摘要:
The disclosed technology uses a visibility function within a network environment that includes a set of nodes. At least one of nodes can directly transmit to one or more of a subset of the set of nodes. The visibility function characterizes a non-uniform resolution profile within the network environment that extends over at least one node outside the subset of nodes. The sent situation information is conditioned to propagate through the network environment according to the visibility function. The node can also receive situation information that includes a visibility parameter. Once the situation information is received, the node can evaluate the visibility parameter to determine whether the situation information is eligible for continued propagation through the network environment. If situation information is eligible for continued propagation the node then prepares to transmit the situation information.
摘要:
A method of trading a future right to a keyword advertisement placement associated with a search results list, wherein the search results list is generated in response to a search query. The method includes creating ownership of the future right to the keyword advertisement placement in an original keyword search engine. Next, the future right to the keyword advertisement placement originally owned by the original keyword search engine is made available for purchase in a keyword advertising market. Then, the future right to the keyword advertisement placement originally owned by the original keyword search engine is traded to another participant in the keyword advertising market.
摘要:
An anomaly score is computed for current and past physical access events using machine learning models. A transformation of the security events history into a time series of event counts, or augmenting the events history with the delay/lag information is used as an input to machine learning models. Machine learning models are used to estimate (compute) probability density functions for the currently observed parameters of security events. Cumulative probability density functions are computed from the probability density functions to be used to compute the anomaly score for the security events. The described method utilizes a collection of machine learning models to improve efficiency, accuracy and computation speed, by training the models on only a small subset of the accumulated history of security events to achieve higher performance of anomaly detection by narrow specialization of the models. When the anomaly score is beyond a threshold, injecting an anomaly alert network packet.
摘要:
The attachment system includes a brushhead assembly having a spring/carrier combination which comprises a spring assembly and a separate carrier assembly, adapted to mate as a combination with a receiving portion, in the form of a cup member, at the top of the handle of the toothbrush. The spring/carrier combination includes a slot which mates snugly with a vertical rib on the inside surface of the cup member, and further includes a portion which opposes the slot on the spring/carrier combination which mates snugly with a cut-out portion in the cup member, to prevent rotational movement of the brushhead relative to the handle. The spring/carrier assembly further includes two opposing spring finger elements which extend downwardly from an upper edge of the spring/carrier assembly and are joined thereto such that the lower ends of the spring fingers have a slightly outward springing action, wherein the lower ends of the spring fingers fit into corresponding openings in opposing sides of the cup member when the spring/carrier assembly is operatively positioned in the cup member, tending to prevent translational movement of the brushhead relative to the handle.
摘要:
A method for utilizing presentation slots to manage advertising and coupon presentation to mobile communication devices over a communication network is stored and executed as an application for use by network devices. The method includes sensing vehicle context and vehicle events, based on vehicle sensor data. Presentation slots, particular circumstances for which advertisements may be presented to a vehicle user, are configured. When a presentation slot is triggered through sensing of a vehicle context or vehicle event, the method identifies advertisements to be presented to the vehicle user, with the advertisements corresponding to configured presentation slots. The identified advertisements are presented to the vehicle user.
摘要:
Techniques are provided to determine user-interest features and user-interest parameter weights for a user-interest model. The user-interest features are pre-determined and/or determined dynamically. Pre-determined user-interest features are based on user-interest profiles, prior user activities, documents listed in a resume, reading or browsing patterns and the like. Dynamically determined user-interest features include features learned from an archive of user activities using statistical analysis, machine learning and the like. User-interest parameter weights are pre-determined and/or dynamically determined. Pre-determined user-interest parameter weights include parameter weights manually entered by a user indicating the relevant importance of a user-interest feature and parameter weights previously learned from an archive of the user's past activities. Dynamically assigned user-interest parameter weights include dynamically determined updates to user-interest parameter weights based on newly identified documents or topics of interest.
摘要:
One embodiment of the present invention provides a system that detects malicious data in an ad-hoc network. During operation, the system receives data at a node in the ad-hoc network, wherein the data was sensed and redundantly communicated to the node by other nodes in the ad-hoc network. Note that in this ad-hoc network, a given node senses data associated with itself and with proximate nodes in the ad-hoc network. In this way, proximate nodes in the ad-hoc network can redundantly sense data about each other. Next, the system determines at the node if the received data, along with data sensed locally by the node, is consistent. If not, the system uses a model which accounts for malicious nodes to determine an explanation for the inconsistency.
摘要:
Techniques for providing privacy protection are provided. A query is received. Privacy policy information, extracted knowledge and optional information about available public information are determined. Information about the knowledge extraction transformations applied to create the extracted knowledge and the source data is determined. Privacy protecting transformations are determined and applied to transform the extracted knowledge based on the selected privacy policy, optional information about available public information, the characteristics of the applied knowledge extractions transformations, the source data and optional previous user queries.