摘要:
A recommendation system may use a network of relationships between many different entities to find search results and establish a relevance value for the search results. The relevance value may be calculated by analyzing trust and similarity components of each relationship between the search user and the entity providing the search results. The entities may be, for example, persons associated within express or implied social networks, or corporations or other organizations with a historical or other reputation. The relationships may be created through many different contact mechanisms and may be unidirectional, asymmetric bidirectional, or symmetric bidirectional relationships. The relationships may be different based on topic or other factors.
摘要:
Methods, systems, and computer-readable media for search query extension are disclosed. A particular method retrieves a set of queries related to a search query from a query repository. The search query includes one or more search words and at least one search word is included in each query in the set of queries. A set of context words based on one or more computer-readable files accessible to a computer is generated and an intersection is calculated. The intersection is based on the set of queries and the set of context words. An extended search query is generated based on the calculated intersection and the search query.
摘要:
Information is automatically located which is relevant to source content that a user is viewing on a user interface without requiring the user to perform an additional search or navigate links of the source content. The source content can be, e.g., a web page or a document from a word processing or email application. The relevant information can include images, videos, web pages, maps or other location-based information, people-based information and special services which aggregate different types of information. Related content is located by analyzing textual content, user behavior and connectivity relative to the source. The related content is scored for similarity to the source. Content which is sufficiently similar but not too similar is selected. Similar related content is grouped to select representative results. The selected content is filtering in multiple stages based on attribute priorities to avoid unnecessary processing of content which is filtered out an early stage.
摘要:
A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may include desktop and network resources such as address book contacts, instant messaging contacts, active directory user accounts, IP addresses, and files that contain particular content or that are stored in particular locations. The resources may be real for which protection against leakage is desired, or fake to operate as bait to lure and detect malicious attacks. The honeypot is implemented in an extensible manner so that virtually any resource may be honeypotted to apply honeypot benefits to resources beyond static IP addresses in order to improve both the breadth of information leakage prevention and the detection of malicious attacks.
摘要:
Semantic networks are generated to model the operational behavior of an enterprise network to provide contextual interpretation of an event or a sequence of events that are observed in that specific enterprise network. In various illustrative examples, different semantic networks may be generated to model different behavior scenarios in the enterprise network. Without the context provided by these semantic networks malicious events may inherently be interpreted as benign events as there is typically always a scenario where such events could be part of normal operations of an enterprise network. Instead, the present semantic networks enable interpretation of events for a specific enterprise network. Such interpretation enables the conclusion that a sequence of events that could possibly be part of normal operations in a theoretical enterprise network is, in fact, abnormal for this specific enterprise network.
摘要:
Advertisements may be displayed on electronic devices within a variety of contexts, such as websites and applications, but the amount of information that may be conveyed by small advertisements in a portion of the screen may be limited. One technique for displaying information in a limited space involves a zoomable advertisement, wherein the advertisement displayed in a first zoom state is supplemented with additional information upon transitioning to a second zoom state (e.g., zooming in to visualize small content, and zooming out to visualize content that was out of bounds in the first zoom state.) Moreover, the content visible at the second zoom state may present advertising content targeted with respect to the user and based on one or more user criteria. The system may notify an advertisement tracking server of various events, e.g., upon rendering the targeted content on behalf of the user.
摘要:
Methods and apparatus for reconstructing digitized images are provided that include an image reconstruction path that receives a digitized image and provides a processed RGB or CMYK image that may be printed or stored in memory. The image reconstruction path is configured to operate in either a multiple scan or single scan environment if the source of the digitized image is a scanner. A plurality of optional functional units in the reconstruction path can be controlled by user or internal controls. These functional units perform preliminary color adjustment, automatic deskew, background and dust removal, descreen, text detection and enhancement, color conversion, scaling, and color manipulation.
摘要:
A text detection technique comprises local ramp detection, identification of intensity troughs (candidate text strokes), determination of stroke width, preliminary detection of text based on contrast and stroke width, and a consistency check.
摘要:
A system and method for follow up management comprising determining if a user has an unexpired repository record, extracting information from the repository record associated with the user; and acting on instructions stored in the repository record. The method is practiced on a system for managing online interaction comprising a business rules engine a follow up repository, and a follow up engine.