Martin A. Quiroga - Kansas City MO, US John A. DeSanto - Kansas City MO, US John S. Flowers - Mission KS, US
Assignee:
Jiles, Inc. - Los Angeles CA
International Classification:
G06F 17/30
US Classification:
707 3, 707 1, 707 2, 707 4, 707 5
Abstract:
There is provided a search engine or other electronic search application that receives an inputted query in natural language. The search engine then analyzes the query in accordance with the syntactic relationships of the natural language in which it was presented, weights the syntactic relationships, and generates a result to the query as output, corresponding to the syntactic relationship of the greatest weight. The outputted result is typically an answer, in the form of a sentence or a phrase, along with the document from which the sentence or phrase is taken, including a hypertext link for the document.
Natural Language Based Search Engine For Handling Pronouns And Methods Of Use Therefor
Martin A. Quiroga - Kansas City MO, US Gordon H. Fischer - Kansas City MO, US John S. Flowers - Mission KS, US
Assignee:
Jiles, Inc. - San Francisco CA
International Classification:
G06F 17/30
US Classification:
707 3, 707100, 715200, 704 9
Abstract:
There is provided a sentence module that handles pronouns in sentences. Each pronoun is replaced by one or more nouns. These replaced nouns are used to form statements that populate the structured representation, in order to produce precise answers to queries, as part of a search engine application.
Network Security System Having A Device Profiler Communicatively Coupled To A Traffic Monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
Network Security System Having A Device Profiler Communicatively Coupled To A Traffic Monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
Network Security System Having A Device Profiler Communicatively Coupled To A Traffic Monitor
A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
Natural Language Based Search Engine And Methods Of Use Therefor
John Flowers - Mission KS, US Martin Quiroga - Kansas City MO, US Gordon Fischer - Kansas City MO, US John DeSanto - Kansas City MO, US
International Classification:
G06F 17/30
US Classification:
707003000
Abstract:
There is provided a search engine or other electronic search application that receives an inputted query in natural language. The search engine then analyzes the query in accordance with the syntactic relationships of the natural language in which it was presented, and generates a result to the query as output. The outputted result is typically an answer, in the form of a sentence or a phrase, along with the document from which the sentence or phrase is taken, including a hypertext link for the document.
John Flowers - Mission KS, US Michael Farmer - Kansas City MO, US Martin Quiroga - Kansas City MO, US Gordon Fischer - Kansas City MO, US John DeSanto - Kansas City MO, US
Assignee:
Kozoru, Inc. - Overland Park KS
International Classification:
G06F 17/30
US Classification:
707002000
Abstract:
The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.
Novel Systems And Methods For Performing Contextual Information Retrieval
John Flowers - Overland Park KS, US Michael Farmer - Kansas City MO, US Martin Quiroga - Austin TX, US Gordon Fischer - Kansas City MO, US John DeSanto - Kansas City MO, US
Assignee:
Kozoru, Inc. - Overland Park KS
International Classification:
G06F 17/30
US Classification:
707005000
Abstract:
The present invention is directed to systems and methods for encoding and retrieving information from a variety of sources using novel search techniques. The systems and methods of the invention are capable of extracting all types of structural and relational information from a query or a source data allowing for the recognition of subtle differences in meaning. The capability of discerning subtle differences in meaning that are beyond the search systems and methods presently available, the invention described herein is capable of repeatedly providing accurate and meaningful responses to a diverse set of queries.
Medical School Nova Southeastern University College of Osteopathic Medicine Graduated: 2007
Languages:
English Spanish
Description:
Dr. Quiroga graduated from the Nova Southeastern University College of Osteopathic Medicine in 2007. He works in Warren, MI and specializes in Pain Management and Family Medicine.
American Honda Motor Company, Inc. Feb 2017 - Sep 2017
District Recall Coordinator
Cps Feb 2017 - Sep 2017
Account Executive and Fleet Specialist
Xsport Fitness Dec 2013 - Dec 2015
Assistant General Manager
Education:
Thornwood High School
Prairie State College
South Suburban College
Jana (formerly txteagle) since Oct 2009
Systems Architect
Biogy, Inc. Oct 2007 - Feb 2010
Chief Architect
kozoru Jul 2004 - Sep 2006
CTO
nCircle Network Security 2001 - 2004
Architect / Product Manager
Education:
The University of New Mexico 1998 - 2000
MArch, Architecture
The University of New Mexico 1993 - 1998
BA, Architecture
Skills:
Network Security Architecture Start-ups Mobile Devices Product Management Machine Learning
Flickr
Googleplus
Martin Quiroga
Work:
Frigorifico el bierzo
Education:
*******************
Martin Quiroga
Martin Quiroga
Martin Quiroga
Martin Quiroga
Martin Quiroga
Martin Quiroga
Martin Quiroga
Youtube
Martin Quiroga - Mirame a Los Ojos
Martin Quiroga
Category:
Music
Uploaded:
08 Dec, 2010
Duration:
4m 20s
Martin Quiroga - La Cuerda
Martin Quiroga
Category:
Music
Uploaded:
10 Dec, 2010
Duration:
3m 39s
La cuerda - Martn Quiroga
All music or related performances remain the sole property of their re...
Category:
Music
Uploaded:
03 Dec, 2010
Duration:
3m 25s
Martin Quiroga - Yo sin ti
cumbia uruguaya
Category:
Music
Uploaded:
12 Dec, 2009
Duration:
4m 3s
MARTIN QUIROGA LA CUMANA
15_11_08 EL MARTINCITO CANTANDO EN EL TROPY DIVINOOOOOOOOOOO...