会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明申请
    • Email attribute system using external databases
    • 使用外部数据库的电子邮件属性系统
    • US20050102368A1
    • 2005-05-12
    • US10706407
    • 2003-11-12
    • George FormanKave Eshghi
    • George FormanKave Eshghi
    • G06F15/16G06Q10/00H04L12/58
    • G06Q10/107H04L51/28
    • Auxiliary, or external, information is used to assist in handling email addresses by allowing additional characterizations of the addresses. The additional characterizations can include geographical, organizational, temporal, and other types of information obtained, for example, from databases external to the email system. An email system can access information in a company's enterprise database to obtain organizational information such as names of people under a given manager, people in a specific building, people who have attended a meeting, etc. Characterizations can be used with traditional email information to create an email group, a search or sort filter, etc.
    • 辅助或外部信息用于通过允许附加地址表征来帮助处理电子邮件地址。 额外的特征可以包括例如从电子邮件系统外部的数据库获得的地理,组织,时间和其他类型的信息。 电子邮件系统可以访问公司企业数据库中的信息,以获取组织信息,例如指定管理员下的人员名称,特定建筑物中的人员,参加会议的人员等。可以使用传统电子邮件信息来创建表征 电子邮件组,搜索或排序过滤器等
    • 42. 发明授权
    • Correlating protocol events in distributed applications
    • 在分布式应用程序中关联协议事件
    • US06618766B1
    • 2003-09-09
    • US09408734
    • 1999-09-29
    • Kave Eshghi
    • Kave Eshghi
    • G06F946
    • H04L69/32H04L67/10H04L69/329
    • Mechanisms for correlating protocol events in a distributed application to the high level transactions that caused the protocol events. The mechanisms for correlating include a set of protocol sensors which are associated with the components of the distributed application. Each protocol sensor detects the protocol events generated by its corresponding component of the distributed application. The detection of protocol events by the protocol sensors is non-invasive in that it does not require recoding or recompilation of software components or redesign or modification of hardware components. The mechanisms for correlating also include a set of event correlators associated with the protocol sensors. Each event correlator uses the results of a prior training phase for the distributed application to determine which of a set of high level transactions in the distributed application caused the corresponding protocol events.
    • 将分布式应用程序中的协议事件与导致协议事件的高级事务相关联的机制。 关联的机制包括与分布式应用的组件相关联的一组协议传感器。 每个协议传感器检测由其分布式应用程序的相应组件生成的协议事件。 协议传感器对协议事件的检测是非侵入性的,因为它不需要重新编码或重新编译软件组件或重新设计或修改硬件组件。 用于相关的机制还包括与协议传感器相关联的一组事件相关器。 每个事件相关器使用分布式应用程序的先前训练阶段的结果来确定分布式应用程序中的一组高级别事务中的哪一个导致相应的协议事件。
    • 45. 发明授权
    • Identifying related objects in a computer database
    • 识别计算机数据库中的相关对象
    • US08972410B2
    • 2015-03-03
    • US12463972
    • 2009-05-11
    • Kave EshghiShyam Sundar RajaramCharlie DagliIra Cohen
    • Kave EshghiShyam Sundar RajaramCharlie DagliIra Cohen
    • G06F7/00G06F17/30
    • G06F17/30607G06F17/30271G06F17/3069
    • Provided are, among other things, systems, methods and techniques for identifying related objects in a computer database. In one representative implementation: (a) a feature vector that describes an existing object is obtained; (b) comparison scores are generated between the feature vector and various sample vectors; (c) a set that includes at least one designated vector is identified from among the sample vectors by evaluating the generated comparison scores; (d) a computer database is searched for matches between label(s) for the designated vector(s) and labels for representative vectors for other objects represented in the computer database; and (e) at least one related object is identified based on the identified match(es).
    • 除其他之外,提供用于识别计算机数据库中的相关对象的系统,方法和技术。 在一个代表性实现中:(a)获得描述现有对象的特征向量; (b)特征向量与各种样本向量之间产生比较分数; (c)通过评估生成的比较分数,从样本向量中识别包括至少一个指定向量的集合; (d)搜索计算机数据库以查找用于指定向量的标签与用于计算机数据库中表示的其他对象的代表向量的标签之间的匹配; 和(e)基于所识别的匹配来识别至少一个相关对象。
    • 47. 发明授权
    • Method and system for optical character recognition using image clustering
    • 使用图像聚类的光学字符识别的方法和系统
    • US08208726B2
    • 2012-06-26
    • US12841839
    • 2010-07-22
    • Kave EshghiGeorge FormanPrakash Reddy
    • Kave EshghiGeorge FormanPrakash Reddy
    • G06K9/34
    • G06K9/00463
    • The present disclosure provides a computer-implemented method of translating an image-based electronic document into a text-based electronic document. The method includes electronically scanning an image-based document to determine positions of word images in the image-based document. The method also includes extracting the word images from the image-based document and storing the word images to an electronic storage device. The method also includes grouping a subset of the word images into a word cluster based on a similarity of the word images, wherein the word images in the word cluster correspond to a same actual word. The method also includes generating a character-encoded transcription for the word cluster based on the word images in the word cluster. The method also includes adding the character-encoded transcription to a text-based electronic document at locations corresponding to the positions of the word images in the image-based document.
    • 本公开提供了一种将基于图像的电子文档翻译成基于文本的电子文档的计算机实现的方法。 该方法包括电子扫描基于图像的文档以确定基于图像的文档中的单词图像的位置。 该方法还包括从基于图像的文档提取单词图像并将单词图像存储到电子存储设备。 该方法还包括基于单词图像的相似性将单词图像的子集分组成单词群集,其中单词群集中的单词图像对应于相同的实际单词。 该方法还包括基于单词簇中的单词图像生成用于单词群集的字符编码的转录。 该方法还包括在基于图像的文档中与单词图像的位置对应的位置处将字符编码的转录添加到基于文本的电子文档。
    • 50. 发明申请
    • SYSTEM AND METHOD FOR SEGMENTING A DATA STREAM
    • 用于分配数据流的系统和方法
    • US20100205163A1
    • 2010-08-12
    • US12368784
    • 2009-02-10
    • Kave EshghiMark David Lillibridge
    • Kave EshghiMark David Lillibridge
    • G06F17/30G06F12/16
    • G06F11/1453G06F11/1456
    • A method of limiting redundant storage of data comprises receiving a data stream and partitioning the data stream into a series of data chunks. At least one content hash value for a set of data chunks is generated based on data content of the set of data chunks. One or more data chunks are grouped into a segment with at least one boundary of the segment defined based on an evaluation of content hash values of data chunks. Content hash values of data chunks of the segment are compared to content hash values of data chunks of segments stored on a backup mass storage device. A pointer to a stored data chunk of an existing segment is stored on the backup mass storage device if a content hash value of a data chunk of the segment matches the content hash value of the stored data chunk.
    • 限制数据的冗余存储的方法包括接收数据流并将数据流划分成一系列数据块。 基于该组数据块的数据内容生成用于一组数据块的至少一个内容哈希值。 一个或多个数据块被分组成具有基于对数据块的内容哈希值的评估定义的段的至少一个边界的段。 将段的数据块的内容哈希值与存储在备份大容量存储设备上的段的数据块的内容哈希值进行比较。 如果段的数据块的内容散列值与存储的数据块的内容哈希值匹配,则指向现有段的存储数据块的指针被存储在备份大容量存储设备上。