摘要:
The claimed subject matter can provide a mechanism for issuing advertising rebates to the advertisers in the form of advertiser points. In one aspect the points can be issued as a function of a points ratio that can be determined and/or updated periodically based upon customer ratings. In another aspect, the customer ratings can be employed in order to calculate a points credit/debit balance that can be awarded to the merchant at the end of a period.
摘要:
The subject disclosure pertains to systems and methods that optimize advertisement campaigns. In particular, total utility that can be derived by an advertiser given particular keywords is maximized. The price of each keyword/slot pair can be determined or estimated and bids adjusted automatically to maximize advertiser utility or return on investment for a campaign.
摘要:
To use market clearing methods to determine market equilibrium, a market clearing situation is established by determining a number of items to be sold at the market price and allotting a number of pseudo items assignable to bids below the market price. Once bids are received for the items, using the number of pseudo items and the actual items as the supply side, and the total funds bid as the demand side, a market clearing price is determinable using a market clearing equilibrium model. Funds assigned to pseudo items are returned or not charged. Further, by selling items only to bids exceeding the market clearing price, such as by setting the market price incrementally above the market clearing price, bidders are encouraged to submit bid prices bid reflecting what the items are worth to them instead of attempting to bid strategically to guess or set the market price.
摘要:
A domain specific search mechanism having “smart find” functionality of locating a webpage dependent service is provided. In other words, the mechanism facilitates intelligent location of web page dependent links/services via a versatile mechanism that looks-up, deciphers, and/or interprets search criteria. Once an intended target is identified, a mechanism can be employed to locate an appropriate link or group of links resident on a web page. The domain specific search mechanism can employ a local (or remote) dictionary and/or lookup table to associate a search input to a domain specific link/service. Additionally, the described “smart find” mechanism(s) can employ embedded metadata to effect the association of a search input to a domain specific link or group of link(s).
摘要:
Methods and systems for quantization and data embedding are described. In at least some embodiments, a transform is applied on an image that is to be watermarked and statistics associated with the image are computed. The computed statistics are quantized using a symmetric lattice, and a watermark is computed using the lattice quantized statistics. The watermark is then inserted into the image.
摘要:
Disclosed is a method for determining the placement of ITAPs in wireless neighborhood networks. The method disclosed provides for efficient integration of multi-hop wireless networks with the Internet by placing ITAPs at strategic locations. Initially the method provides for the formulation of the ITAP placement problem under three wireless models. For each model, methods are developed to efficiently place ITAPs in the networks. The methods aim to minimize the number of required ITAPs while guaranteeing users' bandwidth requirements. Next, a fault tolerance version of the placement method is presented that provides bandwidth guarantees in the presence of failures. Finally the methods are extended to take into account variable traffic demands by developing an approximation algorithm to simultaneously optimize ITAP placement based on demands over multiple periods.
摘要:
Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
摘要:
An archive of items, which are computing data accessed by a user, is created at a semantic object level. The object archiving may group seemingly disparate items as a composite object, which may then be stored to enable retrieval by the user at a later point in time. The composite object may include metadata from the various items to enable identifying the composite object and providing retrieval capabilities. In some aspects, an archiving process may extract item data from an item that is accessed by a computing device. Next, the item may be selected by a schema for inclusion in a composite object when the item data meets criteria specified in the schema. The composite object(s) may then be stored in an object store as an archive.
摘要:
The claimed subject matter relates to a computer-implemented architecture that can facilitate computer-assisted haggling and/or negotiation between multiple parties simultaneously. For example, various proxies associated with both buyers and sellers can be configured to negotiate with other proxies to buy or sell an item. The negotiations can be required to be progressive and during the negotiations a buyer or seller is, typically, allowed to withdraw his or her proposals. The architecture can include a registration component that can resolve concurrency and facilitate a registration of an agreement between two of the parties. The registration of an agreement can create a binding obligation between the parties after which other outstanding proposals can be terminated.
摘要:
Systems and methods for digitally certified stationery are described. In one aspect, a stationery granting authority (SGA) receives a request from a user to generate a document. If the user is authorized for the requested document, the SGA generates a certificate with credentialing information from data in the request. The SGA generates a first digital signature from some of the credentialing information. The SGA communicates the certificate to the user for editing and distribution as the document. A recipient of the document determines whether the document is “official” by contacting a specified service to provide certain information from the document. The verification service computes a second digital signature from the provided information for comparison to the first digital signature. If there is a match, the service notifies the recipient that the document is valid/official. Otherwise, the recipient is notified that the document is not valid.