摘要:
Architecture for presenting advertisements in realtime in retail establishments. A sensor component includes sensors for collecting information about a customer or group of customers as they move through the store. The sensors can include capability for image processing, audio processing, light sensing, velocity sensing, direction sensing, proximity sensing, face recognition, pose recognition, transaction recognition, and biometric sensing, for example. A customer component analyzes the information and generates a profile about the customer. Advertisements are selected for presentation that target the customers as they walk in proximity of a presentation system of the store. An advertisement component facilitates dynamic presentation of a targeted advertisement to the individual as a function of the profile. The customer component can infer information during analysis using machine learning and reasoning.
摘要:
The present invention involves a system and method that facilitate identifying human interaction by utilizing HIPs such as order-based HIPs and determining a difficulty rating of any type of HIPs in an automated fashion. Order-based HIPs require a user to identify elements in the sequence as well as to identify a correct order of the elements in the sequence. The invention involves presenting a user with at least two HIPs such that the HIP can be of known and/or unknown difficulty. A user that correctly answers the HIP of known difficulty gains access to the HIP-controlled resource, action or application. The user's response to the HIP of unknown difficulty can then be examined and employed to determine whether that HIP is too difficult for humans to solve. Alternatively, at least one HIP can be presented. Difficulty of individual HIP parameters can also be determined.
摘要:
Architecture for completing search queries by using artificial intelligence based schemes to infer search intentions of users. Partial queries are completed dynamically in real time. Additionally, search aliasing can also be employed. Custom tuning can be performed based on at least query inputs in the form of text, graffiti, images, handwriting, voice, audio, and video signals. Natural language processing occurs, along with handwriting recognition and slang recognition. The system includes a classifier that receives a partial query as input, accesses a query database based on contents of the query input, and infers an intended search goal from query information stored on the query database. A query formulation engine receives search information associated with the intended search goal and generates a completed formal query for execution.
摘要:
Extraction analysis techniques biased, in part, by query frequency information from a query log file and/or search engine cache are employed along with machine learning processes to determine candidate keywords and/or phrases of web documents. Web oriented features associated with the candidate keywords and/or phrases are also utilized to analyze the web documents. A keyword and/or phrase extraction mechanism can be utilized to score keywords and/or phrases in a web document and estimate a likelihood that the keywords and/or phrases are relevant, for example, in an advertising system and the like.
摘要:
The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities can anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation can employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom.
摘要:
The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
摘要:
A system that can analyze a multi-dimensional input thereafter establishing a search query based upon extracted features from the input. In a particular example, an image can be used as an input to a search mechanism. Pattern recognition and image analysis can be applied to the image thereafter establishing a search query that corresponds to features extracted from the image input. The system can also facilitate indexing multi-dimensional searchable items thereby making them available to be retrieved as results to a search query. More particularly, the system can employ text analysis, pattern and/or speech recognition mechanisms to extract features from searchable items. These extracted features can be employed to index the searchable items.
摘要:
Email spam filtering is performed based on a sender reputation and message features. When an email message is received, a preliminary spam determination is made based, at least in part, on a combination of a reputation associated with the sender of the email message and one or more features of the email message. If the preliminary spam determination indicates that the message is spam, then a secondary spam determination is made based on one or more features of the received email message. If both the preliminary and secondary spam determinations indicate that the received email message is likely spam, then the message is treated as spam.
摘要:
Email spam filtering is performed based on a combination of IP address and domain. When an email message is received, an IP address and a domain associated with the email message are determined. A cross product of the IP address (or portions of the IP address) and the domain (or portions of the domain) is calculated. If the email message is known to be either spam or non-spam, then a spam score based on the known spam status is stored in association with each (IP address, domain) pair element of the cross product. If the spam status of the email message is not known, then the (IP address, domain) pair elements of the cross product are used to lookup previously determined spam scores. A combination of the previously determined spam scores is used to determine whether or not to treat the received email message as spam.
摘要:
Multiple pieces of information can be arranged into a single construct that allows the employee to ascertain information quickly while at her workstation. Selection of information for placement into the construct can employ various statistical models and the like. Selective pieces of information can be masked for a user's construct based upon access rights of the user. Constructs can be configured by a user based on personal preferences as well as by an administrator. Population of metadata upon the construct can be performed automatically through an instruction of the administrator or be overridden by a user request. In addition, various types of synchronization can be implemented between constructs, such that identical or near-identical information is populated upon multiple constructs.