Patent application number | Description | Published |
20080201434 | Context-Sensitive Searches and Functionality for Instant Messaging Applications - In one or more embodiments, in the context of an instant messaging application, a conversation is analyzed and contextually or textually relevant keywords and/or phrases are identified. These keywords or phrases are then highlighted in a visually-identifiable manner for selection by an individual participating in the conversation. Once selected by an individual, a user interface is presented and exposes the individual or individuals in the conversation to various contextually- or textually-relevant material or functionality that pertains to the selected word or phrase. In one or more embodiments, an individual can also manually select a word or phrase to access the user interface that exposes contextually or textually-relevant material or functionality. In the various embodiments described below, at least some of this relevant material or functionality is presented to the user in the context of the instant messaging application and in a manner in which it can be consumed by the individual within the instant messaging application itself. | 08-21-2008 |
20080319932 | CLASSIFICATION USING A CASCADE APPROACH - A system and method that facilitates and effectuates optimizing a classifier for greater performance in a specific region of classification that is of interest, such as a low false positive rate or a low false negative rate. A two-stage classification model can be trained and employed, where the first stage classification is optimized over the entire classification region and the second stage classifier is optimized for the specific region of interest. During training the entire set of training data is employed by a first stage classifier. Only data that is classified by the first stage classifier or by cross validation to fall within a region of interest is used to train the second stage classifier. During classification, data that is classified within the region of interest by the first classification is given the first stage classifier's classification value, otherwise the classification value for the instance of data from the second stage classifier is used. | 12-25-2008 |
20090006343 | MACHINE ASSISTED QUERY FORMULATION - Architecture for completing search queries by using artificial intelligence based schemes to infer search intentions of users. Partial queries are completed dynamically in real time. Additionally, search aliasing can also be employed. Custom tuning can be performed based on at least query inputs in the form of text, graffiti, images, handwriting, voice, audio, and video signals. Natural language processing occurs, along with handwriting recognition and slang recognition. The system includes a classifier that receives a partial query as input, accesses a query database based on contents of the query input, and infers an intended search goal from query information stored on the query database. A query formulation engine receives search information associated with the intended search goal and generates a completed formal query for execution. | 01-01-2009 |
20090106059 | EXECUTIVE REPORTING - Providing for generating an executive report of business or personal activity is described herein. By way of example, such executive report can identify a change and related cause with respect to a prior report. As a particular example, an inference engine can receive an activity report and reference prior reports to identify the change and related cause. A set of results containing such information can be provided to a synthesis component that can include and highlight such information in the executive report. In addition, additional sources of data can be referenced in order to include and/or customize the report to a particular individual, organization, culture, or the like. As described, aspects of the subject innovation can provide an executive report highlighting important aspects of data and tailoring those aspects to interests of one or more users. | 04-23-2009 |
20090193093 | REDUCING UNWANTED AND UNSOLICITED ELECTRONIC MESSAGES BY EXCHANGING ELECTRONIC MESSAGE TRANSMISSION POLICIES AND SOLVING AND VERIFYING SOLUTIONS TO COMPUTATIONAL PUZZLES - The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document. | 07-30-2009 |
20090254336 | PROVIDING A TASK DESCRIPTION NAME SPACE MAP FOR THE INFORMATION WORKER - Providing for generation of a task oriented data structure that can correlate natural language descriptions of computer related tasks to application level commands and functions is described herein. By way of example, a system can include an activity translation component that can receive a natural language description of an application level task. Furthermore, the system can include a language modeling component that can generate the data structure based on an association between the description of the task and at least one application level command utilized in executing the computer related task. Once generated, the data structure can be utilized to automate computer related tasks by input of a human centric description of those tasks. According to further embodiments, machine learning can be employed to train classifiers and heuristic models to optimize task/description relationships and/or tailor such relationships to the needs of particular users. | 10-08-2009 |
20090254390 | COMMUNICATION WORKSPACE - Multiple pieces of information can be arranged into a single construct that allows the employee to ascertain information quickly while at her workstation. Selection of information for placement into the construct can employ various statistical models and the like. Selective pieces of information can be masked for a user's construct based upon access rights of the user. Constructs can be configured by a user based on personal preferences as well as by an administrator. Population of metadata upon the construct can be performed automatically through an instruction of the administrator or be overridden by a user request. In addition, various types of synchronization can be implemented between constructs, such that identical or near-identical information is populated upon multiple constructs. | 10-08-2009 |
20090327871 | I/O FOR CONSTRAINED DEVICES - Systems and methodologies for providing improved input and output capabilities for computing devices are provided herein. An output manager is provided that can determine an appropriate layout for a user interface at a display area based on size and shape parameters associated with the display area. The output manager can additionally sense alterations to the display area and dynamically adjust a determined layout based on the sensed alterations. Further, the output manager can facilitate the connection of an associated device to one or more external display devices to facilitate the combined use of the external display devices and resident display areas at the associated device. An input manager is additionally provided that can obtain input from a target user by sensing patterns associated with the target user and select an appropriate input based on the sensed patterns. | 12-31-2009 |
20100088380 | MESSAGE RENDERING FOR IDENTIFICATION OF CONTENT FEATURES - Architecture for detecting and removing obfuscating clutter from the subject and/or body of a message, e.g., e-mail, prior to filtering of the message, to identify junk messages commonly referred to as spam. The technique utilizes the powerful features built into an HTML rendering engine to strip the HTML instructions for all non-substantive aspects of the message. Pre-processing includes pre-rendering of the message into a final format, which final format is that which is displayed by the rendering engine to the user. The final format message is then converted to a text-only format to remove graphics, color, non-text decoration, and spacing that cannot be rendered as ASCII-style or Unicode-style characters. The result is essentially to reduce each message to its common denominator essentials so that the junk mail filter can view each message on an equal basis. | 04-08-2010 |
20110167053 | VISUAL AND MULTI-DIMENSIONAL SEARCH - A system that can analyze a multi-dimensional input thereafter establishing a search query based upon extracted features from the input. In a particular example, an image can be used as an input to a search mechanism. Pattern recognition and image analysis can be applied to the image thereafter establishing a search query that corresponds to features extracted from the image input. The system can also facilitate indexing multi-dimensional searchable items thereby making them available to be retrieved as results to a search query. More particularly, the system can employ text analysis, pattern and/or speech recognition mechanisms to extract features from searchable items. These extracted features can be employed to index the searchable items. | 07-07-2011 |
20110238829 | ANONYMOUS AND SECURE NETWORK-BASED INTERACTION - The subject disclosure pertains to anonymous network interaction. More specifically, mechanisms are provided to ensure anonymity with respect network interaction such that third parties are unable to determine the source and/or intent of communications. Accordingly, entities may anonymize all outgoing and/or incoming data packets so as to mitigate outside entities from learning about information being sought and/or provided. For example, a user or corporation may employ an anonymizer with respect to web searching so that outside entities are not able to determine what information is attempted to be accessed and by whom. | 09-29-2011 |
20110282954 | Content Presentation Based On User Preferences - Architecture is provided that facilitates user-controlled access to user profile information. A user is allowed to selectively expose (or mask) portions of his/her profile to third parties. Additionally, advertisers and/or content providers can offer incentives or enticement in response to the acceptance of which a user exposes larger portions of their profile. The architecture comprises a system that facilitates profile management utilizing a profile component that facilitates creation and storage of an electronic profile of a user, and a control component under control of the user for controlling access to the profile. Machine learning and reasoning is provided to make inferences and automate aspects thereof. | 11-17-2011 |
20120239653 | Machine Assisted Query Formulation - Architecture for completing search queries by using artificial intelligence based schemes to infer search intentions of users. Partial queries are completed dynamically in real time. Additionally, search aliasing can also be employed. Custom tuning can be performed based on at least query inputs in the form of text, graffiti, images, handwriting, voice, audio, and video signals. Natural language processing occurs, along with handwriting recognition and slang recognition. The system includes a classifier that receives a partial query as input, accesses a query database based on contents of the query input, and infers an intended search goal from query information stored on the query database. A query formulation engine receives search information associated with the intended search goal and generates a completed formal query for execution. | 09-20-2012 |
20130318116 | Advanced Spam Detection Techniques - The subject invention provides for an advanced and robust system and method that facilitates detecting spam. The system and method include components as well as other operations which enhance or promote finding characteristics that are difficult for the spammer to avoid and finding characteristics in non-spam that are difficult for spammers to duplicate. Exemplary characteristics include examining origination features in pairs, analyzing character and/or number sequences, strings, and sub-strings, detecting various entropy levels of one or more character sequences, strings and/or sub-strings as well as analyzing message and/or feature sizes. | 11-28-2013 |