摘要:
Online sellers may be ranked based on feedback given by people trusted by an individual user. The user may trust people in their social networks, as well as people who may be experts in a particular field, and the seller's ranking may be calculated by weighting reviews or feedback from trusted people higher than people unknown to the user. When used with a social campaign management system, ranking of products from multiple online sellers may include coupons or incentives that are available through the user's social network, as well as discounts or incentives that may be targeted to the user's status within their own social network.
摘要:
Methods, systems, and computer-readable media for search query extension are disclosed. A particular method retrieves a set of queries related to a search query from a query repository. The search query includes one or more search words and at least one search word is included in each query in the set of queries. A set of context words based on one or more computer-readable files accessible to a computer is generated and an intersection is calculated. The intersection is based on the set of queries and the set of context words. An extended search query is generated based on the calculated intersection and the search query.
摘要:
A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may include desktop and network resources such as address book contacts, instant messaging contacts, active directory user accounts, IP addresses, and files that contain particular content or that are stored in particular locations. The resources may be real for which protection against leakage is desired, or fake to operate as bait to lure and detect malicious attacks. The honeypot is implemented in an extensible manner so that virtually any resource may be honeypotted to apply honeypot benefits to resources beyond static IP addresses in order to improve both the breadth of information leakage prevention and the detection of malicious attacks.
摘要:
Semantic networks are generated to model the operational behavior of an enterprise network to provide contextual interpretation of an event or a sequence of events that are observed in that specific enterprise network. In various illustrative examples, different semantic networks may be generated to model different behavior scenarios in the enterprise network. Without the context provided by these semantic networks malicious events may inherently be interpreted as benign events as there is typically always a scenario where such events could be part of normal operations of an enterprise network. Instead, the present semantic networks enable interpretation of events for a specific enterprise network. Such interpretation enables the conclusion that a sequence of events that could possibly be part of normal operations in a theoretical enterprise network is, in fact, abnormal for this specific enterprise network.
摘要:
Advertisements may be displayed on electronic devices within a variety of contexts, such as websites and applications, but the amount of information that may be conveyed by small advertisements in a portion of the screen may be limited. One technique for displaying information in a limited space involves a zoomable advertisement, wherein the advertisement displayed in a first zoom state is supplemented with additional information upon transitioning to a second zoom state (e.g., zooming in to visualize small content, and zooming out to visualize content that was out of bounds in the first zoom state.) Moreover, the content visible at the second zoom state may present advertising content targeted with respect to the user and based on one or more user criteria. The system may notify an advertisement tracking server of various events, e.g., upon rendering the targeted content on behalf of the user.
摘要:
Methods and apparatus for reconstructing digitized images are provided that include an image reconstruction path that receives a digitized image and provides a processed RGB or CMYK image that may be printed or stored in memory. The image reconstruction path is configured to operate in either a multiple scan or single scan environment if the source of the digitized image is a scanner. A plurality of optional functional units in the reconstruction path can be controlled by user or internal controls. These functional units perform preliminary color adjustment, automatic deskew, background and dust removal, descreen, text detection and enhancement, color conversion, scaling, and color manipulation.
摘要:
A text detection technique comprises local ramp detection, identification of intensity troughs (candidate text strokes), determination of stroke width, preliminary detection of text based on contrast and stroke width, and a consistency check.
摘要:
A system and method for follow up management comprising determining if a user has an unexpired repository record, extracting information from the repository record associated with the user; and acting on instructions stored in the repository record. The method is practiced on a system for managing online interaction comprising a business rules engine a follow up repository, and a follow up engine.
摘要:
Methods and apparatus are provided to smooth a jagged outline of a reconstructed text generated through any of a variety of systems, such as, for example, an image scanner. Given the reconstructed text with a jagged outline, the methods smooth the outline of the text first through location of horizontal and vertical edges, and subsequent gray scale reconstruction of the edge ink level from a one-bit or a low number of bits edge pattern. The methods then provide identification of the local text outline pattern and corresponding ink level adjustment of the center pixel. The methods produce text having very smooth horizontal and vertical edges. The methods then smooth slanted edges, mend holes in the text, and remove isolated pixels of ink.