Abstract:
Techniques for creating a user network based on user interest in a product are described. For example, a first search query is received from a first client device. The first client device is associated with a first user. A second search query is received from a second client device. The second client device is associated with a second user. The first search query is matched to a product. The second search query is matched to the product. A user network corresponding to the product is created. The first user is added to the user network based on the matching of the first search query to the product. The second user is added to the user network based on the matching of the second search query to the product.
Abstract:
A system and method for detecting whether a user account has been compromised. A server computer determines, for a client device, a first identifier associated with the client device. The server computer analyzes an activity log associated with an account of a user to determine if an eavesdropping condition has been met during a given duration. The analysis includes: 1) determining that an eavesdropping activity has occurred during the given duration and determining that no normal activity has occurred during the given duration for the first identifier; 2) determining a second identifier associated with a second device used to access the user account; and 3) determining that a normal activity associated with the second identifier has occurred during the given duration.
Abstract:
Generating an optimal power cap value includes steps of: analyzing power usage of a system for a specified period of time; computing a power consumption value for the system for the specified period of time; and generating the optimal power cap value for the system, using the computed power consumption value. The system should be coupled with a power meter and should support power regulation technology.
Abstract:
A system and method for detecting whether a user account has been compromised. A server computer determines, for a client device, a first identifier associated with the client device. The server computer analyzes an activity log associated with an account of a user to determine if an eavesdropping condition has been met during a given duration. The analysis includes: 1) determining that an eavesdropping activity has occurred during the given duration and determining that no normal activity has occurred during the given duration for the first identifier; 2) determining a second identifier associated with a second device used to access the user account; and 3) determining that a normal activity associated with the second identifier has occurred during the given duration.
Abstract:
Generating an optimal power cap value includes steps of: analyzing power usage of a system for a specified period of time; computing a power consumption value for the system for the specified period of time; and generating the optimal power cap value for the system, using the computed power consumption value. The system should be coupled with a power meter and should support power regulation technology.