skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Systems and methods for automatically identifying and linking names in digital resources

Abstract

The present invention provides systems and methods for automatically identifying name-like-strings in digital resources, matching these name-like-string against a set of names held in an expertly curated database, and for those name-like-strings found in said database, enhancing the content by associating additional matter with the name, wherein said matter includes information about the names that is held within said database and pointers to other digital resources which include the same name and it synonyms.

Inventors:
; ; ;
Publication Date:
Research Org.:
NAMESFORLIFE, LLC, East Lansing, MI (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1361426
Patent Number(s):
9,672,293
Application Number:
12/685,964
Assignee:
NAMESFORLIFE, LLC CHO
DOE Contract Number:
FG02-07ER86321
Resource Type:
Patent
Resource Relation:
Patent File Date: 2010 Jan 12
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; 96 KNOWLEDGE MANAGEMENT AND PRESERVATION

Citation Formats

Parker, Charles T., Lyons, Catherine M., Roston, Gerald P., and Garrity, George M.. Systems and methods for automatically identifying and linking names in digital resources. United States: N. p., 2017. Web.
Parker, Charles T., Lyons, Catherine M., Roston, Gerald P., & Garrity, George M.. Systems and methods for automatically identifying and linking names in digital resources. United States.
Parker, Charles T., Lyons, Catherine M., Roston, Gerald P., and Garrity, George M.. Tue . "Systems and methods for automatically identifying and linking names in digital resources". United States. doi:. https://www.osti.gov/servlets/purl/1361426.
@article{osti_1361426,
title = {Systems and methods for automatically identifying and linking names in digital resources},
author = {Parker, Charles T. and Lyons, Catherine M. and Roston, Gerald P. and Garrity, George M.},
abstractNote = {The present invention provides systems and methods for automatically identifying name-like-strings in digital resources, matching these name-like-string against a set of names held in an expertly curated database, and for those name-like-strings found in said database, enhancing the content by associating additional matter with the name, wherein said matter includes information about the names that is held within said database and pointers to other digital resources which include the same name and it synonyms.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Jun 06 00:00:00 EDT 2017},
month = {Tue Jun 06 00:00:00 EDT 2017}
}

Patent:

Save / Share:
  • A method and system for detecting, locating and quantifying a physical phenomena such as strain or a deformation in a structure. A plurality of laterally adjacent conductors may each include a plurality of segments. Each segment is constructed to exhibit a unit value representative of a defined energy transmission characteristic. A plurality of identity groups are defined with each identity group comprising a plurality of segments including at least one segment from each of the plurality of conductors. The segments contained within an identity group are configured and arranged such that each of their associated unit values may be representedmore » by a concatenated digit string which is a unique number relative to the other identity groups. Additionally, the unit values of the segments within an identity group maintain unique ratios with respect to the other unit values in the identity group.« less
  • Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.
  • Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document tomore » the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.« less
  • Digital data storage systems, computers, and data verification methods are provided. According to a first aspect of the invention, a computer includes an interface adapted to couple with a dynamic database; and processing circuitry configured to provide a first hash from digital data stored within a portion of the dynamic database at an initial moment in time, to provide a second hash from digital data stored within the portion of the dynamic database at a subsequent moment in time, and to compare the first hash and the second hash.
  • Methods, media and systems for managing a distributed application running in a plurality of digital processing devices are provided. In some embodiments, a method includes running one or more processes associated with the distributed application in virtualized operating system environments on a plurality of digital processing devices, suspending the one or more processes, and saving network state information relating to network connections among the one or more processes. The method further include storing process information relating to the one or more processes, recreating the network connections using the saved network state information, and restarting the one or more processes usingmore » the stored process information.« less