摘要:
Techniques are described for automatically identifying and inhibiting suspect electronic communications between users, such as for electronic communications that may reflect fraudulent activities by one or more of the users or that are otherwise inappropriate for one or more reasons. In some situations, the communications may relate to transactions in which the users are involved, such as for users that are buyers and sellers of items interacting via one or more electronic marketplaces. The communications may occur via a communication mechanism provided by an electronic marketplace that acts as an intermediary between the sender of a communication and the one or more intended recipients of the communication. The automatic identification of suspect communications that may be inappropriate includes automatically assessing the communications in one or more ways, and identified suspect communications and any associated inappropriate user activities may be inhibited in various ways.
摘要:
Techniques are described for automatically identifying and inhibiting suspect electronic communications between users, such as for electronic communications that may reflect fraudulent activities by one or more of the users or that are otherwise inappropriate for one or more reasons. In some situations, the communications may relate to transactions in which the users are involved, such as for users that are buyers and sellers of items interacting via one or more electronic marketplaces. The communications may occur via a communication mechanism provided by an electronic marketplace that acts as an intermediary between the sender of a communication and the one or more intended recipients of the communication. The automatic identification of suspect communications that may be inappropriate includes automatically assessing the communications in one or more ways, and identified suspect communications and any associated inappropriate user activities may be inhibited in various ways.
摘要:
Systems and methods are provided for authenticating a user. In one implementation, a computer-implemented method is provided. According to the method, transaction history information for each one of a set of users is maintained in a storage device. The method provides identifiers associated with items for display and receives, from one of the users, a selection of one or more of the identifiers. The method further authenticates the user as a function of the selection and a transaction history of the user.
摘要:
The disclosure describes, in part, a system and method for improving the stacking of containers on or in a transportation unit. In some implementations, a stacking configuration may be planned that identifies containers and a position for those containers in the stacking configuration. The stacking configuration may be planned based on dimension values of the containers such that when stacked the stacking configuration remains stable. In addition, to improve the efficiency at which containers may be stacked, the disclosure describes that containers and/or the picking of items for those containers may be sequenced so that the containers, when packed and routed, arrive in a manner that allows efficient stacking.
摘要:
Techniques are described for automatically identifying and inhibiting suspect electronic communications between users, such as for electronic communications that may reflect fraudulent activities by one or more of the users or that are otherwise inappropriate for one or more reasons. In some situations, the communications may relate to transactions in which the users are involved, such as for users that are buyers and sellers of items interacting via one or more electronic marketplaces. The communications may occur via a communication mechanism provided by an electronic marketplace that acts as an intermediary between the sender of a communication and the one or more intended recipients of the communication. The automatic identification of suspect communications that may be inappropriate includes automatically assessing the communications in one or more ways, and identified suspect communications and any associated inappropriate user activities may be inhibited in various ways.
摘要:
Various embodiments of a system and method for generating a delivery plan for multi-tier delivery schemes are described. Embodiments may include generating a delivery plan for a region including multiple delivery locations. The delivery plan may specify at least one agent delivery route within the region. The delivery route may include at least one shipment acquisition location coinciding with an expected travel route of a vehicle conveying shipments. The agent delivery route may be traversed by an agent that is to deliver a specific group of shipments acquired from the vehicle at the shipment acquisition location. Embodiments may include selecting the specific group of shipments for delivery on the delivery route. The selecting is based on a time constraint for delivering the group of shipments to respective delivery locations along the delivery route, and historical delivery time information for previous deliveries to the delivery locations along the delivery route.
摘要:
Disclosed are various embodiments for identifying clusters of user accounts who have similar purchase histories and generating product assignments for products identified in the purchase histories. The clusters of user accounts may depict an affinity towards a first type of product while depicting an aversion to a second type of product. The first type of product and the second type of product may have one or more opposing attributes. Product assignments for the products may be generated based on attributes of the products, product categories associated with the products, or the clusters.
摘要:
Systems and methods are provided for authenticating a user. In one implementation, a computer-implemented method is provided. According to the method, transaction history information for each one of a set of users is maintained in a storage device. The method provides identifiers associated with items for display and receives, from one of the users, a selection of one or more of the identifiers. The method further authenticates the user as a function of the selection and a transaction history of the user.
摘要:
Disclosed are various embodiments for identifying clusters of user accounts who have similar purchase histories and generating product assignments for products identified in the purchase histories. The clusters of user accounts may depict an affinity towards a first type of product while depicting an aversion to a second type of product. The first type of product and the second type of product may have one or more opposing attributes. Product assignments for the products may be generated based on attributes of the products, product categories associated with the products, or the clusters.
摘要:
Various embodiments of a system and method for generating a delivery plan for multi-tier delivery schemes are described. Embodiments may include generating a delivery plan for a region including multiple delivery locations. The delivery plan may specify at least one agent delivery route within the region. The delivery route may include at least one shipment acquisition location coinciding with an expected travel route of a vehicle conveying shipments. The agent delivery route may be traversed by an agent that is to deliver a specific group of shipments acquired from the vehicle at the shipment acquisition location. Embodiments may include selecting the specific group of shipments for delivery on the delivery route. The selecting is based on a time constraint for delivering the group of shipments to respective delivery locations along the delivery route, and historical delivery time information for previous deliveries to the delivery locations along the delivery route.