摘要:
The author ranking technique described herein is a technique to rank authors in social media systems along various dimensions, using a variety of statistical methods for utilizing those dimensions. More particularly, the technique ranks authors in social media systems through a combination of statistical techniques that leverage usage metrics, and social and topical graph characteristics. In various exemplary embodiments, the technique can rank author authority by the following: 1) temporal analysis of link sharing in which authority is computed based on a user's propensity to provide early links to web pages that subsequently become popular; 2) topical authority based on the author's links and content updates in specific topic areas; and 3) popularity and influence based on nodal properties of authors.
摘要:
The described implementations relate to communication platforms that are provided over computer networks. One implementation provides a system that can include a storage component configured to store a plurality of communications having a common connector. The system can also include a score computation component that is configured to compute scores reflecting semantic relationships between individual communications from the plurality of communications. The system can also include a summary generation component that is configured to select one or more of the individual communications, based on the scores, and generate a summary of the common connector. The summary can represent the selected individual communications. The system can also include at least one processor configured to execute one or more of the components.
摘要:
The described implementations relate to communication platforms that are provided over computer networks. One implementation provides a system that can include a storage component configured to store a plurality of communications having a common connector. The system can also include a score computation component that is configured to compute scores reflecting semantic relationships between individual communications from the plurality of communications. The system can also include a summary generation component that is configured to select one or more of the individual communications, based on the scores, and generate a summary of the common connector. The summary can represent the selected individual communications. The system can also include at least one processor configured to execute one or more of the components.
摘要:
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access levels associated with content within data using a set of access policies (e.g., a partial access level to inventory data for an inventory server, a full access level to inventory data and billing data for a shopping website server, etc.). The data protector may secure (e.g., encrypt) the data to create protected data, so that clients may be unable to access content of the protected data without obtaining access through the data protector. In this way, the data protector may selectively provide clients with access to content within the protected data according to respective access levels for the different clients (e.g., access to inventory data, but not billing data, may be provided to the inventory server by the data protector).
摘要:
The author ranking technique described herein is a technique to rank authors in social media systems along various dimensions, using a variety of statistical methods for utilizing those dimensions. More particularly, the technique ranks authors in social media systems through a combination of statistical techniques that leverage usage metrics, and social and topical graph characteristics. In various exemplary embodiments, the technique can rank author authority by the following: 1) temporal analysis of link sharing in which authority is computed based on a user's propensity to provide early links to web pages that subsequently become popular; 2) topical authority based on the author's links and content updates in specific topic areas; and 3) popularity and influence based on nodal properties of authors.
摘要:
Methods, systems, and computer-readable media for searching microblog entries. The microblog entries may be generated through a single microblog website or across multiple microblog sites. Upon receiving a search input, a series of microblog entries responsive to the search input may be displayed to the user. The displayed microblog entries may be the most recently generated microblog entries that are responsive to the search input. In another embodiment, the microblog entries returned are a best match to the search criteria, which may be based on a user authority score for a user that drafted a microblog entry and additional characteristics of the microblog entry.
摘要:
A method and system for transferring data files from a sever entity, such as a server computer, to a client entity, such as a client process running on a remote client computer. The data files are stored in a frequency domain form by the server entity. The client entity can specify certain characteristics for the transfer that may be represented as one or more parameters. Parameters may include a compression ratio and certain data enhancements. Default or computed parameters may be used by the server entity when no client-specified parameters are available. Upon receiving a request for a data file, the server entity retrieves the frequency domain form of the data file, quantizes frequency domain coefficients included in the frequency domain form of the data file according to the parameters, compresses the quantized frequency domain coefficients into a compressed data file, and transfers the compressed data file to the client entity.
摘要:
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access levels associated with content within data using a set of access policies (e.g., a partial access level to inventory data for an inventory server, a full access level to inventory data and billing data for a shopping website server, etc.). The data protector may secure (e.g., encrypt) the data to create protected data, so that clients may be unable to access content of the protected data without obtaining access through the data protector. In this way, the data protector may selectively provide clients with access to content within the protected data according to respective access levels for the different clients (e.g., access to inventory data, but not billing data, may be provided to the inventory server by the data protector).
摘要:
The present invention provides a computer implemented method and apparatus for modifying data to be used by a client application in a client/server network. The steps for implementing the present invention include: transmitting information to the server computer from the client computer, wherein the transmitted information defines the intended use of data in a client application stored on the client computer; based on the transmitted information, modifying the data to optimize the data for its intended use by the client application, wherein such modification is performed by the server computer before transmitting the modified data to the client application. In the preferred embodiment, the modifications to the data are made as the request is made from the server application. The data modifications are performed by the server computer and are based on information about the client application's intended use of the data. Because the computations are made on the fly, the modified data files may be customized instantaneously.
摘要:
Systems, methods, and computer-readable storage media for presenting results of search queries with indications that at least a portion of such results has been endorsed by the user and/or social network connections of the user, are provided. Upon receipt of a search query, Web search results satisfying the query are determined. Satisfying search results that have been endorsed by the requesting user and/or one or more social network connections of the requesting user are identified. Upon presentation of the search results on the SERP, those results that were identified as having been endorsed by the requesting user and/or one or more social network connections of the requesting user are annotated as such. In this way, the requesting user may be able to more readily identify personally relevant results as the annotated results have been indicated to be preferences of the user and/or his or her social network connections.