会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • Processing data using sequential dependencies
    • 使用顺序依赖来处理数据
    • US20110131170A1
    • 2011-06-02
    • US12592586
    • 2009-11-30
    • Lukasz GolabHoward KarloffPhilip KornDivesh SrivastavaAvishek Saha
    • Lukasz GolabHoward KarloffPhilip KornDivesh SrivastavaAvishek Saha
    • G06N5/02
    • G06N7/00G06N5/00
    • The specification describes data processes for analyzing large data steams for target anomalies. “Sequential dependencies” (SDs) are chosen for ordered data and present a framework for discovering which subsets of the data obey a given sequential dependency. Given an interval G, an SD on attributes X and Y, written as X→G Y, denotes that the distance between the Y-values of any two consecutive records, when sorted on X, are within G. SDs may be extended to Conditional Sequential Dependencies (CSDs), consisting of an underlying SD plus a representation of the subsets of the data that satisfy the SD. The conditional approximate sequential dependencies may be expressed as pattern tableaux, i.e., compact representations of the subsets of the data that satisfy the underlying dependency.
    • 该规范描述了用于分析目标异常的大型数据流的数据处理。 为有序数据选择“顺序依赖”(SDs),并提供一个框架,用于发现数据的哪些子集服从给定的顺序依赖。 给定间隔G,写入X→GY的属性X和Y上的SD表示当在X上排序时任何两个连续记录的Y值之间的距离在G内。可以扩展到条件序列 依赖关系(CSDs)由基础SD加上满足SD的数据子集的表示组成。 条件近似顺序依赖性可以表示为模式表,即满足基础依赖性的数据子集的紧凑表示。
    • 9. 发明申请
    • Method for selecting nodes in a network
    • 选择网络中节点的方法
    • US20100008368A1
    • 2010-01-14
    • US12217705
    • 2008-07-08
    • Howard Karloff
    • Howard Karloff
    • G01R31/08
    • H04L45/00H04L45/128
    • Given a set of network nodes B that are sought to be monitored, and a set of potential monitoring nodes, a subset M of the monitoring nodes is chosen that insures monitoring each node b in B with a pair of nodes mi and mj such that no node except b is on both any shortest path from b to mi and on any shortest path from b to mj. Some of the nodes in Mare chosen in a first step by identifying a subset of B having nodes b that are “t-good” nodes, choosing a subset of potential monitoring nodes as First Partner nodes, and choosing a corresponding subset of potential monitoring nodes as Second Partner nodes. Others are chosen in a second step that handles nodes b that are not “t-good,” using a greedy algorithm.
    • 给定一组寻求被监视的网络节点B和一组潜在的监控节点,选择监视节点的子集M,以确保用B对中的每个节点b与一对节点mi和mj进行监视,使得no 除b之外的节点在从b到mi的任何最短路径以及从b到mj的任何最短路径上。 通过识别具有节点b的“t-good”节点的B的子集,选择潜在监控节点的子集作为第一伙伴节点,并选择潜在监控节点的对应子集,在第一步中选择的一些节点 作为第二伙伴节点。 使用贪婪算法,在第二步中选择其他选项来处理不是“t-good”的节点b。