US20080120319A1 - System and method for identifying computer users having files with common attributes - Google Patents
System and method for identifying computer users having files with common attributes Download PDFInfo
- Publication number
- US20080120319A1 US20080120319A1 US11/562,084 US56208406A US2008120319A1 US 20080120319 A1 US20080120319 A1 US 20080120319A1 US 56208406 A US56208406 A US 56208406A US 2008120319 A1 US2008120319 A1 US 2008120319A1
- Authority
- US
- United States
- Prior art keywords
- file
- attributes
- files
- computer
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012986 modification Methods 0.000 claims description 3
- 230000004048 modification Effects 0.000 claims description 3
- 230000008520 organization Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 241000239290 Araneae Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/31—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/335—Filtering based on additional data, e.g. user or group profiles
Definitions
- This application relates to a system and a method for identifying computer users having files with common attributes.
- a growing problem in the realm of information technology is managing, organizing, finding, and making use of electronic data available within a business organization. Though data may exist within the business organization, it is often difficult to locate when needed. Consequently, much effort is employed to manage and organize information so that it may be easily found and used.
- search technologies have made it easier to find electronically available information if it has already been structured and organized for public browsing on the Internet, finding information within a private computer network (intranet) remains difficult. For example, searching an intranet gives limited results in part because content creators are insufficiently or improperly motivated so make their content “interesting” (i.e., rich with links to related documents), or attractive. Consequently, few viewers are in turn motivated to link to such content.
- intranet web pages are ideally designed to provide information organized in an efficient, hierarchical structure, and do not necessarily aim to connect information to other information. Consequently, for many intranet searches only use content page contains the sought-for data, and few (sometimes zero) links point to that intranet web page from other pages. Making an intranet search even more difficult, intranet files often lack identifying characteristics to make the files stand out in a particular search.
- data available in an intranet is not search-engine-friendly or was never intended to be viewed directly.
- data may be stored in locations that can't easily be crawled by a “web spider”, or data may be intended only to form a portion of a larger set of data.
- a method for identifying computer users having files with common attributes in accordance with an exemplary embodiment includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user.
- the set of attributes for each file in the first set of files have a plurality of attribute types.
- the method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user.
- the set of attributes for each file in the second set of files have the plurality of attribute types.
- the method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric.
- the method further includes determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
- a system for identifying computer users having files with common attributes in accordance with another exemplary embodiment includes first and second computers operably communicating with one another.
- the system further includes a display device operably communicating with the first computer.
- the first computer is configured to generate a first table having a set of attributes for each file in a first set of files associated with a first computer user.
- the set of attributes for each file in the first set of files have a plurality of attribute types.
- the second computer is further configured to generate a second table having a set of attributes for each file in a second set of files associated with a second computer user.
- the set of attributes for each file in the second set of files have the plurality of attribute types.
- the first computer is further configured to generate a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric.
- the first computer is further configured to determine whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
- the first computer is further configured to display a user identifier associated with at least one of the first and second computer users on the display device when the first and second computer users have at least one file with common attributes.
- FIG. 1 is a block diagram of a computer network for identifying computer users having files with common attribute in accordance with an exemplary embodiment.
- FIG. 2 is a schematic of a set of files associated with a computer user of the computer network of FIG. 1 ;
- FIG. 3 is a schematic of a table of attributes associated with the set of files illustrated in FIG. 2 ;
- FIG. 4 is a schematic of a set of files associated with a second computer user of the computer network of FIG. 1 ;
- FIG. 5 is a schematic of a table of attributes associated with the set of files illustrated in FIG. 4 ;
- FIG. 6 is a schematic of a similarity table derived from the tables of attributes in FIG. 3 and FIG. 5 ;
- FIG. 7 is a flow chart of a method for identifying computer users having files with common attributes in accordance with another exemplary embodiment
- FIG. 8 is a schematic of an exemplary set of files associated with a computer user at an first time
- FIG. 9 is a schematic of a table of attributes associated with the set of files shown in FIG. 8 ;
- FIG. 10 is a schematic of an exemplary set of files associated with the computer user of FIG. 8 at a time later than the first time;
- FIG. 11 is a schematic of a table of attributes associated with the set of files shown in FIG. 10 ;
- FIG. 12 is a schematic of a table having sets of attributes that are in the table of attributes of FIG. 11 and that are not in the table of attributes of FIG. 9 ;
- FIG. 13 is a schematic of an exemplary set of files associated with a different computer user at a first time
- FIG. 14 is a schematic of a table of attributes associated with the set of files shown in FIG. 13 ;
- FIG. 15 is a schematic of an exemplary set of files associated with the different computer user at a time later than the first time
- FIG. 16 is a schematic of a table of attributes associated with the set of files shown in FIG. 15 ;
- FIG. 17 is a schematic of a table having sets of attributes that are in the table of attributes of FIG. 16 and that are not in the table of attributes of FIG. 14 ;
- FIG. 18 is a schematic of a similarity table derived from the tables of attributes in FIG. 12 and FIG. 17 ;
- FIG. 19 is a schematic of an exemplary search query entered by a search user in accordance with the similarity table of FIG. 6 ;
- FIG. 20 is a schematic of an exemplary search result produced in accordance with the search query of FIG. 19 ;
- FIG. 21 is a flow chart of a method for identifying intranet users having files with common attributes in accordance with another exemplary embodiment.
- the computer network 9 includes a computer 10 associated with a first computer user and a computer 20 associated with a second computer user.
- the computer network 9 comprises an Intranet which is a private network that uses Internet software and Internet standards.
- the computers 10 , 20 have at least central processing units 12 , 22 , data storage/RAM/ROM memory 14 , 24 , displays 16 , 26 , keyboards 18 , 28 , and network interfaces 19 , 29 , respectively.
- Computers 10 and 20 are in data communication with network medium 40 .
- Network medium 40 may of course include one or more routers, switches, data hubs, or other data communication equipment, and may facilitate wired and/or wireless communication.
- computer network 9 can further include additional computers, for example computer 30 , which may be associated with additional computer users in the system.
- An additional computer such as computer 30 has at least a central processing unit 32 , data storage/RAM/ROM memory 34 , a display 36 , a keyboard 38 , and a network interface 39 .
- exemplary files and tables utilized the by the computer network 9 for allowing the identification of computer users having files with common attributes are illustrated.
- a set of files 50 associated with the first computer user is illustrated.
- a set of files 60 associated with the second computer user, is also illustrated.
- the set of files 50 resides in memory 14 of computer 10
- set of files 60 resides in memory 24 of computer 20 .
- sets of files associated with different computer users may optionally be located in a shared memory of a single computer or shared network drive.
- the sets of files shown are meant only to be a representative example of files associated with computers—actual files will, of course, vary in name, location, size, etc.
- a table 52 is generated, including a set of attributes for each file in the set of files 50 .
- a table 62 is also generated, including a set of attributes for each file in the set of files 60 .
- the word “table” herein, without limiting its scope, may include a database, index, list, or other equivalent collection or collections of data.
- Tables 52 and 62 include, for each file associated respectively with sets of files 50 , 60 , a set of attributes including username, file or directory name, and checksum. It is of course recognized that the table 52 , 62 may include an alternative or different set of attributes for each file in the sets of files 50 , 60 .
- a set of attributes may include an associated user name, a file or directory name, a checksum value, a file location, a file size, a file creation date, a file modification date, a file access date, keywords from the file, and/or names of files located in the same directory.
- a similarity table 70 is generated utilizing table 52 and table 62 and a predetermined similarity metric. Similarity table 70 is configured to indicate an amount of similarity between files represented in table 52 and files represented in table 62 .
- the similarity metric utilizes a checksum value for each file represented in first table 52 with checksum values for each file represented in second table 62 to generate similarity table 70 .
- the similarity table may then be used to indicate files represented in each table 52 , 62 that have an identical checksum—without requiring the files to have any other attributes in common (i.e., multiple files need not share an identical filename or have an identical checksum).
- similarity table 70 shows a column of unique checksums found in tables 52 and 62 .
- An indication of computer users having a file associated with each unique checksum is also represented in the similarity table 70 .
- Similarity table 70 may optionally indicate whether multiple files having identical checksums are similarly named, located, owned, etc.—depending on the attributes stored in tables 52 and 62 . In this manner a computer user may, for example, locate copies of a particular file saved under different names, as is the case for “File X” of user 1 and “File D” of user 2 .
- the similarity table may be used indicate the names or usernames of computer users having files with attributes in common, e.g., files having identical checksums.
- the similarity metric is a collection of checksums of portions of first and second files, and if there are a predetermined percentage of portions of the first and second files that are similar based on the associated checksums, the first and second files would be identified as being similar.
- FIG. 7 a method for identifying computer users having files with common attributes in accordance with an exemplary embodiment is illustrated. The method can be implemented utilizing the system 9 described above.
- the computer 20 generates a first table 52 having a set of attributes for each file in a first set of files associated with a first computer user.
- the set of attributes for each file in the first set of files have a plurality of attribute types.
- the computer 20 generates a second table 62 having a set of attributes for each file in a second set of files associated with a second computer user.
- the act of attributes for each file in the second set of files have the plurality of attribute types.
- the computer 10 generates a similarity table 70 by comparing each set of attributes in the first table 52 with each set of attributes in the second table 62 , utilizing a predetermined similarity metric.
- the computer 10 determines whether the first and second computer users have at least one file with common attributes, based on data in the similarity table 70 .
- the computer 10 displays the names of the first and second computer users on a display device 16 when the first and second computer users have at least one file with common attributes. After step 105 , the method is exited.
- a table 132 is generated at a first time to include attributes for each file or directory in a set of files 130 associated with a first computer user.
- the third table 132 is generated before the first computer user has created or modified files in the set of files 130 .
- a table 136 is generated at a second, later, time and also includes attributes for each file and/or directory in set of files 134 associated with the first computer user.
- set of files 134 encompasses the same top-level file structure or directory hierarchy as set of files 130 such that any file in the directory structure that is unchanged between the generation of table 132 and the generation of table 136 will result in an identical set of attributes in both table 132 and table 136 .
- the file structure associated with a particular set of files may take forms different from the structure illustrated in FIGS. 8-18 , and that a computer user will likely have files named or located differently than illustrated, such as directory structures used in operating systems such as MAC OS, UNIX, LINUX, and WINDOWS.
- Table 138 is generated from tables 132 and 136 and is configured to include only sets of attributes from table 136 that are not present in table 132 . For example, since “System files” appears in both table 132 and 136 , it does not appear in the temporal differencing table 138 . Also, as illustrated in FIGS. 8-9 , at a first time set of files 130 may include a file named “File A”, located at the top level of a directory structure (C: ⁇ ) associated with the first user. The attributes associated with “File A” in table 132 , in this example, include the username, filename, and file location within the directory structure. At the time table 136 is generated, “File A” exists in a different location than it did when table 132 was generated. Thus the attributes for “File A” are different in table 136 than in table 132 . That difference requires attributes for “File A”, to be listed in “temporal difference” table 138 .
- tables 142 and 146 are derived respectively from sets of files 140 and 144 at third and fourth times, respectively.
- the generation of table 142 at a third time preferably occurs before the second user has created or modified files in the set of files 140 associated with the second computer user. It is however recognized that files may be created or modified in set of files 140 , associated with the second user, prior to generation 142 .
- the generation of table 146 is preferably occurs later in time than the generation of table 142 , though not limited to be so, and the generation of tables 142 and 146 may correspond in time respectively with the generation of tables 132 and 136 .
- a table 148 is generated from table 142 and table 146 to include set of attributes from table 146 that are not represented in table 142 .
- a similarity table 150 is generated utilizing tables 138 and 148 and a predetermined similarity metric.
- the similarity metric is used to compare each set of attributes in table 138 against each set of attributes in table 148 to determine a degree of similarity of files represented by each set of attributes.
- the similarity metric utilizes filename and file location attributes from tables 138 and 148 to determine an amount of similarity between files.
- FIG. 18 shows attributes for “File C”, which, according to table 138 is located at “C: ⁇ Project B” for the first user, and according to table 148 is located at “C: ⁇ Project B: ⁇ Project B- 1 ” for the second user.
- the files have a common filename, they are differently located, resulting in, for example, an amount of similarity less than 100%, based on a scale used by the similarity metric. It is, of course, recognized that a variety of scales and similarity determinations may be used by a particular similarity metric.
- similarity table 150 may be used to select attributes of files that match, within a predetermined or selectable amount of similarity, a search attribute entered by a search user. For example, as shown in FIG. 19 , a search attribute is received form a search user. According to a non-limiting embodiment of the invention, the search attribute is compared with attributes in the similarity table 150 to produce a result attribute or set of result attributes corresponding with the search attribute. For example, a search user may enter the term “File A”.
- the filename is compared with attributes in similarity table 150 and a set of result attributes is calculated and displayed, including, for example, a list of filenames 164 that are related to the search request “File A.”
- the results obtained from the search are “File X”, “File Y”, and “File Z” which are files generated by the search user that are related to the file named “File A.”
- the relationship between the files can be that the “File A”, “File X”, “File Y”, and “File Z” are stored in the same directory.
- a list of usernames 166 associated with other users who have a file with the filename “File A” is determined and displayed.
- the list of usernames 166 includes a user named “User 2 ” who has a file named “File A” (shown as Results 2 in FIG. 20 ). It is, of course, recognized that the search results produced will depend on the type of attributes stored in similarity table 150 . It is anticipated that search results may be ordered by amount of similarity to the search term, as well as by other sorting algorithms known to those skilled in the art.
- FIG. 21 a method for identifying computer users having files with common attributes in accordance with another exemplary embodiment is illustrated. The method can be implemented utilizing the system 9 described above.
- the computers 10 and 20 generate the first table 132 and the second table 142 , respectively, comprising a set of attributes for each of first and second sets of files 130 , 140 , respectively, associated with first and second users, respectively.
- the computers 10 and 20 After generating the first and second tables 132 , 142 , the computers 10 and 20 generate third and fourth tables 136 , 146 comprising a set of attributes for each of a third and fourth set of files, respectively, associated with the first and second computer users, respectively. It should be noted that table 136 can be generated at a different time than generation of table 132 . Further, table 146 can be generated at a time different than generation of table 142 .
- computers 10 and 120 generate first and second difference tables 138 , 148 , respectively, associated with the first and second computers users, respectively.
- the difference table 138 includes a set of attributes from table 136 that are not included identically in table 132 .
- the difference table 148 includes a set of attributes from table 146 that are not included identically in table 142 .
- the computer 10 generates a similarity table 150 based on the first and second difference tables 138 , 148 , utilizing a similarity metric.
- the computer 10 compares set of attributes in table 138 with sets of attributes in table 148 , utilizing a predetermined similarity metric to generate the similarity table 150 .
- the computer 10 receives at least one search attribute from a search user.
- the search user can be either the first user or the second user.
- the search attribute corresponds to an attribute type contained in similarity table 150 .
- the computer 10 displays one or more filename(s) associated with each set of attributes in the search-user's difference table on the display device 16 wherein the set of attributes corresponds with the search attribute.
- the computer displays one or more username(s) associated with each set of attributes in the first or second difference tables on the display device 16 wherein the set of attributes corresponds with the search attribute.
- an inferred relationship metric could be utilized to find files of first and second users having common attributes.
- An inferred relationship metric is a metric associated with an organization of files. For example, as inferred relationship metric could be a grouping of files in a folder. Further, for example, if User 1 and User 2 have “File Z” in common, the fact that User 2 also places “File C” and “File H” in the same folder as “File Z” may suggest an inferred relationship between “File C, ” “File H,” and “File Z.”
- the foregoing embodiments may be extended without limitation to generate table and results associated with sets of files associated with more than two computer users within a computer network. It should be noted that in an alternative embodiment, the foregoing tables and results can be determined utilizing a third external computer or computer server, communicating with first and second computers that store the files associated with first and second computer users, respectively.
- the capabilities of the present invention can be implemented in software, firmware, hardware or some combination thereof.
- one or more aspects of the present invention can be included in an article of manufacture (e.g., one or more computer program products) having, for instance, computer usable media.
- the media has embodied therein, for instance, computer readable program code means for providing and facilitating the capabilities of the present invention.
- the article of manufacture can be included as a part of a computer system or sold separately.
- at least one program storage device readable by a machine, tangibly embodying at least one program of instructions executable by the machine to perform the capabilities of the present invention can be provided.
- the system and methods for identifying computer users having files with common attributes provide a substantial advantage over other systems and methods.
- the system and methods provide a technical effect of enabling intranet users to find file resources in an intranet which are not otherwise sufficiently available, utilizing a similarity table which relates attributes of a file to the attributes of another file.
- Another effect of the system and the methods are that computer users are able to identify other computer users having similar files.
Abstract
A system and a method for identifying computer users having files with common attributes are provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
Description
- This application relates to a system and a method for identifying computer users having files with common attributes.
- A growing problem in the realm of information technology is managing, organizing, finding, and making use of electronic data available within a business organization. Though data may exist within the business organization, it is often difficult to locate when needed. Consequently, much effort is employed to manage and organize information so that it may be easily found and used. Although search technologies have made it easier to find electronically available information if it has already been structured and organized for public browsing on the Internet, finding information within a private computer network (intranet) remains difficult. For example, searching an intranet gives limited results in part because content creators are insufficiently or improperly motivated so make their content “interesting” (i.e., rich with links to related documents), or attractive. Consequently, few viewers are in turn motivated to link to such content.
- Moreover, intranet web pages are ideally designed to provide information organized in an efficient, hierarchical structure, and do not necessarily aim to connect information to other information. Consequently, for many intranet searches only use content page contains the sought-for data, and few (sometimes zero) links point to that intranet web page from other pages. Making an intranet search even more difficult, intranet files often lack identifying characteristics to make the files stand out in a particular search.
- Furthermore, some data available in an intranet is not search-engine-friendly or was never intended to be viewed directly. For example, data may be stored in locations that can't easily be crawled by a “web spider”, or data may be intended only to form a portion of a larger set of data.
- Members of a business organization may wish to identify others in the organization having common interests and ideas, as suggested by their maintenance of identical or similar files. However, current search schemes generally provide results only for purposely published files.
- Accordingly the inventors herein have recognized a need for an improved system and method for identifying computer users having files with common attributes.
- A method for identifying computer users having files with common attributes in accordance with an exemplary embodiment is provided. The method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric. The method further includes determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
- A system for identifying computer users having files with common attributes in accordance with another exemplary embodiment is provided. The system includes first and second computers operably communicating with one another. The system further includes a display device operably communicating with the first computer. The first computer is configured to generate a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The second computer is further configured to generate a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The first computer is further configured to generate a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric. The first computer is further configured to determine whether the first and second computer users have at least one file with common attributes, based on data in the similarity table. The first computer is further configured to display a user identifier associated with at least one of the first and second computer users on the display device when the first and second computer users have at least one file with common attributes.
-
FIG. 1 is a block diagram of a computer network for identifying computer users having files with common attribute in accordance with an exemplary embodiment. -
FIG. 2 is a schematic of a set of files associated with a computer user of the computer network ofFIG. 1 ; -
FIG. 3 is a schematic of a table of attributes associated with the set of files illustrated inFIG. 2 ; -
FIG. 4 is a schematic of a set of files associated with a second computer user of the computer network ofFIG. 1 ; -
FIG. 5 is a schematic of a table of attributes associated with the set of files illustrated inFIG. 4 ; -
FIG. 6 is a schematic of a similarity table derived from the tables of attributes inFIG. 3 andFIG. 5 ; -
FIG. 7 is a flow chart of a method for identifying computer users having files with common attributes in accordance with another exemplary embodiment; -
FIG. 8 is a schematic of an exemplary set of files associated with a computer user at an first time; -
FIG. 9 is a schematic of a table of attributes associated with the set of files shown inFIG. 8 ; -
FIG. 10 is a schematic of an exemplary set of files associated with the computer user ofFIG. 8 at a time later than the first time; -
FIG. 11 is a schematic of a table of attributes associated with the set of files shown inFIG. 10 ; -
FIG. 12 is a schematic of a table having sets of attributes that are in the table of attributes ofFIG. 11 and that are not in the table of attributes ofFIG. 9 ; -
FIG. 13 is a schematic of an exemplary set of files associated with a different computer user at a first time; -
FIG. 14 is a schematic of a table of attributes associated with the set of files shown inFIG. 13 ; -
FIG. 15 is a schematic of an exemplary set of files associated with the different computer user at a time later than the first time; -
FIG. 16 is a schematic of a table of attributes associated with the set of files shown inFIG. 15 ; -
FIG. 17 is a schematic of a table having sets of attributes that are in the table of attributes ofFIG. 16 and that are not in the table of attributes ofFIG. 14 ; -
FIG. 18 is a schematic of a similarity table derived from the tables of attributes inFIG. 12 andFIG. 17 ; -
FIG. 19 is a schematic of an exemplary search query entered by a search user in accordance with the similarity table ofFIG. 6 ; -
FIG. 20 is a schematic of an exemplary search result produced in accordance with the search query ofFIG. 19 ; and -
FIG. 21 is a flow chart of a method for identifying intranet users having files with common attributes in accordance with another exemplary embodiment. - Referring to
FIG. 1 , a computer network 9 for allowing the identification of computer users having files with common attributes is illustrated. The computer network 9 includes acomputer 10 associated with a first computer user and acomputer 20 associated with a second computer user. In an exemplary embodiment, the computer network 9 comprises an Intranet which is a private network that uses Internet software and Internet standards. In the exemplary embodiment, thecomputers central processing units ROM memory keyboards network interfaces 19, 29, respectively.Computers network medium 40.Network medium 40 may of course include one or more routers, switches, data hubs, or other data communication equipment, and may facilitate wired and/or wireless communication. Optionally, computer network 9 can further include additional computers, forexample computer 30, which may be associated with additional computer users in the system. An additional computer such ascomputer 30 has at least acentral processing unit 32, data storage/RAM/ROM memory 34, adisplay 36, akeyboard 38, and a network interface 39. - Referring to
FIGS. 2-6 , exemplary files and tables utilized the by the computer network 9 for allowing the identification of computer users having files with common attributes are illustrated. In particular, a set offiles 50 associated with the first computer user is illustrated. A set offiles 60, associated with the second computer user, is also illustrated. In the exemplary embodiment, the set offiles 50 resides inmemory 14 ofcomputer 10, and set offiles 60 resides inmemory 24 ofcomputer 20. It is, of course, recognized that sets of files associated with different computer users may optionally be located in a shared memory of a single computer or shared network drive. The sets of files shown are meant only to be a representative example of files associated with computers—actual files will, of course, vary in name, location, size, etc. - According to an exemplary embodiment, a table 52 is generated, including a set of attributes for each file in the set of
files 50. A table 62 is also generated, including a set of attributes for each file in the set offiles 60. The word “table” herein, without limiting its scope, may include a database, index, list, or other equivalent collection or collections of data. - Tables 52 and 62 include, for each file associated respectively with sets of
files files - In one exemplary embodiment, a similarity table 70 is generated utilizing table 52 and table 62 and a predetermined similarity metric. Similarity table 70 is configured to indicate an amount of similarity between files represented in table 52 and files represented in table 62. In one non-limiting example, the similarity metric utilizes a checksum value for each file represented in first table 52 with checksum values for each file represented in second table 62 to generate similarity table 70. The similarity table may then be used to indicate files represented in each table 52, 62 that have an identical checksum—without requiring the files to have any other attributes in common (i.e., multiple files need not share an identical filename or have an identical checksum). For example, similarity table 70 shows a column of unique checksums found in tables 52 and 62. An indication of computer users having a file associated with each unique checksum is also represented in the similarity table 70. Similarity table 70 may optionally indicate whether multiple files having identical checksums are similarly named, located, owned, etc.—depending on the attributes stored in tables 52 and 62. In this manner a computer user may, for example, locate copies of a particular file saved under different names, as is the case for “File X” of
user 1 and “File D” ofuser 2. Additionally, or alternatively, the similarity table may be used indicate the names or usernames of computer users having files with attributes in common, e.g., files having identical checksums. - In an alternative embodiment, the similarity metric is a collection of checksums of portions of first and second files, and if there are a predetermined percentage of portions of the first and second files that are similar based on the associated checksums, the first and second files would be identified as being similar.
- Referring to
FIG. 7 , a method for identifying computer users having files with common attributes in accordance with an exemplary embodiment is illustrated. The method can be implemented utilizing the system 9 described above. - At
step 100, thecomputer 20 generates a first table 52 having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. - At
step 102, thecomputer 20 generates a second table 62 having a set of attributes for each file in a second set of files associated with a second computer user. The act of attributes for each file in the second set of files have the plurality of attribute types. - At
step 103, thecomputer 10 generates a similarity table 70 by comparing each set of attributes in the first table 52 with each set of attributes in the second table 62, utilizing a predetermined similarity metric. - At
step 104, thecomputer 10 determines whether the first and second computer users have at least one file with common attributes, based on data in the similarity table 70. - At
step 105, thecomputer 10 displays the names of the first and second computer users on a display device 16 when the first and second computer users have at least one file with common attributes. Afterstep 105, the method is exited. - Referring now to
FIGS. 8-12 , other exemplary files and tables that can be utilized by the computer network 9 for allowing the identification of computer users having files with common attributes are illustrated. For purposes of discussion, it should be noted that tables of attributes for files associated with different computer users may be generated in a way so as to eliminate or reduce analysis of files that are rarely accessed directly by an average computer user, such as system or application files. In this embodiment, a table 132 is generated at a first time to include attributes for each file or directory in a set offiles 130 associated with a first computer user. In a non-limiting example, the third table 132 is generated before the first computer user has created or modified files in the set offiles 130. A table 136 is generated at a second, later, time and also includes attributes for each file and/or directory in set offiles 134 associated with the first computer user. In one non-limiting example, set offiles 134 encompasses the same top-level file structure or directory hierarchy as set offiles 130 such that any file in the directory structure that is unchanged between the generation of table 132 and the generation of table 136 will result in an identical set of attributes in both table 132 and table 136. It is, of course, recognized that the file structure associated with a particular set of files may take forms different from the structure illustrated inFIGS. 8-18 , and that a computer user will likely have files named or located differently than illustrated, such as directory structures used in operating systems such as MAC OS, UNIX, LINUX, and WINDOWS. - Table 138 is generated from tables 132 and 136 and is configured to include only sets of attributes from table 136 that are not present in table 132. For example, since “System files” appears in both table 132 and 136, it does not appear in the temporal differencing table 138. Also, as illustrated in
FIGS. 8-9 , at a first time set offiles 130 may include a file named “File A”, located at the top level of a directory structure (C:\) associated with the first user. The attributes associated with “File A” in table 132, in this example, include the username, filename, and file location within the directory structure. At the time table 136 is generated, “File A” exists in a different location than it did when table 132 was generated. Thus the attributes for “File A” are different in table 136 than in table 132. That difference requires attributes for “File A”, to be listed in “temporal difference” table 138. - Referring to
FIGS. 13-17 , tables 142 and 146 are derived respectively from sets offiles files 140 associated with the second computer user. It is however recognized that files may be created or modified in set offiles 140, associated with the second user, prior togeneration 142. The generation of table 146 is preferably occurs later in time than the generation of table 142, though not limited to be so, and the generation of tables 142 and 146 may correspond in time respectively with the generation of tables 132 and 136. A table 148 is generated from table 142 and table 146 to include set of attributes from table 146 that are not represented in table 142. - A similarity table 150, shown in
FIG. 18 , is generated utilizing tables 138 and 148 and a predetermined similarity metric. The similarity metric is used to compare each set of attributes in table 138 against each set of attributes in table 148 to determine a degree of similarity of files represented by each set of attributes. - In one non-limiting example, the similarity metric utilizes filename and file location attributes from tables 138 and 148 to determine an amount of similarity between files. For example,
FIG. 18 , shows attributes for “File C”, which, according to table 138 is located at “C:\Project B” for the first user, and according to table 148 is located at “C:\Project B:\Project B-1” for the second user. Although the files have a common filename, they are differently located, resulting in, for example, an amount of similarity less than 100%, based on a scale used by the similarity metric. It is, of course, recognized that a variety of scales and similarity determinations may be used by a particular similarity metric. - Referring to
FIGS. 19 and 20 , it should be noted that similarity table 150 may be used to select attributes of files that match, within a predetermined or selectable amount of similarity, a search attribute entered by a search user. For example, as shown inFIG. 19 , a search attribute is received form a search user. According to a non-limiting embodiment of the invention, the search attribute is compared with attributes in the similarity table 150 to produce a result attribute or set of result attributes corresponding with the search attribute. For example, a search user may enter the term “File A”. The filename is compared with attributes in similarity table 150 and a set of result attributes is calculated and displayed, including, for example, a list offilenames 164 that are related to the search request “File A.” In one exemplary embodiment, the results obtained from the search (shown inResults 1 inFIG. 20 ) are “File X”, “File Y”, and “File Z” which are files generated by the search user that are related to the file named “File A.” For example, the relationship between the files can be that the “File A”, “File X”, “File Y”, and “File Z” are stored in the same directory. Further, a list ofusernames 166 associated with other users who have a file with the filename “File A” is determined and displayed. In one exemplary embodiment, the list ofusernames 166 includes a user named “User 2” who has a file named “File A” (shown asResults 2 inFIG. 20 ). It is, of course, recognized that the search results produced will depend on the type of attributes stored in similarity table 150. It is anticipated that search results may be ordered by amount of similarity to the search term, as well as by other sorting algorithms known to those skilled in the art. - Referring now to
FIG. 21 , a method for identifying computer users having files with common attributes in accordance with another exemplary embodiment is illustrated. The method can be implemented utilizing the system 9 described above. - At
step 200, thecomputers files - At
step 202, after generating the first and second tables 132, 142, thecomputers - At
step 204,computers 10 and 120 generate first and second difference tables 138, 148, respectively, associated with the first and second computers users, respectively. The difference table 138 includes a set of attributes from table 136 that are not included identically in table 132. The difference table 148 includes a set of attributes from table 146 that are not included identically in table 142. - At
step 206, thecomputer 10 generates a similarity table 150 based on the first and second difference tables 138, 148, utilizing a similarity metric. In particular, thecomputer 10 compares set of attributes in table 138 with sets of attributes in table 148, utilizing a predetermined similarity metric to generate the similarity table 150. - At
step 208, thecomputer 10 receives at least one search attribute from a search user. The search user can be either the first user or the second user. The search attribute corresponds to an attribute type contained in similarity table 150. - At
step 210, thecomputer 10 displays one or more filename(s) associated with each set of attributes in the search-user's difference table on the display device 16 wherein the set of attributes corresponds with the search attribute. - At
step 212, the computer displays one or more username(s) associated with each set of attributes in the first or second difference tables on the display device 16 wherein the set of attributes corresponds with the search attribute. Afterstep 212, the method is exited. - It should be noted that in an alternate embodiment, an inferred relationship metric could be utilized to find files of first and second users having common attributes. An inferred relationship metric is a metric associated with an organization of files. For example, as inferred relationship metric could be a grouping of files in a folder. Further, for example, if
User 1 andUser 2 have “File Z” in common, the fact thatUser 2 also places “File C” and “File H” in the same folder as “File Z” may suggest an inferred relationship between “File C, ” “File H,” and “File Z.” - It is of course appreciated that the foregoing embodiments may be extended without limitation to generate table and results associated with sets of files associated with more than two computer users within a computer network. It should be noted that in an alternative embodiment, the foregoing tables and results can be determined utilizing a third external computer or computer server, communicating with first and second computers that store the files associated with first and second computer users, respectively.
- The capabilities of the present invention can be implemented in software, firmware, hardware or some combination thereof. As one example, one or more aspects of the present invention can be included in an article of manufacture (e.g., one or more computer program products) having, for instance, computer usable media. The media has embodied therein, for instance, computer readable program code means for providing and facilitating the capabilities of the present invention. The article of manufacture can be included as a part of a computer system or sold separately. Additionally, at least one program storage device readable by a machine, tangibly embodying at least one program of instructions executable by the machine to perform the capabilities of the present invention can be provided.
- The flow diagram depicted herein are just examples. There may be many variations to these diagrams or the steps (or operations) described therein without departing from the spirit of the invention. For instance, the steps may be performed in a differing order, or steps may be added, deleted or modified. All of these variations are considered a part of the claimed invention.
- The system and methods for identifying computer users having files with common attributes provide a substantial advantage over other systems and methods. In particular, the system and methods provide a technical effect of enabling intranet users to find file resources in an intranet which are not otherwise sufficiently available, utilizing a similarity table which relates attributes of a file to the attributes of another file. Another effect of the system and the methods are that computer users are able to identify other computer users having similar files.
- While the invention is described with reference to an exemplary embodiment, it will be understood by those skilled in the art that various changes may be made and equivalent elements may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to the teachings of the invention to adapt to a particular situation without departing from the scope thereof. Therefore, is intended that the invention not be limited the embodiment disclosed for carrying out this invention, but that the invention includes all embodiments falling with the scope of the intended claims. Moreover, the use of the term's first, second, etc. does not denote any order of importance, but rather the term's first, second, etc. are used to distinguish one element from another.
Claims (9)
1. A method for identifying computer users having files with common attributes, comprising:
generating a first table having a set of attributes for each file in a first set of files associated with a first computer user, the set of attributes for each file in the first set of files having a plurality of attribute types;
generating a second table having a set of attributes for each file in a second set of files associated with a second computer user, the set of attributes for each file in the second set of files having the plurality of attribute types;
generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric; and
determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
2. The method of claim 1 , wherein the first and second sets of files are stored on first and second computers, respectively.
3. The method of claim 1 , wherein the set of attributes in the first table includes at least one of a user name, a filename, a file size, a file type, a file creation date, a file modification date, a file location, a checksum value associated with a file, and a collection of checksum values associated with portions of a file.
4. The method of claim 1 , wherein the similarity metric is based on a quantity of checksum values in the first table that correspond to checksum values in the second table.
5. The method of claim 1 , further comprising:
generating a third table at a first time having a set of attributes for each file in a third set of files associated with the first computer user, the set of attributes for each file in the third set of files having the plurality of attribute types;
generating a fourth table at a second time after the first time having a set of attributes for each file in a fourth set of files associated with the first computer user, the set of attributes for each file in the fourth set of files having the plurality of attribute types;
generating the first table having only sets of attributes contained in the fourth table that are not contained in the third table;
generating a fifth table at a third time having a set of attributes for each file in a fifth set of files associated with the second computer user, the set of attributes for each file in the fifth set of files having the plurality of attribute types;
generating a sixth table at a fourth time after the third time having a set of attributes for each file in a sixth set of files associated with the second computer user, the set of attributes for each file in the sixth set of files having the plurality of attribute types; and
generating the second table having only sets of attributes contained in the sixth table that are not contained in the fifth table.
6. The method of claim 1 , further comprising:
receiving a first file attribute that corresponds with a first file associated with the first computer user; and
indicating a name of the second computer user associated with the second set of files wherein at least one file in the second set of files corresponds to the first file, utilizing the similarity table.
7. The method of claim 6 , further comprising indicating one or more related files that are associated with the second computer user, wherein the related files are determined to correspond to the first file by utilizing a predetermined inferred relationship metric.
8. A system for identifying computer users having files with common attributes, comprising:
first and second computers operably communicating with one another;
a display device operably communicating with the first computer, the first computer configured to generate a first table having a set of attributes for each file in a first set of files associated with a first computer user, the set of attributes for each file in the first set of files having a plurality of attribute types, the second computer further configured to generate a second table having a set of attributes for each file in a second set of files associated with a second computer user, the set of attributes for each file in the second set of files having the plurality of attribute types, the first computer further configured to generate a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, the first computer further configured to determine whether the first and second computer users have at least one file with common attributes, based on data in the similarity table, the first computer further configured to display a user identifier associated with at least one of the first and second computer users on the display device when the first and second computer users have at least one file with common attributes.
9. The system of claim 8 , wherein the first computer is further configured to display a file name of the at least one file with common attributes on the display device.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/562,084 US20080120319A1 (en) | 2006-11-21 | 2006-11-21 | System and method for identifying computer users having files with common attributes |
US12/130,339 US8086573B2 (en) | 2006-11-21 | 2008-05-30 | System and method for identifying computer users having files with common attributes |
US13/296,431 US8768893B2 (en) | 2006-11-21 | 2011-11-15 | Identifying computer users having files with common attributes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/562,084 US20080120319A1 (en) | 2006-11-21 | 2006-11-21 | System and method for identifying computer users having files with common attributes |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/130,339 Continuation US8086573B2 (en) | 2006-11-21 | 2008-05-30 | System and method for identifying computer users having files with common attributes |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080120319A1 true US20080120319A1 (en) | 2008-05-22 |
Family
ID=39469784
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/562,084 Abandoned US20080120319A1 (en) | 2006-11-21 | 2006-11-21 | System and method for identifying computer users having files with common attributes |
US12/130,339 Expired - Fee Related US8086573B2 (en) | 2006-11-21 | 2008-05-30 | System and method for identifying computer users having files with common attributes |
US13/296,431 Expired - Fee Related US8768893B2 (en) | 2006-11-21 | 2011-11-15 | Identifying computer users having files with common attributes |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/130,339 Expired - Fee Related US8086573B2 (en) | 2006-11-21 | 2008-05-30 | System and method for identifying computer users having files with common attributes |
US13/296,431 Expired - Fee Related US8768893B2 (en) | 2006-11-21 | 2011-11-15 | Identifying computer users having files with common attributes |
Country Status (1)
Country | Link |
---|---|
US (3) | US20080120319A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090171993A1 (en) * | 2007-09-28 | 2009-07-02 | Xcerion Ab | Network operating system |
US8176555B1 (en) * | 2008-05-30 | 2012-05-08 | Symantec Corporation | Systems and methods for detecting malicious processes by analyzing process names and process characteristics |
US8621233B1 (en) * | 2010-01-13 | 2013-12-31 | Symantec Corporation | Malware detection using file names |
US20140188950A1 (en) * | 2012-12-28 | 2014-07-03 | Honda Motor Co., Ltd. | Computer-readable storage medium, file management apparatus, and file management method |
US20140188929A1 (en) * | 2012-12-28 | 2014-07-03 | Honda Motor Co., Ltd. | Computer-readable storage medium, file management apparatus, and file management method |
US20150012538A1 (en) * | 2007-06-29 | 2015-01-08 | Microsoft Corporation | Flexible namespace prioritization |
US9286271B2 (en) | 2010-05-26 | 2016-03-15 | Google Inc. | Providing an electronic document collection |
US9384285B1 (en) | 2012-12-18 | 2016-07-05 | Google Inc. | Methods for identifying related documents |
US9514113B1 (en) | 2013-07-29 | 2016-12-06 | Google Inc. | Methods for automatic footnote generation |
US9529791B1 (en) | 2013-12-12 | 2016-12-27 | Google Inc. | Template and content aware document and template editing |
US9529916B1 (en) | 2012-10-30 | 2016-12-27 | Google Inc. | Managing documents based on access context |
US9542374B1 (en) | 2012-01-20 | 2017-01-10 | Google Inc. | Method and apparatus for applying revision specific electronic signatures to an electronically stored document |
US9703763B1 (en) | 2014-08-14 | 2017-07-11 | Google Inc. | Automatic document citations by utilizing copied content for candidate sources |
US9842113B1 (en) | 2013-08-27 | 2017-12-12 | Google Inc. | Context-based file selection |
US11308037B2 (en) | 2012-10-30 | 2022-04-19 | Google Llc | Automatic collaboration |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008257444A (en) * | 2007-04-04 | 2008-10-23 | Nec Corp | Similar file management device, method therefor and program therefor |
US8214375B2 (en) * | 2008-11-26 | 2012-07-03 | Autodesk, Inc. | Manual and automatic techniques for finding similar users |
JP5952196B2 (en) * | 2010-02-03 | 2016-07-13 | アルコード コーポレーション | Electronic message system and method |
US9575979B1 (en) * | 2013-12-16 | 2017-02-21 | Amazon Technologies, Inc. | Determining application composition and ownership |
US9413739B1 (en) * | 2014-06-25 | 2016-08-09 | Google Inc. | System and method for identification and consolidation of related concurrent document sessions |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5806073A (en) * | 1994-01-21 | 1998-09-08 | Piaton; Alain Nicolas | Method for the comparison of computer files |
US6098079A (en) * | 1998-04-02 | 2000-08-01 | Mitsubishi Electric Information Technology Center America, Inc. (Ita) | File version reconciliation using hash codes |
US20050210465A1 (en) * | 2004-03-16 | 2005-09-22 | Hitachi, Ltd. | Management system of difference data among servers and control method of information processing apparatus |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956722A (en) | 1997-09-23 | 1999-09-21 | At&T Corp. | Method for effective indexing of partially dynamic documents |
US6088707A (en) * | 1997-10-06 | 2000-07-11 | International Business Machines Corporation | Computer system and method of displaying update status of linked hypertext documents |
US6347313B1 (en) | 1999-03-01 | 2002-02-12 | Hewlett-Packard Company | Information embedding based on user relevance feedback for object retrieval |
US6571234B1 (en) | 1999-05-11 | 2003-05-27 | Prophet Financial Systems, Inc. | System and method for managing online message board |
US6424969B1 (en) | 1999-07-20 | 2002-07-23 | Inmentia, Inc. | System and method for organizing data |
JP2001109754A (en) | 1999-09-30 | 2001-04-20 | Internatl Business Mach Corp <Ibm> | Retrieving method using index file and device used for the method |
US20020049760A1 (en) * | 2000-06-16 | 2002-04-25 | Flycode, Inc. | Technique for accessing information in a peer-to-peer network |
JP2003157259A (en) | 2001-09-05 | 2003-05-30 | Fuji Xerox Co Ltd | Information retrieval system |
US8271530B2 (en) | 2002-04-08 | 2012-09-18 | Oracale International Corporation | Method and mechanism for managing and accessing static and dynamic data |
US7409406B2 (en) | 2003-09-08 | 2008-08-05 | International Business Machines Corporation | Uniform search system and method for selectively sharing distributed access-controlled documents |
US8135683B2 (en) | 2003-12-16 | 2012-03-13 | International Business Machines Corporation | Method and apparatus for data redundancy elimination at the block level |
US8229904B2 (en) * | 2004-07-01 | 2012-07-24 | Emc Corporation | Storage pools for information management |
JP2006048286A (en) | 2004-08-03 | 2006-02-16 | Sony Corp | Information processing device and method, and program |
WO2006047654A2 (en) * | 2004-10-25 | 2006-05-04 | Yuanhua Tang | Full text query and search systems and methods of use |
-
2006
- 2006-11-21 US US11/562,084 patent/US20080120319A1/en not_active Abandoned
-
2008
- 2008-05-30 US US12/130,339 patent/US8086573B2/en not_active Expired - Fee Related
-
2011
- 2011-11-15 US US13/296,431 patent/US8768893B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5806073A (en) * | 1994-01-21 | 1998-09-08 | Piaton; Alain Nicolas | Method for the comparison of computer files |
US6098079A (en) * | 1998-04-02 | 2000-08-01 | Mitsubishi Electric Information Technology Center America, Inc. (Ita) | File version reconciliation using hash codes |
US20050210465A1 (en) * | 2004-03-16 | 2005-09-22 | Hitachi, Ltd. | Management system of difference data among servers and control method of information processing apparatus |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150012538A1 (en) * | 2007-06-29 | 2015-01-08 | Microsoft Corporation | Flexible namespace prioritization |
US9621649B2 (en) | 2007-09-28 | 2017-04-11 | Xcerion Aktiebolag | Network operating system |
US8843942B2 (en) | 2007-09-28 | 2014-09-23 | Xcerion Aktiebolag | Interpreting semantic application code |
US8615531B2 (en) | 2007-09-28 | 2013-12-24 | Xcerion Aktiebolag | Programmatic data manipulation |
US11838358B2 (en) | 2007-09-28 | 2023-12-05 | Xcerion Aktiebolag | Network operating system |
US8688627B2 (en) | 2007-09-28 | 2014-04-01 | Xcerion Aktiebolag | Transaction propagation in a networking environment |
US8738567B2 (en) * | 2007-09-28 | 2014-05-27 | Xcerion Aktiebolag | Network file system with enhanced collaboration features |
US9071623B2 (en) | 2007-09-28 | 2015-06-30 | Xcerion Aktiebolag | Real-time data sharing |
US20090171993A1 (en) * | 2007-09-28 | 2009-07-02 | Xcerion Ab | Network operating system |
US8620863B2 (en) | 2007-09-28 | 2013-12-31 | Xcerion Aktiebolag | Message passing in a collaborative environment |
US8996459B2 (en) | 2007-09-28 | 2015-03-31 | Xcerion Aktiebolag | Offline and/or client-side execution of a network application |
US8959123B2 (en) | 2007-09-28 | 2015-02-17 | Xcerion Aktiebolag | User interface framework |
US8954526B2 (en) | 2007-09-28 | 2015-02-10 | Xcerion Aktiebolag | Network operating system |
US8176555B1 (en) * | 2008-05-30 | 2012-05-08 | Symantec Corporation | Systems and methods for detecting malicious processes by analyzing process names and process characteristics |
US8621233B1 (en) * | 2010-01-13 | 2013-12-31 | Symantec Corporation | Malware detection using file names |
US9038186B1 (en) | 2010-01-13 | 2015-05-19 | Symantec Corporation | Malware detection using file names |
US9292479B2 (en) | 2010-05-26 | 2016-03-22 | Google Inc. | Providing an electronic document collection |
US9286271B2 (en) | 2010-05-26 | 2016-03-15 | Google Inc. | Providing an electronic document collection |
US9542374B1 (en) | 2012-01-20 | 2017-01-10 | Google Inc. | Method and apparatus for applying revision specific electronic signatures to an electronically stored document |
US11308037B2 (en) | 2012-10-30 | 2022-04-19 | Google Llc | Automatic collaboration |
US9529916B1 (en) | 2012-10-30 | 2016-12-27 | Google Inc. | Managing documents based on access context |
US11748311B1 (en) | 2012-10-30 | 2023-09-05 | Google Llc | Automatic collaboration |
US9384285B1 (en) | 2012-12-18 | 2016-07-05 | Google Inc. | Methods for identifying related documents |
CN103914507A (en) * | 2012-12-28 | 2014-07-09 | 富士通株式会社 | File management apparatus and file management method |
US20140188929A1 (en) * | 2012-12-28 | 2014-07-03 | Honda Motor Co., Ltd. | Computer-readable storage medium, file management apparatus, and file management method |
US10073852B2 (en) * | 2012-12-28 | 2018-09-11 | Fujitsu Limited | Computer-readable storage medium, file management apparatus, and file management method |
US20140188950A1 (en) * | 2012-12-28 | 2014-07-03 | Honda Motor Co., Ltd. | Computer-readable storage medium, file management apparatus, and file management method |
US9514113B1 (en) | 2013-07-29 | 2016-12-06 | Google Inc. | Methods for automatic footnote generation |
US9842113B1 (en) | 2013-08-27 | 2017-12-12 | Google Inc. | Context-based file selection |
US11681654B2 (en) | 2013-08-27 | 2023-06-20 | Google Llc | Context-based file selection |
US9529791B1 (en) | 2013-12-12 | 2016-12-27 | Google Inc. | Template and content aware document and template editing |
US9703763B1 (en) | 2014-08-14 | 2017-07-11 | Google Inc. | Automatic document citations by utilizing copied content for candidate sources |
Also Published As
Publication number | Publication date |
---|---|
US20080228811A1 (en) | 2008-09-18 |
US20120059830A1 (en) | 2012-03-08 |
US8086573B2 (en) | 2011-12-27 |
US8768893B2 (en) | 2014-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8086573B2 (en) | System and method for identifying computer users having files with common attributes | |
US6842748B1 (en) | Usage based strength between related information in an information retrieval system | |
US20120284270A1 (en) | Method and device to detect similar documents | |
CA2511098C (en) | Dispersing search engine results by using page category information | |
US8370334B2 (en) | Dynamic updating of display and ranking for search results | |
US7711729B2 (en) | Searching a document based on a customer defined metadata schemata | |
TWI512506B (en) | Sorting method and device for search results | |
US20060101077A1 (en) | Usage based strength between related help topics and context based mapping thereof in a help information retrieval system | |
US11256744B2 (en) | Method, apparatus and software for differentiating two or more data sets having common data set identifiers | |
US20070271249A1 (en) | Heterogeneous multi-level extendable indexing for general purpose annotation systems | |
US8364718B2 (en) | Collaborative bookmarking | |
US20200042510A1 (en) | Method and device for correlating multiple tables in a database environment | |
US20120059828A1 (en) | Methods and Systems for Compressing Indices | |
JP2012069171A (en) | Web page ranking with hierarchical consideration | |
Bota et al. | Composite retrieval of heterogeneous web search | |
WO2009031759A1 (en) | Method and system for generating search collection of query | |
CN102999637B (en) | According to the method and system that file eigenvalue is file automatic powder adding add file label | |
CN112927057A (en) | Object information display method and device, computer equipment and readable storage medium | |
CN112434250A (en) | CMS (content management system) identification feature rule extraction method based on online website | |
US20050125387A1 (en) | Method of joining data and its metadata using dynamic metadata in relational database | |
JP5488031B2 (en) | Search device | |
CN115563073A (en) | Method and device for data processing of distributed metadata and electronic equipment | |
JP5418295B2 (en) | Search device | |
Sitas et al. | Duplicate detection algorithms of bibliographic descriptions | |
Pedersen et al. | Achieving adaptivity for OLAP-XML federations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DREWS, CLEMENS;LAU, TESSA ANN;LIN, JAMES;AND OTHERS;REEL/FRAME:018542/0593;SIGNING DATES FROM 20061030 TO 20061031 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |