The present application relates generally to the technical field of algorithms and programming and, in one specific example, the retrieving of transaction data for graphical display.
The large volume of transactions occurring over networks such as the Internet create a large amount of data. This data is typically stored and accessed on a piecemeal basis to determine the characteristics of specific transactions. These characteristics may include the item sold, the price of the item, the parties to the transaction, or other useful information.
Some embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings in which:
A system and method for displaying transaction data using an adjacency matrix representation is illustrated. In the following description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of some embodiments. It may be evident, however, to one skilled in the art that some embodiments may be practiced without these specific details.
In some example embodiments, a system and method for displaying transaction data using an adjacency matrix representation is illustrated. Large amounts of data are generated and retained by companies that run e-commerce web sites and other sites that transact in good and services. This data can easily range into the petabyte size for large merchants. The relationships captured within this data may include transactions, accounts held by persons (e.g., legal person such as corporations, and natural persons), amounts spent, the persons between whom a transaction takes place, the time of transactions, the date of transactions, and other suitable data describing a transaction. In one example embodiment, a transaction may be any type of relationship between two or more persons, where this relationship may be represented in a digital format. In some example cases, this data may be analyzed to reveal certain trends. These trends may include the existence of on-going fraud, the buying habits of customers and potential customers, and a host of other information.
Some example embodiments may include transaction data retrieved based upon accounts and the transaction data associated with these accounts. This transaction data may include sales made by one seller, associated with an account, as identified by an account identifier, to a purchaser associated with a different account identified by an account identifier. In addition to sales, other types of transactions between sellers, or more generally person identified by accounts, made be considered transaction data. These transaction types may include email exchanges as tracked by IP address, common transaction amounts between or by persons identified by accounts, or transactions engaged in by persons having similar geographic locations.
In one example embodiment, an adjacency matrix is generated where the indices of the matrix represent accounts and the positions within the matrix are associated with the existence of attributes between those accounts. This adjacency matrix may be converted into a graph where the nodes are accounts and the edges are transactions between accounts and information describing these transactions. In some example embodiments, a plurality of adjacency matrices are generated such that a multidimensional array of adjacency matrices are generated. In some example embodiments, another data structure in lieu of a multi-dimensional array of adjacency matrices may be implemented such as a hash table, binary search tree, re-black tree, or some other suitable data structure. In some example embodiments, the computational complexity of the sorting problem posed by a particular set of transaction data may dictate the use of one data structure as opposed to another.
In some example embodiments, sorting may be performed using any one of a number of comparison based or hybrid sorting algorithms. For example, in some embodiments, a merge sort algorithm or a quick sort algorithm may be implemented. In some example embodiments, a hybrid of some type of comparison based sorting algorithm (e.g., the aforementioned merge sort or quick sort) with Θ(n log n) performance may be implemented in conjunction with another sorting algorithm with Θ(n2) performance. Sorting algorithms with Θ(n2) performance include, for example, bubble sort and selection sort. In some example embodiments, a parallel sort-merge algorithm may be implemented. Some example embodiments may include using any sorting algorithm that may be classified as having a worst case computational time of better than Θ(n2).
In one example embodiment, transaction data for a plurality of accounts is represented by an adjacency matrix, where the accounts are associated with the indices of the X and Y axis of this adjacency matrix. Elements within the matrix defined by the X and Y axis represent relationships between accounts. Using this matrix, all accounts, and transactions engaged in using these accounts over some period of time, may be represented. This period of time may be a day, a week, or some other suitable period of time. Once the matrix is constructed, it may be sorted/transformed according to one or more characteristics of a transaction. For example, the matrix may be sorted along the X and Y indices by monetary value of the transactions taking place, the time of day the transactions take place, or some other attribute of an account. Further, specific relationships between accounts may be represented at a more granular level through the use of a graph, where the accounts form the nodes of the graph, and the transactions form the edges connecting the nodes.
In some example embodiments, portions of the adjacency matrix may be further organized (e.g., sorted and/or transformed) such that specific portions of the graph are organized in a more detailed manner. For example, if an adjacency matrix of accounts related based upon transaction amounts is shown, and one would also like to see which of these transactions occurred during a certain time of day, then the matrix would have to be further sub-divided and organized. This further sub-division may, in some example embodiments, be performed recursively or iteratively.
In some example embodiments, account data in the form of an account identifier is retrieved. The account identifier may be a types of numeric value such as an account number that may be used to uniquely identify an account held by a seller or purchaser of goods or services. Alternatively, an account identifier may be a type of formal name (e.g., a network handle) associated with a seller or purchaser of good or services. The account identified by the account identifier may form the nodes of a graph, and the axes of the adjacency matrix. Further, in some example embodiments, attributes of these accounts in the form of transaction data may be retrieved. This transaction data may form edges connecting these nodes, and may form coordinates within the adjacency matrix. In some example embodiments, a plurality of adjacency matrices may be generated and combined into a multidimensional array. Some example embodiments may include, sorting and transforming the matrix or matrices using one or more of the above referenced sorting algorithms, or some other suitable sorting algorithm. Once sorted, then patterns may be discerned within the matrix or matrices via visual inspection or using some type of automated inspection regime. This automated inspection regime may utilize some sort of Artificial Intelligence (A.I.), or statistical algorithm.
Some example cases may involve the utilization of a system and method for “Network Rating Visualization” as shown in U.S. Provisional Patent Application 60/986,879 incorporated by reference in it entirety herein. Through using this system and method, a more granular depiction of the various nodes and edges appearing in the adjacency matrix may be presented. Further, through using the system and method for “Network Rating Visualization,” additional patterns may be identified, classified, and added to the taxonomy of graphs (e.g., a taxonomy database) for future reference. In some example embodiments, this taxonomy, or portions thereof, may be displayed as part of a GUI to assist persons such as fraud prevention specialists, marketing professionals or other suitable persons. This GUI and the logic associated therewith may be shown as part of a system and method titled “Graph Pattern Recognition Interface” as shown in U.S. Provisional Patent Application 60/991,539 incorporated by reference in it entirety herein.
In some example embodiments, the data used to generate the nodes and edges, and ultimately the data structures (e.g., adjacency matrices) illustrated herein, may be derived from systems and method for “Global Conduct Score and Data Attribute Utilization.” This system and method is shown in U.S. Provisional Patent Application 60/988,967 which is incorporated in its entirety herein. Additionally, the system and method for an “Associated Community Platform,” as shown in U.S. patent application Ser. No. 11/618,465, may also be used as a basis to derive the data used to generate the nodes and edges referenced herein. This application Ser. No. 11/618,465 is also incorporated by reference in its entirety herein.
Example System
In some example embodiments, in lieu of retrieving the requested transaction data 111 from the database server 107, a real-time solution may be implemented to retrieve transaction data and display it in real time. This real-time solution may include establishing a Transmission Control Protocol/Internet Protocol (TCP/IP) or User Datagram Protocol/IP connection between the parallel computing cluster 110 and a computer system (not pictured) monitoring the network 103. In one example embodiment, when the computer system monitoring the network 103 discovers transaction data 104, the computer system monitoring the network 103 sends a copy of this transaction data 104 to the computing cluster 110 for processing. Processing may include sorting the transaction data 104 so as to render it in a GUI 114. Various principles of socket programming may be used in conjunction with TCP/IP and UDP/IP to facilitate this real-time solution.
Example Matrices
In some example embodiments, the example adjacency matrices of
Some example embodiments may include the use of a database technology including OLAP to provide a basis for analyzing data over time and for generating a three-dimensional adjacency matrix. In such an embodiment, sending accounts and receiving accounts, and the transaction data associated with these accounts, may be stored in a multidimensional cube and retrieved using a Multidimensional Expression (MDX) language. Once retrieved, this data could be passed to method 1000 outlined below for rendering of the data in a GUI.
Some example embodiments may include, the use of a recursive or iterative operation to show data displayed in the X, Y, or Z axes of an adjacency matrix (see e.g.,
Example Logic
In some example embodiments, an operation 1103 is executed that retrieves a sorting instruction set. The sorting instruction set may be retrieved from, for example, a pattern recognition computer 201. This pattern recognition computer 201 may receive these sorting instructions from, for example, the system administrator or the suitable person. The sorting instructions may be encoded using, for example, an eXtensible Markup Language (XML), a file utilizing some type of character delimited instructions, or some other suitable type of format. An operation 1104 may be executed that applies the sorting instruction set to the nodes and edges such that the nodes and edges used to generate the convergence points in the X and Y axes of the adjacency matrix are sorted. Further, in some example embodiments, an operation 1105 is executed that displays a resulting sorted adjacency matrix within the GUI 114. An operation 1106 may be executed that stores resulting adjacency matrix into, for example, a taxonomy database 1114 or a taxonomy database 1115. This taxonomy database 1114 corresponds to the relational database 108 whereas the taxonomy database 1115 corresponds to the OLAP database 109. A decisional operation 1107 may be executed that determines whether or not a micro-segment sort has been requested. In cases where decisional operation 1107 evaluates to “false,” the termination condition is met. In cases where decisional operation 1107 evaluates to “true,” a further operation 1108 is executed.
With regard to operation 1108, when executed, this operation allows a user 113 to select an area of the sorted adjacency matrix for a micro-segment sort. This selection process may be facilitated through the use of some type of Input/Output (I/O) device such as a mouse, keyboard, light pen, or other suitable device. Once this area is selected, a micro-segment sort may be initiated. As described elsewhere, this area may be, for example, the area 901 previously referenced in
In some example embodiments, the operation 1101, when executed, may retrieve account data including at least one of an account identifier and transaction data. The operation 1104, when executed, may generate a data structure including the account data. Further, the operation 1104 may also sort the data structure including the account data to create a sorted account data structure. An operation 1105 when executed may display the sorted account data structure. In some example embodiments, the account identifier includes at least one of a numeric value, or a network handle. The transaction data may include at least one of sale data, purchase data, IP address data, or geographic location data. Further, the data structure may include a multi-dimensional array represented as a matrix. The sorted account data structure may include a plurality of sorted account identifiers. Further, the sorted account data structure may include a plurality of sorted transaction data. The operation 1104, when executed, may also sort the data structure based upon at least one of a first type of account identifier, or a first type of transaction data. An operation 1108, when executed, may select an area of the sorted account data structure to form a micro segment. An operation 1110 when executed may sort the micro segment to generate a sorted micro segment. This operation 1110, when executed, may also sort the micro segment based upon at least one of a second type of account identifier, or a second type of transaction data.
In some example embodiments, the various operations 1101 through 1110 may reside as a part of, for example, the parallel computing cluster 110, or other suitable computer system referenced above. In other example embodiments, these various operations 1101 through 1110 may reside as a part of the pattern recognition computer 201. Further, in some example embodiments, these various operations 1101 through 1110 may be divided amongst the parallel computing cluster 110 and the pattern recognition computer 201.
In some example embodiments, the data structure 1500 may be implemented to compare multiple points of convergence at once for a set of accounts (e.g., receiving accounts). This data structure 1500 may allow a user 113 to see the observe the similarities and differences between accounts across multiple sets of data in the form of convergence points.
Example Storage
Some embodiments may include the various databases (e.g., 108 and 109) being relational databases, or in some cases OLAP based databases. In the case of relational databases, various tables of data are created and data is inserted into, and/or selected from, these tables using SQL, or some other database-query language known in the art. In the case of OLAP databases, one or more multi-dimensional cubes or hypercubes containing multidimensional data from which data is selected from or inserted into using MDX may be implemented. In the case of a database using tables and SQL, a database application such as, for example, MYSQL™, SQLSERVER™, Oracle 81™, 10G™, or some other suitable database application may be used to manage the data. In this, the case of a database using cubes and MDX, a database using Multidimensional On Line Analytic Processing (MOLAP), Relational On Line Analytic Processing (ROLAP), Hybrid Online Analytic Processing (HOLAP), or some other suitable database application may be used to manage the data. These tables or cubes made up of tables, in the case of, for example, ROLAP, are organized into an RDS or Object Relational Data Schema (ORDS), as is known in the art. These schemas may be normalized using certain normalization algorithms so as to avoid abnormalities such as non-additive joins and other problems. Additionally, these normalization algorithms may include Boyce-Codd Normal Form or some other normalization, optimization algorithm known in the art.
A Three-Tier Architecture
In some embodiments, a method is illustrated as implemented in a distributed or non-distributed software application designed under a three-tier architecture paradigm, whereby the various components of computer code that implement this method may be categorized as belonging to one or more of these three tiers. Some embodiments may include a first tier as an interface (e.g., an interface tier) that is relatively free of application processing. Further, a second tier may be a logic tier that performs application processing in the form of logical/mathematical manipulations of data inputted through the interface level, and communicates the results of these logical/mathematical manipulations to the interface tier, and/or to a backend, or storage, tier. These logical/mathematical manipulations may relate to certain business rules, or processes that govern the software application as a whole. A third, storage tier, may be a persistent storage medium or, non-persistent storage medium. In some cases, one or more of these tiers may be collapsed into another, resulting in a two-tier architecture, or even a one-tier architecture. For example, the interface and logic tiers may be consolidated, or the logic and storage tiers may be consolidated, as in the case of a software application with an embedded database. This three-tier architecture may be implemented using one technology, or, as will be discussed below, a variety of technologies. This three-tier architecture, and the technologies through which it is implemented, may be executed on two or more computer systems organized in a server-client, peer to peer, or some other suitable configuration. Further, these three tiers may be distributed between more than one computer system as various software components.
Component Design
Some example embodiments may include the above illustrated tiers, and processes or operations that make them up, as being written as one or more software components. Common to many of these components is the ability to generate, use, and manipulate data. These components, and the functionality associated with each, may be used by client, server, or peer computer systems. These various components may be implemented by a computer system on an as-needed basis. These components may be written in an object-oriented computer language such that a component oriented or object-oriented programming technique can be implemented using a Visual Component Library (VCL), Component Library for Cross Platform (CLX), Java Beans (JB), Java Enterprise Beans (EJB), Component Object Model (COM), Distributed Component Object Model (DCOM), or other suitable technique. These components may be linked to other components via various Application Programming interfaces (APIs), and then compiled into one complete server, client, and/or peer software application. Further, these APIs may be able to communicate through various distributed programming protocols as distributed computing components.
Distributed Computing Components and Protocols
Some example embodiments may include remote procedure calls being used to implement one or more of the above illustrated components across a distributed programming environment as distributed computing components. For example, an interface component (e.g., an interface tier) may reside on a first computer system that is remotely located from a second computer system containing a logic component (e.g., a logic tier). These first and second computer systems may be configured in a server-client, peer-to-peer, or some other suitable configuration. These various components may be written using the above illustrated object-oriented programming techniques, and can be written in the same programming language, or a different programming language. Various protocols may be implemented to enable these various components to communicate regardless of the programming language used to write these components. For example, a component written in C++ may be able to communicate with another component written in the Java programming language through utilizing a distributed computing protocol such as a Common Object Request Broker Architecture (CORBA), a Simple Object Access Protocol (SOAP), or some other suitable protocol. Some embodiments may include the use of one or more of these protocols with the various protocols outlined in the OSI model or TCP/IP protocol stack model for defining the protocols used by a network to transmit data.
A System of Transmission Between a Server and Client
Some embodiments may utilize the OSI model or TCP/IP protocol stack model for defining the protocols used by a network to transmit data. In applying these models, a system of data transmission between a server and client, or between peer computer systems, is illustrated as a series of roughly five layers comprising: an application layer, a transport layer, a network layer, a data link layer, and a physical layer. In the case of software having a three-tier architecture, the various tiers (e.g., the interface, logic, and storage tiers) reside on the application layer of the TCP/IP protocol stack. In an example implementation using the TCP/IP protocol stack model, data from an application residing at the application layer is loaded into the data load field of a TCP segment residing at the transport layer. This TCP segment also contains port information for a recipient software application residing remotely. This TCP segment is loaded into the data load field of an IP datagram residing at the network layer. Next, this IP datagram is loaded into a frame residing at the data link layer. This frame is then encoded at the physical layer and the data transmitted over a network such as an Internet, LAN, WAN, or some other suitable network. In some cases, Internet refers to a network of networks. These networks may use a variety of protocols for the exchange of data, including the aforementioned TCP/IP, and additionally ATM, SNA, SDI, or some other suitable protocol. These networks may be organized within a variety of topologies (e.g., a star topology), or structures.
A Computer System
The example computer system 1800 includes a processor 1802 (e.g., a Central Processing Unit (CPU), a Graphics Processing Unit (GPU) or both), a main memory 1801, and a static memory 1806, which communicate with each other via a bus 1808. The computer system 1800 may further include a video display unit 1810 (e.g., a Liquid Crystal Display (LCD) or a Cathode Ray Tube (CRT)). The computer system 1800 may also includes an alphanumeric input device 1817 (e.g., a keyboard), a GUI cursor controller 1811 (e.g., a mouse), a disk drive unit 1816, a signal generation device 1815 (e.g., a speaker) and a network interface device (e.g., a transmitter) 1820.
The disk drive unit 1816 includes a machine-readable medium 1822 on which is stored one or more sets of instructions 1821 and data structures (e.g., software) embodying or used by any one or more of the methodologies or functions illustrated herein. The software may also reside, completely or at least partially, within the main memory 1801 and/or within the processor 1802 during execution thereof by the computer system 1800, the main memory 1801 and the processor 1802 also constituting machine-readable media.
The instructions 1821 may further be transmitted or received over a network 1826 via the network interface device 1820 using any one of a number of well-known transfer protocols (e.g., Hyper Text Transfer Protocol (HTTP), Session Initiation Protocol (SIP)).
The term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that cause the machine to perform any of the one or more of the methodologies illustrated herein. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic medium, and carrier wave signals.
Marketplace Applications
In some example embodiments, a system and method is shown that facilitates the visual representation of large amounts of transaction data. This transaction data, in some example embodiments, relates to on line transactions involving goods and services between persons in a network. In some example embodiments, the amount of data may include data in the terabyte range. Some example embodiments may include the generation of an adjacency matrix wherein the axes are composed of accounts and the coordinates within the matrix are composed of transaction information relating to accounts. This adjacency matrix may be converted into a graph in some cases, where the accounts are nodes and the transactions are edges.
The Abstract of the Disclosure is provided to comply with 37 C.F.R. §1.72(b), requiring an abstract that may allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it may not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
This is a U.S. Patent Application that claims priority under 35 U.S.C. §119(e) to U.S. Provisional Patent Application titled “TRANSACTION DATA REPRESENTATIONS USING AN ADJACENCY MATRIX,” (Ser. No. 60/991,569) filed on Nov. 30, 2007 which is incorporated by reference in its entirety herein. Moreover, the present application is related to U.S. Provisional Patent Application titled: “GRAPH PATTERN RECOGNITION INTERFACE” as shown in the U.S. Provisional Patent Application (Ser. No. 60/991,539) filed on Nov. 30, 2007, and incorporated by reference in it entirety herein. A copy of this provisional patent application is attached herein as an Appendix A. Additionally, the present application is related to the U.S. Provisional Patent Application titled: “GLOBAL CONDUCT SCORE AND ATTRIBUTE DATA UTILIZATION” (Ser. No. 60/988,967) filed on Nov. 19, 2007. A copy of this provisional patent application is attached herein as an Appendix B. The present application is also related to the U.S. Provisional Patent Application titled: “NETWORK RATING VISUALIZATION” (Ser. No. 60/986,879) filed on Nov. 9, 2007. A copy of this provisional patent application is attached herein as an Appendix C. Further, the present application is related to U.S. Patent Application titled: “ASSOCIATED COMMUNITY PLATFORM” (Ser. No. 11/618,465) filed on Dec. 29, 2006. A copy of this patent application is attached herein as an Appendix D.
Number | Name | Date | Kind |
---|---|---|---|
5136690 | Becker et al. | Aug 1992 | A |
5185696 | Yoshino et al. | Feb 1993 | A |
5390113 | Sampson | Feb 1995 | A |
5577106 | Tanaka et al. | Nov 1996 | A |
5596703 | Eick et al. | Jan 1997 | A |
5778178 | Arunachalam | Jul 1998 | A |
5819226 | Gopinathan et al. | Oct 1998 | A |
5870559 | Leshem et al. | Feb 1999 | A |
5950179 | Buchanan et al. | Sep 1999 | A |
5963922 | Helmering | Oct 1999 | A |
5987500 | Arunachalam | Nov 1999 | A |
6032188 | Mairs et al. | Feb 2000 | A |
6094643 | Anderson et al. | Jul 2000 | A |
6208720 | Curtis et al. | Mar 2001 | B1 |
6212556 | Arunachalam | Apr 2001 | B1 |
6256032 | Hugh | Jul 2001 | B1 |
6321206 | Honarvar | Nov 2001 | B1 |
6405173 | Honarvar et al. | Jun 2002 | B1 |
6430545 | Honarvar et al. | Aug 2002 | B1 |
6490566 | Schmidt | Dec 2002 | B1 |
6609120 | Honarvar et al. | Aug 2003 | B1 |
6658393 | Basch et al. | Dec 2003 | B1 |
6708155 | Honarvar et al. | Mar 2004 | B1 |
6918096 | Hugh et al. | Jul 2005 | B2 |
7464056 | Campbell et al. | Dec 2008 | B1 |
7536348 | Shao et al. | May 2009 | B2 |
7558768 | Parida | Jul 2009 | B2 |
7587453 | Bhrara et al. | Sep 2009 | B2 |
7626586 | Perttunen | Dec 2009 | B1 |
7813822 | Hoffberg | Oct 2010 | B1 |
8103566 | Petruzzi | Jan 2012 | B1 |
8165973 | Alexe et al. | Apr 2012 | B2 |
8341111 | Patil et al. | Dec 2012 | B2 |
20010010730 | Rhoads | Aug 2001 | A1 |
20010037315 | Saliba et al. | Nov 2001 | A1 |
20010037316 | Shiloh | Nov 2001 | A1 |
20020026348 | Fowler et al. | Feb 2002 | A1 |
20020046049 | Siegel et al. | Apr 2002 | A1 |
20020046113 | Pisano et al. | Apr 2002 | A1 |
20020072993 | Sandus et al. | Jun 2002 | A1 |
20020103660 | Cramon et al. | Aug 2002 | A1 |
20020123957 | Notarius et al. | Sep 2002 | A1 |
20020133721 | Adjaoute | Sep 2002 | A1 |
20030009411 | Ram et al. | Jan 2003 | A1 |
20030018558 | Heffner et al. | Jan 2003 | A1 |
20030026404 | Joyce et al. | Feb 2003 | A1 |
20030036989 | Bhatia | Feb 2003 | A1 |
20030061132 | Yu et al. | Mar 2003 | A1 |
20030097320 | Gorden | May 2003 | A1 |
20030172013 | Block et al. | Sep 2003 | A1 |
20030204426 | Honarvar et al. | Oct 2003 | A1 |
20030216984 | Wang | Nov 2003 | A1 |
20040034573 | Cohen | Feb 2004 | A1 |
20040034616 | Witkowski et al. | Feb 2004 | A1 |
20040122803 | Dom et al. | Jun 2004 | A1 |
20040148211 | Honarvar et al. | Jul 2004 | A1 |
20040164983 | Khozai | Aug 2004 | A1 |
20040204925 | Alon et al. | Oct 2004 | A1 |
20040236688 | Bozeman | Nov 2004 | A1 |
20040249866 | Chen et al. | Dec 2004 | A1 |
20050144111 | Manstein et al. | Jun 2005 | A1 |
20050182708 | Moudgal | Aug 2005 | A1 |
20050187827 | Weiss et al. | Aug 2005 | A1 |
20050187881 | McGiffin et al. | Aug 2005 | A1 |
20050188294 | Kuchinsky et al. | Aug 2005 | A1 |
20050222929 | Steier et al. | Oct 2005 | A1 |
20050251371 | Chagoly et al. | Nov 2005 | A1 |
20050256735 | Bayne | Nov 2005 | A1 |
20050273820 | Elberbaum | Dec 2005 | A1 |
20050283494 | Colossi et al. | Dec 2005 | A1 |
20060028471 | Kincaid et al. | Feb 2006 | A1 |
20060069635 | Ram et al. | Mar 2006 | A1 |
20060149674 | Cook et al. | Jul 2006 | A1 |
20060173772 | Hayes et al. | Aug 2006 | A1 |
20060229921 | Colbeck | Oct 2006 | A1 |
20060235658 | Nitta et al. | Oct 2006 | A1 |
20060235764 | Bamborough et al. | Oct 2006 | A1 |
20060287910 | Kuchar et al. | Dec 2006 | A1 |
20070027662 | Parida | Feb 2007 | A1 |
20070033105 | Collins et al. | Feb 2007 | A1 |
20070055662 | Edelman et al. | Mar 2007 | A1 |
20070100875 | Chi et al. | May 2007 | A1 |
20070239694 | Singh et al. | Oct 2007 | A1 |
20070282673 | Nagpal et al. | Dec 2007 | A1 |
20080011844 | Tami et al. | Jan 2008 | A1 |
20080015938 | Haddad et al. | Jan 2008 | A1 |
20080135612 | Silbernagl et al. | Jun 2008 | A1 |
20080140682 | Grosset et al. | Jun 2008 | A1 |
20080162259 | Patil et al. | Jul 2008 | A1 |
20090122065 | Patil et al. | May 2009 | A1 |
20090144213 | Patil et al. | Jun 2009 | A1 |
20090234683 | Anderson et al. | Sep 2009 | A1 |
20100005051 | Agrawal et al. | Jan 2010 | A1 |
20100169137 | Jastrebski et al. | Jul 2010 | A1 |
20130138587 | Patil et al. | May 2013 | A1 |
Number | Date | Country |
---|---|---|
55110367 | Aug 1980 | JP |
Entry |
---|
Chakrabarti et al, D. Fully Automatic Cross-associations, in Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. (2004). |
“U.S. Appl. No. 09/793,843, Examiner Interview Summary mailed Mar. 17, 2005”, 3 pgs. |
“U.S. Appl. No. 09/793,843, Final Office Action mailed Feb. 9, 2007”, 5 pgs. |
“U.S. Appl. No. 09/793,843, Non Final Office Action mailed Jun. 13, 2006”, 18 pgs. |
“U.S. Appl. No. 09/793,843, Non Final Office Action mailed Dec. 9, 2005”, 16 pgs. |
“U.S. Appl. No. 09/793,843, Notice of Allowance mailed Apr. 13, 2007”, 8 pgs. |
“U.S. Appl. No. 09/793,843, Preliminary Amendment filed Aug. 19, 2004”, 11 pgs. |
“U.S. Appl. No. 09/793,843, Response filed Feb. 20, 2007 to Final Office Action mailed Feb. 9, 2007”, 17 pgs. |
“U.S. Appl. No. 09/793,843, Response filed Feb. 22, 2006 to Non Final Office Action mailed Dec. 9, 2005”, 17 pgs. |
“U.S. Appl. No. 09/793,843, Response filed Apr. 5, 2005 to Restriction Requirement mailed Mar. 17, 2005”, 13 pgs. |
“U.S. Appl. No. 09/793,843, Response filed Aug. 3, 2006 to Non Final Office Action mailed Jun. 13, 2006”, 20 pgs. |
“U.S. Appl. No. 09/793,843, Restriction Requirement mailed Mar. 17, 2005”, 8 pgs. |
“U.S. Appl. No. 11/618,465, Non-Final Office Action mailed Apr. 13, 2009”, 17 pgs. |
“U.S. Appl. No. 11/618,465, Response filed Aug. 13, 2009 to Non Final Office Action mailed Apr. 13, 2009”, 12 pgs. |
“Rete algorithm—Wikipedia”, http://en.wikipedia.org/wiki/Rete—algorithm#Rete—III, (Jun. 28, 2007). |
Lindorff, Dave, “CIO Insight”, New York; vol. 1(20), ISSN15350096, Proquest document ID: 234810651, (Nov. 2, 2002), 6. |
U.S. Appl. No. 11/618,465, Final Office Action mailed Apr. 15, 2010, 16 pgs. |
“U.S. Appl. No. 11/618,465, Examiner Interview Summary mailed Dec. 14, 2009”, 3 pgs. |
“U.S. Appl. No. 11/618,465, Non-Final Office Action mailed Aug. 3, 2010”, 15 pgs. |
“U.S. Appl. No. 11/618,465, Response filed Jul. 15, 2010 to Final Office Action mailed Apr. 15, 2010”, 11 pgs. |
“U.S. Appl. No. 11/618,465, Response filed Dec. 3, 2010 to Non Final Office Action mailed Aug. 3, 2010”, 23 pgs. |
“U.S. Appl. No. 11/961,817, Non Final Office Action mailed Dec. 13, 2010”, 27 pgs. |
“U.S. Appl. No. 11/963,452, Non Final Office Action mailed Nov. 18, 2010”, 15 pgs. |
Amann, Bernd, et al., “Gram: A Graph Data Model and Query Language”, 1992 Proceeding ECHT '92 Proceedings of the ACM conference on Hypertext, (1992), 201-211. |
Graves, Mark, et al., “Graph Database Systems”, Engineering in Medicine and Biology Magazine, IEEE; vol. 14 Issue 6, (Dec. 1995), 737-745. |
Herman, Ivan, et al., “GraphXML—An XML-Based Graph Description Format”, Lecture Notes in Computer Science, 2001, vol. 1984, (2001), 52-62. |
Imielinski, Tomasz, et al., “MSQL: A Query Language for Database Mining; 1999; Data Mining and Knowledge Discover”, 1999 Kluwer Academic Publishers, Manufactured in the Netherlands; vol. 3, No. 4, (1999), 373-408. |
“U.S. Appl. No. 11/618,465, Final Office Action mailed Feb. 4, 2011”, 15 pgs. |
“U.S. Appl. No. 11/618,465, Pre-Appeal Brief Request filed Apr. 4, 2011”, 5 pgs. |
“U.S. Appl. No. 11/961,817, Final Office Action mailed Apr. 19, 2011”, 9 pgs. |
“U.S. Appl. No. 11/961,817, Response filed Mar. 14, 2011 to Non Final Office Action mailed Dec. 13, 2010”, 15 pgs. |
“U.S. Appl. No. 11/963,452, Notice of Allowance mailed Jun. 20, 2011”, 11 pgs. |
“U.S. Appl. No. 11/963,452, Response filed Feb. 18, 2011 to Non Final Office Action mailed Nov. 18, 2010”, 11 pgs. |
“U.S. Appl. No. 11/618,465, Appeal Brief filed Jul. 8, 2011”, 25 pgs. |
“U.S. Appl. No. 11/618,465, Applicant's Summary of Examiner Interview filed Sep. 19, 2011”, 1 pg. |
“U.S. Appl. No. 11/618,465, Decision on Pre-Appeal Brief Request mailed Jun. 8, 2011”, 2 pgs. |
“U.S. Appl. No. 11/618,465, Examiner Interview Summary mailed Aug. 31, 2011”, 3 pgs. |
“U.S. Appl. No. 11/618,465, Examiner's Answer to Appeal Brief mailed Aug. 19, 2011”, 21 pgs. |
“U.S. Appl. No. 11/618,465, Reply Brief filed Sep. 19, 2011”, 3 pgs. |
“U.S. Appl. No. 11/618,465, Second Examiner's Answer to Appeal Brief mailed Aug. 31, 2011”, 20 pgs. |
“U.S. Appl. No. 11/961,817, Examiner Interview Summary mailed Jul. 18, 2011”, 4 pgs. |
“U.S. Appl. No. 11/961,817, Response Filed Jul. 14, 2011 to Final Office Action Received Apr. 19, 2011”, 10 pgs. |
“U.S. Appl. No. 13/220,209 , Response filed Jul. 31, 2012 to Non Final Office Action mailed May 2, 2012”, 9 pgs. |
“U.S. Appl. No. 13/220,209, Non Final Office Action mailed May 2, 2012”, 23 pgs. |
“U.S. Appl. No. 13/220,209, Notice of Allowance mailed Aug. 20, 2012”, 9 pgs. |
Neal, Radford M, “Probabilistic Inference Using Markov Chain Monte Carlo Methods”, Technical Report, Department of Computer Science University of Toronto, (Sep. 25, 1993), 144 pgs. |
“U.S. Appl. No. 11/961,817, Response filed Aug. 7, 2013 to Non Final Office Action mailed Mar. 7, 2013”, 11 pgs. |
“U.S. Appl. No. 11/961,817, Final Office Action mailed Aug. 16, 2013”, 9 pgs. |
“U.S. Appl. No. 11/961,817, Non Final Office Action mailed Mar. 7, 2013”, 10 pgs. |
Number | Date | Country | |
---|---|---|---|
20090125543 A1 | May 2009 | US |
Number | Date | Country | |
---|---|---|---|
60991569 | Nov 2007 | US | |
60991539 | Nov 2007 | US | |
60988967 | Nov 2007 | US | |
60986879 | Nov 2007 | US |