Abstract:
A structured file includes information to bind a web data source to a web data query system. Code is embedded within the structured file and is in a code language understood by the web data query system. The code is unrestricted in function. Code language objects are exposed within the web data query system for use by the code to interface with the web data query system and the web data source. A URL is associated with the structured file to enable access of the structured file through the Internet. A unit-based quota method is implemented to manage execution of code in the structured file. The unit-based quota method collapses multiple dimensions of computing resource control into a single unit value, tracks a number of units expended by the code, and stops execution of the code when the number of units expended by the code reaches a set limit.
Abstract:
Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data across platforms, which data can be used to improve the quality of data used in processing interactions between or among processors in such systems. The disclosed systems and methods enable users to access web-based resources on a first device by authenticating themselves on a second device. A user can provide identifying information to a web-based resource on a first device, and as a result, the user receives a message at his/her already registered second device. The user then authenticates himself/herself on the second device by reusing the means of authentication that exist on the user's second device, which results in the user being granted entry to the web-based resource on the first device.
Abstract:
Disclosed are systems and methods for improving interactions with and between computers in an authentication system supported by or configured with authentication servers or platforms. The systems interact to identify access and retrieve data across platforms, which data can be used to improve the quality of results data used in processing interactions between or among processors in such systems. The disclosed anti-spoofing systems and methods provide improved functionality to facial recognition systems by enabling enhanced “spoof” (or attempts to impersonate a user) detection while authenticating a user. The disclosed systems and method provide additional functionality to existing facial recognition systems that enables such systems to actually determine whether the image being captured and/or recorded is that of an actual person, as opposed to a non-human representation.
Abstract:
Many users may share information, such as messages, photos, and/or links to websites or other content, through social networks as social network posts. As provided herein, a commentating user may be provided with the ability to overlay content, such as images, icons, text, links to websites, and/or other content visually and positionally onto a social network post to create an overlaid social network post. The commentating user may resize, reposition, and/or tag the content that is overlaid the social network post. In this way, various users may overlay content onto social network posts for an improved user interface and interaction for social network interfacing.
Abstract:
A method of providing in-context exploration of a query results web page, wherein the web page has at least one element and a plurality of query results, receives an indication of interest in the at least one element, and in response to the indication, emphasizes at least one query result relative to the plurality of query results.
Abstract:
Embodiments of the invention are directed to using image data and contextual data to determine information about a scene, based on one or more previously obtained images. Contextual data, such location of image capture, can be used to determine previously obtained images related to the contextual data and other location-related information, such as billboard locations. With even low resolution devices, such as cell phone, image attributes, such as a histogram or optically recognized characters, can be compared between the previously obtained images and the newly captured image. Attributes matching within a predefined threshold indicate matching images. Information on the content of matching previously obtained images can be provided back to a user who captured the new image. User profile data can refine the content information. The content information can also be used as search terms for additional searching or other processing.
Abstract:
A search engine provider interacts with a content provider wherein the content provider provides content to the search engine provider. The content may comprise information that indicates a structure of the content provider's web pages. The search engine may use structural information to classify and extract data items from web pages, and to highlight those data items in search results with labels that identify each such data item's class.
Abstract:
Techniques for communicating particular information from a user to a touch screen device by way of a touch event is provided. Sensors that are operatively coupled to a sensing device sense an input from the user which conveys particular information. This input is then converted by the sensing device into another signal called the sensing device signal which is then transmitted from the sensing device to the user's skin. Then a second set of sensors that are operatively coupled to a touch device receive a user-touch signal that is transmitted from the user's body. The user-touch signal is based, at least in part on the sensing device signal. The touch device then decodes the user-touch signal to determine the location of the touch event on the touch device and sensing device signal embedded in the user-touch signal to extract the particular information related to the user.
Abstract:
Users may consume and/or share information through various types of content items. For example, user may post a family photo through a social network, create a running blog through a microblogging service, etc. Because users may be overwhelmed by the amount of available content items, it may be advantageous to recommend content items, such as blogs to follow, to users. Accordingly, inductive matrix completion is used to evaluate user interactions with content items (e.g., a user following a blog), content item features (e.g., text and/or images of a blog is evaluated to identify a topic of the blog), and/or user features (e.g., a user liking or reblogging a blog, user demographics, user interests, etc.) to determine whether to recommend a content item to a user. Additionally, graph proximity is used to recommend content items based upon weights of edges connecting user nodes to content item nodes within a directed graph.
Abstract:
A method for tailoring content in a web page is provided. There is a relationship between the source domain a user comes from and the behavior pattern of a user on a website. To predict the behavior patterns of a particular user coming from a particular source domain, first a large dataset is compiled from user logs. Second, session analysis is performed on the dataset to identify sessions, session characteristics, page view categories, and source categories. Third, sessions are clustered and analyzed to determine how the behavior changes according, to a source category. Fourth, a mapping between source categories and behavior patterns is generated. When a user requests a page view from a source domain, if the source domain is mapped to a source category, then a tailored version of the page view is presented to the user based on the mapping between source categories and behavior patterns.