摘要:
A client-server network system implements a multi-tier caching strategy for a user to access a document efficiently. When serving a document to client, the document is examined for embedded references to other documents. The embedded references are extracted and then assigned a priority. The documents referenced are obtained locally from the server cache or obtained from their respective web hosts and transmitted according to the assigned priority. If the client determines that it has the document, the transmission of is terminated. If the client or server determines that a newly requested document is one of the referenced documents being transmitted, the transmission is given a higher priority. In some instances, the server calculates a content difference between a current version of a referenced and a previous version and transmits this content.
摘要:
A micro-payment system has buyers, sellers, and a broker. The buyers establish accounts with the broker and provide payment information allowing the broker to invoice the buyers. The sellers establish accounts with the brokers and specify terms for accessing items, including electronic content, available from the sellers. The sellers also provide payment information that allows the broker to credit the sellers for sales of the items. The broker aggregates the buyers' micro-payment purchases and invoices the buyers. The broker also aggregates the sellers' micro-payment sales and credits the sellers.
摘要:
A server system having one or more processors and memory receives, from a client, an invitation-code request from a user of the client for an invitation code enabling a new user account to be registered, where the invitation-code request includes identifying information and determines whether the invitation-code request exceeds registration limit criteria based on the identifying information. In accordance with a determination that the invitation-code request exceeds the registration limit criteria, the invitation-code request is rejected. In accordance with a determination that the invitation-code request does not exceed the registration limit criteria, an invitation code is provided to the user, enabling a new user account to be registered.
摘要:
Communicating peer processes on a wide area network may be synchronized in real time using a client-side library in conjunction with a centralized communication service. Such an approach provides a considerably easier way to develop applications as diverse as multiplayer games, synchronized video watching, document collaboration systems, and a range of web applications that require communication between multiple web clients.
摘要:
A computer implemented method for registering user accounts that includes sending a first request to an online service wherein the first request includes a telephone number, sending a second request to the online service wherein the second request includes an invitation code received via a telephone associated with the telephone number, and upon acceptance of the invitation code by the online service, receiving an invitation from the online service, to register a user account.
摘要:
An instant messaging (IM) system has an IM server connected to a communication network, and logic operable on the IM server enabling a first user to browse contacts associated with a second user. In some cases the first user can add and list contacts accessed by browsing the contacts associated with the second user.
摘要:
A method and a system allow accessing several of a user's controlled access accounts by presenting the credentials of only one of the accounts. The method may include (a) storing the credentials for each of the user's accounts; (b) receiving from the user credentials corresponding to any of the user's accounts; (c) presenting the received credentials to access the corresponding account; and (d) upon successful access of the corresponding account, using the stored credentials to access one or more of the user's accounts without requiring the user to present the corresponding credentials. For each of the user's accounts, the credentials are stored encrypted, using a randomly generated key, common to all the encrypted credentials. In addition, the randomly generated key is encrypted using the credentials of each of the accounts. In that manner, plain-text copies of neither the random key nor the credentials of the accounts need to be stored.
摘要:
One embodiment of the present invention provides a system that learns a generative model for textual documents. During operation, the system receives a current model, which contains terminal nodes representing random variables for words and cluster nodes representing clusters of conceptually related words. Within the current model, nodes are coupled together by weighted links, so that if a cluster node in the probabilistic model fires, a weighted link from the cluster node to another node causes the other node to fire with a probability proportionate to the link weight. The system also receives a set of training documents, wherein each training document contains a set of words. Next, the system applies the set of training documents to the current model to produce a new model.
摘要:
A data compression system includes: (a) a data compression module that receives a sequence of input vectors and that provides a sequence of compressed vectors; (b) a data decompression module that receives the compressed vectors to provide a sequence of output vectors; and (c) a parameter update module that receives the sequence of input vectors and the sequence of output vectors, and which learns the data compression module and data decompression module based on evaluating a loss function of the input vectors, the output vectors, and the parameters controlling the compression module and the decompression module. Each input vector and its corresponding output vector may represent digitized time-domain signals (e.g., speech, audio or video signals) over a predetermined time period. The loss function may be evaluated for each of a sequence of predetermined time periods.
摘要:
A method which does not rely on explicit inverted indices is provided to search for documents in a corpus of documents responsive to a textual search query. The method includes (a) selecting a program that is customized by setting values for a plurality of parameters, the program structured to receive the textual search query as input and to provide as output values indicating the relevance of the documents in the corpus to the search query; (b) training the program using a machine learning technique; and (c) applying the trained program to the textual search query. The program may be based on a structure that is developed based on a genetic programming technique.