摘要:
A resource reference is detected in a base resource, such as a web page or an email message. The resource reference refers to a target resource, such as another webpage or another email message. An appropriate activity-based resource type for the resource reference is then identified. The resource reference is then linked to an activity-based resource such that when the base resource is displayed and a user interacts with the resource reference, the activity-based resource is displayed to the user. The activity-based resource comprises a calculated field that has a value that indicates how one or more users have interacted with one or more resources. The value of the calculated field is calculated using activity data indicating how users interacted with the resources. The activity data is generated without receiving input of the activity data from the users.
摘要:
Methods and systems for occupancy prediction using historical occupancy patterns are described. In an embodiment, an occupancy probability is computed by comparing a recent occupancy pattern to historic occupancy patterns. Sensor data for a room, or other space, is used to generate a table of past occupancy which comprises these historic occupancy patterns. The comparison which is performed identifies a number of similar historic occupancy patterns and data from these similar historic occupancy patterns is combined to generate an occupancy probability for a time in the future. In an example, time may be divided into discrete slots and binary values may be used to indicate occupancy or non-occupancy in each slot. An occupancy probability for a defined future time slot then comprises a combination of the binary values for corresponding time slots from each of the identified similar occupancy patterns.
摘要:
A computing system generates resource data that represents a resource. The content of the resource data is dependent on a ranking of resources in a set of resources. The ranking of the resources in the set of resources is dependent on interactions between users in a set of users and the resources in the set of resources. The ranking of the resources in the set of resources also is dependent on a degree to which each user in the set of users is related to a user.
摘要:
Systems, methods and computer program products for providing a customized news feed to an individual computer user within an organization based on the reading activities and preferences of other users in the same organization are disclosed. In an embodiment, the system includes a correlation server configured to collect and correlate the reading activities and preferences of individual computer network users within the organization, a news feed database for storing the collected and correlated data, a proxy server configured to receive and output to the information client a selected portion of the collected and correlated data, and a graphical user interface produced by the proxy server that allows the user to select different views of the collected and correlated data as a personalized news feed.
摘要:
An image background maintenance system and method for maintaining a background model of an image sequence by processing on multiple spatial scales. These multiple spatial scales include a pixel scale, a regional scale and a frame scale. The image sequence undergoes pixel processing that determines a current background model and provides an initial pixel assignment as either a background or a foreground pixel. Region processing further refines the initial pixel assignments by considering relationships between pixels and possibly reassigning pixels. Frame processing further refines the current background model by determining whether a substantial change has occurred in the actual background and, if so, providing a more accurate background model.
摘要:
Disclosed is a method for one computing device (the “provider”) to provide peripheral services to another device (the “host”). A user directly runs the host. The host accesses the provider as if the provider were a set of peripheral devices attached to the host. In this way, the host and provider become, in effect, one device with the combined capabilities of both devices. The provider switches between two modes: In standalone mode, the provider acts as an individual device; upon switching to auxiliary mode, the provider provides peripheral services to the host but can still run applications and present an input/output interface to its own user. When the peripheral device provided to the host is a display screen, the host can map the provided screen into the host's own video memory, thus hiding implementation details from applications that use the screens. One device can simultaneously act as provider and host.
摘要:
Systems, methods and computer program products are disclosed for facilitating the collection of activity data, organizational hierarchy data and distribution list data within a private computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' business rules addressing intranet users' privacy to display a social graph of organization members related to a requesting organization member. Such systems, methods and computer program products allow for the collecting of such data passively without a need for active participation from the requester. A computer-implemented process for displaying a social graph further comprises calculating sub-scores for each of activity data, organizational data and distribution list data and calculating a total score for each related organization member and displaying the social graph comprising those organization members whose score exceeds a predetermined value as related to the requester.
摘要:
Systems, methods and computer program products are disclosed for facilitating the collection of activity data, organizational hierarchy data and distribution list data within a private computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' business rules addressing intranet users' privacy to display a social graph of organization members related to a requesting organization member. Such systems, methods and computer program products allow for the collecting of such data passively without a need for active participation from the requester. A computer-implemented process for displaying a social graph further comprises calculating sub-scores for each of activity data, organizational data and distribution list data and calculating a total score for each related organization member and displaying the social graph comprising those organization members whose score exceeds a predetermined value as related to the requester.
摘要:
Systems, methods and computer program products for facilitating the collection of data within a computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' rules addressing intranet users' privacy are disclosed. Such systems, methods and computer program products allow for the collecting of activity information related to computer-based activities performed by users while logged into an organization's intranet. Such activity includes navigating to URLs, opening and editing documents, writing, opening and reading email and instant messages, and the like. The collecting, consolidating, storing and exposing of such activity information—while ensuring privacy requirements—serves as a basis for high-value services (e.g., augmenting documents with extra information, improving search results, automatic news feeds, social networking announcements, etc.) to be offered and provisioned to such users.
摘要:
Methods and systems for using a foot-based interface to interact with a computer are described. An application program from a plurality of application programs is executed on an operating system of a personal computer. The application program is configured to receive user input via a foot-based interface. Further, user input is received from the foot-based interface and mapped into a command. Moreover, the command controls an application program function. Also, the command is executed and an output corresponding to the execution of the command is generated. Additionally, the output is displayed to the user.