Patent application number | Description | Published |
20080319774 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a processing device that receives data related to a cursor movement towards an advertisement displayed on a web page. The processing device analyzes the cursor movement data and determines a confidence level useable in the determination of click fraud, the confidence level responsive to the analysis of the cursor movement. The received data includes data that the cursor on the web page has transited at least one pixel cluster on the web page prior to a clicking the advertisement. In one embodiment, a click fraud is detected when the click occurred without the cursor crossing a pixel cluster, and no click fraud occurring when the click occurred after the cursor crossed a pixel cluster. | 12-25-2008 |
20080319842 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement. | 12-25-2008 |
20080320125 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page. | 12-25-2008 |
20090024460 | CURSOR PATH VECTOR ANALYSIS FOR DETECTING CLICK FRAUD - A system and method for detecting click fraud where the movement of a cursor on a web page is tracked prior to an advertisement on the web page being clicked by a controller of the cursor. The tracking is performed by client code on a client device displaying the web page. A path taken by the movement of the cursor is mapped to at least one vector associated with the path by the client code. The at least one vector is useable to detect a click fraud. | 01-22-2009 |
20090024461 | CURSOR PATH VECTOR ANALYSIS FOR DETECTING CLICK FRAUD - A system and method for detecting click fraud where data related to at least one vector associated with a path taken by movement of a cursor on a web page prior to an advertisement on the web page being clicked by a controller of the cursor is received. Click fraud is detected based on an analysis of the received data. A pattern in the at least one vector is analyzed to determine if the cursor movement is human-like and a click fraud detected if the cursor movement is not human-like. In another embodiment, the at least one vector associated with the path is stored and compared with previously stored vectors associated with the path and a click fraud detected if the stored at least one vector is analogous to at least one of the previously stored vectors associated with the path. | 01-22-2009 |
20090024971 | CURSOR PATH VECTOR ANALYSIS FOR DETECTING CLICK FRAUD - A system and method for detecting click fraud where data is received corresponding to a tracking of movement of a cursor on a web page. The movement of the cursor is associated with at least one vector. The at least one vector represents at least a portion of the cursor movement. A confidence level useable in the determination of click fraud is determined. The confidence level is responsive to analysis of the at least one vector representing at least a portion of the cursor movement. | 01-22-2009 |
20090049135 | SYSTEM AND METHOD FOR MANAGING AN INSTANT MESSAGING COMMUNITY - A system and method exploits organizational distances associated with an organizational hierarchy in a directed acyclic graph to both affect behavior in instant messaging systems, as well as to modify behavior (presence, IM, availability, who can get to the IM user) based on the reporting relationships that exist in an organization. One part of the invention is in exploiting a directed acyclic graph for the purposes of controlling instant messaging behavior for an individual, a team or a community. This is accommodated by abstracting organizational reporting relationships. The reporting relationships that exist in LDAP are used to enforce top-down rules which determine actions that motivate a change in behavior for instant messaging users across the organization. Such actions are not possible to motivate in conventional art. Conventional art relies on rules that a specific user manually builds, and do not consider capabilities around hierarchical imposition, not a reporting team/group/organizational. The present invention may force a change in behavior for a plurality of instant messaging users based on reporting relationships. | 02-19-2009 |
20090099880 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - A user interface to establish dynamic prioritization of business process instances enables a user to select a business process for association with dynamic prioritization, define at least two different priority levels that correspond to the business process and to define a priority relevant context associated with the business process, where the priority relevant context is evaluated to select an execution priority level from at least two different priority levels for association with a specific instance of the business process. The user interface further enables a user to define at least one directive that is evaluated in consideration of the priority relevant context in order to select the execution priority level and is coupled to data storage to store the priority levels and the priority relevant context. | 04-16-2009 |
20090100052 | ENABLING COLLABORATIVE NETWORKS - A system and method for providing collaborative resources to a user. A search expression is received from a user. One more keywords are determined from the search expression. One or more resources are determined responsive to the keywords and based on information related to the user, and the at least one resource is provided to the user. The one or more resources may be determined responsive to and prioritized to at least one of, for example, information in email of the user, an organization of the user, a search history of the user, an organizational position of the user, a level of experience of the user, a geographical location of the user, a geographical location of the resource, a language preference of the user, or a keyword match confidence. The resource may include at least one person and presence information associated with the at least one person. | 04-16-2009 |
20090100183 | Detection of Missing Recipients in Electronic Messages - A computer-implemented method of identifying a missing recipient of an electronic message can include identifying at least one user specified as a recipient of an electronic message and accessing a data store comprising measures of correlation between a plurality of users, wherein the plurality of users comprises the recipient of the electronic message. One or more users not designated as a recipient of the electronic message and having a measure of correlation, with at least one recipient of the electronic message, that exceeds a predetermined threshold can be identified as a potential missing recipient of the electronic message. An indication that a recipient may have been excluded from the electronic message can be output. | 04-16-2009 |
20090100431 | DYNAMIC BUSINESS PROCESS PRIORITIZATION BASED ON CONTEXT - Instantiated business processes are dynamically prioritized to an execution priority level based upon a priority relevant context associated with the business process. The business process instance is further executed based upon the execution priority level. The execution priority level for the business process instance may be determined using at least one of a table lookup, a rule or an algorithm to determine the execution priority level. Moreover, the execution priority level may be set based upon available priority levels in a priority band. Still further, detected changes in the priority relevant context may trigger changing the execution priority level based upon the change in the priority relevant context. Resources allocated to implement the business process instance may also be dynamically adjusted based upon changes to the execution priority level of an associated business process instance. | 04-16-2009 |
20090106247 | METHOD AND SYSTEM FOR ALLOWING MULTIPLE USERS TO ACCESS AND UNLOCK SHARED ELECTRONIC DOCUMENTS IN A COMPUTER SYSTEM - A system for allowing multiple users to access and unlock shared electronic documents in a computer system. A group of users are defined as potential “lock-breaker” users for a document, such that they are automatically contacted in the event that a user wishes to unlock the document after it has been locked by another user. The lock-breaker users defined for a document are given access rights to the document that allow them to break a current lock on the document, so that it can be opened for editing, and accordingly re-locked. The lock-breaker users for a document may be organized in a hierarchy, such as a hierarchy matching the relationships of employees of an organization. The lock-breaker hierarchy may define the order in which the lock-breaker users are automatically contacted when a user wishes to access a locked document (e.g. an LDAP directory tree or social network). | 04-23-2009 |
20090106370 | Processing Electronic Messages According to Sender Classification - A computer-implemented method of sorting electronic messages can include identifying at least one recipient of an electronic message and retrieving a classification scheme of the recipient. An identifier can be included within the electronic message. The identifier can specify a tag selected from the classification scheme of the recipient. The electronic message, including the identifier specifying the selected tag, can be sent. | 04-23-2009 |
20090112725 | ERRATA NOTIFICATION FOR PRINTED MATERIAL - Embodiments of the present invention address deficiencies of the art in respect to errata sheet management for published documents and provide a novel and non-obvious method, system and computer program product for errata sheet notification aggregation. In one embodiment of the invention, a method for errata sheet handling in an e-commerce system can be provided. The method can include registering a customer for errata sheet notification for a publication externally to a publisher of the publication and also externally to a publisher of errata sheets for the publication. The method further can include providing a notification to the customer of the publication of the errata sheet in response to determining the publication of an errata sheet for the publication by the publisher of errata sheets for the publication. | 04-30-2009 |
20090116630 | INHIBITION OF TELEPHONY BASED PHISHING - Embodiments of the present invention address deficiencies of the art in respect to telephonic phishing and provide a method, system and computer program product for preventing telephonic phishing. In an embodiment of the invention, a method for preventing telephonic phishing can be provided. The method can include receiving in a third-party validation service a request by an enterprise caller to establish a telephone call with a customer, validating the enterprise caller in the third-party validation service, and notifying the customer of whether or not the enterprise caller is legitimate or illegitimate. | 05-07-2009 |
20090132329 | Meeting Scheduling to Minimize Inconvenience of Meeting Participants - A computer-implemented method of automatically scheduling meetings can include determining that no timeslot is available for scheduling a proposed meeting involving a plurality of participants and selecting a plurality of candidate times for the proposed meeting. An inconvenience metric for each participant of the proposed meeting can be calculated. A schedule misfit metric for each of the plurality of candidate times can be calculated, at least in part, according to the inconvenience metric for each participant. A time for the proposed meeting can be selected from the candidate times according to the schedule misfit metric. The proposed meeting can be scheduled for the selected time. | 05-21-2009 |
20090132661 | Forwarding Un-responded to Instant Messages to Electronic Mail - A method of forwarding an instant message to electronic mail can begin with determining availability of an instant messaging client for a recipient. The method can continue with sending the instant message to the instant messaging client for the recipient. The method can include not receiving a reply to the instant message within a pre-defined period of time. The method can further include sending an electronic mail message including the instant message to the recipient upon reaching the pre-defined period of time. | 05-21-2009 |
20090144254 | AGGREGATE SCORING OF TAGGED CONTENT ACROSS SOCIAL BOOKMARKING SYSTEMS - Embodiments of the present invention address deficiencies of the art in respect to social bookmarking and provide a method, system and computer program product for aggregating scoring of tagged content across social bookmarking systems. In an embodiment of the invention, a method for aggregating scoring of tagged content across social bookmarking systems can be provided. The method can include combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score and applying the single aggregate tag score to the tag in the content. In this regard, combining tag scores for a tag in content across multiple different social bookmarking systems into a single aggregate tag score can include computing either a simple or a weighted average of the tag scores for the tag to produce the single aggregate score. | 06-04-2009 |
20090168609 | METHOD AND SYSTEM FOR AUTOMATIC TIME-ZONE SENSITIVE SCHEDULING - A system that enables a user to indicate time zones in their electronic calendar for corresponding time periods in the future, and that makes the future time zone information it collects available for scheduling purposes, so that free time can be correctly determined even for frequently traveling users. The disclosed system further automatically provides indications to the user when input future free time information creates local times for previously scheduled calendar events that are outside of the user's regular working hours. | 07-02-2009 |
20090192970 | CONTENT AND CONTEXT BASED HANDLING OF INSTANT MESSAGES - Instant message systems are enhanced by establishing at least one handling rule that is evaluated in an instant messaging environment, each established handling rule defining a condition based upon at least one of identified content or identified context, and a corresponding event handling action to be performed within the instant message environment. Upon identifying an instant message conversation within the instant message environment between a user and a correspondent, each handling rule is evaluated and the event handling action of an associated handling rule is performed if it is determined that the condition of handling rule is satisfied. Further, an indication that the corresponding event action was performed is conveyed to a corresponding user. | 07-30-2009 |
20090214016 | HIERARCHAL CONTROL OF TELECONFERENCES - A teleconference between at least two participants is evaluated by monitoring the teleconference and detecting a triggering event if more than one participant desires to speak at the same time. Upon detecting a triggering event, e.g., detecting an attempt of one or more participants to interrupt another participant, or detecting a request initiated by one or more participants to interrupt another participant, a dominant source is selected from among the ones of the participants attempting/requesting to speak based at least in part upon a determined hierarchal order of those participants attempting/requesting to speak. A participant is then selected from the participants to have the role of the dominant participant based upon the selected dominant source and only the speech of the dominant participant is conveyed to each participant through the teleconference system. | 08-27-2009 |
20090254817 | Enhanced spell checking utilizing a social network - A computer-implemented method of enhancing spell check. The method can include receiving from each of a plurality of clients at least one custom term and at least one class identifier that is associated with the custom term. The custom terms and the associated class identifiers can be processed to provide an electronic dictionary that includes a plurality of shared terms. Each of the shared terms can be associated with at least one of the class identifiers to which the shared term corresponds. Each of the custom terms can correspond to at least one of the shared terms. At least one of the shared terms can be output to at least one of the plurality of clients. | 10-08-2009 |
20090323916 | NOTIFICATION TO ABSENT TELECONFERENCE INVITEES - A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and attendance of the teleconference meeting, determining from the indication whether to issue a notification to an absent invitee of the teleconference meeting, and selectively issuing the notification to the absent invitee. | 12-31-2009 |
20100057856 | MANAGING URGENCY INDICATORS IN ELECTRONIC MESSAGING - A rating is applied in connection with a sender of an electronic message and a use of an urgency indicator for the electronic message. A different electronic message is received from the sender, and an urgency indicator established for the different electronic message is modified responsive to the applied rating. | 03-04-2010 |
20100088012 | OPTIMIZATION OF TRAVEL ROUTING - Travel routes for a vehicle from a first location of the vehicle to a second location are generated. Different alternative travel routes are calculated from a first location to a second location selected by a user for a specific vehicle in a navigation system. For each of the different alternative travel routes, both estimated emissions of the specific vehicle and also estimated fuel consumption of the specific vehicle when following each of the different alternative travel routes are computed. Subsequently, each of the different alternative travel routes are presented to a user in the navigation system in connection with corresponding estimated emissions and fuel consumption for each of the different alternative travel routes. | 04-08-2010 |
20100094837 | RELATIONSHIP MANAGEMENT FOR CONTACT STALENESS - A contact management data processing system can be provided. The system can include a contact manager coupled to a list of contacts and stored staleness criteria stored in connection with the list of contacts. The system also can include stale contact management logic. The logic can include program code enabled to apply the stored staleness criteria to a selected contact to identify a stale contact, and to manage the stale contact in the list of contacts. In aspects of the embodiment, the list of contacts can be stored in a personal computer, in a server remotely disposed from the contact manager, in a telephone such as a cellular telephone or voice over Internet protocol (VoIP) telephone, or in a personal digital assistant to name but a few. | 04-15-2010 |
20100169426 | EXPERTISE REFERRALS USING A REAL-TIME COMMUNICATION SYSTEM - A computer-implemented method of providing expertise based referrals can include receiving, from a first user, a voucher specifying a second user seeking expertise and a third user as a potential subject matter expert. Responsive to execution of the voucher, an instant messaging session between the second user and the third user can be established and an input from the second user indicating whether a posed question from the second user is resolved can be received. When the posed question is resolved, a role of maven can be assigned to the first user and a role of subject matter expert can be assigned to the third user. A transcript of the instant messaging session between the second user and the third user, a reference to the first user with the assigned role, and a reference to the third user with the assigned role can be stored as part of a referral transaction. | 07-01-2010 |
20100192060 | AUTOMATIC GENERATION OF ASSENT INDICATION IN A DOCUMENT APPROVAL FUNCTION FOR COLLABORATIVE DOCUMENT EDITING - A method for generating an assent indication in a document approval and review function can include loading a document for editing in a document editor and determining a set of authors for the document. The method also can include modifying a title of the document to include an identity of at least one of the authors in the set. Finally, the method can include changing a visual appearance in the title of an identity of the assenting author responsive to one of the authors in the set assenting to a publication of the document. | 07-29-2010 |
20100332278 | PROJECT MANAGEMENT VIA COLLABORATIVE CALENDARING - An apparatus and method for collaborative calendaring of event management that includes receiving data of a desired calendar event, receiving data of a desired objective related to the desired calendar event, and providing an indication of at least one other calendar event responsive to receiving the indication of the desired objective. The indication of the at least one other calendar event may be provided based on a template associated with the desired objective. The template may define best practices events related to the objective. | 12-30-2010 |
20110093538 | COLLABORATIVE CALENDAR AND WORKFLOW MANAGEMENT - Collaborative calendar and workflow management that includes receiving, by a processing device, a workflow of a user comprising workflow tasks, accessing a calendar of the user by the processing device, and inserting, by the processing device, calendar entries of the user and the workflow tasks together in the calendar of the user. | 04-21-2011 |
20120170734 | NOTIFICATION TO ABSENT TELECONFERENCE INVITEES - A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and a further indication of current attendance at the teleconference;
| 07-05-2012 |
20120203783 | PROCESSING ELECTRONIC MESSAGES ACCORDING TO SENDER CLASSIFICATION - A computer-implemented method of sorting electronic messages can include identifying at least one recipient of an electronic message and retrieving a classification scheme of the recipient. An identifier can be included within the electronic message. The identifier can specify a tag selected from the classification scheme of the recipient. The electronic message, including the identifier specifying the selected tag, can be sent. | 08-09-2012 |
20120250846 | HIERARCHAL CONTROL OF TELECONFERENCES - A teleconference between at least two participants is evaluated by monitoring the teleconference and detecting a triggering event if more than one participant desires to speak at the same time. Upon detecting a triggering event, e.g., detecting an attempt of one or more participants to interrupt another participant, or detecting a request initiated by one or more participants to interrupt another participant, a dominant source is selected from among the ones of the participants attempting/requesting to speak based at least in part upon a determined hierarchal order of those participants attempting/requesting to speak. A participant is then selected from the participants to have the role of the dominant participant based upon the selected dominant source and only the speech of the dominant participant is conveyed to each participant through the teleconference system. | 10-04-2012 |
20130007893 | PREVENTING ON-LINE VIOLATIONS OF LEGAL REGULATIONS ON USERS OF A COMMUNICATION SYSTEM - A system for preventing on-line violations of open meeting regulations and similar laws, in which one or more special classes of users are defined for an electronic communication system. The definition of each special class may include quorum requirements, including the number of group members that make up a quorum for that special class. Users identified as members of special classes may be reminded of the restrictions on communications using the communication system arising from that special class membership. When a user composes a message for posting or sending through the communication system, the user's identity is checked to determine whether they are a member of a restricted special class. If the user is a member of a special class, a determination is made as to whether posting or sending the message would violate any legal restrictions associated with that special class. | 01-03-2013 |
20130011068 | Policy-Based Image Management - The different illustrative embodiments provide a method, computer program product, and apparatus for managing an image. A determination is made whether an object is present in a subset of a plurality of images using an identification of the object. A determination is made whether the object is permitted to be present in the subset of the plurality of images using the policy for the user associated with the object responsive to a determination that the object is present in the subset of the plurality of images using a policy for a user associated with the object. A removal action of the object is performed on the subset of the plurality of images responsive to an absence of a determination that the object is permitted to be present in the subset of the plurality of images using the policy. | 01-10-2013 |
20140304254 | Identifying One or More Relevant Social Networks for One or More Collaboration Artifacts - Methods, products, apparatus, and systems may provide for identifying a set of users associated with one or more collaboration artifacts. Additionally, a set of networks including a plurality of candidate social networks may be identified. Moreover, a relationship strength may be determined between the set of users associated with the one or more collaborations artifacts and each of the candidate social networks to identify one or more relevant social networks from the candidate social networks. Determining the relationship strength may include calculating a similarity metric. In addition, at least one member affiliated with the one or more relevant social networks may become aware of the collaboration artifact. | 10-09-2014 |
20150052153 | Identifying One or More Relevant Social Networks for One or More Collaboration Artifacts - Methods, products, apparatus, and systems may provide for identifying a set of users associated with one or more collaboration artifacts. Additionally, a set of networks including a plurality of candidate social networks may be identified. Moreover, a relationship strength may be determined between the set of users associated with the one or more collaborations artifacts and each of the candidate social networks to identify one or more relevant social networks from the candidate social networks. Determining the relationship strength may include calculating a similarity metric. In addition, at least one member affiliated with the one or more relevant social networks may become aware of the collaboration artifact. | 02-19-2015 |