摘要:
A social networking system identifies an event based on a thread including messages from users of the social networking system and communicates invitations to the event to one or more invited users. The social networking system receives a response to an invitation from a responding user and identifies a group of users invited to the event that have not responded to the invitation. From the users invited to the event that have not responded to the invitation, a subset of users having a threshold affinity to the responding user are selected. The social networking system notifies the subset of users of the responding user's response to the invitation and may also provide the subset of users with a suggestion for attending the event.
摘要:
A social networking system identifies an event based on a thread including messages from users of the social networking system and communicates invitations to the event to one or more invited users. The social networking system receives a response to an invitation from a responding user and identifies a group of users invited to the event that have not responded to the invitation. From the users invited to the event that have not responded to the invitation, a subset of users having a threshold affinity to the responding user are selected. The social networking system notifies the subset of users of the responding user's response to the invitation and may also provide the subset of users with a suggestion for attending the event.
摘要:
A social networking system that provides a system allowing users of the social networking system to define future plans, whereby users of the social networking system who view the plan are permitted to add themselves to the plan independent of whether they were explicitly specified as attendees of the plan. The social networking system is capable of auto-filling some missing plan details through inference. The social networking system is also capable of merging similar plans together.
摘要:
In particular embodiments, one or more computer systems of a social-networking system identify a user viewing video content on a first display device, identify the video content being viewed on the first display device by the user, and determine a second display device associated with the identified user. The one or more computer systems of the social-networking system determine an action related to the video content being viewed by the user on the first display device and provide one or more instructions to the determined second display device to display a call-to-action associated with the determined action.
摘要:
A social networking system enables a third party application to request user data based on action types and aggregations of a user's data corresponding to an action type with respect to multiple objects. Users of the social networking system may provide privacy or accessibility of their information based on the action type associated with the information (e.g., a user may allow a particular application to access all actions of a certain type, regardless of the source of those actions). The third party application may use this accessed information to generate personalized content for a user based on aggregations of the user's data and then publish the personalized content back to the social networking system.
摘要:
A social networking system enables a third party application to request user data based on action types and aggregations of a user's data corresponding to an action type with respect to multiple objects. Users of the social networking system may provide privacy or accessibility of their information based on the action type associated with the information (e.g., a user may allow a particular application to access all actions of a certain type, regardless of the source of those actions). The third party application may use this accessed information to generate personalized content for a user based on aggregations of the user's data and then publish the personalized content back to the social networking system.
摘要:
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact. Probabilistic information may be collected from various sources for a claim, enabling a social networking system to evaluate a truthfulness of the assertion made in the claim. User-declared profile information may be evaluated as claims. A user, entity, or application may make claims about any assertions made in the social networking system. Reputation scores may be determined for users based on evaluations of their historical assertions. Claims may be evaluated for truthfulness using a probabilistic prediction model using heuristics analysis, regression analysis, and machine learning methods. A claims-based profile of users may be provided to viewers based on the contexts in which the claims were made. Viewers may view claims made about users, such as the users' biographical information, contact information, expertise, and interests.
摘要:
In one embodiment, one or more computing devices receive, from one or more mobile devices respectively associated with one or more users, one or more sets of data, wherein each set of data comprises: a user identifier indicating to which user the set of data corresponds; a location where the corresponding user was at; and a time when the corresponding user was at the location. The computing devices store the one or more sets of data; and extract one or more statistics from the one or more sets of data that represent behavioral pattern of at least one of the one or more users.
摘要:
A method is provided for controlling multiple access to a network service to prevent fraudulent use of the network service. The method includes identifying an account access counter for an account using identification information received from a user at a first device using a network, wherein the user is requesting access to a service provided at a second device, and further wherein the account access counter is the number of service access sessions active for the account; comparing the account access counter to a maximum account access number, whrerein the maximum account access number defines a maximum number of service access sessions allowed for the account; and providing the user at the first device access to the service at the second device if the account access counter is less than the maximum account access number.
摘要:
A method of limiting presentation of rules based events includes receiving a request to view a rules based event at a computer. A first estimate of a first geographic location of the computer is obtained. The first estimate includes a first confidence determination. If the first confidence determination is less than a first established confidence level, a second estimate of the first geographic location of the computer is obtained. The second estimate includes a second confidence determination for comparison to a second established confidence level. The first estimate and the second estimate define a composite estimated geographic location of the computer. Information on a second geographic location of the rules based event is retrieved. The retrieved information is compared with the composite estimated geographic location of the computer. Access to the rules based event is provided based on access rules, the comparison, and the composite estimated geographic location.