Abstract:
A method for retrieving data from a data source by querying the data source with data points of a layer. The data points may be encompassed within a determined region of the layer. The steps of the method may include: determining the region of the layer, dynamically querying the data source with one or more data points of the layer encompassed within the region upon determining the region, and receiving the data from the data source.
Abstract:
An overlay protocol and system for allowing multicast routing in the Internet to be performed at the application level. The overlay protocol uses “native” Internet multicast and multicast routing protocols to route information, according to overlay routing tables. Overlay groups are mapped to native multicast groups to exploit native multicasting in regional or local forwarding domains. Use of the overlay protocol allows overlay distribution to be handled in a more intelligent and bandwidth-managed fashion. Overlay routers are placed at each of several local area networks, Internet service provider's point of presence, enterprise, or other cohesively-managed locations. The overlay computers are configured according to bandwidth and security policies, and perform application-level multicast distribution across the otherwise disjoint multicast networks by using the overlay routing. The result is an overlay multicast network that is effectively managed according to local network management policies. Application-level control can be applied to the transferred data at the overlay routers.
Abstract:
Systems and methods build a profile for a contact. In one aspect, missing information from a profile of a contact is identified. A determination is made regarding whether the missing information is necessary for the profile based on satisfaction of a threshold. In response to the satisfaction of the threshold, a user is prompted to request the missing information from the contact. The missing information is obtained. The missing information is added to the profile.
Abstract:
A system and method are disclosed for identifying and generating a potential user trail. The trail may be an anticipated browsing path for a user based on current and/or historical browsing data, including search logs, browsing histories, and other data. The trail may be displayed as a search result summary or with individual search results in response to receiving a search query.
Abstract:
A system may provide for mobile application based online advertising via mobile application interface. A database may be configured to store data corresponding to a plurality of visual elements for rending an advertisement. An advertising server may be in operative communication with the database and configured to receive requests for advertisement campaigns. A mobile interface may allow submission of information relating to an advertisement campaign to the advertising server. A generator engine may be configured to select from the plurality of visual elements and generate display logic for displaying an advertisement corresponding to the advertisement campaign.
Abstract:
Methods and apparatus are described for evaluating a binary classification system operable to classify each of a plurality of events as a first event type or a second event type. At least some of the events of the first event type are independently verifiable with reference to verification data. The binary classification system is susceptible to a first error type in which events of the first event type are classified as the second event type, and a second error type in which events of the second event type are classified as the first event type. Operation of a first configuration of the binary classification system is evaluated with reference to an objective function. The objective function is derived by expressing a number of errors of the second error type in terms of a number of errors of the first error type with reference to the verification data, and by assuming relative proportions of the first and second event types within the plurality of events.
Abstract:
Inverse search systems and methods operate on identifiers of content items in a corpus such as the World Wide Web In an inverse search, the user submits a query that includes an identifier of a target content item in the corpus and receives information (metadata) about the target content item being returned to the user. Many types of metadata can be returned, including ratings or other metadata related to the target content item obtained from users, popularity data specific to the target content item, information about previously submitted forward search queries that led to the target content item being identified as a hit, and metadata extracted from the target content item.
Abstract:
An online music system includes a music database configured to store musical selections and to store a user profile for respective users of the online music system, an advertiser account management system to store bid amounts from advertisers seeking to provide information to the users of the online music system and a user recommendation system coupled to the music database to present information about musical selections to respective users based on the stored user profile and the stored bid amounts.
Abstract:
A computer implemented method can determine validity of web-based interactions. Web-based interaction data relating to a web-based interaction may be accessed. The web-based interaction data may include aggregate measure data that may include a number of unique queries per web-based session. The validity of the web-based interaction may be determined based on the aggregate measure data.
Abstract:
An audio fingerprint is extracted from an audio sample, where the fingerprint contains information that is characteristic of the content in the sample. The fingerprint may be generated by computing an energy spectrum for the audio sample, resampling the energy spectrum logarithmically in the time dimension, transforming the resampled energy spectrum to produce a series of feature vectors, and computing the fingerprint using differential coding of the feature vectors. The generated fingerprint can be compared to a set of reference fingerprints in a database to identify the original audio content.