Abstract:
A content application determines images of an article for extraction. The content application identifies an initial image associated with a content of the article. A caption and a credit line associated with the initial image is detected and the initial image is extracted along with the caption and the credit line. A second image of the article associated with a video is also detected and extracted along with the video. In addition, the content application extracts a slideshow detected within the article.
Abstract:
Technologies for providing event-level data privacy for streaming post analytics data include, in some embodiments, receiving a data stream that includes instances of count data collected over a time interval, computing a true count breakdown that includes a set of sub-counts of non-public user interface interactions on the post, creating a noisy count breakdown by applying at least one differential privacy mechanism to the set of sub-counts, and streaming the noisy count breakdown instead of the true count breakdown to a computing device. At least one of the sub-counts is a count that is associated with a particular value of an attribute that has different possible values. The attribute is associated with the non-public user interface interactions on the post.
Abstract:
When a user-submitted query is received, a set of candidate queries is identified. For each of the candidate queries, features are extracted that, for each candidate query, reflect a measure of effectiveness of the candidate query. The candidate queries are rank ordered based on the measure of effectiveness, and one or more of the top-ranked candidate queries are presented as suggested alternatives to the user-submitted query.
Abstract:
Techniques to operate an experiment (online) over a computer network comprised of computing devices. The experiment may consist of a series of tests on experiment variants of a software application running on the computing devices of which each variant refers to a particular application version or implementation. These techniques may be configured into hardware operative to run such tests over the computer network by selecting one group or multiple groups of computing devices. Other embodiments are described and claimed.
Abstract:
The ranking quality of a ranked list may be evaluated. In an example embodiment, a method is implemented by a system to access log data, ascertain which entries of a ranked list are skipped, and determine a ranking quality metric from the skipped entries. More specifically, log data that reflects user interactions with a ranked list having multiple entries is accessed. The user interactions include at least indications of which of the multiple entries are selected entries. It is ascertained which entries of the multiple entries of the ranked list are skipped entries based on the selected entries. The ranking quality metric for the ranked list is determined responsive to the skipped entries.
Abstract:
Technologies for providing event-level data privacy for streaming post analytics data include, in some embodiments, receiving a data stream that includes instances of count data collected over a time interval, computing a true count breakdown that includes a set of sub-counts of non-public user interface interactions on the post, creating a noisy count breakdown by applying at least one differential privacy mechanism to the set of sub-counts, and streaming the noisy count breakdown instead of the true count breakdown to a computing device. At least one of the sub-counts is a count that is associated with a particular value of an attribute that has different possible values. The attribute is associated with the non-public user interface interactions on the post.