摘要:
Methods and apparatus are provided to smooth a jagged outline of a reconstructed text generated through any of a variety of systems, such as, for example, an image scanner. Given the reconstructed text with a jagged outline, the methods smooth the outline of the text first through location of horizontal and vertical edges, and subsequent gray scale reconstruction of the edge ink level from a one-bit or a low number of bits edge pattern. The methods then provide identification of the local text outline pattern and corresponding ink level adjustment of the center pixel. The methods produce text having very smooth horizontal and vertical edges. The methods then smooth slanted edges, mend holes in the text, and remove isolated pixels of ink.
摘要:
Topical affinity badges in information retrieval is described, for example, where graphical elements are presented together with ranked search results from a search engine, to indicate a degree of association between an author of a document and a topic. In various embodiments, a measure of an author's affinity to a topic is predicted using a machine learning system that takes as input author features derived from documents of the author. In various examples topical affinity scores or labels are used to generate badges and/or to index documents at an index of a search engine. For example, badges may be presented with ranked search results, in pop up displays or in other ways. In examples author features relating to any of recency, frequency and presentation of an author's documents are generated, where presentation features may relate to biographical information such as experience, qualifications, and previous documents.
摘要:
Social influencers may be identified for specific usage contexts and for influencer type. Influencers may be categorized by mavens, connectors, salesmen, or other categories. Within each usage context, a unified data model may be used to collect data from multiple sources, including multiple social networks, as well as to collect data from different levels of influencers in each usage context. The relevance of various communication media as well as the frequency and quality of use of the media may be factors used to determine a person's effectiveness as a specific type of influencer within a usage context.
摘要:
A social marketing system may reward and incentivize participants, and may also have a fraud detection system. The manager may create social marketing campaigns that may be simulated to determine an expected set of activities, which may be compared to an actual set of activities. A fraud detection system may detect abnormal activity and may bring the activity to a manager's attention and may also punish the participants by withholding rewards, lowering the participant's reputation, or some other punishment mechanism.
摘要:
A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may include desktop and network resources such as address book contacts, instant messaging contacts, active directory user accounts, IP addresses, and files that contain particular content or that are stored in particular locations. The resources may be real for which protection against leakage is desired, or fake to operate as bait to lure and detect malicious attacks. The honeypot is implemented in an extensible manner so that virtually any resource may be honeypotted to apply honeypot benefits to resources beyond static IP addresses in order to improve both the breadth of information leakage prevention and the detection of malicious attacks.
摘要:
Information is automatically located which is relevant to source content that a user is viewing on a user interface without requiring the user to perform an additional search or navigate links of the source content. The source content can be, e.g., a web page or a document from a word processing or email application. The relevant information can include images, videos, web pages, maps or other location-based information, people-based information and special services which aggregate different types of information. Related content is located by analyzing textual content, user behavior and connectivity relative to the source. The related content is scored for similarity to the source. Content which is sufficiently similar but not too similar is selected. Similar related content is grouped to select representative results. The selected content is filtering in multiple stages based on attribute priorities to avoid unnecessary processing of content which is filtered out an early stage.
摘要:
A system and method for follow up management comprising determining if a user has an unexpired repository record, extracting information from the repository record associated with the user; and acting on instructions stored in the repository record. The method is practiced on a system for managing online interaction comprising a business rules engine a follow up repository, and a follow up engine.
摘要:
A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's expertise may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks.
摘要:
A recommendation system may use a network of relationships between many different entities to find search results and establish a relevance value for the search results. The relevance value may be calculated by analyzing trust and similarity components of each relationship between the search user and the entity providing the search results. The entities may be, for example, persons associated within express or implied social networks, or corporations or other organizations with a historical or other reputation. The relationships may be created through many different contact mechanisms and may be unidirectional, asymmetric bidirectional, or symmetric bidirectional relationships. The relationships may be different based on topic or other factors.
摘要:
Security risk for a single IT asset and/or a set of IT assets in a network such as an enterprise or corporate network may be estimated and represented in a visual form by categorizing risk into different discrete levels. The IT assets may include both computing devices and users. The risk categorization uses a security assessment of an IT asset that is generated to indicate the type of security problem encountered, the severity of the problem, and the fidelity of the assessment. The asset value of an IT asset to the enterprise is also assigned. Security risk is then categorized (and a numeric risk value provided) for each IT asset for different problem types by considering the IT asset value along with the severity and fidelity of the security assessment. The security risk for the enterprise is estimated using the numeric risk value and then displayed in visual form.