摘要:
Methods, apparatuses and systems directed to sponsored story generation from an organic activity stream in a social networking site. A user wishing to promote an entry from an organic activity stream may, using a sponsor user interface, specify the types of stories to promote to a portion of the home page displayed to a member of a social network.
摘要:
Methods, apparatuses and systems directed to sponsored story generation from an organic activity stream in a social networking site. A user wishing to promote an entry from an organic activity stream may, using a sponsor user interface, specify the types of stories to promote to a portion of the home page displayed to a member of a social network.
摘要:
Methods, apparatuses and systems directed to sponsored story generation from an organic activity stream in a social networking site. A user wishing to promote an entry from an organic activity stream may, using a sponsor user interface, specify the types of stories to promote to a portion of the home page displayed to a member of a social network.
摘要:
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
摘要:
To provide a sponsored story unit, the social networking system receives a story request from an advertiser. The story request specifies properties of content used to generate the sponsored story. When the social networking system stores an object or an action performed on an object, properties associated with, and describing, the object or the action are also stored. For example, properties of an object include an object type, an object identifier, metadata describing the object or other suitable information. The social networking system identifies actions or objects associated with users connected to a viewing user having one or more properties included in a story request. A sponsored story is generated from the identified actions or objects and presented to a viewing user.
摘要:
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.
摘要:
In one embodiment, a method includes receiving a first selection of an entity associated with a user of a social-networking system; receiving a second selection of a type of user interaction with the entity; and providing the first and second selections for use in a sponsored-story specification. The use of the first and second selections in the sponsored-story specification facilitate entries in an organic activity stream of the social-networking system that match the sponsored-story specification being provided for display in pre-determined areas of web pages.
摘要:
To provide a sponsored story unit, the social networking system receives a story request from an advertiser. The story request specifies properties of content used to generate the sponsored story. When the social networking system stores an object or an action performed on an object, properties associated with, and describing, the object or the action are also stored. For example, properties of an object include an object type, an object identifier, metadata describing the object or other suitable information. The social networking system identifies actions or objects associated with users connected to a viewing user having one or more properties included in a story request. A sponsored story is generated from the identified actions or objects and presented to a viewing user.
摘要:
In a social networking system, users may perform different types of actions with respect to objects (e.g., for a song, a user can buy, listen to, recommend, or like the song). Objects on the social networking system may include object properties (e.g., for a song, an artist, genre, and album are the song's object properties). Each type of action performed on a type of object may be aggregated in a different way. Actions may be performed on objects by users through the social networking system, a third-party application installed on the social networking system, and systems external to the social networking system. An advertiser may specify targeting criteria based on multiple different action types and aggregations of an action with respect to a particular object. Users may be categorized based on their interactions with objects having a common element. Ads may then be targeted to the categorized users.
摘要:
A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.