The present disclosure relates to the field of computers, and specifically to the use of computers in allocating human resources. Still more particularly, the present disclosure relates to the use of computers to allocate human resources to cohorts used by a workgroup.
A computer implemented method, program product, and/or system allocate human resources to a cohort. At least one attribute held by each member of a group of human resources is identified. A request is received, from a planned cohort, for multiple human resources that collectively possess a set of predefined attributes, wherein no single human resource possesses all of the predefined attributes. The set of human resources that satisfies the request is identified and assigned to the planned cohort.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including, but not limited to, wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
With reference now to the figures, and in particular to
Computer 102 includes a processor 104 that is coupled to a system bus 106. Processor 104 may utilize one or more processors, each of which has one or more processor cores. A video adapter 108, which drives/supports a display 110, is also coupled to system bus 106. System bus 106 is coupled via a bus bridge 112 to an input/output (I/O) bus 114. An I/O interface 116 is coupled to I/O bus 114. I/O interface 116 affords communication with various I/O devices, including a keyboard 118, a mouse 120, a media tray 122 (which may include storage devices such as CD-ROM drives, multi-media interfaces, etc.), a printer 124, and external USB port(s) 126. While the format of the ports connected to I/O interface 116 may be any known to those skilled in the art of computer architecture, in one embodiment some or all of these ports are universal serial bus (USB) ports.
As depicted, computer 102 is able to communicate with a software deploying server 150, human resource requesting computers 152, and/or human resource computers 154 using a network interface 130. Network 128 may be an external network such as the Internet, or an internal network such as an Ethernet or a virtual private network (VPN).
A hard drive interface 132 is also coupled to system bus 106. Hard drive interface 132 interfaces with a hard drive 134. In one embodiment, hard drive 134 populates a system memory 136, which is also coupled to system bus 106. System memory is defined as a lowest level of volatile memory in computer 102. This volatile memory includes additional higher levels of volatile memory (not shown), including, but not limited to, cache memory, registers and buffers. Data that populates system memory 136 includes computer 102's operating system (OS) 138 and application programs 144.
OS 138 includes a shell 140, for providing transparent user access to resources such as application programs 144. Generally, shell 140 is a program that provides an interpreter and an interface between the user and the operating system. More specifically, shell 140 executes commands that are entered into a command line user interface or from a file. Thus, shell 140, also called a command processor, is generally the highest level of the operating system software hierarchy and serves as a command interpreter. The shell provides a system prompt, interprets commands entered by keyboard, mouse, or other user input media, and sends the interpreted command(s) to the appropriate lower levels of the operating system (e.g., a kernel 142) for processing. Note that while shell 140 is a text-based, line-oriented user interface, the present invention will equally well support other user interface modes, such as graphical, voice, gestural, etc.
As depicted, OS 138 also includes kernel 142, which includes lower levels of functionality for OS 138, including providing essential services required by other parts of OS 138 and application programs 144, including memory management, process and task management, disk management, and mouse and keyboard management.
Application programs 144 include a renderer, shown in exemplary manner as a browser 146. Browser 146 includes program modules and instructions enabling a world wide web (WWW) client (i.e., computer 102) to send and receive network messages to the Internet using hypertext transfer protocol (HTTP) messaging, thus enabling communication with software deploying server 150 and other described computer systems.
Application programs 144 in computer 102's system memory (as well as software deploying server 150's system memory) also include a human resource allocating logic (HRAL) 148. HRAL 148 includes code for implementing the processes described below, including those described in
The hardware elements depicted in computer 102 are not intended to be exhaustive, but rather are representative to highlight essential components required by the present invention. For instance, computer 102 may include alternate memory storage devices such as magnetic cassettes, digital versatile disks (DVDs), Bernoulli cartridges, and the like. These and other variations are intended to be within the spirit and scope of the present invention.
Referring now to
Assume that workgroup 208 is assigned to a particular project. Workgroup 208 can plan on having multiple cohorts to perform sub-processes of that project. As such, these planned cohorts send the human resource allocating system 202 a request 204. Request 204 is from one of the cohorts 206a-n (e.g., using one of the human resource requesting computers 152 shown in
With reference now to
Assume now that a project to which workgroup 208 has been assigned requires a cohort (e.g., cohort 206a) to include human resources that collectively have attributes A-D (where no individual human resource has all of these attributes). This scenario provides three possible solutions: human resource 210a (who has attributes A, B, C) combined with human resource 210b (who has duplicate attribute C along with needed attribute D); human resource 210a (who has attributes A, B, C) combined with human resource 210c (who has duplicate attributes A and B along with needed attribute D); human resource 210b (who has attributes C and D) combined with human resource 210c (who has duplicate attribute D along with needed attributes A and B). A processor can decide which of these combinations to use by applying other constraints to the problem.
For example, assume that human resource 210a has been assigned a weight that is higher than the weight held by human resource 210b. This weight describes how valuable each human resource is to the planned cohort 206a and/or workgroup 208 and/or the project. The weight can be based on a set of predefined attributes needed by the cohort/workgroup/project. Thus, since human resource 210a and human resource 210c have more needed attributes than human resource 210b, then one of human resource 210a or human resource 210c will be assigned to the planned cohort 206a. Since human resource 210a or human resource 210c have the same number of attributes, the “tie” can be broken based on several factors. In one embodiment, the different attributes are given different weights (based on how significant they are to the project). Thus, if attribute 302d has a higher significance weight than attribute 302a or attribute 302b, then human resource 210c would be selected to be combined with human resource 210b to make up cohort 206a.
In one embodiment, features, related to a particular individual, beyond those defined by attributes 302a-d may determine which human resources are used to create cohort 206a, based on some enterprise rule (such as criteria for tenure selection). For example, assume that human resource 210a is a professor in a university who is due for tenure consideration, while human resources 210a-b are too junior for such consideration. If selection to work with workgroup 208 via cohort 206a would be beneficial to human resource 210a, then that person would be given preference (e.g., would be assigned a higher weight) to join cohort 206a. Thus, a balance is struck between the needs of the cohort/workgroup/project and the needs of the individual person under consideration for inclusion in the cohort 206a.
With reference now to
In one embodiment, if the databases being crawled are writings/speeches by the individual, then keyword searches can be for words from a particular field's specialized lexicon. For example, assume that an individual has used the term “nyctalopia”, which means “night blindness.” Since “nyctalopia” is not a commonly used word, an assumption can be made by computer logic that the person who used the term has an interest and/or an expertise in ophthalmology/optometry. In this example, therefore, the attribute “Interest and/or Expertise in Vision” would be assigned to that individual by the computer logic/processor.
In one embodiment, an individual's interest/expertise can be determined by the frequency, consistency, and/or longevity of terminology usage in available databases. For example, assume that crawling available databases reveals three individuals who use a certain predetermined term. A first person has been consistently (year after year) using the term in nearly all of his writings/speeches during the past twenty years. A second person used the term frequently twenty years ago, but has not used it since then. A third person used the term frequently during the current year, but had never used the term before. In this example, computer logic can conclude that the person with the highest level of interest/expertise in the subject associated with the crawled term is the first person, due to the long and consistent use of the term. The third person would have the next highest level of interest/expertise, since that person has demonstrated a current interest in the field through her writings/speeches. The second person would have an interest level of interest/expertise below that of the third person, since the second person apparently is no longer interested in the field. Of course, all three persons presumptively show a higher level of interest/expertise than anyone who has never used the term at all. Note that additional computer logic is used to recognize archaic terms. That is, if the crawling logic is looking for “Term A” (e.g., “Pertussis”), which used to be called “Term B” (e.g., “Whooping Cough”), then the crawling logic will use a mapping logic between these two terms in order to search for both terms.
Note that crawling of publications can also include an attribute weight value based on the document from which selected terms are identified. For example, assume that “Term A”, which has been deemed to be indicative of an interest in “Topic X”, has been used by a first individual in “Prestigious Journal”, while the same term has been used by a second individual in “Disreputable Journal”. In this example, a higher weighting is given to the attribute of “Interest/Expertise in Topic X” for the first individual over the second individual. Therefore, the first individual will be chosen over the second individual to meet the attribute requirement of “Interest/Expertise in Topic X” for a certain project.
Note further that the source of the databases being crawled may be kept secret. That is, while crawling logic may have access to a database that is sensitive, if not actually security protected, the identity of that database should be shielded from non-crawling logic. For example, assume that the crawling logic located a term, used by an individual, which indicates that individual's interest in a particular field/topic/subject area, and that the term usage by that individual was from an enterprise's internal accounting system. Details of what is in this database may be required, by rules/regulations/statute/policy, to be kept confidential. Thus, while the crawling logic can use the database to assign an attribute (i.e., “Interest/Expertise in Corporate Financial Write-offs”) to an individual, the crawling logic should not identify the database itself, since doing so may reveal insider information about the enterprise's finances.
The various embodiments described in the database crawling discussed herein describe a predetermined significance rule. Examples of such predetermined significance rules described herein include frequency, longevity, and consistency of usage; usage in weighted publications; usage of arcane terms; etc.
A request is received for multiple human resources that collectively possess a set of predefined attributes (block 406). The request may be received from a planned cohort (e.g., element 206a shown in
In one embodiment, certain individuals may be highly compatible if their different attributes (e.g., skill sets) complement one another, if they speak the same language (or are able to provide language interpretation skills to the cohort), if they have a shared interest in the project, etc. For example, assume that a cohort is made up of ten individuals, where four speak only Spanish and four speak only English. The remaining two individuals may be given a higher weighting (indicating their value to the cohort) if they are able to translate between the Spanish speakers and the English speakers, even though this skill set if not one of the set of predetermined attributes called for by the workgroup/project.
In one embodiment, the individual needs (including interests in certain project areas, need to be part of a project in order to further the individual's career, desire to work with certain named individuals, etc.) are received by a human resource allocating system by user-inputs from different human resources.
Continuing with block 408, there may be occasions in which the requisite human resources are not available within an initial community. In this situation, the needed human resources can be created (by new hires, new training, contracting out, etc.), subject to financial limitations. Alternatively, the human resource allocation logic can redefine the set of predefined attributes needed by the project/workgroup/cohort. For example, assume that the project states that three medical doctors are needed for a research project. If only two medical doctors are available within a pool of human resources, then the human resource allocation logic may 1) suggest to a project manager or 2) decide on its own (based on predefined constraints) that the third member of the cohort may be a doctor of osteopathic medicine, a nurse practitioner, etc.
With further reference to block 408, the needs of the individual also include a consideration of the type of project/cohort to which they will be assigned. For example, certain projects (e.g., establishing a set of standards for a new technology) could be considered by most cohort candidates as being more onerous than a project to evaluate proposed convention locations at various resorts around the world. Thus, if a person has dutifully served on one or more onerous projects, then that person would be given priority to participate in a project that is deemed more desirable, either by general consensus (e.g., resort shopping) or by the individual's own stated preferences.
As depicted in block 410, multiple cohorts are defined and assigned to the workgroup. In one embodiment, each cohort satisfies at least one unique need of a project to which the workgroup is assigned. For example, assume that the project is a medical research project. A first cohort may be made up of individual having certain medical conditions being studied, while a second cohort may be made up of health care providers who will be giving physical examinations to the persons in the first cohort, and a third cohort may be made up of information technology (IT) experts who will be collecting and analyzing data resulting from the physical examinations. Thus, the functions of the multiple cohorts are defined and assigned to the workgroup for use on the project. In another embodiment, a single cohort may satisfy several needs of the project (e.g., a single cohort includes both medical professionals as well as IT experts).
As depicted in block 412, a run time (e.g., start date through completion date) for a project can be predicted. A determination is then made (query block 414) as to whether all members of the proposed cohorts will be available when the project actually starts/ends in the future. If all members of a particular cohort will not be available, then a new cohort will be created (block 408), either predictively or at the actual run time. Whether the new cohort is created predictively or at run time, predicting which human resources will be available can be based on historical data (e.g., how many persons having certain attributes have become available at a same time of each of the past five years). For example, assume that a determination has been made that a cohort will need four electron microscope operators at run time, which will be two years in the future. For each of the past five years, a school's graduate program has received, at the beginning of each new school year, at least ten new students who are electron microscope operators. Thus, a reasonable/safe prediction is that there will be at least four electron microscope operators who will be available to the cohort at run time in the next year or two.
Once a determination is made that all members of the set of human resources are (or will be) available at run time, then this set of human resources are assigned to the planned cohort for use by the workgroup with the project (block 416).
A query is then made to determine if the cohort is acceptable (query block 418). This acceptance may come from a manager of a project, who may not explain why a cohort was accepted/rejected. That is, a manager of a project may simply reply with “Reject” when presented a cohort that has been assembled by the computer logic without giving an explanation for the rejection. In one embodiment, the reason for the rejection is determined by computer heuristics. For example, assume that all of the set of predefined attributes required for the project, as well as the needs of the individuals, have been met. However, there are still some unknown attributes that may or may not be useful to the project and/or in meeting the needs of the individuals. For example, a certain individual may bring to the project contacts, traits, etc. that are either useful or detrimental. If the cohort is repeatedly deemed unacceptable whenever this individual is part of the cohort, then the computer logic will “learn” not to include that individual in future cohorts (block 420). Similarly, if all or most cohorts that include a certain individual (e.g., a well connected and/or particularly well-respected individual) are deemed acceptable by a project manager, then computer logic will try to include that individual in future cohorts. The process ends at terminator block 422.
Note that in one embodiment of the present disclosure a cohort is dynamic. That is, members can come into and leave a cohort before and/or during the project, even though the requirements of the project may remain fixed. In this embodiment, newly arriving members of the cohort go through the same analysis described above, such that existing members of a cohort may need to be removed if an optimal combination of members (i.e., members having the needed attributes) is obtained by evicting existing members from the cohort.
Note further that, in one embodiment of the present disclosure, cohort population includes predictions of needs of future cohorts. For example, assume that a computer logic “knows” that additional cohorts will be needed for near or distant future projects. Thus, an “optimal” or “dream team” current cohort may need to be broken up for a present project, in order to keep some of the members of the current cohort available to work on future projects.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of various embodiments of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Note further that any methods described in the present disclosure may be implemented through the use of a VHDL (VHSIC Hardware Description Language) program and a VHDL chip. VHDL is an exemplary design-entry language for Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), and other similar electronic devices. Thus, any software-implemented method described herein may be emulated by a hardware-based VHDL program, which is then applied to a VHDL chip, such as a FPGA.
Having thus described embodiments of the invention of the present application in detail and by reference to illustrative embodiments thereof, it will be apparent that modifications and variations are possible without departing from the scope of the invention defined in the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
2671443 | Holland | Mar 1954 | A |
3711152 | Sirpak et al. | Jan 1973 | A |
4803625 | Fu et al. | Feb 1989 | A |
4883063 | Bernard et al. | Nov 1989 | A |
4890227 | Watanabe et al. | Dec 1989 | A |
5024225 | Fang | Jun 1991 | A |
5070453 | Duffany | Dec 1991 | A |
5111391 | Fields et al. | May 1992 | A |
5128871 | Schmitz | Jul 1992 | A |
5148365 | Dembo | Sep 1992 | A |
5167230 | Chance | Dec 1992 | A |
5216593 | Dietrich et al. | Jun 1993 | A |
5590648 | Mitchell et al. | Jan 1997 | A |
5601435 | Quy | Feb 1997 | A |
5764740 | Holender | Jun 1998 | A |
5838918 | Prager et al. | Nov 1998 | A |
5880598 | Duong | Mar 1999 | A |
6021403 | Horvitz et al. | Feb 2000 | A |
6049776 | Donnelly et al. | Apr 2000 | A |
6076166 | Moshfeghi et al. | Jun 2000 | A |
6102856 | Groff et al. | Aug 2000 | A |
6144837 | Quy | Nov 2000 | A |
6164975 | Weingarden et al. | Dec 2000 | A |
6212524 | Weissman et al. | Apr 2001 | B1 |
6272483 | Joslin et al. | Aug 2001 | B1 |
6289340 | Puram et al. | Sep 2001 | B1 |
6321207 | Ye | Nov 2001 | B1 |
6381577 | Brown | Apr 2002 | B1 |
6449641 | Moiin et al. | Sep 2002 | B1 |
6466232 | Newell et al. | Oct 2002 | B1 |
6484155 | Kiss et al. | Nov 2002 | B1 |
6578068 | Bowman-Amuah | Jun 2003 | B1 |
6604160 | Le et al. | Aug 2003 | B1 |
6647374 | Kansal | Nov 2003 | B2 |
6675159 | Lin et al. | Jan 2004 | B1 |
6885936 | Yashio et al. | Apr 2005 | B2 |
6889137 | Rychlak | May 2005 | B1 |
6905816 | Jacobs et al. | Jun 2005 | B2 |
6937147 | Dilbeck et al. | Aug 2005 | B2 |
6954736 | Menninger et al. | Oct 2005 | B2 |
7149533 | Laird et al. | Dec 2006 | B2 |
7181428 | Lawrence | Feb 2007 | B2 |
7213009 | Pestotnik et al. | May 2007 | B2 |
7221928 | Laird et al. | May 2007 | B2 |
7243024 | Endicott | Jul 2007 | B2 |
7295925 | Breed et al. | Nov 2007 | B2 |
7319386 | Collins et al. | Jan 2008 | B2 |
7343316 | Goto et al. | Mar 2008 | B2 |
7400257 | Rivas | Jul 2008 | B2 |
7403922 | Lewis et al. | Jul 2008 | B1 |
7457764 | Bullock et al. | Nov 2008 | B1 |
7460019 | Henderson | Dec 2008 | B2 |
7464147 | Fakhouri et al. | Dec 2008 | B1 |
7516142 | Friedlander et al. | Apr 2009 | B2 |
7523118 | Friedlander et al. | Apr 2009 | B2 |
7539533 | Tran | May 2009 | B2 |
7539623 | Wyatt | May 2009 | B1 |
7542878 | Nanikashvili | Jun 2009 | B2 |
7558745 | Cullen et al. | Jul 2009 | B2 |
7584160 | Friedlander et al. | Sep 2009 | B2 |
7630948 | Friedlander et al. | Dec 2009 | B2 |
7630986 | Herz et al. | Dec 2009 | B1 |
7647288 | Friedlander et al. | Jan 2010 | B2 |
7693736 | Chu et al. | Apr 2010 | B1 |
7702605 | Friedlander et al. | Apr 2010 | B2 |
7739606 | Sawada et al. | Jun 2010 | B2 |
7752154 | Friedlander et al. | Jul 2010 | B2 |
7801885 | Verma | Sep 2010 | B1 |
7930262 | Friedlander et al. | Apr 2011 | B2 |
7933228 | Coley | Apr 2011 | B2 |
7935076 | Estes et al. | May 2011 | B2 |
7937214 | Kaneda et al. | May 2011 | B2 |
8001008 | Engle | Aug 2011 | B2 |
8010516 | Ishii et al. | Aug 2011 | B2 |
8045455 | Agronow et al. | Oct 2011 | B1 |
8055603 | Angell et al. | Nov 2011 | B2 |
8126882 | Lawyer | Feb 2012 | B2 |
8204779 | Hughes et al. | Jun 2012 | B1 |
8207859 | Enegren et al. | Jun 2012 | B2 |
8207860 | Enegren et al. | Jun 2012 | B2 |
20010034632 | Wilkinson | Oct 2001 | A1 |
20010039373 | Cunningham et al. | Nov 2001 | A1 |
20010051765 | Walker et al. | Dec 2001 | A1 |
20020019764 | Mascarenhas | Feb 2002 | A1 |
20020029161 | Brodersen | Mar 2002 | A1 |
20020035572 | Takatori et al. | Mar 2002 | A1 |
20020052756 | Lomangino | May 2002 | A1 |
20020059201 | Work | May 2002 | A1 |
20020107824 | Ahmed et al. | Aug 2002 | A1 |
20020111922 | Young et al. | Aug 2002 | A1 |
20020115447 | Martin et al. | Aug 2002 | A1 |
20020182573 | Watson | Dec 2002 | A1 |
20030033180 | Shekar et al. | Feb 2003 | A1 |
20030065544 | Elzinga et al. | Apr 2003 | A1 |
20030088491 | Liu et al. | May 2003 | A1 |
20030092976 | Murase et al. | May 2003 | A1 |
20030097291 | Freedman | May 2003 | A1 |
20030140063 | Pizzorno et al. | Jul 2003 | A1 |
20030177038 | Rao | Sep 2003 | A1 |
20030220830 | Myr | Nov 2003 | A1 |
20030220860 | Heytens et al. | Nov 2003 | A1 |
20040006694 | Heelan et al. | Jan 2004 | A1 |
20040122787 | Avinash et al. | Jun 2004 | A1 |
20040155772 | Medema et al. | Aug 2004 | A1 |
20040155815 | Muncaster et al. | Aug 2004 | A1 |
20040199056 | Husemann et al. | Oct 2004 | A1 |
20040243422 | Weber et al. | Dec 2004 | A1 |
20040267595 | Woodings et al. | Dec 2004 | A1 |
20050004823 | Hnatio | Jan 2005 | A1 |
20050004828 | DeSilva et al. | Jan 2005 | A1 |
20050037730 | Montague | Feb 2005 | A1 |
20050038608 | Chandra et al. | Feb 2005 | A1 |
20050080806 | Doganata et al. | Apr 2005 | A1 |
20050085257 | Laird et al. | Apr 2005 | A1 |
20050101873 | Misczynski et al. | May 2005 | A1 |
20050144062 | Mittal et al. | Jun 2005 | A1 |
20050149466 | Hale et al. | Jul 2005 | A1 |
20050165594 | Chandra et al. | Jul 2005 | A1 |
20050198486 | Desmond et al. | Sep 2005 | A1 |
20050222989 | Haveliwala et al. | Oct 2005 | A1 |
20050240668 | Rolia et al. | Oct 2005 | A1 |
20060010090 | Brockway et al. | Jan 2006 | A1 |
20060023848 | Mohler et al. | Feb 2006 | A1 |
20060031110 | Benbassat et al. | Feb 2006 | A1 |
20060036560 | Fogel | Feb 2006 | A1 |
20060069514 | Chow et al. | Mar 2006 | A1 |
20060105830 | Nemitz et al. | May 2006 | A1 |
20060118541 | Ellis et al. | Jun 2006 | A1 |
20060155627 | Horowitz | Jul 2006 | A1 |
20060184412 | Kagan et al. | Aug 2006 | A1 |
20060194186 | Nanda | Aug 2006 | A1 |
20060200435 | Flinn et al. | Sep 2006 | A1 |
20060206724 | Schaufele et al. | Sep 2006 | A1 |
20060208169 | Breed et al. | Sep 2006 | A1 |
20060218010 | Michon et al. | Sep 2006 | A1 |
20060226991 | Rivas | Oct 2006 | A1 |
20060294085 | Rose et al. | Dec 2006 | A1 |
20070073654 | Chow et al. | Mar 2007 | A1 |
20070073754 | Friedlander et al. | Mar 2007 | A1 |
20070073799 | Adjali et al. | Mar 2007 | A1 |
20070112261 | Enegren et al. | May 2007 | A1 |
20070112735 | Holloway et al. | May 2007 | A1 |
20070124058 | Kitagawa et al. | May 2007 | A1 |
20070150325 | Bjornson | Jun 2007 | A1 |
20070160964 | Albertsson | Jul 2007 | A1 |
20070168307 | Floudas et al. | Jul 2007 | A1 |
20070174090 | Friedlander et al. | Jul 2007 | A1 |
20070174091 | Friedlander et al. | Jul 2007 | A1 |
20070174101 | Li et al. | Jul 2007 | A1 |
20070179356 | Wessel | Aug 2007 | A1 |
20070185737 | Friedlander et al. | Aug 2007 | A1 |
20070203872 | Flinn et al. | Aug 2007 | A1 |
20070244701 | Erlanger et al. | Oct 2007 | A1 |
20070250361 | Hazy | Oct 2007 | A1 |
20070274337 | Purpura | Nov 2007 | A1 |
20080015422 | Wessel | Jan 2008 | A1 |
20080015871 | Eder | Jan 2008 | A1 |
20080028409 | Cherkasova et al. | Jan 2008 | A1 |
20080065576 | Friedlander et al. | Mar 2008 | A1 |
20080077463 | Friedlander et al. | Mar 2008 | A1 |
20080082356 | Friedlander | Apr 2008 | A1 |
20080082374 | Kennis et al. | Apr 2008 | A1 |
20080147694 | Ernest et al. | Jun 2008 | A1 |
20080155104 | Quinn et al. | Jun 2008 | A1 |
20080167929 | Cao et al. | Jul 2008 | A1 |
20080172352 | Friedlander et al. | Jul 2008 | A1 |
20080177687 | Friedlander et al. | Jul 2008 | A1 |
20080177688 | Friedlander et al. | Jul 2008 | A1 |
20080189402 | Betzler et al. | Aug 2008 | A1 |
20080208801 | Friedlander et al. | Aug 2008 | A1 |
20080208813 | Friedlander et al. | Aug 2008 | A1 |
20080208814 | Friedlander et al. | Aug 2008 | A1 |
20080208832 | Friedlander et al. | Aug 2008 | A1 |
20080208838 | Friedlander et al. | Aug 2008 | A1 |
20080208875 | Friedlander et al. | Aug 2008 | A1 |
20080208901 | Friedlander et al. | Aug 2008 | A1 |
20080208902 | Friedlander et al. | Aug 2008 | A1 |
20080208903 | Friedlander et al. | Aug 2008 | A1 |
20080208904 | Friedlander et al. | Aug 2008 | A1 |
20080209493 | Choi et al. | Aug 2008 | A1 |
20080221419 | Furman | Sep 2008 | A1 |
20080242509 | Menektchiev et al. | Oct 2008 | A1 |
20080246629 | Tsui et al. | Oct 2008 | A1 |
20080275321 | Furman | Nov 2008 | A1 |
20080281974 | Slothouber et al. | Nov 2008 | A1 |
20080288862 | Smetters et al. | Nov 2008 | A1 |
20080294459 | Angell et al. | Nov 2008 | A1 |
20080294692 | Angell et al. | Nov 2008 | A1 |
20090024553 | Angell et al. | Jan 2009 | A1 |
20090069787 | Estes et al. | Mar 2009 | A1 |
20090089149 | Lerner et al. | Apr 2009 | A1 |
20090106179 | Friedlander et al. | Apr 2009 | A1 |
20090112670 | Black et al. | Apr 2009 | A1 |
20090138300 | Kagan et al. | May 2009 | A1 |
20090140923 | Graves et al. | Jun 2009 | A1 |
20090198696 | Banks | Aug 2009 | A1 |
20090198733 | Gounares et al. | Aug 2009 | A1 |
20090267774 | Enegren et al. | Oct 2009 | A1 |
20090267775 | Enegren et al. | Oct 2009 | A1 |
20090270705 | Enegren et al. | Oct 2009 | A1 |
20090287503 | Angell et al. | Nov 2009 | A1 |
20090287674 | Bouillet et al. | Nov 2009 | A1 |
20090287683 | Bennett | Nov 2009 | A1 |
20090299766 | Friedlander et al. | Dec 2009 | A1 |
20090299928 | Kongtcheu | Dec 2009 | A1 |
20100010832 | Boute et al. | Jan 2010 | A1 |
20100042456 | Stinchcombe et al. | Feb 2010 | A1 |
20100056643 | Bachynsky et al. | Mar 2010 | A1 |
20100057655 | Jacobson et al. | Mar 2010 | A1 |
20100063877 | Soroca et al. | Mar 2010 | A1 |
20100077438 | Ansari | Mar 2010 | A1 |
20100131028 | Hsu et al. | May 2010 | A1 |
20100191516 | Benish et al. | Jul 2010 | A1 |
20100223581 | Manolescu et al. | Sep 2010 | A1 |
20100228715 | Lawrence | Sep 2010 | A1 |
20100274770 | Gupta | Oct 2010 | A1 |
20110054968 | Galaviz | Mar 2011 | A1 |
20110093287 | Dicks et al. | Apr 2011 | A1 |
20110131082 | Manser | Jun 2011 | A1 |
20110190579 | Ziarno et al. | Aug 2011 | A1 |
20110213655 | Henkin | Sep 2011 | A1 |
20110246055 | Huck et al. | Oct 2011 | A1 |
20110251790 | Liotopoulos et al. | Oct 2011 | A1 |
20110275480 | Champsaur | Nov 2011 | A1 |
20110275907 | Inciardi et al. | Nov 2011 | A1 |
20120108984 | Bennett et al. | May 2012 | A1 |
20120245479 | Ganesh et al. | Sep 2012 | A1 |
20130096966 | Barnes, Jr. | Apr 2013 | A1 |
20130109997 | Linke et al. | May 2013 | A1 |
Entry |
---|
T. Vercauteren et al., “Hierarchical Forecasting of Web Server Workload Using Sequential Monte Carlo Training”, IEEE Transactions on Signal Processing, vol. 55, No. 4, pp. 1286-1297, Apr. 2007. |
P. Palazzari et al., “Synthesis of Pipelined Systems for the Contemporaneous Execution of Periodic and Aperiodic Tasks With Hard Real-Time Constraints”, 18th International Parallel and Distributed Processing Symposium, 121. IEEE Comput. Soc, Los Alamitos, CA, USA, 2004, pp. LVI-289. |
RL Dillon et al., “Optimal Use of Budget Reserves to Minimize Technical and Management Failure Risks During Complex Project Development”, IEEE Transactions on Engineering Management, vol. 52, No. 3, pp. 382-395, Aug. 2005. |
K. Vanthournout et al., “A Taxonomy for Resource Discovery”, PERS Ubiquit Comput 9, pp. 81-89, 2005. |
C. Srisuwanrat et al., “Optimal Scheduling of Probabilistic Repetitive Projects Using Completed Unit and Genetic Algorithms”, Proceedings of the 2007 Winter Simulation Conference, pp. 2151-2158, 2007. |
S. Bharathi et al., “Scheduling Data-Intensive Workflows on Storage Constrained Resources”, Works 09, Portland, OR, pp. 1-10 Nov. 15, 2009. |
J. Redondo et al., “Solving the Multiple Competitive Facilities Location and Design Problem on the Plane”, Massachusetts Institute of Technology, Evolutionary Computation, vol. 17, No. 1, pp. 21-53, 2009. |
H. Van et al., “Autonomic Virtual Resource Management for Service Hosting Platforms”, Cloud'09, pp. 1-8 , May 23, 2009. |
U.S. Appl. No. 12/795,847, Specification filed Jun. 8, 2010. |
U.S. Appl. No. 12/903,376—Non-Final Office Action Mailed Jul. 30, 2012. |
U.S. Appl. No. 12/875,261—Notice of Allowance Mailed Sep. 27, 2012. |
Phillip E. Hayes et al., “Picking Up the Pieces: Utilizing Disaster Recovery Project Management to Improve Readiness and Response Time,” IEEE Industry Applications Magazine, Nov./Dec. 2002, pp. 1-10 (Abstract). |
Kun Wang et al., “A Mathematical Approach to Disaster Recovery Planning,” Proceedings of the First International Conference on Semantics, Knowledge, and Grid, 2005, pp. 1-3 (Abstract). |
E. A. Silver, “An Overview of Heuristic Solution Methods,” The Journal of the Operational Research Society, vol. 55, No. 9, Sep. 2004, pp. 936-956 (Abstract). |
Smith et al., “Collaborative Approaches to Research,” HEFCE Fundamental Review of Research Policy and Planning, Final Report, Apr. 2000, pp. 1-117. |
William E. Souder, “Analytical Effectiveness of Mathematical Models for R&D Project Selection,” Management Science, vol. 19, No. 8, Application Seires, Apr. 1973, pp. 907-923 (Abstract). |
J. Altmann et al., “Cooperative Software Development: Concepts, Model and Tools,” Technology of Object-Oriented Languages and Systems, 1999, pp. 1-14. |
Shou-Qi Cao et al., “Research on Resource Scheduling for Development Process of Complicated Product,” Computer Supported Cooperative Work in Design, 2005. Proceedings of the Ninth International Conference on, vol. 1, pp. 229-233 (Abstract). |
Ming Chen et al., “Research on Organization Method of Development Activities for Complicated Product,” Computer Supported Cooperative Work in Design, 2005. Proceedings of the Ninth International Conference on, vol. 1, pp. 234-239 (Abstract). |
Luckham et al., “Event Processing Glossary,” Jul. 2008, pp. 1-19. http://complexevents.com. |
Dept of Health and Human Services Agency for Healthcare Research and Quality, “AHRQ Quality Indicators—Patient Safety Indicators—Technical Specifications,” 2012, pp. 1-149. http://www.qualityindicators.ahrq.gov. |
Wong et al., “Rule-Based Anomaly Pattern Detection for Detecting Disease Outbreaks,” AAAI-02 Proceedings, 2002, pp. 1-7. |
Grzymala-Busse, “Knowledge Acquisition Under Uncertainty—A Rough Set Approach,” Journal of Intelligent and Robotic Systems, 1988 (Abstract). |
Schadow et al., “Discussion Paper: Privacy-Preserving Distributed Queries for a Clinical Case Research Network,” IEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, 2002 (Abstract). |
U.S. Appl. No. 13/253,431—Non-Final Office Action Mailed Sep. 11, 2013. |
Nih Article, “Agepage—Hyperthermia: Too Hot for Your Health”, National Institute on Aging, National Institutes of Health, Jul. 2010, pp. 1-4. |
U.S. Appl. No. 13/253,431—Notice of Allowance mailed Oct. 22, 2014. |
Bashur et al., “TeleMedicine: A New Health Care Delivery System”, Annual Reviews Public Health 21 (2000): pp. 613-637, 2000. |
Blumrosen et al., “New Wearable Body Sensor for Continuous Diagnosis of Internal Tissue Bleeding”, in Proceedings of the 2009 Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 5 pages, 2009. |
Gao et al., “Vital Signs Monitoring and Patient Tracking Over a Wireless Network”, in Proceedings of the 27th Annual International Conference of the IEEE EMBS, Shanghai, Sep. 2005, 4 pages. |
Hong et al., “A Wireless 3-Channel ECG Transmission System Using PDA Phone”, 2007 International Conference on Convergence Information Technology, IEEE Computer Society, pp. 462-465, 2007. |
Milenkovic et al., “Wireless Sensor Networks for Personal Health Monitoring: Issues and an Implementation”, Computer Communications 29 (2006): pp. 2521-2533, 2006. |
Morton et al., “Importance of Emergency Identification Schemes”, Emergency Medicine Journal 2002; 19: pp. 584-586, 2002. |
Shin et al., “Ubiquitous House and Unconstrained Monitoring Devices for Home Healthcare System”, in Proceedings of the 6th International Special Topic Conference on ITAB, 2007, Tokyo, pp. 201-204. |
U.S. Appl. No. 12/884,665—Examiner's Answer Mailed May 16, 2013. |
U.S. Appl. No. 12/795,847—Notice of Allowance Mailed Jun. 5, 2013. |
U.S. Appl. No. 13/253,431—Final Office Action Mailed May 21, 2013. |
U.S. Appl. No. 12/884,665—Final Office Action Mailed Oct. 18, 2012. |
U.S. Appl. No. 12/795,847—Non-Final Office Action Mailed Nov. 26, 2012. |
U.S. Appl. No. 12/903,376—Notice of Allowance Mailed Dec. 19, 2012. |
U.S. Appl. No. 13/253,431—Non-Final Office Action Mailed Jan. 3, 2013. |
U.S. Appl. No. 13/253,431—Specification Filed Oct. 5, 2011. |
U.S. Appl. No. 12/903,376—Specification Filed Oct. 13, 2010. |
U.S. Appl. No. 12/875,261—Specification Filed Sep. 3, 2010. |
U.S. Appl. No. 12/884,665—Specification Filed Sep. 17, 2010. |
U.S. Appl. No. 12/875,261—Non-Final Office Action Mailed Feb. 14, 2012. |
U.S. Appl. No. 12/884,665—Non-Final Office Action Mailed Apr. 11, 2012. |
U.S. Appl. No. 13/253,431—Non-Final Office Action Mailed Nov. 10, 2011. |
U.S. Appl. No. 13/253,431—Non-Final Office Action Mailed Mar. 31, 2014. |
Mordecai, M. “Physiological Stats Monitoring for Firefighters: Watching Out for Overexertion Before It's Too Late”, firerescue1.com, Jun. 18, 2008, pp. 1-4. |
Number | Date | Country | |
---|---|---|---|
20120035971 A1 | Feb 2012 | US |