Patent application number | Description | Published |
20120323677 | CLICK PREDICTION USING BIN COUNTING - Methods, systems, and computer-storage media having computer-usable instructions embodied thereon for calculating event probabilities are provided. The event may be a click probability. Event probabilities are calculated using a system optimized for runtime model accuracy with an operable learning algorithm. Bin counting techniques are used to calculate event probabilities based on a count of event occurrences and non-event occurrences. Linear parameters, such and counts of clicks and non-clicks, may also be used in the system to allow for runtime adjustments. | 12-20-2012 |
20150019204 | FEATURE COMPLETION IN COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |
20150019460 | ACTIVE LABELING FOR COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |
20150019461 | INTERACTIVE SEGMENT EXTRACTION IN COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |
20150019463 | ACTIVE FEATURING IN COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |
Patent application number | Description | Published |
20100228598 | MARKET DESIGN FOR A RESOURCE EXCHANGE SYSTEM - Providing a market design for a peer-to-peer resource exchange system. Prices for a plurality of resources such as storage space, upload bandwidth, and download bandwidth are calculated and balanced based on previous resource prices, a supply of the resources, and a demand for the resources. Further, prices for operations such as storage and retrieval are determined such that a total of the payments to resource suppliers equals a total of the payments received from the resource consumers. In some embodiments, incoming data operation requests are allocated to the peers such that equilibrium among the peers is achieved. | 09-09-2010 |
20100293174 | QUERY CLASSIFICATION - Techniques and systems are disclosed that provide for constructing a query classification index that can be used to classify a query into relevant categories. Where documents in an index are classified into one or more category predictions for a category hierarchy, classification metadata is generated for categories to which a document in the index has been classified. Further, the classification metadata is associated to the corresponding documents in the index. Additionally, a query of the index can be classified using the metadata associated to the documents in the index, and query results can be provided that are classified by the one or more categories identified by the classification of the query. | 11-18-2010 |
20120089439 | MARKET DESIGN FOR A RESOURCE EXCHANGE SYSTEM - Providing a market design for a peer-to-peer resource exchange system. Prices for a plurality of resources such as storage space, upload bandwidth, and download bandwidth are calculated and balanced based on previous resource prices, a supply of the resources, and a demand for the resources. Further, prices for operations such as storage and retrieval are determined such that a total of the payments to resource suppliers equals a total of the payments received from the resource consumers. In some embodiments, incoming data operation requests are allocated to the peers such that equilibrium among the peers is achieved. | 04-12-2012 |
20120158488 | OFFLINE COUNTERFACTUAL ANALYSIS - Counterfactual analysis can be performed “offline”, or “after the fact”, based on data collected during a trial in which random variations are applied to the output of the system whose parameters are to be the subject of the counterfactual analysis. A weighting factor can be derived and applied to data collected during the trial to emphasize that data obtained when the random variations most closely resembled the output that would be expected if counterfactual parameters were utilized to generate the output. If the counterfactual parameters being considered differ too much from the parameters under which the trial was conducted, the offline counterfactual analysis can estimate a direction and magnitude of the change of the system performance, as opposed to deriving a specific expected system performance value. In economic transactions, the random variations can be considered variations in the price paid by another party, thereby enabling derivation of their marginal cost. | 06-21-2012 |
20140074586 | EQUILIBRIUM ALLOCATION FOR BUDGET SMOOTHING IN SEARCH ADVERTISING - Various technologies described herein pertain to smoothing budgets of advertisers in online advertising. Information that indicates respective budgets of advertisers for online advertising during a time period and bids for auctions during the time period from the advertisers can be received. Moreover, a determination concerning whether to either throttle an advertiser from an auction or permit the advertiser to participate in the auction can be effectuated for each of the auctions during the time period and for each of the advertisers. The determination satisfies equilibrium conditions between the advertisers based on the respective budgets of the advertisers and the bids of the auctions. Moreover, winning bids for the auctions during the time period are determined. The winning bids can be determined from the bids of the advertisers respectively permitted to participate in each of the auctions. | 03-13-2014 |
20150242761 | INTERACTIVE VISUALIZATION OF MACHINE-LEARNING PERFORMANCE - Methods, computer systems, computer-storage media, and graphical user interfaces are provided for visualizing a performance of a machine-learned model. An interactive graphical user interface includes an item representation display area that displays a plurality of item representations corresponding to a plurality of items processed by the machine-learned model. The plurality of item representations are arranged according to scores assigned to the plurality of items by the machine-learned model. Further, each of the plurality of item representations is visually configured to represent a label assigned to a corresponding item. | 08-27-2015 |
Patent application number | Description | Published |
20130158482 | RAPID DELIVERY AND/OR RECEIVING OF FLUIDS - The present invention generally relates to systems and methods for delivering and/or receiving a substance or substances such as blood, from subjects, e.g., from the skin and/or from beneath the skin. In one aspect, the present invention is generally directed to devices and methods for receiving or extracting blood from a subject, e.g., from the skin and/or from beneath the skin, using devices containing a fluid transporter (for example, one or more microneedles), and a storage chamber having an internal pressure less than atmospheric pressure prior to receiving blood. In some cases, the device may be self-contained, and in certain instances, the device can be applied to the skin, and activated to receive blood from the subject. The device, or a portion thereof, may then be processed to determine the blood and/or an analyte within the blood, alone or with an external apparatus. For example, blood may be received from the device, and/or the device may contain sensors or agents able to determine the blood and/or an analyte suspected of being contained in the blood. In another aspect, the present invention is generally directed to arrangements of skin insertion objects such as microneedles and methods of forming and arranging skin insertion objects. Other aspects of the present invention are directed at other devices for receiving blood (or other bodily fluids, e.g., interstitial fluid), kits involving such devices, methods of making such devices, methods of using such devices, and the like. | 06-20-2013 |
Patent application number | Description | Published |
20090307160 | PARALLEL GENERATION OF A BAYESIAN NETWORK - A method for generating a Bayesian network in a parallel manner is based on an initial model having a plurality of nodes. Each node corresponds to a variable of a data set and has a local distribution associated therewith. The method includes assigning a plurality of subsets of the nodes to a respective plurality of constructors. The plurality of constructors is operated in a parallel manner to identify edges to add between nodes in the initial model. The identified edges are added to the initial model to generate the Bayesian network. The edges indicate dependency between nodes connected by the edges. | 12-10-2009 |
20090327083 | AUTOMATING ON-LINE ADVERTISEMENT PLACEMENT OPTIMIZATION - A method and system for generating a price landscape for an advertiser for bids placed by the advertiser for advertisement space is provided. A price landscape system generates a price landscape based on information provided by an advertisement placement service that may include overall price estimation data and advertiser-specific performance data. The price landscape system generates price landscape data for an advertiser that combines the overall price estimation data and the advertiser-specific performance data to provide a more accurate assessment of the advertiser's expected performance than can be determined from the overall price estimation data or the advertiser-specific performance data alone. | 12-31-2009 |
20110161308 | EVALUATING PREFERENCES OF CONTENT ON A WEBPAGE - Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate evaluation of digital content preferences are provided. A user is presented with items of digital content and permitted to manipulate the arrangement of the digital content items in the context of a layout area. Based on the user's manipulation of the digital content items, a user preference regarding an arrangement of digital content, such as a location preference, a position preference, and/or a usage preference, is identified. In embodiments, such a user preference can be utilized to later display digital content to a user in accordance therewith. | 06-30-2011 |
20120095752 | LEVERAGING BACK-OFF GRAMMARS FOR AUTHORING CONTEXT-FREE GRAMMARS - A system and method of refining context-free grammars (CFGs). The method includes deriving back-off grammar (BOG) rules from an initially developed CFG and utilizing the initial CFG and the derived BOG rules to recognize user utterances. Based on a response of the initial CFG and the derived BOG rules to the user utterances, at least a portion of the derived BOG rules are utilized to modify the initial CFG and thereby produce a refined CFG. The above method can carried out iterativey, with each new iteration utilizing a refined CFG from preceding iterations. | 04-19-2012 |
20120150772 | Social Newsfeed Triage - A social newsfeed being delivered to a user is triaged. A personalized model is established which predicts the importance to the user of data elements within a current social newsfeed being delivered to the user. The personalized model is established based on implicit actions the user takes in response to receiving previous social newsfeeds. The personalized model is then used to triage the data elements within the current social newsfeed. | 06-14-2012 |
Patent application number | Description | Published |
20120331530 | AUTHENTICATION AND AUTHORIZATION IN NETWORK LAYER TWO AND NETWORK LAYER THREE - A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on the node authentication code. | 12-27-2012 |
20130145421 | POLICY EVALUATION IN CONTROLLED ENVIRONMENT - A module may include interface logic to receive information identifying a state related to a client device via logic related to a controlled environment, and to send a valid policy result to a host device, where the valid policy result is related to the state. The module may include processing logic to process policy content according to a resource policy, where the processing is based on the information, and to produce the valid policy result based on the processing using the resource policy, where the valid policy result is adapted for use by the host device when implementing the network policy with respect to a destination device when the client device attempts to communicate with the destination device. | 06-06-2013 |
20140150053 | COMBINING NETWORK ENDPOINT POLICY RESULTS - An endpoint integrity system controls access to resources of a protected network for endpoint devices attempting to access the protected network. The system may include a number of evaluation modules that communicate with an endpoint device. The evaluation modules generate policy results for the endpoint device, in which each of the policy results assume one of three or more states, called a multi-state policy result. The multi-state policy results are combined to produce a combined Boolean policy result. | 05-29-2014 |
20150358271 | ENHANCED BUDDY LIST INTERFACE - A graphical user interface between a user of a computer service and the computer service includes a list of other users of the computer service selected by the user as significant to the user and an icon associated with one of the other listed users indicating that a communication has occurred between the user and the other user. | 12-10-2015 |
Patent application number | Description | Published |
20110145206 | ATOMIC DELETION OF DATABASE DATA CATEGORIES - A device maintains, in a database, a plurality of data items, each data item of the plurality of data items being associated with a respective category. The device associates, in the database, a first counter value with each data item, the first counter value indicating a number of times the respective category has been deleted from the database at a time when the data item was stored in the database. The device associates, in the database or another database, a second counter value with the respective category, the second counter value indicating a current value for a number of times the respective category has been deleted from the database. The device selectively deletes, from the database, one or more data items of the plurality of data items from the database based on the first counter values and the second counter value. | 06-16-2011 |
20110145209 | ATOMIC DELETION OF DATABASE DATA CATEGORIES - A device may maintain, in a database, a plurality of data items, each data item of the plurality of data items being associated with a respective category and supplemental information relating to deletion of the data item. The device may associate a group of counters with at least one of the categories and receive a deletion request corresponding to one of the group of categories, the deletion request including the supplemental information. The device may identify a counter associated with the category corresponding to the deletion request based on the supplemental information. The device may then increment the identified counters and selectively delete the data items based on values of the counters. | 06-16-2011 |
20110153854 | SESSION MIGRATION BETWEEN NETWORK POLICY SERVERS - A policy device grants access to a client device, without authenticating the client device, when the client device provides a session identifier to the policy device that was previously granted to the client device by a second policy device upon authenticating the client device by the second policy device. In one example, a policy device includes a network interface that receives a session identifier from a client device, wherein the policy device comprises an individually administered autonomous policy server, and an authorization module that grants the client device access to a network protected by the policy device based on the session identifier without authenticating the client device by the policy device. In this manner, the client device need not provide authentication information multiple times within a short time span, and the policy device can deallocate resources when a session migrates to a second policy device. | 06-23-2011 |
20110247048 | TESTING POLICIES IN A NETWORK - A device may include first logic configured to receive a data unit and to receive a network policy. The device may include second logic configured to identify how the data unit will be handled by the network policy and to generate a result that includes information about how the data unit will be handled by the network policy. | 10-06-2011 |
20120144471 | UPDATING STORED PASSWORDS - A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client in accordance with an authentication protocol, and authenticate the client based on a comparison of the first form to a value derived from a second form of the password stored in a password database. The comparison fails when the first form is not comparable to a value derived from the second form. The server may establish a secure connection to the client, receive a plain-text password from the client over the secure connection, authenticate the client by comparing a value derived from the plain-text password with a value derived from the second form, and update the password database with a third form of the password that permits the authentication server to successfully authenticate the client when the authentication server receives the first form. | 06-07-2012 |
20120239685 | ATOMIC DELETION OF DATABASE DATA CATEGORIES - A device maintains, in a database, a plurality of data items, each data item of the plurality of data items being associated with a respective category. The device associates, in the database, a first counter value with each data item, the first counter value indicating a number of times the respective category has been deleted from the database at a time when the data item was stored in the database. The device associates, in the database or another database, a second counter value with the respective category, the second counter value indicating a current value for a number of times the respective category has been deleted from the database. The device selectively deletes, from the database, one or more data items of the plurality of data items from the database based on the first counter values and the second counter value. | 09-20-2012 |
20120240182 | SECURITY ENFORCEMENT IN VIRTUALIZED SYSTEMS - A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information. | 09-20-2012 |
20140123217 | PROVISIONING LAYER THREE ACCESS FOR AGENTLESS DEVICES - A method may include obtaining a layer two identification of an endpoint that is seeking access to a network, the endpoint omitting an agent to communicate a layer three address of the endpoint to a policy node, applying one or more authentication rules based on the layer two identification of the endpoint, assigning the layer three address to the endpoint, learning, by the policy node, the layer three address of the endpoint, and provisioning layer three access for the endpoint to the network based on the learned layer three address. | 05-01-2014 |
20140137225 | SINGLE SIGN-ON FOR NETWORK APPLICATIONS - A method may include authenticating a device to a first server, where the device includes an agent; receiving a request, in the first server from a second server, to verify the authenticity of the device, where the device is not authenticated to the second server; sending a browser plug-in to the device to communicate with the agent for verifying the authenticity of the device; receiving, in the first server, a message from the agent verifying the authenticity of the device; and sending a message from the first server to the second server to authenticate the device to the second server. | 05-15-2014 |
20140351917 | PROVISIONING NETWORK ACCESS THROUGH A FIREWALL - A method may include determining one or more rules and communicating the one or more rules to a firewall, where the firewall receives a data unit and determines, based on the one or more rules, whether to forward the data unit to a destination address; receiving a redirection of a device from the firewall when the firewall determines not to forward the data unit to the destination address; receiving an indication that the firewall did not forward the data unit to the destination address; and determining a new rule to allow the firewall to forward the data unit to the destination address and communicating the new rule to the firewall; and redirecting the device to the destination address. | 11-27-2014 |
20150156219 | SECURITY ENFORCEMENT IN VIRTUALIZED SYSTEMS - A system includes a virtual machine (VM) server and a policy engine server. The VM server includes two or more guest operating systems and an agent. The agent is configured to collect information from the two or more guest operating systems. The policy engine server is configured to: receive the information from the agent; generate access control information for a first guest OS, of the two or more guest operating systems, based on the information; and configure an enforcer based on the access control information. | 06-04-2015 |
20150195273 | UPDATING STORED PASSWORDS - A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client device in accordance with an authentication protocol, and authenticate the client device based on a comparison of the first form to a value derived from a second form of the password stored in a password database, where the comparison fails when the first form is not comparable to a value derived from the second form. The server may establish a secure connection to the client, receive a plain-text password from the client device over the secure connection, authenticate the client device by comparing a value derived from the plain-text password with a value derived from the second form, and update the password database with a third form of the password that permits the authentication server to successfully authenticate the client device when the authentication server receives the first form. | 07-09-2015 |