摘要:
A system and method for online reinforcement learning is provided. In particular, a method for performing the explore-vs.-exploit tradeoff is provided. Although the method is heuristic, it can be applied in a principled manner while simultaneously learning the parameters and/or structure of the model (e.g., Bayesian network model).The system includes a model which receives an input (e.g., from a user) and provides a probability distribution associated with uncertainty regarding parameters of the model to a decision engine. The decision engine can determine whether to exploit the information known to it or to explore to obtain additional information based, at least in part, upon the explore-vs.-exploit tradeoff (e.g., Thompson strategy). A reinforcement learning component can obtain additional information (e.g., feedback from a user) and update parameter(s) and/or the structure of the model. The system can be employed in scenarios in which an influence diagram is used to make repeated decisions and maximization of long-term expected utility is desired.
摘要:
Architecture for integrating and generating back-off grammars (BOG) in a speech recognition application for recognizing out-of-grammar (OOG) utterances and updating the context-free grammars (CFG) with the results. A parsing component identifies keywords and/or slots from user utterances and a grammar generation component adds filler tags before and/or after the keywords and slots to create new grammar rules. The BOG can be generated from these new grammar rules and can be used to process the OOG user utterances. By processing the OOG user utterances through the BOG, the architecture can recognize and perform the intended task on behalf of the user.
摘要:
The claimed subject matter relates to an architecture that can utilize features of a product to facilitate organization and/or classification of products or product features as well as opinions relating to those products or product features into market identifiers. The market identifiers can aid in aggregating opinions in a more relevant manner that potentially requires less user information about a user in order to achieve bone fide targeting. The architecture can employ data mining techniques to gather information relating to products and opinions thereof in order to create or update data tables and can further allow a user to configure the market identifier in various ways.
摘要:
The claimed subject matter relates to an architecture that can facilitate verification or feedback in association with consumer transactions. In particular the architecture can image a transaction receipt, translate the image into text-based data, and extract relevant transaction data there from. Such relevant transaction data can be saved to a data store maintained or supervised by the customer and/or transmitted to authorized components that can benefit from data related to transaction histories, verification, and/or feedback.
摘要:
Various embodiments provide techniques for inventory clustering. In one or more embodiments, a set of inventory to be processed is placed into an initial cluster. The inventory can be related to impressions for advertising that are defined by values for a set of attributes. Recursive division of the initial cluster is performed by selecting an attribute and deriving child clusters that are constrained by one or more values of the attributes in accordance with one or more clustering algorithms. The clustering algorithms are configured to derive an optimum number of clusters by repetitively generating smaller child clusters and measuring a cost associated with adding additional clusters. Additional child clusters can be formed in this manner until the measured cost to add more clusters outweighs a benefit of adding more clusters.
摘要:
Various embodiments provide techniques for graph clustering. In one or more embodiments, a participation graph is obtained that represents relationships between entities. An auxiliary graph is constructed based on the participation graph. The auxiliary graph may be constructed such that the auxiliary graph is less dense than the participation graph and is therefore computationally less complex to analyze. Clusters in the auxiliary graph are determined by solving an objective function defined for the auxiliary graph. Clusters determined for the auxiliary graph may then be utilized to ascertain clusters in the participation graph that solve a related objective function defined for the participation graph.
摘要:
Enhancements to Bayesian prediction models for network location traffic provide increased accuracy in web traffic predictions. The enhancements include implementing user advertising target queries to determine preferred edges of a Bayesian model, employing hierarchical data structures to cleanse training data for a Bayesian model, and/or augmenting existing data with new training data to enhance a previously constructed Bayesian model. Preferred edge enhancements for the Bayesian model utilize target attribute derived preferred edges and/or explicitly specified preferred edges. Training data is cleansed utilizing tag hierarchies that can employ parent-child relationships, ancestor relationships, and/or network location specific parameters. New training data can also be employed to adjust probabilities in a previously constructed Bayesian model. The new training data can be weighted differently than data represented by the previously constructed Bayesian model.
摘要:
Improved browsing experience in social bookmarking by leveraging aspects of self tagging and prediction. Quality recommendations are provided for sites of interest to the user and information about what types of people like the current website. Self-tagging is used as an effective means to perform personalized searches. Machine learning and reasoning is employed to predict self-tags based on a website visited and/or website behavior, and self-tags associated with a website and/or webpage based on content of that website and/or webpage. The architecture can be embodied as a browser utility to leverage and extend social-bookmarking information. The utility facilitates the display of information related to a summary view of the users who liked/disliked the current page or website, a tag cloud associated with webpages, and a recommendation button that causes self-tag recommendations to be displayed and that recommends links based on the combination of user tags and content.
摘要:
The claimed subject matter relates to an architecture or extension to a window manager. In particular, the extension can provide for a window rotation feature that can be exposed as a rotate button. Additionally or alternatively, the rotation feature can be activated based upon a diverse set of conditions, events, and/or commands. Upon activation of the rotation feature, the window manager can rotate a window about an axis to expose a secondary surface that can be populated with alternative content that is distinct from the content of the primary surface of the window. In addition, the architecture provides techniques for identifying both double-sided graphical objects and potentially double-sided objects.
摘要:
The claimed subject matter relates to an architecture that can utilize information obtained from a communications system and/or an associated content engine or model in order to facilitate enhanced content recommendations. The information can include content recommendations (e.g., from the content model) as well as information based upon social networking features of the communications system. For example, information such as referrals from friends, family, or other parties that are likely to have firsthand knowledge of interests, objectives, and/or desires of particular consumer that potentially offer a superior data set than conventional data mining by which to form a content recommendation.