Images List Premium Download Classic

Heuristic

Heuristic-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Heuristically programmed artificial intelligence for mainframe operating systems
International Business Machines Corporation
November 30, 2017 - N°20170344887

Disclosed herein is a heuristically programmable system comprising a web-socket; a backend component that is in operative communication with the web-socket to act as a heuristically programmed algorithm framework that is operative to interact with a user in natural language and in a human-like manner; a main frame computer; a web server that is in operative communication with an internet; ...
Heuristically programmed artificial intelligence for mainframe operating systems
International Business Machines Corporation
November 30, 2017 - N°20170344639

Disclosed herein is a heuristically programmable system comprising a web-socket; a backend component that is in operative communication with the web-socket to act as a heuristically programmed algorithm framework that is operative to interact with a user in natural language and in a human-like manner; a main frame computer; a web server that is in operative communication with an internet; ...
System, method, and computer program product for generation of local content corpus
Groupon, Inc.
November 30, 2017 - N°20170344565

A method for generating a body of content relevant to a geographical space can comprise building a gazette containing a lexicon of at least people, places, and organizations. A system can process content obtain from a plurality of sources to bootstrap an initial set of entities for each of the places in the gazette. A local content corpus can be ...
Heuristic Patent Pack
Download 107+ patent application PDFs
Heuristic Patent Applications
Download 107+ Heuristic-related PDFs
For professional research & prior art discovery
inventor
  • 107+ full patent PDF documents of Heuristic-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Using automated data validation in loan origination to evaluate credit worthiness and data reliability
Fannie Mae
November 23, 2017 - N°20170337625

A system, comprises a device including a memory with an application configured to validate data in an acquisition installed thereon, wherein the system is improved by the application being configured to electronically receive a query for a financial transaction between a first party and a second party, electronically transmit an encryption key from the second party to a third party, ...
Adaptive heuristic behavioral policing of executable objects
Fannie Mae
November 23, 2017 - N°20170337376

Methods and systems for heuristic behavioral policing of executable objects dynamically adapt based on context to reduce false positive and false negative outcomes. The level of heuristic behavioral suspicion required to subject an inbound executable object to a policing action is determined by an adaptive suspicion threshold. The suspicion threshold is dynamically adjusted based on outcomes of processing recent executable ...
Computer-implemented land planning system and method with gis integration
Bentley Systems, Incorporated
November 16, 2017 - N°20170329875

A computer-implemented land planning system is designed to generate at least one conceptual fit solution to a user-defined land development problem. The system employs a computer readable medium and a computer program encoded on the medium. The computer program is operable, when executed on a computer, for electronically creating at least one candidate solution to the land development problem. The ...
Heuristic Patent Pack
Download 107+ patent application PDFs
Heuristic Patent Applications
Download 107+ Heuristic-related PDFs
For professional research & prior art discovery
inventor
  • 107+ full patent PDF documents of Heuristic-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Performing configuration and operating system identification for virtual machine images
Amazon Technologies, Inc.
November 09, 2017 - N°20170322823

Techniques are described for importing and using virtual machine images in configured manners, such as by a virtual machine image importation service on behalf of clients. An image may be retrieved based on a client-provided location, and various characteristics of the image may be identified via application of multiple heuristic or other assessment tests to various aspects of the retrieved ...
Efficient resource usage for location sharing in computer networks
Amazon Technologies, Inc.
November 02, 2017 - N°20170318432

A location sharing system and related processes across computer networks are provided that efficiently utilize resources by adjusting location determination techniques at client devices. A rule-based architecture including user-based heuristics facilitates location determination that is accurate while optimizing resource consumption. Current interest in or other behavior associated with a target user or requesting user can be used in selecting a ...
Method and system to identify data and content delivery on a cellular network using a ...
Amazon Technologies, Inc.
November 02, 2017 - N°20170318107

An approach is defined to establish consumption analytics of network nodes of a social network. Content is tagged and the content consumption analytics are derived from the content consumption. The content analytics and related heuristic is applied to new content shared in the social network. The content is compared to policies for content push operations and cellular network constraints to ...
Systems and methods for intelligent promotion design with promotion selection
Amazon Technologies, Inc.
November 02, 2017 - N°20170316449

Systems and methods for the selection of the promotions are provided. A set of possible offers are initially received, each including a set of variables, with each variable having a set of possible values. These form a combination of variable values for each offer. A heuristic is applied to all possible offers to reduce the number of offers being considered. ...
Multiple query optimization in sql-on-hadoop systems
Amazon Technologies, Inc.
November 02, 2017 - N°20170316055

To reduce the overall computation time of a batch of queries, multiple query optimization in sql-on-hadoop systems groups multiple mapreduce jobs converted from queries into a single one, thus avoiding redundant computations by taking sharing opportunities of data scan, map function and map output. Sql-on-hadoop converts a query into a dag of mapreduce jobs and each map function is a ...
Method for configuring a tunnel connection for an automation network
Siemens Aktiengesellschaft
October 26, 2017 - N°20170310639

In a method for configuring a communication between a first computer with an automation engineering software and a second computer which is connected in a proprietary automation network, the first computer is run in a cloud environment. The communication between the first computer and the second computer is carried out by a tunnel protocol for establishing a tunnel connection, and ...
Virtual channel joining
Siemens Aktiengesellschaft
October 19, 2017 - N°20170302724

Methods for establishing connection to the internet using multiple channels. A device takes advantage of several channels available to it internally and/or from neighboring devices to request the various resources of the webpage, and assembles the webpage using the resources arriving from the different channels. When a device has the ability to connect to the internet using multiple internal ...
Heuristic Patent Pack
Download 107+ patent application PDFs
Heuristic Patent Applications
Download 107+ Heuristic-related PDFs
For professional research & prior art discovery
inventor
  • 107+ full patent PDF documents of Heuristic-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Evaluating the evaluation behaviors of evaluators
Microsoft Technology Licensing, Llc
October 12, 2017 - N°20170295194

Systems and methods for evaluating the evaluation behaviors of an evaluator are presented. In contrast to evaluation methods that monitor and analyze click behaviors, the disclosed subject matter is directed to evaluating non-click behaviors. After obtaining results of an evaluation request submitted to a response service for evaluation by the evaluator, evaluation behaviors of the evaluator are monitored. The monitored ...
Adaptive automatic email domain name correction
Lmp Software, Llc
October 12, 2017 - N°20170295134

A system and methods for correcting domain names in invalid email addresses are described herein. The method includes receiving email failure information including a bad domain name. The bad domain name is compared to valid domain names in a valid domain name database and a match distance of the bad domain name to valid domain names in the valid domain ...
Human-machine collaborative optimization via apprenticeship scheduling
Massachusetts Institute Of Technology
October 12, 2017 - N°20170293844

Domain expert heuristics are captured within a computational framework for a task scheduling system. One or more classifiers are trained to predict (i) whether a first action should be scheduled instead of a second action using pairwise comparisons between actions scheduled by a demonstrator at particular times and actions not scheduled by the demonstrator at the particular times, and (ii) ...
Systems and methods for multi-objective heuristics with conditional genes
The Aerospace Corporation
October 12, 2017 - N°20170293839

Systems and methods are provided to engage in multi-objective optimization where there may be potential solutions for evaluation (e. G., chromosomes) that each have one or more conditional genes. The value of each of the conditional genes in each of the chromosomes may be equivalent to one of a plurality of hidden genes in each of the chromosomes. The value ...
Systems and methods for enhancing control system security by detecting anomalies in descriptive characteristics of ...
Brightsource Ics2 Ltd.
October 12, 2017 - N°20170293757

To enhance the security of an industrial control system, a data stream can be received from an input device via a communications network or an i/o subsystem of a computer system. All or part of the data stream can be stored in computer memory. Stored elements of the data stream can be retrieved from the memory. A set of ...
Wearable technology device-based behavioral analysis and heuristic feedback
International Business Machines Corporation
October 05, 2017 - N°20170286967

An aspect of wearable technology device processes includes receiving, by a wireless receiver of a wearable technology device, a transaction authorization request and a transaction amount from a contactless transaction terminal. An aspect also includes comparing the transaction amount with a current balance associated with an account of an individual corresponding to the wearable technology device. Upon determining the transaction ...
Automatic revision of a predictive damage model
General Electric Company
October 05, 2017 - N°20170286854

A method for automatic revision of a predictive damage model that assess a physical system and provides maintenance recommendations to a user platform includes evaluating the predictive model at periodic intervals, identifying alternate parameters for the model that satisfy real-world physical constraints, determining an impact of the alternate parameters on an accuracy of the predictive model, forecasting performance of a ...
System and method for generating user behavioral avatar based on personalized backup
Acronis International Gmbh
October 05, 2017 - N°20170286824

A personalized data backup application logs all user actions performed with the user's electronic files. During operation, all files modified by user actions, such as sending messages, uploading images or videos, taking pictures/videos, posting on social networks or in the chats, activating voice or sensory devices, are detected. These files can be located on user's mobile device or computer ...
Loading