Patent application number | Description | Published |
20100205057 | PRIVACY-SENSITIVE METHODS, SYSTEMS, AND MEDIA FOR TARGETING ONLINE ADVERTISEMENTS USING BRAND AFFINITY MODELING - Privacy-sensitive methods, systems, and media for targeting online advertisements using brand affinity modeling are provided. In accordance with some embodiments, a method for constructing brand audiences for targeting advertisements is provided, the method comprising: collecting visitation data relating to user-generated micro-content from a plurality of browsers; extracting a quasi-social network from the collected visitation data, wherein the quasi-social network comprises a plurality of links that are induced between the plurality of browsers visiting the user-generated micro-content; selecting seed nodes from the plurality of browsers, wherein the selected seed nodes have performed a brand action relating to the user-generated micro-content that is indicative of brand affinity; determining candidate nodes from the plurality of browsers based at least in part on a distance from the seed nodes in the quasi-social network; calculating a brand proximity score for each of the candidate nodes, wherein the brand proximity score includes one or more brand proximity measures and wherein the brand proximity score is an aggregated distance measurement between the candidate nodes and the seed nodes; generating a ranking of the candidate nodes based on the brand proximity score; and selecting a brand audience for serving an advertisement based on the generated ranking. | 08-12-2010 |
20110040586 | METHODS AND SYSTEMS FOR PROVIDING SOCIAL NETWORKING-BASED ADVERTISEMENTS - Methods and systems for providing social networking-based advertisements are provided. In accordance with some embodiments, methods for providing social networking-based advertisements to users are provided, the method comprising: collecting user information relating to a user from a user profile on a social networking website, wherein the user information includes relationship data that describes a social network of members of the social networking website connected to the user; determining whether the user information has missing attributes; in response to determining that the user information has missing attributes, deriving the missing attributes from users profiles associated with the members of the social network; using the collected user information and the missing attributes to select an advertisement; and providing the selected advertisement to the user and at least one member of the social network associated with the user. | 02-17-2011 |
20110041168 | SYSTEMS AND METHODS FOR TARGETING ONLINE ADVERTISEMENTS USING DATA DERIVED FROM SOCIAL NETWORKS - Systems and methods for targeting online advertisements using data derived from social networks are provided. In accordance with some embodiments, the method comprises: presenting a user at a user computer with a publicly accessible website that includes user-generated social networking content over the Internet, wherein the user is authorized to access features and the user-generated social networking content associated with the publicly accessible website upon inputting user information; in response to receiving user information from the user, displaying a webpage associated with the user; displaying at least one advertisement on the webpage, wherein the at least one advertisement embeds an object in the user computer and wherein the object is used to obtain a unique identifier associated with the user; using the object to construct a micronetwork of the members associated with the user, wherein the object obtains the unique identifier from each member that visits the webpage and the unique identifier from each member that establishes a relationship with the user; using the object to monitor information relating to the user, wherein the information includes actions executed by the user; retargeting advertisements for transmission to the user and the micronetwork based on information monitored by the object; and transmitting at least one retargeted advertisement to the user and the micronetwork associated with the user, wherein the at least one retargeted advertisement is transmitted using the unique identifier associated with the user and the unique identifier associated with each member of the micronetwork. | 02-17-2011 |
20140025509 | METHODS AND APPARATUS FOR BID OPTIMIZATION AND INVENTORY SCORING - Methods for bid optimization and inventory scoring are provided. The method comprises receiving a definition of a success event associated with a campaign that has a set of campaign parameters. The method also comprises calculating an impact estimate for a performance measure of the success event. The impact estimate is calculated based on a set of auction parameters and a set of historical data associated with a browser. The method further comprises defining a bidding function based on the impact estimate, a set of characteristics of the browser, and the set of campaign parameters. The method also comprises calculating, after calculating the impact estimate and defining the bidding function, a bid value using the bidding function. The method also comprises sending a signal having the bid value to a real-time bidding exchange. | 01-23-2014 |
20140067538 | METHODS, SYSTEMS, AND MEDIA FOR INHIBITING ADVERTISEMENT COLLISIONS - In some embodiments, a mediator device is operable to receive a request for permission to serve a first advertisement associated with a first advertiser to a display device. The mediator device can set a lock indicator to an active state in response to receiving the request and send an indication of approval to serve the first advertisement. The mediator device can receive, at a later time, a request for permission to serve a second advertisement to the display device. The mediator device can decline to send an indication of approval to serve the second advertisement when the lock indicator is in the active state. | 03-06-2014 |
20140068061 | METHODS AND APPARATUS FOR DETECTING AND FILTERING FORCED TRAFFIC DATA FROM NETWORK DATA - A non-transitory processor-readable medium is provided that stores code representing instructions to be executed by a processor to filter data associated with an entity for a first predefined time period in response to an access by the entity at a first time to a preselected network location from a plurality of preselected network locations. The plurality of preselected network locations are associated with forced web traffic patterns. The processor is also caused to filter data associated with the entity for a second predefined time period in response to an access by the entity at a second time to a preselected network location from the plurality of preselected network locations during the first predefined time period. The second time is after the first time. | 03-06-2014 |
20140068773 | METHODS, SYSTEMS AND MEDIA FOR DETECTING NON-INTENDED TRAFFIC USING CO-VISITATION INFORMATION - A non-transitory processor-readable medium stores code representing instructions to be executed by a processor to receive data associated with access by a first plurality of entities to a first website location and to receive data associated with access by a second plurality of entities to a second website location. The processor is also caused to define a co-visitation factor for each of the first website location and the second website location based on the received data. The processor is also caused to, if the co-visitation factor of the first website location and/or the co-visitation factor of the second website location is over a predefined threshold, select the first website location and/or the second website location as target website locations. The processor is caused to send a signal to set a flag associated with each target website location indicating the target website location as a suspicious website location. | 03-06-2014 |
20140119185 | METHODS AND APPARATUS FOR DETECTING AND FILTERING FORCED TRAFFIC DATA FROM NETWORK DATA - A non-transitory processor-readable medium is provided that stores code representing instructions to be executed by a processor to filter data associated with an entity for a first predefined time period in response to an access by the entity at a first time to a preselected network location from a plurality of preselected network locations. The plurality of preselected network locations are associated with forced web traffic patterns. The processor is also caused to filter data associated with the entity for a second predefined time period in response to an access by the entity at a second time to a preselected network location from the plurality of preselected network locations during the first predefined time period. The second time is after the first time. | 05-01-2014 |
20140279753 | METHODS AND SYSTEM FOR PROVIDING SIMULTANEOUS MULTI-TASK ENSEMBLE LEARNING - A complete end-to-end modeling system is provided that includes data sampling, feature engineering, action labeling, and model learning or learning from models built based on collected data. The end-to-end modeling process is performed via an automatic mechanism with minimal or reduced human intervention. A processor-readable medium is disclosed, storing processor-executable instructions to instantiate an automated data sampling and prediction structure training component, the automated data sampling and prediction structure training component being configured to automatically collect user event data samples, and use the collected user event data samples to train multiple prediction structures in parallel. | 09-18-2014 |
20140351931 | METHODS, SYSTEMS AND MEDIA FOR DETECTING NON-INTENDED TRAFFIC USING CO-VISITATION INFORMATION - A non-transitory processor-readable medium is provided that stores code representing instructions to be executed by a processor to receive data associated with access by a first plurality of entities to a first website location and to receive data associated with access by a second plurality of entities to a second website location. The processor is also caused to define a co-visitation factor for each of the first website location and the second website location based on the received data. The processor is also caused to, if the co-visitation factor of the first website location and/or the co-visitation factor of the second website location is over a predefined threshold, select the first website location and/or the second website location as target website locations. The processor is caused to send a signal to set a flag associated with each target website location indicating the target website location as a suspicious website location. | 11-27-2014 |