-
公开(公告)号:US10671151B2
公开(公告)日:2020-06-02
申请号:US15685268
申请日:2017-08-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Paul R. Bastide , Matthew E. Broomhall , Liam S. Harpur , Lin Sun
Abstract: A method, computer program product, and system for mitigating disorientation of a user transitioning out of a digital reality session. A user login credentials is received. A start digital reality session command is received. User behavior inputs associated with the digital reality session are monitor. In response to analyzing the user behavior inputs, a behavior risk rating associated with the user behavior inputs is generated. An ending event to the digital reality session is detected. A leakage length value based on the generated behavior risk rating is generated. An expected leakage length value based on the analyzed behavior associated with the user and a user profile associated with the user is determined. A leakage risk value based on the behavior risk rating and leakage length value is assigned. In response to the leakage risk value being above a threshold, the digital reality session is modified.
-
公开(公告)号:US10530842B2
公开(公告)日:2020-01-07
申请号:US15802028
申请日:2017-11-02
Applicant: International Business Machines Corporation
Inventor: Rahul Ghosh , Hugh E. Hockett , Aaron J. Quirk , Lin Sun
IPC: G06F9/455 , G06F9/445 , H04L29/08 , G06F9/44 , H04L12/24 , G06F8/61 , G06F8/10 , G06F8/20 , G06F8/71
Abstract: A method is provided for building patterns with high level pattern topology requirements for deployment across multiple systems. The patterns are built based on pattern capabilities and configurations of the multiple systems. Such patterns can meet the desired pattern capabilities including high availability and/or continuous capabilities.
-
公开(公告)号:US20190384860A1
公开(公告)日:2019-12-19
申请号:US16008796
申请日:2018-06-14
Applicant: International Business Machines Corporation
Inventor: Matthew E. Broomhall , Paul R. Bastide , Lin Sun , Liam S. Harpur
Abstract: Related post identification and presentation is described. A system includes an interface to receive a base post generated by an author. An analyzer analyzes the base post and a number of other posts. A search engine of the system identifies from the number of other posts and based on the analysis, a number of related posts that relate to the base post. A posting engine of the system presents the base post along with identified related posts in an activity stream of a subscriber.
-
公开(公告)号:US20190251059A1
公开(公告)日:2019-08-15
申请号:US16392884
申请日:2019-04-24
Applicant: International Business Machines Corporation
Inventor: Yu Fen Chang , Peng Hui Jiang , Dong Rui Li , Lin Sun , Li Xiang , Ting Xie , Yuan Lin Yang
CPC classification number: G06F16/116 , G06F16/122 , G06F16/13 , G06F16/252 , G06F21/57 , G06F21/6218
Abstract: A computing system performs file conversion upon format expiration. A computing system evaluates a risk of expiration of a first format associated with a first format object. The computing system determines if the risk of expiration is above a threshold. The computing system identifies in response to determining the risk of expiration is above the threshold, one or more files stored in the first format for conversion. The computing system converts one or more files stored in the first format to a second format. The computing system saves the one or more files in the second format.
-
公开(公告)号:US10332217B2
公开(公告)日:2019-06-25
申请号:US14279448
申请日:2014-05-16
Applicant: International Business Machines Corporation
Inventor: Judith H. Bank , Liam Harpur , Ruthie D. Lyle , Patrick J. O'Sullivan , Lin Sun
IPC: G06F17/30 , G06Q50/00 , G06F16/28 , G06F16/951 , G06F16/2457
Abstract: A method includes selecting community groups having a first community from a plurality of communities and a second community from the plurality of communities. The method includes collecting a plurality of community factors that each describe the first community and the second community. The method also includes determining a plurality of correlation values, for each community factor from the plurality of community factors, between the first community and the second community. The method also includes calculating a community merge score from the plurality of correlation values. The method also includes merging the community group in response to a community merge score threshold being met by the community merge score.
-
公开(公告)号:US20190064919A1
公开(公告)日:2019-02-28
申请号:US15685268
申请日:2017-08-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Paul R. Bastide , Matthew E. Broomhall , Liam S. Harpur , Lin Sun
Abstract: A method, computer program product, and system for mitigating disorientation of a user transitioning out of a digital reality session. A user login credentials is received. A start digital reality session command is received. User behavior inputs associated with the digital reality session are monitor. In response to analyzing the user behavior inputs, a behavior risk rating associated with the user behavior inputs is generated. An ending event to the digital reality session is detected. A leakage length value based on the generated behavior risk rating is generated. An expected leakage length value based on the analyzed behavior associated with the user and a user profile associated with the user is determined. A leakage risk value based on the behavior risk rating and leakage length value is assigned. In response to the leakage risk value being above a threshold, the digital reality session is modified.
-
公开(公告)号:US20190052734A1
公开(公告)日:2019-02-14
申请号:US16163915
申请日:2018-10-18
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Lisa M. W. Bradley , Brian O'Donovan , Aaron J. Quirk , Lin Sun
Abstract: A publication tool, and methods of use thereof, for publishing user created content as well as republishing content created by others to a social media network. The publication tool incorporates and uses analytic data from a plurality of data sources to identify and evaluate relationships between the user of the social media network and members of social media networks who subscribe to view the content published by the user on the social media network. The publication tool predicts the likelihood that a subscriber of the social media network will publish or share the same content as the user and if the publication tool predicts that the same content will be published by the user and the subscriber, the publication tool will publish the content on the social media network as a joint publication which can be viewed by all common subscribers shared between the user and the subscriber.
-
公开(公告)号:US10133823B2
公开(公告)日:2018-11-20
申请号:US14219405
申请日:2014-03-19
Applicant: International Business Machines Corporation
Inventor: Li Chen , Henri Fouotsop Meli , David Michael Stecher , Lin Sun
IPC: G06F17/30
Abstract: According to an embodiment of the present invention, a system displays initial search results based on a query and enables selection by a user of an item within the search results. The system determines refined search results based on behavior of the user with respect to the initial search results. Embodiments of the present invention further include a method and computer program product for presenting revised search results based on user behavior while examining the results in substantially the same manners described above.
-
公开(公告)号:US20180331822A1
公开(公告)日:2018-11-15
申请号:US15593755
申请日:2017-05-12
Applicant: International Business Machines Corporation
Inventor: Lisa M.W. Bradley , Liam S. Harpur , Aaron J. Quirk , Lin Sun
CPC classification number: H04L9/0643 , G06K19/06037 , H04L9/3242 , H04L63/0492 , H04L63/0861 , H04L63/102 , H04L63/108 , H04L2209/16 , H04W12/08
Abstract: In an approach to securing data using visual hashing, one or more computer processors receive a user access request for hashed image. The one or more computer processors identify one or more access request parameters for the hashed image. The one or more computer processors determine whether the user access request for the hashed image meets the one or more access request parameters. Responsive to determining that the user access request for the hashed image meets the one or more access request parameters, the one or more computer processors identify one or more user access permissions. The one or more computer processors prepare a modified image of the hashed image corresponding to the identified one or more user access permissions. The one or more computer processors send the modified image of the hashed image corresponding to the one or more user access permissions to a requesting user.
-
公开(公告)号:US10121056B2
公开(公告)日:2018-11-06
申请号:US14635854
申请日:2015-03-02
Applicant: International Business Machines Corporation
Inventor: Lisa M. Bradley , Brian O'Donovan , Aaron J. Quirk , Lin Sun
Abstract: A method, system and computer program product for ensuring a desired distribution of images in a multimedia document among different demographic groups. Demographic criteria (e.g., age) is received to form demographic groups of members of an organization. Demographic information along with interests of the members are retrieved. Such member data is analyzed within the constraints of the demographic criteria to generate a statistical distribution of members of the organization that forms an initially desired distribution of content of the multimedia document among the demographic groups of the organization. An indication is then provided to the user regarding whether the current distribution of the content of the multimedia document among the demographic groups of the organization satisfies or does not satisfy the desired distribution of content among the demographic groups. In this manner, the user can ensure a desired distribution of content in the multimedia document among different demographic groups.
-
-
-
-
-
-
-
-
-