Unlock instant, AI-driven research and patent intelligence for your innovation.

Incentive-based application execution

A technology of application program and daemon program, applied in the direction of program control design, program control device, program loading/starting, etc., can solve problems such as infeasibility

Active Publication Date: 2019-09-27
MICROSOFT TECH LICENSING LLC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While one often thinks that he / she can run many services and applications on a desktop computer at one time, this is not feasible in the context of mobile computing devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Incentive-based application execution
  • Incentive-based application execution
  • Incentive-based application execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] For purposes of brevity, the term "exemplary" in this document should be interpreted as serving as an example or instance of something, rather than as an ideal and / or primary illustration of that thing. The term "personal information" corresponds to information, data, metadata, preferences, behaviors, and rules for interacting with users associated with them. In general, personal information is information about an associated user that represents some aspect of the user. Personal information may include data such as (by way of example and not limitation) gender, age, education, demographics, place of residence, citizenship, etc. Personal information may also include preferences and interests, skills, abilities, etc. In addition, Personal Information may include rules (including rules established by the Associated User as well as rules learned and / or inferred through analysis, as described below) for interacting with the Associated User in providing personal assistance....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods are provided for a personal daemon executing as a background process on a mobile computing device for providing personal assistance to an associated user. Also executing on the mobile computing device is a schedule manager. A personal daemon performs one or more personal auxiliary actions on behalf of an associated user. The schedule manager responds to events supporting individual daemons. More particularly, in response to receiving the event, the schedule manager determines a set of applications responsive to the received event, and from the set of applications at least identifies the first subset. The schedule manager receives feedback information regarding the availability of executed application programs in the first subset of application programs and updates an association score for each of the applications in the first subset of application programs.

Description

Background technique [0001] More and more people are expressing and demonstrating their interest in having computers understand them and provide personalized assistance tailored to their specific needs and context. Of course, in order to provide personalized assistance tailored to a person's specific needs and context, the assistance process must know many aspects of the person, ie, his or her personal information. In fact, the more aspects of a person a process knows, the better the process is at personalizing information for that person. [0002] Often, the computing devices most commonly owned by individuals are mobile computing devices, such as smartphones, tablet computing devices, or so-called "phablets"—a computing device classification that is a hybrid of smartphones and tablet computing devices. In general, mobile computing devices have less processing capabilities and operate with limited power resources. While one often thinks that he / she can run many services and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/62G06F9/4881G06F9/445
Inventor D·C·布格尔D·L·马西B·J·F·德斯梅特B·H·阿格拉伊阿尔卡斯
Owner MICROSOFT TECH LICENSING LLC