Abstract:
A system that incorporates a user context into a computer-based search is provided. To establish the context, the innovation can identify information about a user state or context via a variety of sources and sensors. The state/context information can be used to filter, arrange and/or rank search results so as to facilitate converging on meaningful searches and results. Machine learning systems (implicitly and/or explicitly trained) can be employed to infer a current and/or future context related to user. An identified or inferred user context can be employed to modify an automated or user-defined search input/query. Contextual cues can be considered directly in the construction and use of context of context-sensitive retrieval algorithms that are optimized for identifying and/or ranking of informational items of potential interest or value in different contexts. As well, the context can be employed to intelligently render results of a query (e.g., user/application defined, context-modified query).
Abstract:
Architecture for presenting advertisements in realtime in retail establishments. A sensor component includes sensors for collecting information about a customer or group of customers as they move through the store. The sensors can include capability for image processing, audio processing, light sensing, velocity sensing, direction sensing, proximity sensing, face recognition, pose recognition, transaction recognition, and biometric sensing, for example. A customer component analyzes the information and generates a profile about the customer. Advertisements are selected for presentation that target the customers as they walk in proximity of a presentation system of the store. An advertisement component facilitates dynamic presentation of a targeted advertisement to the individual as a function of the profile. The customer component can infer information during analysis using machine learning and reasoning.
Abstract:
Various embodiments can utilize information that is displayed for a user to automatically generate a list of keywords and use that list as a means to display supplemental information that is relevant to the keywords. In at least some embodiments, the displayed information is analyzed using an extraction algorithm to identify words or, more generally, character strings of interest. If these words or character strings of interest are determined to constitute relevant search terms or “keywords”, then a special user interface portion can be used to display this supplemental information along with the information that is already displayed for the user. This supplemental information can include the search terms themselves, ads that pertain to the search terms, and/or search results that have been ascertained from a web search engine.
Abstract:
The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features, which can be employed in connection with machine learning systems to build improved filters. Data associated with origination information as well as other information embedded in the body of the message that allows a recipient of the message to contact and/or respond to the sender of the message call be extracted as features. The features, or a subset thereof, can be normalized and/or deobfuscated prior to being employed as features of the machine learning systems. The (deobfuscated) features can be employed to populate a plurality of feature lists that facilitate spam detection and prevention. Exemplary features include an email address, an IP address, a URL, an embedded image pointing to a URL, and/or portions thereof.
Abstract:
The present invention provides a unique system and method that can employ machine learning techniques to automatically fill one or more fields across a diverse array of web forms. In particular, one or more instrumented tools can collect input or entries of form fields. Machine learning can be used to learn what data corresponds to which fields or types of fields. The input can be sent to a central repository where other databases can be aggregated as well. This input can be provided to a machine learning system to learn how to predict the desired outputs. Alternatively or in addition, learning can be performed in part by observing entries and then adapting the autofill component accordingly. Furthermore, a number of features of database fields as well as constraints can be employed to facilitate assignments of database entries to form values—particularly when the web form has never been seen before by the autofill system.
Abstract:
The invention relates to a system for filtering messages—the system includes a seed filter having associated therewith a false positive rate and a false negative rate. A new filter is also provided for filtering the messages, the new filter is evaluated according to the false positive rate and the false negative rate of the seed filter, the data used to determine the false positive rate and the false negative rate of the seed filter are utilized to determine a new false positive rate and a new false negative rate of the new filter as a function of threshold. The new filter is employed in lieu of the seed filter if a threshold exists for the new filter such that the new false positive rate and new false negative rate are together considered better than the false positive and the false negative rate of the seed filter.
Abstract:
Architecture that monitors interaction data (e.g., search queries, query results and click-through rates), and provides users with links to other users that fall into similar categories with respect to the foregoing monitored activities (e.g., providing links to individuals and groups that share common interests and/or profiles). A search engine can be interactively coupled with one or more social networks, and that maps individuals and/or groups within respective social networks to subsets of categories associated with searches. A database stores mapped information which can be continuously updated and reorganized as links within the system mapping become stronger or weaker. The architecture can comprise a social network system that includes a database for mapping search-related information to an entity of a social network, and a search component for processing a search query for search results and returning a link to an entity of a social network based on the search query.
Abstract:
Architecture is provided that facilitates user-controlled access to user profile information. A user is allowed to selectively expose (or mask) portions of his/her profile to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profile. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile of a user, and a control component under control of the user for controlling access to the profile. Machine learning and reasoning is provided to make inferences and automate aspects thereof.
Abstract:
Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.
Abstract:
The subject invention provides a unique system and method that facilitates mitigation of storage abuse in connection with free storage provided by messaging service providers such as email, instant messaging, chat, blogging, and/or web hosting service providers. The system and method involve measuring the outbound volume of stored data. When the volume satisfies a threshold, a cost can be imposed on the account to mitigate the suspicious or abusive activity. Other factors can be considered as well that can modify the cost imposed on the cost such as by increasing the cost. Machine learning can be employed as well to predict a level or degree of suspicion. The various factors or the text of the messages can be used as input for the machine learning system.