-
公开(公告)号:US20190179955A1
公开(公告)日:2019-06-13
申请号:US15840559
申请日:2017-12-13
Applicant: International Business Machines Corporation
Inventor: Ethan A. Geyer , Jonathan F. Brunn , Jonathan Dunne , Naama Tepper
Abstract: Familiarity-based text classification framework selection is described. A list of participants in an electronic message thread is selected. For each pairing of participants, a familiarity score is determined based on a number of criteria. A familiarity model is formed based on multiple familiarity scores and a text classification framework for the electronic message thread is selected based on the familiarity model.
-
公开(公告)号:US20190158448A1
公开(公告)日:2019-05-23
申请号:US15819145
申请日:2017-11-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Kelley Anders , Jeremy R. Fox , Liam S. Harpur , Jonathan Dunne
Abstract: Systems and methods for selectively delaying delivery of high-impact digital communications are disclosed. In embodiments, a computer-implemented method comprises: receiving, by a computing device, notification of a digital communication from a sender to at least one recipient; determining an impact value of the digital communication by comparing data of the digital communication with user profile data of the at least one recipient; determining that the impact value meets a predetermined threshold value associated with the at least one recipient, indicating that communication handling procedures apply to selectively delay the delivery of the digital communication to the at least one recipient; determining whether special delivery procedures apply that override the communication handling procedures; and initiating delivery of the digital communication to the at least one recipient based on the determining whether special delivery procedures apply.
-
公开(公告)号:US10296410B2
公开(公告)日:2019-05-21
申请号:US13893650
申请日:2013-05-14
Applicant: International Business Machines Corporation
Inventor: Jonathan Dunne , Jeffrey B. Sloyer
Abstract: Reliability testing can include determining a transaction time for each of a plurality of transactions to a system under test during the reliability test, wherein the plurality of transactions are of a same type. Forecasts of transaction times can be calculated for the transaction type. The forecasts can be compared with a threshold time using a processor. A remedial action can be implemented responsive to at least one of the forecasts exceeding the threshold time.
-
公开(公告)号:US20190129939A1
公开(公告)日:2019-05-02
申请号:US15800949
申请日:2017-11-01
Applicant: International Business Machines Corporation
Inventor: Trudy L. Hewitt , Jonathan Dunne , Kelley Anders , Robert Grant
Abstract: A system, method and computer program product for cognitive copy and paste. The method includes: receiving, at a hardware processor of a computer system, an input representing a selection of a content captured from a source application program, and receiving an input representing an identified target application program that will receive the selected content to be copied and rendered in the target application program. The selected content is analyzed to determine a context for the selected content; and a rendering of the selected content at a location within the destination application based on the determined context, the rendering achieving a best representation of the selected content on the destination application. The analyzing includes invoking a natural language processor to determine an intent, meaning, or an intended use of the selected content based on the determined context, and employs a support vector machine for determining a best format change when rendering.
-
公开(公告)号:US20190124067A1
公开(公告)日:2019-04-25
申请号:US15792961
申请日:2017-10-25
Applicant: International Business Machines Corporation
Inventor: Kelley Anders , Jonathan Dunne , Robert Grant , Trudy L. Hewitt
Abstract: Multi-step user authentication combines steps of authenticating both objective and subjective credentials. A user selects objective credentials, such as a password, and enters subjective credentials, such as a subjective description of the user's emotional response to a subjective challenge, such as a musical recording or image. The system identifies other content likely to elicit a similar emotional response from the same user. When the user later attempts to log onto a secured system, the user must enter the objective credentials and then describe the user's emotional response to a second subjective challenge that is likely to elicit an emotional response similar to that invoked by the first subjective challenge. If the user enters the correct objective credentials and describes an emotional response consistent with the first subjective description, then the user is given access to the secured system.
-
公开(公告)号:US20190104414A1
公开(公告)日:2019-04-04
申请号:US16205958
申请日:2018-11-30
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Lisa M.W. Bradley , Jonathan Dunne , Liam Harpur , Asima Silva
Abstract: Systems and methods for securing access to a mobile device are disclosed. A method includes: transmitting, by a computer device, a tone to a surface of an object; detecting, by the computer device, a frequency response from the object based on the transmitted tone; determining, by the computer device, that the detected frequency response from the surface of the object conforms to a stored frequency response; and unlocking, by the computer device, the computer device based on the determining.
-
公开(公告)号:US20190103982A1
公开(公告)日:2019-04-04
申请号:US15720265
申请日:2017-09-29
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jonathan F. Brunn , Rachael M.H. Dickens , Jonathan Dunne , Ethan A. Geyer , Liam S. HARPUR , Bo Jiang , ANDREW PENROSE , Naama Tepper
Abstract: A method, computer system, and computer program product for calculating a group chat segment duration is provided. The embodiment may include capturing a plurality of group chat messages from a chat message repository. The embodiment may also include determining a probability distribution based on analyzing the captured group chat messages over a time vector. The embodiment may further include calculating a time parameter based on the determined probability distribution. The embodiment may also include calculating a content parameter based on one or more relevant chat topics. The embodiment may further include calculating an attendee parameter based on a plurality of attendees and one or more attendee associations. The embodiment may also include determining a chat duration prediction based on the calculated time parameter, the calculated content parameter, and the calculated attendee parameter.
-
公开(公告)号:US20190095844A1
公开(公告)日:2019-03-28
申请号:US15712139
申请日:2017-09-22
Applicant: International Business Machines Corporation
Inventor: Jonathan Dunne , Andrew Penrose
Abstract: The illustrative embodiments provide for a computer-implemented method of allocating, in real time, actions to individuals based on text monitored in chat channels executing on different computers in a computer network. A desired action mentioned in the chat session is detected. Action to vector modeling is then performed by assigning a corresponding coefficient for the action to ones of a plurality of different vectors for ones of a plurality of different users. A corresponding set of coefficients is combined for all users. A highest coefficient is selected, corresponding to a second user from among the ones of the plurality of different users. A message is sent to the second user requesting the second user to perform the action.
-
公开(公告)号:US10242207B2
公开(公告)日:2019-03-26
申请号:US15268551
申请日:2016-09-17
Applicant: International Business Machines Corporation
Inventor: Hernan A. Cunico , Jonathan Dunne , Jeremiah O'Connor , Asima Silva
Abstract: For preventing unwanted information disclosure in a current electronic communication from a sender to a receiver of the current electronic communication, a risk score is assigned for the current electronic communication by a computer system applying an access control model based on historical electronic communications. The model generates the risk score responsive to identities of the sender and receiver and responsive to access control level and hierarchal position of at least one of the sender and receiver. The computer system blocks transmission of the current electronic communication from the sender to the receiver responsive to whether the risk score for the sender and receiver exceeds a predetermined threshold.
-
公开(公告)号:US20190087255A1
公开(公告)日:2019-03-21
申请号:US16183911
申请日:2018-11-08
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Hernan A. Cunico , Jonathan Dunne , Jeremiah O'Connor , Asima Silva
Abstract: A method and system for performing a root cause analysis. A CPU identifies events of interest as a function of a user's observable behavior, which includes the user's eye gaze, while viewing event data. The CPU calculates an interest score for each of the identified events of interest, wherein the interest score is a probability of each of the identified events of interest being a root cause of a defect. The CPU tags each of the events of interest with a tag as a function of each calculated interest score. The identifying of the one or more events of interest includes: correlating a focal point of the user's eye gaze to a viewing position of a display device displaying the file; and identifying, as a function of the viewing position, the event data being viewed and an amount of time that the event data is viewed by the user.
-
-
-
-
-
-
-
-
-