Abstract:
Techniques are described herein for enhancing the ranking products using purchase day based time windows. A purchase day based time window is a time window that is defined to include purchase days selected from a series of consecutive days. A purchase day is a day on which a product associated with the time window is purchased. The series of consecutive days includes the purchase days intermixed with non-purchase day(s). A non-purchase day is a day on which the product associated with the time window is not purchased. The purchase day based time window is further defined to not include the non-purchase day(s).
Abstract:
A system and method for detecting whether a user account has been compromised. A server computer determines, for a client device, a first identifier associated with the client device. The server computer analyzes an activity log associated with an account of a user to determine if an eavesdropping condition has been met during a given duration. The analysis includes: 1) determining that an eavesdropping activity has occurred during the given duration and determining that no normal activity has occurred during the given duration for the first identifier; 2) determining a second identifier associated with a second device used to access the user account; and 3) determining that a normal activity associated with the second identifier has occurred during the given duration.
Abstract:
The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
Abstract:
Techniques are provided for associating product offerings with product abstractions. The techniques enable generating a second product offering based on a first product offering by mapping items in the first product offering using one or more mapping dictionaries, where a product offering is an offer to sell a particular product by a particular party. Once the second product offering has been generated, a matching score is determined for each of one or more product abstractions; and then one or more product abstractions are associated with the first product offering based on the matching scores for the second product offering.
Abstract:
A method for processing query data is described that includes receiving a query portion from a client over a network. For each of multiple search contexts, a relevance score is determined, based on the query portion. Each search context corresponds to a different set of information against which queries can be executed. Indication of the relevance scores is provided to the client over the network. Determining the relevance score and providing indication are performed prior to an input indicating a complete query or in response thereto. The method may also include associating shortcuts with search contexts, selecting a set of shortcuts based, at least in part, on the relevance scores for the search contexts and the association between the shortcuts and search contexts, and sending the set of shortcuts to the client. The shortcuts include links for accessing a content location associated with the shortcut.
Abstract:
Disclosed is a method and system for displaying one or more actions associated with a domain. A server computer receives over a network from a client-side module executing on a computing device a Uniform Resource Locator (URL) associated with a web page to which a user has navigated via a browser executing on the computing device. The server computer determines that the web page is part of a domain that the user has navigated to more than a predetermined number of times within a given period of time. The server computer determines a category associated with the web page and determines one or more actions associated with the domain. The server computer transmits to the computing device for display in the browser a link, the link representing an action associated with the domain and with the category associated with the web page.
Abstract:
One or more messages may be selected and grouped and one or more group-level actions may be initiated for the group, such that the group-level action is performed on each message in the group. Each message in a group shares the at least one attribute value. A messaging user interface may comprise a listing of the set of messages and a message group display portion that displays one or more message groups and a group-level toolbar comprising a selectable indicator for each group-level action. A message, or messages, shown in a message list portion of the user interface may be selected from the message list based on similarity of the message(s) to previously selected messages, and the selected message(s) may be grouping based on shared attribute values. The messages belonging to a group may be modified in the same way via a single action taken on the group.
Abstract:
A system and method for monitoring the performance and execution flow of a target application and generating a corresponding data model are provided. The system and method comprise attaching to a thread or process of a target application and tracking the execution of subroutines using instrumentation commands. Data representing the execution flow of the various subroutines, subroutine calls, and their performance is gathered and used to generate data models representing the threads and processes of the application. The data models are optionally merged and/or pruned. A visualization of the data models is generated indicating relevant points of interest within the target application's execution flow.
Abstract:
A system and method for distributing media related to a location. The physical location of a media presentation device is received over a network. The physical location of a plurality of end users are identified, via the network, wherein each of plurality of users is associated with a user device capable of storing media files. At least one of the end users is identified who is located in such proximity to the media presentation device that the user can perceive media that presented on the media presentation device. At least one media file that is currently being presented on the media presentation device is identified and transmitted over the network to each of the identified end users.
Abstract:
Methods, systems and computer program products are provided for social networking. In one method, a network builder receives a digital object from the user. The digital object contains information associated with the user. The network builder extracts the information associated with the user from the digital object. The network builder further access the strength of relationships between the user and a plurality of other users, each associated with one or more social networks. The relationships strength is extracted based at least in part on the extracted information. The network builder then adds the user to one or more social networks based on the information associated with the user and the strength of the relationships between the user and the plurality of other users.