Abstract:
A significant recent trend in the internet and mobile telephony has been the dominance of user generated content. As such, in mobile technology have permitted users to upload content onto the internet, whereby sites provide an easily accessible and manageable medium for users to share their thoughts and form a portal for media-rich exchanges. It has been found that much of what is exchanged by users in such settings is context-sensitive, ranging from users' moods and opinions, to communication about users' plans. Broadly contemplated herein, in accordance with at least one embodiment of the invention, is the employment of data mining in information repositories settings to efficiently classify an information stream in real-time and thereby discern user intent.
Abstract:
A method for computing the energy rating for cloud-based software services is disclosed. For each of the service, following steps are performed. The method includes identifying configuration parameters impacting the energy consumption. The method further includes determining a value for each configuration parameter. Further, the method includes determining a relative energy rating using a pre-determined equation, based on the values of the configuration parameter. Finally, the method includes assigning a discrete value based on the range of the relative energy rating.
Abstract:
Data pertaining to interactions between a plurality of customers is obtained. A graph is formed, having a plurality of nodes representing the customers and a plurality of edges representing interactions between the customers. A sub-set of the customers are denoted as previously churned customers. A spreading activation model is applied to the graph to identify, based on the graph and the previously churned customers, the potential churning customers.
Abstract:
Users and vendors are matched. A request from a mobile wireless device of a user is received that relates to a business service. The request is matched against vendors providing the business service to yield one or more vendors currently locationally near the user and that are currently accepting service calls for the business service. A response is sent to the mobile wireless device of the user, with identities of the vendors that are locationally near the user and that are currently accepting service calls for the business service. The current location of the user may be determined based on the user's mobile wireless device. The current location of each vendor may be determined based on that provider's mobile wireless device. Whether each vendor providing the business service requested is currently accepting service calls is determined based on previously provided information by the provider.
Abstract:
In response to determining that computer generation of an abstract workflow plan for a network-accessible service resulted in failure, a method attempts to automatically recover from the failure. Where attempting to automatically recover from this failure is unsuccessful, the method applies remedy rules, to assist in debugging the failure. In response to determining that computer assignment of a physical plan for the abstract workflow plan resulted in failure, the method attempts to automatically recover from the failure. Where attempting to automatically recover from this failure is unsuccessful, the method applies remedy rules, to assist in debugging the failure. In response to determining that computer evaluation of a runtime configuration for the physical plan resulted in a failure, the method attempts to automatically recover from the failure. Where attempting to automatically recover from this failure is unsuccessful, the method applies remedy rules, to assist in debugging the failure.
Abstract:
Embodiments of the invention provide a non-web based social networking system enabling users having limited Internet connectivity and/or limited access to high end mobile computing devices a cross networking opportunity with web-based social networking sites. Embodiments of the invention provide for additional communication modalities between social networking users, including but not limited to non-web based communication between the social networking users.
Abstract:
Techniques for supporting a presence virtualization query are provided. The techniques include receiving a virtual query from a client, the virtual query specified in terms of a membership set of members, wherein the membership set comprises a list of presentity uniform resource identifiers (URIs) and a separate transformation function, defined over a set of presence documents of the members in the membership set, redirecting the query to a destination virtual presentity URI whose presence state comprises an aggregation of the presence documents of the list of URIs in the membership set and a corresponding query element (QE) object that manages subscriptions for the URI, adding the client as a watcher for the destination virtual presentity URI, and applying transformation logic specified by the watcher client and notifying a corresponding client of a resulting output.
Abstract:
Data pertaining to interactions between a plurality of customers is obtained. A graph is formed, having a plurality of nodes representing the customers and a plurality of edges representing interactions between the customers. A sub-set of the customers are denoted as previously churned customers. A spreading activation model is applied to the graph to identify, based on the graph and the previously churned customers, the potential churning customers.
Abstract:
A plurality of pure operator type rules are instantiated within a domain of a telecommunications operator and a plurality of pure application type rules are instantiated within a domain of a third party telecommunications application provider. The plurality of pure operator type rules and the plurality of pure application type rules are associated with a composite service. A plurality of network components are established to transmit given events of a plurality of protocol-level events to at least one of the domain of the telecommunications operator and the domain of the third party telecommunications application provider. The composite service is deployed in an execution engine of the third party telecommunications application provider.