules.
摘要:
Techniques for segregating one or more logs of at least one multitasking user to derive at least one behavioral pattern of the at least one multitasking user are provided. The techniques include obtaining at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information, correlating the at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information to determine a task associated with each of one or more actions and segregate the one or more logs based on the one or more actions, and using the one or more logs that have been segregated to derive at least one behavioral pattern of the at least one multitasking user. Techniques are also provided for deriving intelligence from at least one activity log of at least one multitasking user to provide information to the at least one user.
摘要:
Techniques for retrieval of one or more relevant multi-attribute structured objects with respect to a query are provided. The techniques include receiving a query, grouping one or more attributes of one or more objects in a database into one or more groups according to how each bears a relation to the query, and using the one or more attribute groups to produce an output of one or more relevant multi-attribute structured objects in response to the query.
摘要:
Techniques for segregating one or more logs of at least one multitasking user to derive at least one behavioral pattern of the at least one multitasking user are provided. The techniques include obtaining at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information, correlating the at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information to determine a task associated with each of one or more actions and segregate the one or more logs based on the one or more actions, and using the one or more logs that have been segregated to derive at least one behavioral pattern of the at least one multitasking user. Techniques are also provided for deriving intelligence from at least one activity log of at least one multitasking user to provide information to the at least one user.
摘要:
Techniques for segregating one or more logs of at least one multitasking user to derive at least one behavioral pattern of the at least one multitasking user are provided. The techniques include obtaining at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information, correlating the at least one of at least one action log, configuration information, domain knowledge, at least one task history and open task repository information to determine a task associated with each of one or more actions and segregate the one or more logs based on the one or more actions, and using the one or more logs that have been segregated to derive at least one behavioral pattern of the at least one multitasking user. Techniques are also provided for deriving intelligence from at least one activity log of at least one multitasking user to provide information to the at least one user.