US20010044795A1 - Method and system for summarizing topics of documents browsed by a user - Google Patents

Method and system for summarizing topics of documents browsed by a user Download PDF

Info

Publication number
US20010044795A1
US20010044795A1 US09/191,587 US19158798A US2001044795A1 US 20010044795 A1 US20010044795 A1 US 20010044795A1 US 19158798 A US19158798 A US 19158798A US 2001044795 A1 US2001044795 A1 US 2001044795A1
Authority
US
United States
Prior art keywords
documents
document
user
accessed
dividing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/191,587
Other versions
US6356898B2 (en
Inventor
Andrew L. Cohen
Paul P. Maglio
Robert C. Barrett
Mark A. Sheldon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US09/191,587 priority Critical patent/US6356898B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COHEN, ANDREW L., SHELDON, MARK A., BARRETT, ROBERT C., MAGLIO, PAUL P.
Priority to IL14310799A priority patent/IL143107A0/en
Priority to CA002352174A priority patent/CA2352174A1/en
Priority to AU19143/00A priority patent/AU1914300A/en
Priority to EP99962773A priority patent/EP1224578A4/en
Priority to PCT/US1999/026992 priority patent/WO2000029985A1/en
Publication of US20010044795A1 publication Critical patent/US20010044795A1/en
Publication of US6356898B2 publication Critical patent/US6356898B2/en
Application granted granted Critical
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/335Filtering based on additional data, e.g. user or group profiles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99932Access augmentation or optimizing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99935Query augmenting and refining, e.g. inexact access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99936Pattern matching access

Definitions

  • the invention disclosed herein relates to cooperative computing environments and information retrieval and management methods and systems. More particularly, the present invention relates to methods and systems for capturing and generating useful information about a user's access and use of data on a computer system, such as in the form of documents stored on remote servers, and making such useful information available to others.
  • Computer systems such as organizational networks, database systems and the Internet, provide a wealth of information to users.
  • users must know how to find the information they want. Indeed, searching for specific information on a desired subject of interest is often a difficult and tedious process that is usually aided by the user's existing knowledge of or expertise in the subject. This is particularly true in the relatively unstructured environment of the Internet.
  • a user might begin a search for desired information by entering a keyword query through a search engine, and then follow hyperlinks contained in the web documents to move from one document to another until the desired information is found.
  • keyword searches are typically unreliable and do not immediately produce directly relevant results, users are often required to browse through a number of documents until some directly relevant information is found. Expertise in a subject usually helps users formulate better keyword searches and recognize the relevance of the various results found.
  • the user frequently restarts the search process by jumping to a new, unrelated resource such as the original or another search engine, an index file, or a known document which may have helped the user in the past in related searches.
  • This jump is usually performed by manual entry of the address of the new resource, such as the uniform resource locator (URL) in the case of the web.
  • the user can jump to the new resource by selecting the bookmark.
  • the user may get distracted during the search process by a hyperlink to another document which is completely unrelated to the search, or the user may select an active advertisement to pursue other information before returning to the thread of the search.
  • a method for producing a summary of topics for a set of documents accessed by a user on a computer system is accessible through a plurality of different methods, such as by specifying an identifier or locator for the document, activating a hyperlink in another document which points to the document, or navigating to the document through navigational commands in an application program such as a browser.
  • the method involves capturing information regarding each of the accessed documents in the set, the information including the method used to access the document, dividing the set of documents into subsets of documents based at least in part on the methods used to access the documents, and labeling each subset of documents with a topic.
  • the method of one embodiment involves four basic steps: logging, applying heuristic rules for probable break points, content-based clustering, and topic labeling.
  • One approach to capturing usage trails is to create operating system-dependent programs that spy on low-level system events, such as DDE or system hooks on the Windows platform. It is possible to use this method to augment a web browser, a Lotus Notes client, or other database front end to augment standard logging data such as recording every page a user visits, how long the user visited a page, how long the viewer window was exposed to include the use logs of user actions on the browser such as how the user arrived at a page, whether by typing in a URL, following a link, selecting a bookmark, or hitting the BACK, or Forward, selecting a link from a document outside the current application and other obvious user actions. These actions are used as an adjunct to content analysis tools such as automatic clustering or on-line topic detection software to identify distinct topic areas.
  • content analysis tools such as automatic clustering or on-line topic detection software to identify distinct topic areas.
  • Some sample heuristics may be used for partitioning a set of web pages. For example, a user entering a web page by typing in it's URL or selecting a page from a bookmark list often denotes a change of topic is usually initiating a new topic. Three possibilities are as follows:
  • FIG. 1 is a diagram of a system for capturing and conveying expertise in document usage in accordance with one embodiment of the present invention
  • FIG. 2 is flow chart showing a process of capturing and conveying expertise in document usage using the system of FIG. 1 in accordance with one embodiment of the present invention
  • FIG. 3 is a flow chart showing a process of capturing and parsing an expert's use of documents on the world wide web in accordance with one embodiment of the present invention
  • FIG. 4 is a flow chart showing a process of allowing users to search and access an expert's document sequences by specifying a topic and/or expert in accordance with one embodiment of the present invention
  • FIG. 5 is a flow chart showing a process of parsing a document usage trail in accordance with one embodiment of the present invention
  • FIG. 6 is a flow chart showing the parsing process of FIG. 5 applying a first set of heuristics in accordance with one embodiment of the present invention.
  • FIGS. 7 A- 7 B contain a flow chart showing the parsing process of FIG. 5 applying a second set of heuristics in accordance with one embodiment of the present invention.
  • one embodiment of the system 10 of the present invention includes a plurality of computer workstations 12 connected to a network 14 , such as the Internet or other internet or intranet, and a monitoring server 16 connectable to the workstations 12 directly or over the Internet 14 .
  • the workstations 12 have a client application program 18 executing thereon which is capable of accessing, retrieving and using documents available from servers on the Internet 14 , from the monitoring server 16 , or from other workstations 12 .
  • the client application 18 is a web browser program such as NETSCAPE NAVIGATOR or INTERNET EXPLORER which communicates with the servers on the web via HTTP.
  • the client application 18 may be a LOTUS NOTES client application which communicates and exchanges data with LOTUS NOTES databases operating on the servers.
  • client application 18 may be a LOTUS NOTES client application which communicates and exchanges data with LOTUS NOTES databases operating on the servers.
  • the workstations 12 also have a logger program 20 operating thereon which logs the documents accessed and used by the client application 18 and stores this logged or captured information in a log file.
  • the logger program 20 may be built into the client application 18 , or may be a plug-in program or operating system-dependent program that spies on low level system events, such as a DDE, as known to those of skill in the art.
  • the logger program 20 is a programmable intermediary which is programmed to monitor the use of the client application.
  • An example of such an intermediary is web browser intelligence or WBI client as described in Barrett, R., Maglio, P. P., & Kellem, D. C. How to Personalize the Web , Proceedings of Human Factors in Computing Systems, CHI '97. (1997), New York: ACM Press, and Barrett, R. & Maglio, P. P., Intermediaries: New places for producing and manipulating web content , Proceedings of Seventh International World Wide Web Conference.
  • the logger program 20 monitors the usage of documents retrieved by the client application 18 and stores document identifiers which identify the documents used.
  • the document identifiers are the URLs for the document or pseudonyms thereof.
  • the document identifiers are LOTUS NOTES Universal Identifiers (UIDs) which name any document in any database by encoding an identifier for the NOTES database, including possible replica information, and an identifier for the document within the database.
  • UIDs LOTUS NOTES Universal Identifiers
  • a usage trail of all the documents accessed or used by the user during a browsing session is thus created and stored in the log file.
  • additional information is captured by the logger, including the method used to access the particular document and actions taken by the user in the document, e.g., search terms input by the user into a search engine.
  • the additional information comprises client action information, which identifies the method used to access particular documents and actions taken in LOTUS NOTES.
  • client action information identifies the method used to access particular documents and actions taken in LOTUS NOTES.
  • Notes supports hyperlinks in the form of document links and database links which take the user to a particular database without picking a document. Users can change windows in Notes, open databases manually, which is the equivalent of typing in a URL, pick an icon, or bookmark, on the desktop, and perform other operations or actions. These actions are captured as additional information.
  • the usage trail is ended. Additional usage trails may be established in the log file if the user initiates another browsing session. Because trails are meant ultimately to be shared, they are stored in a central location to which all users or clients have access. Thus, at certain points, the log file is transmitted from the workstation 12 to the monitoring server.
  • the monitoring server 16 contains conventional computer hardware elements including a processor 22 and memory devices 24 including a RAM, ROM, hard disk, and other magnetic or optical disk drives.
  • the monitoring server 16 further contains a number of program modules for analyzing the user's log. These program modules include a pre-processor 26 , a parser 28 , and a labeler 30 .
  • the pre-processor 26 prepares a usage trail for parsing, and the parser 28 breaks the trail into content areas in accordance with processes described herein.
  • the labeler 30 assigns labels or topics to the content areas, which topics are then arranged in a table of contents 32 which associates the various topics with the users from whose usage trails they were derived.
  • the list of documents associated with each topic is stored in the table of contents 32 or a separate relational table 34 , so that they can be retrieved for presentation to other users as described herein.
  • this central repository is implemented as a WBI server connected to a simple database or file system.
  • the client-side WBI monitors URLs viewed by a specific individual and sends that information via a simple HTTP request to a central WBI server which maintains a database of all users and their trails.
  • WBI provides a convenient and platform-independent means for maintaining these data, but many other schemes are possible as will be recognized by those of skill in the art, such as a DB 2 or LOTUS NOTES database, though these would require different client-server protocols.
  • one process for sharing expertise using the system of FIG. 1 begins when an expert user is browsing through documents, step 50 .
  • the documents accessed by the expert are monitored and stored, step 52 , to create a usage trail.
  • the usage trail is analyzed to automatically determine one or more content areas of the documents, step 54 , and the usage trails and content areas are stored, step 56 .
  • the process of determining the content areas effectively cuts the usage trail into content areas and associates the trails with people with expertise in that content area.
  • Experts are persons with peer acknowledged familiarity with a particular content area or as defined by one of the many computer systems designed to track expertise in organizations.
  • a variety of methods are possible for cutting or breaking the usage trail, including ones that take account of content or semantics of the documents on the trails, topology or connectivity of documents on the trails, or both, as described in the above reference 1998 article by Maglio & Barrett.
  • a alternative method for meaningfully breaking trails into content areas based on local connections of trail elements is described in Maglio, P. P. & Barrett, R, How to Build Modeling Agents to Support Web Searchers, Proceedings of the Sixth International Conference on User Modeling, New York, 1997, which is hereby incorporated by reference into this application.
  • Alternative processes for determining the content areas are described below with reference to FIGS. 5 - 7 .
  • the portions of the usage areas are labeled with topics, step 58 .
  • labeling is performed by selecting the most frequent word or phrase to appear in the portion of the usage trail.
  • Other embodiments of labeling are used with reference to clustering technology, as described below and otherwise known to those of skill in the art.
  • a subsequent user may access the labels in alternative ways.
  • the user may simply request a list of all available labels or topics displayed, step 60 , in response to which the list is retrieved from and displayed and the user allowed to select one of the labels, step 62 .
  • the user may place a query request for a subject matter of interest to the user, step 64 , and the query is executed on the available labels in an attempt to find a reasonably close match, step 66 . Labels which are possible matches to the query are displayed and the user may make a selection therefrom, step 62 .
  • the portion or subsequence of the usage trail associated with the label is retrieved and the documents in the subsequence provided to the user, step 68 , possibly in the same order in which the documents were accessed by the expert in the original browsing session as recorded in the usage trail.
  • step 80 the WBI client checks when a new web page has been accessed, step 82 .
  • a new web page includes any change in web page, even to a web page the expert has previously accessed.
  • the client WBI agent adds the URL of the web page and the method used by the expert to access the web page into the sage trial stored in the log file, step 84 .
  • only new web pages not previously accessed can be added to the usage trail.
  • the method of access used by the expert is stored in the log file for use in parsing the usage trail.
  • the various methods of accessing web documents are well known, and include those set forth above such as input of a URL, selection of a bookmark, activation of a hyperlink from another document or another application, and browser navigation.
  • the client side WBI agent also sends the document to the monitoring server, step 86 , for analysis of its content during parsing.
  • the client side WBI agent can send the URL of each document to the monitoring server, which server then retrieves the document directly from its original server.
  • step 88 When the expert is done browsing, step 88 , as determined by, e.g., termination of the browser program, or otherwise at scheduled times or events, the log file generated by the client side WBI agent and representing the captured information of expert activity is transmitted to the server side WBI, step 90 .
  • the captured information is sent to the server as each new web page is accessed.
  • the server side WBI agent parses the usage trail into subtrails or subsequences based on the captured information, step 92 , which may include a combination of document content and user actions in accessing the document.
  • the server WBI agent also generates content areas for each the subsequences, step 94 , based upon the contents of the documents. Labels are generated for each content area, step 96 .
  • step 98 the labels generated for the user's content areas are stored in a database on the server. If the expert belongs to a group such as a department within an organization, step 98 , the group data is associated with the expert, step 102 , and the expert, group and label data is stored in the database, step 100 .
  • the server may contain a table of groups and users for use in making this determination, of the expert's log file may contain data identifying which groups, if any, to which the expert belongs.
  • a subsequent user has several options for finding document content areas for topics of interest. If the user knows the identity of an expert, the user can specify the expert, step 110 , and the table of topics is queried for As explained above with reference to FIG. 2, the user can display the list of all topics for that expert and make a selection therefrom, step 114 , or may input a query for topics and be presented a list of matching topics. If the user knows the group but not a particular expert, the user can specify the group, step 116 , and the table of contents is queried for labels associated with the experts in that group, step 118 . If the user does not know of any particular expert or group in the subject matter of interest to the user, the user can display the list of topics or perform a query, step 120 , as described above.
  • the user chooses a label or topic which represents a trail of documents in the associated content area, step 122 .
  • the server side WBI accesses the topic database to locate the trail of documents associated with the selected label, step 124 .
  • the server side WBI queries the database to determine whether other experts accessed documents in the located trail and other trails taken by such experts from the document, step 126 .
  • the server transmits the list of other experts, associated documents, and alternative trails to the client for sequential display.
  • the server provides the list of URLs and other information to the client side WBI agent, which retrieves each of the documents in the trail in sequence, step 128 .
  • the monitoring server retrieves the documents from the original server and transmit them to the client in sequence.
  • the user is allowed to interact with each document provided, step 130 , and to issue commands whether to proceed with the other documents in the trail or pursue another trail followed by one of the other identified experts.
  • the following exemplary series of scenarios assist in the understanding of the operation of the user selection options described herein.
  • the exemplary situation is a financial consulting scenario.
  • Sara is a tax expert at a major financial consulting firm. She works in one of fifteen groups each consisting of ten tax consultants. Each group has a geographic specialty and each individual within each group has expertise in a particular area of tax law. Sara has a client who is a resident of Sweden, but who is a U.S. citizen. In addition, this client's family (husband and children) continues to live in San Francisco where they own residential and income property. Thus, she has to file personal income tax forms in both countries. However, Sara has joined the San Francisco group recently and she has not yet gained expertise in Swedish Tax law. She needs to leverage the expertise of her counterparts in the group who are specialists in Swedish and international tax law.
  • Scenario 1 When the User Knows the Identity of the Expert. Sara wants to know how to account for US rental property income on the Swedish income tax forms and remembers meeting Sven Jorgensen at a company meeting. She would like to capitalize on his expertise in this area. Sara performs the following steps:
  • Sara begins to browse through his paths by typing in tentative query terms, such as “U.S. rental income”. As she types in the query, relevant browse paths created by Sven appear on the screen.
  • Scenario 2 When the User Knows the Group. Sara wants to know how to account for U.S. rental property income on the Swedish income tax forms and vaguely remembers meeting a group of experts in US-Swedish tax law at a company meeting. Unfortunately, she does not remember any of their names. Sara needs to discover the experts in the area. She types in her query, which is performed on an indexed set of documents contained in the experts browse paths. What is returned is a set of experts and a sub-set of each expert's browse paths that match the query. She requests the list of content area experts.
  • Scenario 3 When the User Needs to Identify an Expert. Sara wants to know how to account for U.S. rental property income on Swedish income tax forms. Unfortunately, she has no idea who in her company might know relevant information in this area.
  • Sara In the first two of the scenarios described above, Sara either knows an expert or a group of experts who can likely answer her questions. In these cases, she is able to leverage her tacit knowledge about people and their differential expertise in her organization. She can review traces of the documents people have read with a reasonable expectation of finding more useful documents than if she had browsed or searched alone. In the third scenario, Sara has no idea who in the organization might have the expertise to help her. In this case, the system of the present invention relies on explicit representations of expertise in the form of updated profiles and taxonomies of people and their respective expertise.
  • parsing of the usage trail may be accomplished in a number of known ways, depending upon the results desired. Other methodologies which provide improved results over known methods are now described with reference to FIGS. 5 - 7 B. These parsing methodologies are applicable to the expertise sharing methodology described above. They are also generally applicable to parsing of a user's browsing history for the user's own use, for example, to create an index or table of contents of the user's own browsing activities so the user can retrace his steps. Thus, the parsing methodologies described below may be implemented in stand-alone programs residing and executing on the user's own computer rather than on a remotely located server.
  • the basic parsing method starts when the user browses through documents, step 150 , and a usage trail is logged by capturing the document identifiers such as URLs as well as user actions made in connection with the documents, step 152 .
  • These user actions include the method employed to access the document as explained above, and may include other actions such as text input by the user while interacting with the document.
  • the actions logged are used to help determine likely or definitive break points in the usage trail, step 154 .
  • Different heuristics may be applied to partition the usage trail based on the user actions, and examples are described below with reference to FIGS. 6 and 7A- 7 B.
  • Standard document clustering techniques are employed to determine content areas within the usage trail, step 156 .
  • the clustering techniques may be any clustering algorithm including conventional ones such as the k-means clustering algorithm described in L. Bottou and Y. Bengio, Convergence Properties of the K - Means Algorithm, in Advances in Neural Information Processing Systems 7, pages 585-592 (MIT Press 1995), which is hereby incorporated by reference into this application.
  • additional document clustering algorithms are described in the following two documents, which are hereby incorporated by reference into this application: Douglas R. Cutting, David R. Karger, Jan O. Pedersen, John W. Tukey, Scatter/Gather: A Cluster - based Approach to Browsing Large Document Collections. In Proceedings of the 15th Annual International ACM SIGIR Conference. Association for Computing Machinery. New York. June, 1992. Pages 318-329. Gerard Salton. Introduction to Modern Information Retrieval, (McGraw-Hill, New York 1983).
  • step 158 the content areas are labeled using standard labeling techniques.
  • the labeling of document clusters is known to those of skill in the art, and is described for example in pages 314-323 of Peter G. Anick and Shivakumar Vaithyanathan, Exploiting Clustering and Phrases for Context - based Information Retrieval, in Proceedings of the 20th International ACM SIGIR Conference, Association for Computing Machinery, July 1997, which document is hereby incorporated by reference into this application.
  • FIG. 6 shows one embodiment of the parsing using the first heuristic.
  • certain user actions are deemed to end a prior document sequence or trail and begin a new one. These actions may vary, but in the particular embodiment in FIG. 6 they include inputting a URL, selecting a bookmark or choosing a URL from an external application. In theory, these action likely represent the user's intention to start a new thread or search, since the user is jumping to a seemingly unrelated document. Entering a new search term into a search engine for a new web-wide search may similarly be considered the start of a new trail. Conversely, other actions such as selecting hyperlinks or navigating using browser commands are deemed to likely represent a continuation of the ongoing thread of interest or search for information.
  • the parsing program employing this method loops through the usage trail to consider each document, step 170 , and reads the method of user access to each document as stored in the log, step 172 .
  • the parsing program tests if the document was accessed by direct input of a URL, step 174 , selection of a bookmark, step 176 , or activation of a link in an external application, step 178 , and, if any of those apply, a new document sequence is established, step 180 . Otherwise, the current document is added to the current open subsequence, step 182 .
  • step 184 If there are more documents in the usage trail, step 184 , the process continues, until all documents have been considered and the usage trail is divided into a set of subsequences.
  • the program then performs clustering on each subsequence to generate clusters of related documents, step 186 .
  • the clusters are labeled, step 188 , and the labels and associated documents are stored for later reference, step 190 .
  • the methodology shown in FIG. 6 provides for a clean, relatively simple and quick way to divide up a usage trail for clustering. However, it may also fail to include documents together in a cluster which are otherwise quite closely related in substance because of the circumstances in which they are accessed, e.g., because the second one happened to have been accessed by one type of user action rather than another. This possibility is accounted for in the alternative methodology shown in FIGS. 7 A- 7 B by giving some weight to user actions in clustering, rather than simply dividing the trail at certain user actions.
  • the parsing program employing this second method loops through the usage trail to consider each document, step 200 , and reads the method of user access to each document as stored in the log, step 202 . If the URL for the document is one of the user's bookmarks, the bookmark name is set as a token for clustering, step 206 . Otherwise, a token is created representing the method of access, step 208 . Creating the token comprises comparing the access method to a table of access methods which are set to suggest a topical break.
  • a new token is created which would not pass through the document parser, for example SuggestedClusterN, where N is the number of the current cluster.
  • the token in this case SuggestedClusterN, is added to the cluster.
  • the weight of the token is tuned to affect clustering as one skilled in the art would recognized.
  • the document itself is parsed into tokens, step 210 , and weights are assigned to the tokens, step 212 . This process is performed for all documents in the trail, step 218 .
  • a new document sequence can be started upon specified actions taken by the expert, as well as creating tokens as illustrated in FIG. 7A.
  • a vector is generated as a combination of all the tokens, including the user action tokens, step 222 .
  • the vector is normalized in accordance with standard linear algebra techniques, step 224 . This process is performed on each document until vectors have been generated for all documents, step 226 .
  • a vector space model is created from the vectors, step 228 , and the documents are clustered based on the vector space model, step 230 . Tokens from each cluster are selected to serve as the labels, step 232 , in accordance with standard labeling techniques, and a table of contents is generated from the labels, step 234 .

Abstract

The invention disclosed herein relates to cooperative computing environments and information retrieval and management methods and systems. More particularly, the present invention relates to methods and systems for capturing and generating useful information about a user's access and use of data on a computer system, such as in the form of documents stored on remote servers, and making such useful information available to others. Documents on the computer system are accessible through a plurality of different methods, such as by specifying an identifier or locator for the document, activating a hyperlink in another document which points to the document, or navigating to the document through navigational commands in an application program such as a browser. The method involves capturing information regarding each of the accessed documents in the set, the information including the method used to access the document, dividing the set of documents into subsets of documents based at least in part on the methods used to access the documents, labeling each subset of documents with a topic, and making the labels and documents accessed available to other users who wish to browse the same documents.

Description

    RELATED APPLICATIONS
  • This application is related to and claims the benefit of provisional application Ser. No. 60/098,568, titled THE EXPERTISE BROWSER: HOW TO LEVERAGE DISTRIBUTED ORGANIZATIONAL KNOWLEDGE, filed Aug. 31, 1998, attorney docket no. L09-98-027P, which is hereby incorporated by reference into this application. [0001]
  • This application is related to commonly owned application Ser. No. 09/143,075, titled METHOD AND SYSTEM FOR INFORMING USERS OF SUBJECTS OF DISCUSSION IN ON-LINE CHATS, filed Aug. 28, 1998, attorney docket no. 3330/33, which is hereby incorporated by reference into this application. [0002]
  • This application is related to commonly owned application Ser. No. titled METHOD AND SYSTEM FOR CONVEYING EXPERTISE BASED ON DOCUMENT USAGE, filed Nov. 13, 1998, attorney docket no. 3330/38, which is hereby incorporated by reference into this application.[0003]
  • COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever. [0004]
  • BACKGROUND OF THE INVENTION
  • The invention disclosed herein relates to cooperative computing environments and information retrieval and management methods and systems. More particularly, the present invention relates to methods and systems for capturing and generating useful information about a user's access and use of data on a computer system, such as in the form of documents stored on remote servers, and making such useful information available to others. [0005]
  • Computer systems such as organizational networks, database systems and the Internet, provide a wealth of information to users. However, users must know how to find the information they want. Indeed, searching for specific information on a desired subject of interest is often a difficult and tedious process that is usually aided by the user's existing knowledge of or expertise in the subject. This is particularly true in the relatively unstructured environment of the Internet. [0006]
  • Using the world wide web, for example, a user might begin a search for desired information by entering a keyword query through a search engine, and then follow hyperlinks contained in the web documents to move from one document to another until the desired information is found. Since keyword searches are typically unreliable and do not immediately produce directly relevant results, users are often required to browse through a number of documents until some directly relevant information is found. Expertise in a subject usually helps users formulate better keyword searches and recognize the relevance of the various results found. [0007]
  • Moreover, particular documents usually provide only part of the specific information desired, and thus users must often access a number of such documents until a complete set of useful information is compiled from the various documents. During this process, users also make frequent use of navigational commands offered by the user's web browser program, such as the BACK and FORWARD commands and the history or GO list to view documents previously accessed, and the HOME command to navigate to a home page in relation to a particular page found. [0008]
  • If the desired information is not found after a while, the user frequently restarts the search process by jumping to a new, unrelated resource such as the original or another search engine, an index file, or a known document which may have helped the user in the past in related searches. This jump is usually performed by manual entry of the address of the new resource, such as the uniform resource locator (URL) in the case of the web. Alternatively, if the user previously visited the resource and stored its URL as a bookmark on the browser, the user can jump to the new resource by selecting the bookmark. Of course, the user may get distracted during the search process by a hyperlink to another document which is completely unrelated to the search, or the user may select an active advertisement to pursue other information before returning to the thread of the search. [0009]
  • Thus, by the time a user finds a number of documents which contain the desired information, the search process has likely led the user through a path of numerous documents accessed in many different ways depending upon the user's judgment as to which way would bring the user closer to the desired end result. [0010]
  • Having now expended time and effort to compile this useful set of documents, the user is apt to want to capture this set both for the user's own later use as well as for use by others. Several software programs allow users to store a path of a series of documents as the user browses the documents. However, this path will likely include a number of documents which are unrelated to the search process or are otherwise unhelpful, as explained above. Those programs that allow users to edit their paths still require substantial manual effort and judgment on the part of the user. Moreover, other users have no way of finding paths or sequences of documents which relate to specific topics or which were created by specific users or user with specific expertise. Later users thus can not take advantage of the time and expertise of the first user in performing the search and browsing through numerous documents to find those that are truly relevant and helpful. [0011]
  • There is therefore a need for powerful tools and methods that capture a user's browsing history and automatically generate a set of useful documents and resources from this history for the user's later use as well as use by others. [0012]
  • SUMMARY OF THE INVENTION
  • It is an object of the present invention to solve the problems described above with existing browsing logging systems. [0013]
  • It is another object of the present invention to allow a broad range of users to obtain the benefit of the expertise of experts as expressed through the experts' access and use of documents. [0014]
  • It is another object of the present invention to automatically parse document browser trails or paths into sequences of documents which are related by a common topic. [0015]
  • It is another object of the present invention to facilitate the use of the distributed expertise within an organization by making available traces of experts' browsing and searching behavior. [0016]
  • It is another object of the present invention to helps users find documents that someone with expertise in a particular field has already read. [0017]
  • It is another object of the present invention to account for a user's method of accessing documents in determining how to group together sets of related documents. [0018]
  • The above and other objects are achieved by a method for producing a summary of topics for a set of documents accessed by a user on a computer system. Documents on the computer system are accessible through a plurality of different methods, such as by specifying an identifier or locator for the document, activating a hyperlink in another document which points to the document, or navigating to the document through navigational commands in an application program such as a browser. The method involves capturing information regarding each of the accessed documents in the set, the information including the method used to access the document, dividing the set of documents into subsets of documents based at least in part on the methods used to access the documents, and labeling each subset of documents with a topic. [0019]
  • The method of one embodiment involves four basic steps: logging, applying heuristic rules for probable break points, content-based clustering, and topic labeling. [0020]
  • One approach to capturing usage trails is to create operating system-dependent programs that spy on low-level system events, such as DDE or system hooks on the Windows platform. It is possible to use this method to augment a web browser, a Lotus Notes client, or other database front end to augment standard logging data such as recording every page a user visits, how long the user visited a page, how long the viewer window was exposed to include the use logs of user actions on the browser such as how the user arrived at a page, whether by typing in a URL, following a link, selecting a bookmark, or hitting the BACK, or Forward, selecting a link from a document outside the current application and other obvious user actions. These actions are used as an adjunct to content analysis tools such as automatic clustering or on-line topic detection software to identify distinct topic areas. [0021]
  • Some sample heuristics may be used for partitioning a set of web pages. For example, a user entering a web page by typing in it's URL or selecting a page from a bookmark list often denotes a change of topic is usually initiating a new topic. Three possibilities are as follows: [0022]
  • 1. Heuristics derived from user actions while searching and browsing are used to partition the browse history into topically related pages by themselves. In this case, the content analysis tool is null, and the first level clustering is based solely on the heuristics. [0023]
  • 2. Heuristics derived from user actions while searching and browsing are used to encode this information as additional features added to the documents, which are then clustered using a standard clustering algorithm. [0024]
  • 3. Heuristics derived from user actions while searching and browsing are used to assign a priori probabilities to partitions on the data, which are then used by a bayesian clustering process. The distances between vectors gives the relatedness between the underlying documents. The bayesian process uses probabilities to determine whether the documents overlap in content. [0025]
  • Heuristics derived from user actions while searching and browsing to cluster and label are envisioned: [0026]
  • 1. Clustering and labeling within one browse session; [0027]
  • 2. Clustering and labeling the documents from many different browse sessions; and [0028]
  • 3. Clustering and labeling many different browse paths.[0029]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention is illustrated in the figures of the accompanying drawings which are meant to be exemplary and not limiting, in which like references refer to like or corresponding parts, and in which: [0030]
  • FIG. 1 is a diagram of a system for capturing and conveying expertise in document usage in accordance with one embodiment of the present invention; [0031]
  • FIG. 2 is flow chart showing a process of capturing and conveying expertise in document usage using the system of FIG. 1 in accordance with one embodiment of the present invention; [0032]
  • FIG. 3 is a flow chart showing a process of capturing and parsing an expert's use of documents on the world wide web in accordance with one embodiment of the present invention; [0033]
  • FIG. 4 is a flow chart showing a process of allowing users to search and access an expert's document sequences by specifying a topic and/or expert in accordance with one embodiment of the present invention; [0034]
  • FIG. 5 is a flow chart showing a process of parsing a document usage trail in accordance with one embodiment of the present invention; [0035]
  • FIG. 6 is a flow chart showing the parsing process of FIG. 5 applying a first set of heuristics in accordance with one embodiment of the present invention; and [0036]
  • FIGS. [0037] 7A-7B contain a flow chart showing the parsing process of FIG. 5 applying a second set of heuristics in accordance with one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The preferred embodiments of a system, method, and article of manufacture containing software programs in accordance with the present invention is described with reference to the drawings in FIGS. [0038] 1-7.
  • Referring to FIG. 1, one embodiment of the [0039] system 10 of the present invention includes a plurality of computer workstations 12 connected to a network 14, such as the Internet or other internet or intranet, and a monitoring server 16 connectable to the workstations 12 directly or over the Internet 14. As shown in one exemplary case in FIG. 1, the workstations 12 have a client application program 18 executing thereon which is capable of accessing, retrieving and using documents available from servers on the Internet 14, from the monitoring server 16, or from other workstations 12. In the case of the world wide web, the client application 18 is a web browser program such as NETSCAPE NAVIGATOR or INTERNET EXPLORER which communicates with the servers on the web via HTTP. Alternatively, the client application 18 may be a LOTUS NOTES client application which communicates and exchanges data with LOTUS NOTES databases operating on the servers. As one skilled in the art will recognize, many conventional client applications for network environments may be used without departing from the scope of the present invention.
  • In particular embodiments, the [0040] workstations 12 also have a logger program 20 operating thereon which logs the documents accessed and used by the client application 18 and stores this logged or captured information in a log file. The logger program 20 may be built into the client application 18, or may be a plug-in program or operating system-dependent program that spies on low level system events, such as a DDE, as known to those of skill in the art.
  • Alternatively, the [0041] logger program 20 is a programmable intermediary which is programmed to monitor the use of the client application. An example of such an intermediary is web browser intelligence or WBI client as described in Barrett, R., Maglio, P. P., & Kellem, D. C. How to Personalize the Web, Proceedings of Human Factors in Computing Systems, CHI '97. (1997), New York: ACM Press, and Barrett, R. & Maglio, P. P., Intermediaries: New places for producing and manipulating web content, Proceedings of Seventh International World Wide Web Conference. Brisbane, Australia, 1998, both of which are hereby incorporated by reference into this application, and are available for downloading on the web at http://www.alphaworks.ibm.com. These programmable intermediaries provide a convenient means for monitoring the sequence of URLs viewed by a user, as the system is platform-independent, thus allowing identical code to be used on any kind of computer.
  • The [0042] logger program 20 monitors the usage of documents retrieved by the client application 18 and stores document identifiers which identify the documents used. In the case of the web, the document identifiers are the URLs for the document or pseudonyms thereof. In the case of documents retrieved from a LOTUS NOTES database, the document identifiers are LOTUS NOTES Universal Identifiers (UIDs) which name any document in any database by encoding an identifier for the NOTES database, including possible replica information, and an identifier for the document within the database. The document identifiers for consecutive documents accessed in a sequence during a browsing session are added to the log. A usage trail of all the documents accessed or used by the user during a browsing session is thus created and stored in the log file. In some embodiments, described in greater detail below, additional information is captured by the logger, including the method used to access the particular document and actions taken by the user in the document, e.g., search terms input by the user into a search engine.
  • In the case with NOTES UIDs, the additional information comprises client action information, which identifies the method used to access particular documents and actions taken in LOTUS NOTES. Notes supports hyperlinks in the form of document links and database links which take the user to a particular database without picking a document. Users can change windows in Notes, open databases manually, which is the equivalent of typing in a URL, pick an icon, or bookmark, on the desktop, and perform other operations or actions. These actions are captured as additional information. [0043]
  • At the end of a document browsing session, such as at the end of a day or when the user terminates the [0044] client application 18, the usage trail is ended. Additional usage trails may be established in the log file if the user initiates another browsing session. Because trails are meant ultimately to be shared, they are stored in a central location to which all users or clients have access. Thus, at certain points, the log file is transmitted from the workstation 12 to the monitoring server. The monitoring server 16 contains conventional computer hardware elements including a processor 22 and memory devices 24 including a RAM, ROM, hard disk, and other magnetic or optical disk drives.
  • The [0045] monitoring server 16 further contains a number of program modules for analyzing the user's log. These program modules include a pre-processor 26, a parser 28, and a labeler 30. The pre-processor 26 prepares a usage trail for parsing, and the parser 28 breaks the trail into content areas in accordance with processes described herein. The labeler 30 assigns labels or topics to the content areas, which topics are then arranged in a table of contents 32 which associates the various topics with the users from whose usage trails they were derived. The list of documents associated with each topic is stored in the table of contents 32 or a separate relational table 34, so that they can be retrieved for presentation to other users as described herein.
  • In particular embodiments, this central repository is implemented as a WBI server connected to a simple database or file system. Thus, the client-side WBI monitors URLs viewed by a specific individual and sends that information via a simple HTTP request to a central WBI server which maintains a database of all users and their trails. As in the case of monitoring, WBI provides a convenient and platform-independent means for maintaining these data, but many other schemes are possible as will be recognized by those of skill in the art, such as a DB[0046] 2 or LOTUS NOTES database, though these would require different client-server protocols.
  • Referring to FIG. 2, one process for sharing expertise using the system of FIG. 1 begins when an expert user is browsing through documents, [0047] step 50. The documents accessed by the expert are monitored and stored, step 52, to create a usage trail. The usage trail is analyzed to automatically determine one or more content areas of the documents, step 54, and the usage trails and content areas are stored, step 56. The process of determining the content areas effectively cuts the usage trail into content areas and associates the trails with people with expertise in that content area. Experts are persons with peer acknowledged familiarity with a particular content area or as defined by one of the many computer systems designed to track expertise in organizations. A variety of methods are possible for cutting or breaking the usage trail, including ones that take account of content or semantics of the documents on the trails, topology or connectivity of documents on the trails, or both, as described in the above reference 1998 article by Maglio & Barrett. A alternative method for meaningfully breaking trails into content areas based on local connections of trail elements is described in Maglio, P. P. & Barrett, R, How to Build Modeling Agents to Support Web Searchers, Proceedings of the Sixth International Conference on User Modeling, New York, 1997, which is hereby incorporated by reference into this application. Alternative processes for determining the content areas are described below with reference to FIGS. 5-7.
  • Once the usage trail is broken and content areas identified, the portions of the usage areas are labeled with topics, [0048] step 58. In a simple embodiment, labeling is performed by selecting the most frequent word or phrase to appear in the portion of the usage trail. Other embodiments of labeling are used with reference to clustering technology, as described below and otherwise known to those of skill in the art.
  • A subsequent user may access the labels in alternative ways. The user may simply request a list of all available labels or topics displayed, [0049] step 60, in response to which the list is retrieved from and displayed and the user allowed to select one of the labels, step 62. The user may place a query request for a subject matter of interest to the user, step 64, and the query is executed on the available labels in an attempt to find a reasonably close match, step 66. Labels which are possible matches to the query are displayed and the user may make a selection therefrom, step 62. Once the user selects a label, the portion or subsequence of the usage trail associated with the label is retrieved and the documents in the subsequence provided to the user, step 68, possibly in the same order in which the documents were accessed by the expert in the original browsing session as recorded in the usage trail.
  • Referring to FIGS. [0050] 3-4, the process of capturing expertise information and making it available to others is now described in greater detail with respect to the world wide web embodiment described above involving the use of WBI intermediaries on the client workstations and monitoring server. As shown in FIG. 3, as the expert browses the web, step 80, the WBI client checks when a new web page has been accessed, step 82. In this context, a new web page includes any change in web page, even to a web page the expert has previously accessed. When a new page is accessed, the client WBI agent adds the URL of the web page and the method used by the expert to access the web page into the sage trial stored in the log file, step 84. Alternatively, only new web pages not previously accessed can be added to the usage trail. The method of access used by the expert is stored in the log file for use in parsing the usage trail. The various methods of accessing web documents are well known, and include those set forth above such as input of a URL, selection of a bookmark, activation of a hyperlink from another document or another application, and browser navigation.
  • The client side WBI agent also sends the document to the monitoring server, [0051] step 86, for analysis of its content during parsing. Alternatively, the client side WBI agent can send the URL of each document to the monitoring server, which server then retrieves the document directly from its original server.
  • When the expert is done browsing, [0052] step 88, as determined by, e.g., termination of the browser program, or otherwise at scheduled times or events, the log file generated by the client side WBI agent and representing the captured information of expert activity is transmitted to the server side WBI, step 90. In alternative embodiments, the captured information is sent to the server as each new web page is accessed. The server side WBI agent parses the usage trail into subtrails or subsequences based on the captured information, step 92, which may include a combination of document content and user actions in accessing the document. The server WBI agent also generates content areas for each the subsequences, step 94, based upon the contents of the documents. Labels are generated for each content area, step 96.
  • If the expert does not belong to a group, step [0053] 98, the labels generated for the user's content areas are stored in a database on the server. If the expert belongs to a group such as a department within an organization, step 98, the group data is associated with the expert, step 102, and the expert, group and label data is stored in the database, step 100. The server may contain a table of groups and users for use in making this determination, of the expert's log file may contain data identifying which groups, if any, to which the expert belongs.
  • Referring to FIG. 4, a subsequent user has several options for finding document content areas for topics of interest. If the user knows the identity of an expert, the user can specify the expert, step [0054] 110, and the table of topics is queried for As explained above with reference to FIG. 2, the user can display the list of all topics for that expert and make a selection therefrom, step 114, or may input a query for topics and be presented a list of matching topics. If the user knows the group but not a particular expert, the user can specify the group, step 116, and the table of contents is queried for labels associated with the experts in that group, step 118. If the user does not know of any particular expert or group in the subject matter of interest to the user, the user can display the list of topics or perform a query, step 120, as described above.
  • Ultimately, the user chooses a label or topic which represents a trail of documents in the associated content area, [0055] step 122. In response, the server side WBI accesses the topic database to locate the trail of documents associated with the selected label, step 124. In addition, the server side WBI queries the database to determine whether other experts accessed documents in the located trail and other trails taken by such experts from the document, step 126. The server transmits the list of other experts, associated documents, and alternative trails to the client for sequential display. Alternatively, the server provides the list of URLs and other information to the client side WBI agent, which retrieves each of the documents in the trail in sequence, step 128. As a further alternative, the monitoring server retrieves the documents from the original server and transmit them to the client in sequence. The user is allowed to interact with each document provided, step 130, and to issue commands whether to proceed with the other documents in the trail or pursue another trail followed by one of the other identified experts.
  • The following exemplary series of scenarios assist in the understanding of the operation of the user selection options described herein. The exemplary situation is a financial consulting scenario. [0056]
  • Sara is a tax expert at a major financial consulting firm. She works in one of fifteen groups each consisting of ten tax consultants. Each group has a geographic specialty and each individual within each group has expertise in a particular area of tax law. Sara has a client who is a resident of Sweden, but who is a U.S. citizen. In addition, this client's family (husband and children) continues to live in San Francisco where they own residential and income property. Thus, she has to file personal income tax forms in both countries. However, Sara has joined the San Francisco group recently and she has not yet gained expertise in Swedish Tax law. She needs to leverage the expertise of her counterparts in the group who are specialists in Swedish and international tax law. [0057]
  • Scenario 1: When the User Knows the Identity of the Expert. Sara wants to know how to account for US rental property income on the Swedish income tax forms and remembers meeting Sven Jorgensen at a company meeting. She would like to capitalize on his expertise in this area. Sara performs the following steps: [0058]
  • Sara selects Sven, an the expert whose browsing paths she would like to query. [0059]
  • Sara begins to browse through his paths by typing in tentative query terms, such as “U.S. rental income”. As she types in the query, relevant browse paths created by Sven appear on the screen. [0060]
  • Sara selects one of the paths and reviews the browse histories and documents until she finds the document that helps solve her problem. [0061]
  • Scenario 2: When the User Knows the Group. Sara wants to know how to account for U.S. rental property income on the Swedish income tax forms and vaguely remembers meeting a group of experts in US-Swedish tax law at a company meeting. Unfortunately, she does not remember any of their names. Sara needs to discover the experts in the area. She types in her query, which is performed on an indexed set of documents contained in the experts browse paths. What is returned is a set of experts and a sub-set of each expert's browse paths that match the query. She requests the list of content area experts. [0062]
  • From this list, Sara thinks she remembers Sven Jorgensen and Ben Hogan as the experts she met, and selects their paths as ones she would like to browse. [0063]
  • Sara begins to browse through these paths by typing in tentative queries such as “U.S. rental income”. As she types in the queries, paths created by the experts that are related her query appear on the screen. [0064]
  • Sara selects one of the paths and reviews documents until she finds the document that helps solve her problem. [0065]
  • Scenario 3: When the User Needs to Identify an Expert. Sara wants to know how to account for U.S. rental property income on Swedish income tax forms. Unfortunately, she has no idea who in her company might know relevant information in this area. [0066]
  • Once again Sara needs to discover the experts in the area. She types in her query that is performed on an indexed set of documents contained in the experts' browse paths. What is returned is a set of experts and a sub-set of each expert's browse paths that match the query. [0067]
  • She requests the list of content area experts. [0068]
  • Sara does not recognize any of the experts, so she selects all of the experts. She scans through the paths. At first, none seem especially related to her interests. However, after reviewing them carefully, one of the experts' paths looks interesting. [0069]
  • She selects that expert and requests all of that person's paths. Sara finds one of the paths and accompanying document that helps solve her problem. [0070]
  • In the first two of the scenarios described above, Sara either knows an expert or a group of experts who can likely answer her questions. In these cases, she is able to leverage her tacit knowledge about people and their differential expertise in her organization. She can review traces of the documents people have read with a reasonable expectation of finding more useful documents than if she had browsed or searched alone. In the third scenario, Sara has no idea who in the organization might have the expertise to help her. In this case, the system of the present invention relies on explicit representations of expertise in the form of updated profiles and taxonomies of people and their respective expertise. [0071]
  • As explained above, the parsing of the usage trail may be accomplished in a number of known ways, depending upon the results desired. Other methodologies which provide improved results over known methods are now described with reference to FIGS. [0072] 5-7B. These parsing methodologies are applicable to the expertise sharing methodology described above. They are also generally applicable to parsing of a user's browsing history for the user's own use, for example, to create an index or table of contents of the user's own browsing activities so the user can retrace his steps. Thus, the parsing methodologies described below may be implemented in stand-alone programs residing and executing on the user's own computer rather than on a remotely located server.
  • Referring to FIG. 5, the basic parsing method starts when the user browses through documents, [0073] step 150, and a usage trail is logged by capturing the document identifiers such as URLs as well as user actions made in connection with the documents, step 152. These user actions include the method employed to access the document as explained above, and may include other actions such as text input by the user while interacting with the document. The actions logged are used to help determine likely or definitive break points in the usage trail, step 154. Different heuristics may be applied to partition the usage trail based on the user actions, and examples are described below with reference to FIGS. 6 and 7A-7B.
  • Standard document clustering techniques are employed to determine content areas within the usage trail, step [0074] 156. The clustering techniques may be any clustering algorithm including conventional ones such as the k-means clustering algorithm described in L. Bottou and Y. Bengio, Convergence Properties of the K-Means Algorithm, in Advances in Neural Information Processing Systems 7, pages 585-592 (MIT Press 1995), which is hereby incorporated by reference into this application. Several examples of additional document clustering algorithms are described in the following two documents, which are hereby incorporated by reference into this application: Douglas R. Cutting, David R. Karger, Jan O. Pedersen, John W. Tukey, Scatter/Gather: A Cluster-based Approach to Browsing Large Document Collections. In Proceedings of the 15th Annual International ACM SIGIR Conference. Association for Computing Machinery. New York. June, 1992. Pages 318-329. Gerard Salton. Introduction to Modern Information Retrieval, (McGraw-Hill, New York 1983).
  • After clustering is completed, the content areas are labeled using standard labeling techniques, [0075] step 158. The labeling of document clusters is known to those of skill in the art, and is described for example in pages 314-323 of Peter G. Anick and Shivakumar Vaithyanathan, Exploiting Clustering and Phrases for Context-based Information Retrieval, in Proceedings of the 20th International ACM SIGIR Conference, Association for Computing Machinery, July 1997, which document is hereby incorporated by reference into this application.
  • In the context of the world wide web, in hypertext documents, since there is more information than just the content of documents, documents can be clustered by content, or by analysis of their hyperlink structure, or both. Combining content and link information into a single clustering algorithm and purely content-based and purely link-based clustering is described in, for example “HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering,” Ron Weiss, Bienvenido Velez, Mark A. Sheldon, Chanathip Nemprempre, Peter Szilagyi, Andrzej Duda, and David K. Gifford, Proceedings of the Seventh ACM Conference on Hypertext, Washington, D.C., March 1996, which document is hereby incorporated by reference into this application. [0076]
  • FIG. 6 shows one embodiment of the parsing using the first heuristic. Under this heuristic, certain user actions are deemed to end a prior document sequence or trail and begin a new one. These actions may vary, but in the particular embodiment in FIG. 6 they include inputting a URL, selecting a bookmark or choosing a URL from an external application. In theory, these action likely represent the user's intention to start a new thread or search, since the user is jumping to a seemingly unrelated document. Entering a new search term into a search engine for a new web-wide search may similarly be considered the start of a new trail. Conversely, other actions such as selecting hyperlinks or navigating using browser commands are deemed to likely represent a continuation of the ongoing thread of interest or search for information. [0077]
  • Thus, referring to FIG. 6, given a usage trail log which includes the user actions obtained as described above, the parsing program employing this method loops through the usage trail to consider each document, [0078] step 170, and reads the method of user access to each document as stored in the log, step 172. For each document, the parsing program tests if the document was accessed by direct input of a URL, step 174, selection of a bookmark, step 176, or activation of a link in an external application, step 178, and, if any of those apply, a new document sequence is established, step 180. Otherwise, the current document is added to the current open subsequence, step 182. If there are more documents in the usage trail, step 184, the process continues, until all documents have been considered and the usage trail is divided into a set of subsequences. The program then performs clustering on each subsequence to generate clusters of related documents, step 186. The clusters are labeled, step 188, and the labels and associated documents are stored for later reference, step 190.
  • The methodology shown in FIG. 6 provides for a clean, relatively simple and quick way to divide up a usage trail for clustering. However, it may also fail to include documents together in a cluster which are otherwise quite closely related in substance because of the circumstances in which they are accessed, e.g., because the second one happened to have been accessed by one type of user action rather than another. This possibility is accounted for in the alternative methodology shown in FIGS. [0079] 7A-7B by giving some weight to user actions in clustering, rather than simply dividing the trail at certain user actions.
  • Beginning with FIG. 7A, given a usage trail log which includes the user actions obtained as described above, the parsing program employing this second method loops through the usage trail to consider each document, [0080] step 200, and reads the method of user access to each document as stored in the log, step 202. If the URL for the document is one of the user's bookmarks, the bookmark name is set as a token for clustering, step 206. Otherwise, a token is created representing the method of access, step 208. Creating the token comprises comparing the access method to a table of access methods which are set to suggest a topical break. If the table comparison suggest a topical break, then a new token is created which would not pass through the document parser, for example SuggestedClusterN, where N is the number of the current cluster. For every document encountered in the log until the next cluster break, the token, in this case SuggestedClusterN, is added to the cluster. The weight of the token is tuned to affect clustering as one skilled in the art would recognized.
  • In accordance with standard clustering techniques, the document itself is parsed into tokens, step [0081] 210, and weights are assigned to the tokens, step 212. This process is performed for all documents in the trail, step 218.
  • As an alternative to the logic illustrated in FIG. 7A, a new document sequence can be started upon specified actions taken by the expert, as well as creating tokens as illustrated in FIG. 7A. [0082]
  • Referring to FIG. 7B, for each document in the trail, [0083] step 220, a vector is generated as a combination of all the tokens, including the user action tokens, step 222. The vector is normalized in accordance with standard linear algebra techniques, step 224. This process is performed on each document until vectors have been generated for all documents, step 226. A vector space model is created from the vectors, step 228, and the documents are clustered based on the vector space model, step 230. Tokens from each cluster are selected to serve as the labels, step 232, in accordance with standard labeling techniques, and a table of contents is generated from the labels, step 234.
  • As a result of this second method, documents which are very close in content will still be clustered together even when an abrupt user action occurred between them. Conversely, documents which are actually unrelated will not be clustered together just because one was accessed through activation of a hyperlink in the other. [0084]
  • While the invention has been described and illustrated in connection with preferred embodiments, many variations and modifications as will be evident to those skilled in this art may be made without departing from the spirit and scope of the invention, and the invention is thus not to be limited to the precise details of methodology or construction set forth above as such variations and modification are intended to be included within the scope of the invention. [0085]

Claims (15)

What is claimed is:
1. A method for producing a summary of topics for a set of documents accessed by a user on a computer system, the document being accessible on the computer system through a plurality of different methods, the method comprising:
capturing information regarding each of the accessed documents in the set, the information including the method used to access the document;
dividing the set of documents into a plurality of subsets of documents based at least in part on the methods used to access the documents; and
labeling each subset of documents with a topic.
2. The method of
claim 1
, wherein each of the documents is associated with an identifier, and wherein the step of capturing information includes capturing the identifier of each document in the set.
3. The method of
claim 2
, wherein the step of capturing information comprises monitoring the user's access of the documents and storing for each document the identifier associated therewith and the method used to access the document.
4. The method of
claim 1
, wherein the step of capturing information about the documents in the set comprises capturing a sequence in which the documents are accessed by the user.
5. The method of
claim 4
, wherein the step of dividing the set of documents into subsets comprises dividing the sequence of documents into subsequences of consecutive documents accessed by the user.
6. The method of
claim 5
, wherein each of the documents is associated with an identifier, and the methods include two or more from the group consisting of input of a document identifier, selecting a stored bookmark for the document identifier, activating a link to a target document contained in a source document, and navigating to a document previously accessed in the sequence.
7. The method of
claim 6
, wherein the step of dividing the set of documents comprises starting a new subsequence of documents with any document in the sequence accessed through a predetermined one or more of the plurality of methods.
8. The method of
claim 7
, wherein the step of starting a new sequence comprises starting the new sequence with any document accessed through input of the document's identifier.
9. The method of
claim 7
, wherein the step of starting a new sequence comprises starting the new sequence with any document accessed through selection of a stored bookmark for the document's identifier.
10. The method of
claim 7
, the step of dividing the set of documents into subsets comprises grouping into a subset consecutive documents which were accessed through activation of links contained in the consecutive documents.
11. The method of
claim 1
, wherein the documents contain content and wherein the step of dividing the set of documents into subsets comprises dividing the set of document based at least in part on the content of the documents in the set.
12. The method of
claim 11
, wherein the step of dividing the set of documents comprises clustering the documents based at least in part on the content of the documents.
13. The method of
claim 12
, wherein the step of dividing the set of documents into subsets comprises dividing the set of documents into first subsets based on the methods through which the documents were accessed and clustering the documents in each first subset into second subsets based on the content of the documents in each first subset.
14. The method of
claim 12
, wherein the step of dividing the set of documents into subsets comprises clustering the documents based on the content of the documents and the methods used to access the documents.
15. The method of
claim 14
, wherein the step of clustering comprises identifying tokens in each of the documents and establishing a vector for each document comprising a combination of the tokens in the document and a feature representing the method used to access the document.
US09/191,587 1998-08-31 1998-11-13 Method and system for summarizing topics of documents browsed by a user Expired - Lifetime US6356898B2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US09/191,587 US6356898B2 (en) 1998-08-31 1998-11-13 Method and system for summarizing topics of documents browsed by a user
EP99962773A EP1224578A4 (en) 1998-11-13 1999-11-15 Method and system for summarizing topics of documents browsed by a user
CA002352174A CA2352174A1 (en) 1998-11-13 1999-11-15 Method and system for summarizing topics of documents browsed by a user
AU19143/00A AU1914300A (en) 1998-11-13 1999-11-15 Method and system for summarizing topics of documents browsed by a user
IL14310799A IL143107A0 (en) 1998-11-13 1999-11-15 Method and system for summarizing topics of documents browsed by a user
PCT/US1999/026992 WO2000029985A1 (en) 1998-11-13 1999-11-15 Method and system for summarizing topics of documents browsed by a user

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US9856898P 1998-08-31 1998-08-31
US09/191,587 US6356898B2 (en) 1998-08-31 1998-11-13 Method and system for summarizing topics of documents browsed by a user

Publications (2)

Publication Number Publication Date
US20010044795A1 true US20010044795A1 (en) 2001-11-22
US6356898B2 US6356898B2 (en) 2002-03-12

Family

ID=22706081

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/191,587 Expired - Lifetime US6356898B2 (en) 1998-08-31 1998-11-13 Method and system for summarizing topics of documents browsed by a user

Country Status (6)

Country Link
US (1) US6356898B2 (en)
EP (1) EP1224578A4 (en)
AU (1) AU1914300A (en)
CA (1) CA2352174A1 (en)
IL (1) IL143107A0 (en)
WO (1) WO2000029985A1 (en)

Cited By (144)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020091836A1 (en) * 2000-06-24 2002-07-11 Moetteli John Brent Browsing method for focusing research
US6665710B1 (en) * 2000-05-11 2003-12-16 International Business Machines Corporation Searching local network addresses
US20040015398A1 (en) * 2001-10-24 2004-01-22 Hayward Monte Duane Method of disseminating advertisements using an embedded media player page
US20040051812A1 (en) * 2000-10-24 2004-03-18 Hayward Monte Duane Method of collecting data using an embedded media player page
US20040236774A1 (en) * 1999-12-07 2004-11-25 Microsoft Corporation Bookmarking and placemarking a displayed document in a computer system
US20050154702A1 (en) * 2003-12-17 2005-07-14 International Business Machines Corporation Computer aided authoring, electronic document browsing, retrieving, and subscribing and publishing
US20050222973A1 (en) * 2004-03-30 2005-10-06 Matthias Kaiser Methods and systems for summarizing information
US6983320B1 (en) * 2000-05-23 2006-01-03 Cyveillance, Inc. System, method and computer program product for analyzing e-commerce competition of an entity by utilizing predetermined entity-specific metrics and analyzed statistics from web pages
US20060053109A1 (en) * 2004-07-02 2006-03-09 Srinivasan Sudanagunta Relevant multimedia advertising targeted based upon search query
US7013323B1 (en) * 2000-05-23 2006-03-14 Cyveillance, Inc. System and method for developing and interpreting e-commerce metrics by utilizing a list of rules wherein each rule contain at least one of entity-specific criteria
US20060136528A1 (en) * 2004-12-20 2006-06-22 Claria Corporation Method and device for publishing cross-network user behavioral data
US20080162537A1 (en) * 2006-12-29 2008-07-03 Ebay Inc. Method and system for utilizing profiles
US20080172380A1 (en) * 2007-01-17 2008-07-17 Wojciech Czyz Information retrieval based on information location in the information space.
US20080319955A1 (en) * 2000-10-04 2008-12-25 John Douglass Web browser page rating system
US20100082673A1 (en) * 2008-09-30 2010-04-01 Kabushiki Kaisha Toshiba Apparatus, method and program product for classifying web browsing purposes
US20100192069A1 (en) * 2009-01-23 2010-07-29 Cisco Technology, Inc. Differentiating a User from Multiple Users Based on a Determined Pattern of Accessing a Prescribed Network Destination
US20100312592A1 (en) * 2009-06-03 2010-12-09 Oracle International Corporation Confirming enforcement of business rules specified in a data access tier of a multi-tier application
USRE42167E1 (en) * 1999-05-20 2011-02-22 Evresearch Ltd. Information management, retrieval and display systems and associated methods
US20110219030A1 (en) * 2010-03-03 2011-09-08 Daniel-Alexander Billsus Document presentation using retrieval path data
US20110218883A1 (en) * 2010-03-03 2011-09-08 Daniel-Alexander Billsus Document processing using retrieval path data
US20110219029A1 (en) * 2010-03-03 2011-09-08 Daniel-Alexander Billsus Document processing using retrieval path data
US8073866B2 (en) 2005-03-17 2011-12-06 Claria Innovations, Llc Method for providing content to an internet user based on the user's demonstrated content preferences
US8078602B2 (en) 2004-12-17 2011-12-13 Claria Innovations, Llc Search engine for a computer network
US8086697B2 (en) 2005-06-28 2011-12-27 Claria Innovations, Llc Techniques for displaying impressions in documents delivered over a computer network
US20120053927A1 (en) * 2010-09-01 2012-03-01 Microsoft Corporation Identifying topically-related phrases in a browsing sequence
US8170912B2 (en) 2003-11-25 2012-05-01 Carhamm Ltd., Llc Database structure and front end
US8255413B2 (en) 2004-08-19 2012-08-28 Carhamm Ltd., Llc Method and apparatus for responding to request for information-personalization
US8316003B2 (en) 2002-11-05 2012-11-20 Carhamm Ltd., Llc Updating content of presentation vehicle in a computer network
US20130166528A1 (en) * 2004-12-21 2013-06-27 Scenera Technologies, Llc System And Method For Generating A Search Index And Executing A Context-Sensitive Search
US20130227401A1 (en) * 2010-06-03 2013-08-29 Rhonda Enterprises, Llc Systems and methods for presenting a content summary of a media item to a uesr based on a position within the media item
US8620952B2 (en) 2007-01-03 2013-12-31 Carhamm Ltd., Llc System for database reporting
US8645941B2 (en) 2005-03-07 2014-02-04 Carhamm Ltd., Llc Method for attributing and allocating revenue related to embedded software
US8689238B2 (en) 2000-05-18 2014-04-01 Carhamm Ltd., Llc Techniques for displaying impressions in documents delivered over a computer network
US20160267188A1 (en) * 2015-03-12 2016-09-15 Oracle International Corporation Methods for identifying, ranking, and displaying subject matter experts on social networks
US20160357808A1 (en) * 2015-06-05 2016-12-08 Apple Inc. Systems and methods for proactively providing recommendations to a user of a computing device
CN106462661A (en) * 2014-05-13 2017-02-22 爱克发医疗保健公司 A system and a related method for automatically selecting a hanging protocol for a medical study
US9633356B2 (en) 2006-07-20 2017-04-25 Aol Inc. Targeted advertising for playlists based upon search queries
US20170169129A1 (en) * 2014-05-12 2017-06-15 Rakuten, Inc. Information processing system, information processing method, and program
US20170169134A1 (en) * 2013-04-30 2017-06-15 Splunk Inc. Gui-triggered processing of performance data and log data from an information technology environment
US20170249335A1 (en) * 2016-02-29 2017-08-31 Red Hat, Inc. Snapshot management in distributed file systems
US20170351740A1 (en) * 2016-06-07 2017-12-07 International Business Machines Corporation Determining stalwart nodes in signed social networks
US20170351716A1 (en) * 2016-06-07 2017-12-07 Oracle International Corporation Resource allocation for database provisioning
US20180011855A1 (en) * 2016-07-11 2018-01-11 Hewlett Packard Enterprise Development Lp Calculating user experience scores
US20180011884A1 (en) * 2016-07-11 2018-01-11 Investcloud Inc Data exchange common interface configuration
US20180011900A1 (en) * 2016-07-11 2018-01-11 Facebook, Inc. Keyboard-Based Corrections for Search Queries on Online Social Networks
US20180018330A1 (en) * 2016-07-12 2018-01-18 International Business Machines Corporation Multi-field search query ranking using scoring statistics
US20180075070A1 (en) * 2016-09-12 2018-03-15 International Business Machines Corporation Search space reduction for knowledge graph querying and interactions
US20180121508A1 (en) * 2016-11-03 2018-05-03 Soundhound, Inc. Dynamic choice of data sources in natural language query processing
US20180121496A1 (en) * 2016-11-03 2018-05-03 Pearson Education, Inc. Mapping data resources to requested objectives
US20180129698A1 (en) * 2016-11-08 2018-05-10 At&T Intellectual Property I, L.P. Unique identification generation for records in a data streaming processing system
US20180129687A1 (en) * 2016-11-08 2018-05-10 International Business Machines Corporation Automatic data purging in a database management system
US10042836B1 (en) * 2012-04-30 2018-08-07 Intuit Inc. Semantic knowledge base for tax preparation
US10055498B2 (en) 2015-07-07 2018-08-21 Oracle International Corporation Methods for assessing and scoring user proficiency in topics determined by data from social networks and other sources
US10162327B2 (en) 2015-10-28 2018-12-25 Johnson Controls Technology Company Multi-function thermostat with concierge features
US10198255B2 (en) 2013-07-09 2019-02-05 Oracle International Corporation Method and system for reducing instability when upgrading software
US10210248B2 (en) * 2015-12-04 2019-02-19 Fujitsu Limited Computer-readable recording medium, display control method, and information processing device
US10225136B2 (en) 2013-04-30 2019-03-05 Splunk Inc. Processing of log data and performance data obtained via an application programming interface (API)
US10248671B2 (en) 2013-07-09 2019-04-02 Oracle International Corporation Dynamic migration script management
US10255335B2 (en) * 2015-11-06 2019-04-09 Cloudera, Inc. Database workload analysis and optimization visualizations
US10282473B2 (en) * 2015-09-08 2019-05-07 Molbase (Shanghai) Biotechnology Co., Ltd Task-crawling system and task-crawling method for distributed crawler system
US10282359B1 (en) * 2018-03-30 2019-05-07 Atlassian Pty Ltd Search based on group relevance
US10296514B2 (en) * 2015-04-30 2019-05-21 Ricoh Company, Ltd. Information processing system, method for acquiring information, information processing apparatus and recording medium
US10303693B2 (en) * 2014-11-20 2019-05-28 International Business Machines Corporation Normalization of confidence thresholds in federated environments
US10311537B1 (en) 2012-04-29 2019-06-04 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US10311524B2 (en) * 2017-01-04 2019-06-04 International Business Machines Corporation Hashtag segmentation
US10311029B2 (en) * 2017-01-04 2019-06-04 Sap Se Shared database dictionaries
US10319255B2 (en) 2016-11-08 2019-06-11 Pearson Education, Inc. Measuring language learning using standardized score scales and adaptive assessment engines
US10318239B2 (en) * 2012-03-01 2019-06-11 International Business Machines Corporation Finding a best matching string among a set of strings
US10318541B2 (en) 2013-04-30 2019-06-11 Splunk Inc. Correlating log data with performance measurements having a specified relationship to a threshold value
US10324915B2 (en) * 2016-02-05 2019-06-18 Hitachi, Ltd. Information processing apparatus, processing apparatus, data search method
US10331705B2 (en) * 2015-06-07 2019-06-25 Apple Inc. Moments naming based on location accuracy
US10346357B2 (en) 2013-04-30 2019-07-09 Splunk Inc. Processing of performance data and structure data from an information technology environment
US10353957B2 (en) 2013-04-30 2019-07-16 Splunk Inc. Processing of performance data and raw log data from an information technology environment
US10353938B1 (en) * 2012-03-02 2019-07-16 Google Llc Aggregating activity data for multiple users
US10353927B2 (en) * 2014-07-10 2019-07-16 Entit Software Llc Categorizing columns in a data table
US10360204B2 (en) * 2014-05-22 2019-07-23 Entit Software Llc User defined function, class creation for external data source access
US10360190B2 (en) * 2016-03-31 2019-07-23 Microsoft Technology Licensing, Llc Migrate data in a system using extensions
US10366055B2 (en) * 2010-05-13 2019-07-30 Microsoft Technology Licensing, Llc Decreasing duplicates and loops in an activity record
US10379958B2 (en) * 2015-06-03 2019-08-13 Axxana (Israel) Ltd. Fast archiving for database systems
US10380135B2 (en) * 2014-06-19 2019-08-13 Wells Fargo Bank, N.A. Data aggregation and reporting environment for data center infrastructure management
US10387499B2 (en) * 2014-05-29 2019-08-20 Panasonic Intellectual Property Management Co., Ltd. Cooking recipe supply method and control program
US10394823B2 (en) * 2017-01-04 2019-08-27 International Business Machines Corporation Detection and utilization of attributes
US10404799B2 (en) * 2014-11-19 2019-09-03 Commvault Systems, Inc. Migration to cloud storage from backup
US10409847B2 (en) * 2015-12-04 2019-09-10 Fujitsu Limited Computer-readable recording medium, learning method, and mail server
US10409834B2 (en) * 2016-07-11 2019-09-10 Al-Elm Information Security Co. Methods and systems for multi-dynamic data retrieval and data disbursement
US10423614B2 (en) * 2016-11-08 2019-09-24 International Business Machines Corporation Determining the significance of an event in the context of a natural language query
US10430465B2 (en) * 2017-01-04 2019-10-01 International Business Machines Corporation Dynamic faceting for personalized search and discovery
US10438500B2 (en) 2016-03-14 2019-10-08 Pearson Education, Inc. Job profile integration into talent management systems
US10452688B2 (en) * 2016-11-08 2019-10-22 Ebay Inc. Crowd assisted query system
US10459959B2 (en) * 2016-11-07 2019-10-29 Oath Inc. Top-k query processing with conditional skips
US10459960B2 (en) * 2016-11-08 2019-10-29 International Business Machines Corporation Clustering a set of natural language queries based on significant events
US10467188B2 (en) * 2009-12-08 2019-11-05 Netapp, Inc. In-line policy management with multi-level object handle
US10474704B2 (en) * 2016-06-27 2019-11-12 International Business Machines Corporation Recommending documents sets based on a similar set of correlated features
US10474678B1 (en) * 2015-06-03 2019-11-12 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US10474714B2 (en) * 2013-05-01 2019-11-12 Kble Ltd Method and component for classifying resources of a database
US10489402B2 (en) * 2016-11-08 2019-11-26 International Business Machines Corporation Bridging native JDBC calls with DBaaS using ESB
US10489456B2 (en) * 2016-11-08 2019-11-26 International Business Machines Corporation Topic bridging determination using topical graphs
US10496401B2 (en) * 2016-11-08 2019-12-03 Sap Se Managing rename of tables and table fields
US10521436B2 (en) * 2016-07-11 2019-12-31 Baidu Usa Llc Systems and methods for data and information source reliability estimation
US10528633B2 (en) 2017-01-23 2020-01-07 International Business Machines Corporation Utilizing online content to suggest item attribute importance
US10529033B2 (en) * 2015-11-06 2020-01-07 Clarifize, Inc Network connection system and method
US10540335B2 (en) 2013-07-09 2020-01-21 Oracle International Corporation Solution to generate a scriptset for an automated database migration
US10545943B2 (en) 2016-04-05 2020-01-28 International Business Machines Corporation Change stream analytics for data replication systems
US10558626B2 (en) * 2016-11-07 2020-02-11 Salesforce.Com, Inc. Merging and unmerging objects using graphical representation
US10579598B2 (en) * 2017-01-03 2020-03-03 International Business Machines Corporation Global namespace for a hierarchical set of file systems
US10579587B2 (en) * 2017-01-03 2020-03-03 International Business Machines Corporation Space management for a hierarchical set of file systems
US10585860B2 (en) * 2017-01-03 2020-03-10 International Business Machines Corporation Global namespace for a hierarchical set of file systems
US10592522B2 (en) 2013-04-30 2020-03-17 Splunk Inc. Correlating performance data and log data using diverse data stores
US10592479B2 (en) * 2017-01-03 2020-03-17 International Business Machines Corporation Space management for a hierarchical set of file systems
US10592326B2 (en) 2017-03-08 2020-03-17 Axxana (Israel) Ltd. Method and apparatus for data loss assessment
US10606708B2 (en) * 2017-01-04 2020-03-31 International Business Machines Corporation Risk measurement driven data protection strategy
US10613762B2 (en) * 2012-01-18 2020-04-07 Cloudera, Inc. Memory allocation buffer for reduction of heap fragmentation
US10628457B2 (en) * 2016-11-08 2020-04-21 International Business Machines Corporation Method and system for self-organizing an online community of news content readers and authors
US10650318B2 (en) 2016-07-20 2020-05-12 Baidu Usa Llc Systems and methods of determining sufficient causes from multiple outcomes
US10691654B2 (en) 2013-07-09 2020-06-23 Oracle International Corporation Automated database migration architecture
US10708370B2 (en) * 2016-11-08 2020-07-07 International Business Machines Corporation Method and system for assigning privileges in an online community of news content readers and authors
US10713315B2 (en) * 2014-02-21 2020-07-14 Apple Inc. Personalized targeting of media stations
US10726074B2 (en) * 2017-01-04 2020-07-28 Microsoft Technology Licensing, Llc Identifying among recent revisions to documents those that are relevant to a search query
US10725891B2 (en) 2014-05-30 2020-07-28 Micro Focus Llc Evaluating user experience
US10726003B2 (en) * 2016-01-05 2020-07-28 Caavo Inc Simultaneous search on multiple living room devices
US10733613B2 (en) * 2017-01-04 2020-08-04 Salesforce.Com, Inc. Methods and systems for performing data assessment
US10740313B2 (en) 2006-10-05 2020-08-11 Splunk Inc. Storing events associated with a time stamp extracted from log data and performing a search on the events and data that is not log data
US10747795B2 (en) 2018-01-11 2020-08-18 International Business Machines Corporation Cognitive retrieve and rank search improvements using natural language for product attributes
US10755371B1 (en) 2012-04-29 2020-08-25 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US10769028B2 (en) 2013-10-16 2020-09-08 Axxana (Israel) Ltd. Zero-transaction-loss recovery for database systems
US10776244B2 (en) 2013-07-09 2020-09-15 Oracle International Corporation Consolidation planning services for systems migration
US10810250B2 (en) * 2014-02-21 2020-10-20 Apple Inc. Revisiting content history
US10877982B1 (en) 2014-05-21 2020-12-29 Google, Llc Detection of popular content with narrow appeal
US10956463B2 (en) 2016-11-22 2021-03-23 International Business Machines Corporation System and method for generating improved search queries from natural language questions
US10969131B2 (en) 2015-10-28 2021-04-06 Johnson Controls Technology Company Sensor with halo light system
US10997191B2 (en) 2013-04-30 2021-05-04 Splunk Inc. Query-triggered processing of performance data and log data from an information technology environment
US11044504B2 (en) 2019-06-14 2021-06-22 A&E Television Networks Intellectual property rights management software systems for video content and methods of their manufacture and use
KR102269425B1 (en) * 2020-09-15 2021-06-25 주식회사 딥서치 Automated data processing method for topic adoption
US11055183B2 (en) 2009-08-04 2021-07-06 Axxana (Israel) Ltd. Data gap management in a remote data mirroring system
US11061979B2 (en) 2017-01-05 2021-07-13 International Business Machines Corporation Website domain specific search
US11107390B2 (en) 2018-12-21 2021-08-31 Johnson Controls Technology Company Display device with halo
US11157664B2 (en) 2013-07-09 2021-10-26 Oracle International Corporation Database modeling and analysis
US11163802B1 (en) * 2004-03-01 2021-11-02 Huawei Technologies Co., Ltd. Local search using restriction specification
US11194860B2 (en) 2016-07-11 2021-12-07 Baidu Usa Llc Question generation systems and methods for automating diagnosis
US11256671B2 (en) 2019-09-13 2022-02-22 Oracle International Corporation Integrated transition control center
US11392609B2 (en) 2016-04-05 2022-07-19 International Business Machines Corporation Supplementing change streams
US11423502B1 (en) 2012-04-29 2022-08-23 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US11636158B1 (en) 2015-06-03 2023-04-25 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US11676235B1 (en) 2015-06-03 2023-06-13 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties

Families Citing this family (97)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6760746B1 (en) 1999-09-01 2004-07-06 Eric Schneider Method, product, and apparatus for processing a data request
US6338082B1 (en) 1999-03-22 2002-01-08 Eric Schneider Method, product, and apparatus for requesting a network resource
US8037168B2 (en) 1999-07-15 2011-10-11 Esdr Network Solutions Llc Method, product, and apparatus for enhancing resolution services, registration services, and search services
US9141717B2 (en) 1999-03-22 2015-09-22 Esdr Network Solutions Llc Methods, systems, products, and devices for processing DNS friendly identifiers
US7188138B1 (en) 1999-03-22 2007-03-06 Eric Schneider Method, product, and apparatus for resource identifier registration and aftermarket services
USRE43690E1 (en) 1999-03-22 2012-09-25 Esdr Network Solutions Llc Search engine request method, product, and apparatus
US8667051B2 (en) * 1999-03-22 2014-03-04 Esdr Network Solutions Llc Real-time communication processing method, product, and apparatus
US7107192B1 (en) 1999-03-31 2006-09-12 International Business Machines Corporation Method for computing models based on attributes selected by entropy
US7213198B1 (en) * 1999-08-12 2007-05-01 Google Inc. Link based clustering of hyperlinked documents
USRE44207E1 (en) 1999-09-01 2013-05-07 Esdr Network Solutions Llc Network resource access method, product, and apparatus
US7000194B1 (en) * 1999-09-22 2006-02-14 International Business Machines Corporation Method and system for profiling users based on their relationships with content topics
US7127500B1 (en) * 1999-11-10 2006-10-24 Oclc Online Computer Library Center, Inc. Retrieval of digital objects by redirection of controlled vocabulary searches
US7711738B1 (en) * 1999-11-15 2010-05-04 West Services, Inc. Method, system and computer-readable medium for accessing and retrieving court records, items and documents
US6560597B1 (en) * 2000-03-21 2003-05-06 International Business Machines Corporation Concept decomposition using clustering
CA2303739C (en) * 2000-04-04 2009-06-30 Webhancer Corporation Method and system for managing performance of data transfers for a data access system
US6611814B1 (en) * 2000-07-17 2003-08-26 International Business Machines Corporation System and method for using virtual wish lists for assisting shopping over computer networks
US6873967B1 (en) 2000-07-17 2005-03-29 International Business Machines Corporation Electronic shopping assistant and method of use
US6643651B1 (en) * 2001-01-05 2003-11-04 At&T Corp. Navigation of object lists
US7260643B2 (en) * 2001-03-30 2007-08-21 Xerox Corporation Systems and methods for identifying user types using multi-modal clustering and information scent
US20030004996A1 (en) * 2001-06-29 2003-01-02 International Business Machines Corporation Method and system for spatial information retrieval for hyperlinked documents
US7110790B2 (en) * 2001-10-03 2006-09-19 Nokia Corporation Quick access list for previously accessed network addresses
US7124358B2 (en) * 2002-01-02 2006-10-17 International Business Machines Corporation Method for dynamically generating reference identifiers in structured information
US7565402B2 (en) * 2002-01-05 2009-07-21 Eric Schneider Sitemap access method, product, and apparatus
US7136875B2 (en) * 2002-09-24 2006-11-14 Google, Inc. Serving advertisements based on content
US7693830B2 (en) * 2005-08-10 2010-04-06 Google Inc. Programmable search engine
US20070038614A1 (en) * 2005-08-10 2007-02-15 Guha Ramanathan V Generating and presenting advertisements based on context data for programmable search engines
US7716199B2 (en) * 2005-08-10 2010-05-11 Google Inc. Aggregating context data for programmable search engines
US7743045B2 (en) 2005-08-10 2010-06-22 Google Inc. Detecting spam related and biased contexts for programmable search engines
US7716161B2 (en) * 2002-09-24 2010-05-11 Google, Inc, Methods and apparatus for serving relevant advertisements
US20070038603A1 (en) * 2005-08-10 2007-02-15 Guha Ramanathan V Sharing context data across programmable search engines
US7599852B2 (en) * 2002-04-05 2009-10-06 Sponster Llc Method and apparatus for adding advertising tag lines to electronic messages
US7231395B2 (en) * 2002-05-24 2007-06-12 Overture Services, Inc. Method and apparatus for categorizing and presenting documents of a distributed database
US8260786B2 (en) * 2002-05-24 2012-09-04 Yahoo! Inc. Method and apparatus for categorizing and presenting documents of a distributed database
US7162262B2 (en) 2002-09-23 2007-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Methods, systems and computer program products for requesting received power levels based on received block error rates utilizing an anti-windup and/or emergency procedure
US20100100437A1 (en) 2002-09-24 2010-04-22 Google, Inc. Suggesting and/or providing ad serving constraint information
US8086559B2 (en) 2002-09-24 2011-12-27 Google, Inc. Serving content-relevant advertisements with client-side device support
US20040059712A1 (en) * 2002-09-24 2004-03-25 Dean Jeffrey A. Serving advertisements using information associated with e-mail
US20040139042A1 (en) * 2002-12-31 2004-07-15 Schirmer Andrew L. System and method for improving data analysis through data grouping
US20050071310A1 (en) * 2003-09-30 2005-03-31 Nadav Eiron System, method, and computer program product for identifying multi-page documents in hypertext collections
US20050222989A1 (en) * 2003-09-30 2005-10-06 Taher Haveliwala Results based personalization of advertisements in a search engine
US8321278B2 (en) * 2003-09-30 2012-11-27 Google Inc. Targeted advertisements based on user profiles and page profile
US20050102283A1 (en) * 2003-10-15 2005-05-12 Anderson Stephen J. System with an interactive, graphical interface for delivery of planning information and consulting materials, research, and compliance information relating to tax or other forms
US20050198315A1 (en) * 2004-02-13 2005-09-08 Wesley Christopher W. Techniques for modifying the behavior of documents delivered over a computer network
US7716223B2 (en) 2004-03-29 2010-05-11 Google Inc. Variable personalization of search results in a search engine
US7756869B2 (en) * 2004-04-30 2010-07-13 The Boeing Company Methods and apparatus for extracting referential keys from a document
US7565630B1 (en) 2004-06-15 2009-07-21 Google Inc. Customization of search results for search queries received from third party sites
US20050289159A1 (en) * 2004-06-29 2005-12-29 The Boeing Company Web-enabled real-time link selection apparatus and method
US20050289447A1 (en) * 2004-06-29 2005-12-29 The Boeing Company Systems and methods for generating and storing referential links in a database
US20050289161A1 (en) * 2004-06-29 2005-12-29 The Boeing Company Integrated document directory generator apparatus and methods
US20050289185A1 (en) * 2004-06-29 2005-12-29 The Boeing Company Apparatus and methods for accessing information in database trees
US7421421B2 (en) * 2004-08-04 2008-09-02 International Business Machines Corporation Method for providing multi-variable dynamic search results visualizations
US7496563B2 (en) * 2004-08-04 2009-02-24 International Business Machines Corporation Method for locating documents a user has previously accessed
US7493303B2 (en) * 2004-08-04 2009-02-17 International Business Machines Corporation Method for remotely searching a local user index
US7395260B2 (en) * 2004-08-04 2008-07-01 International Business Machines Corporation Method for providing graphical representations of search results in multiple related histograms
US8261196B2 (en) * 2004-08-04 2012-09-04 International Business Machines Corporation Method for displaying usage metrics as part of search results
WO2006026579A2 (en) * 2004-08-27 2006-03-09 Peng Tao A personal online information management system
US7340672B2 (en) * 2004-09-20 2008-03-04 Intel Corporation Providing data integrity for data streams
US20060235965A1 (en) * 2005-03-07 2006-10-19 Claria Corporation Method for quantifying the propensity to respond to an advertisement
US7694212B2 (en) 2005-03-31 2010-04-06 Google Inc. Systems and methods for providing a graphical display of search activity
US8166028B1 (en) 2005-03-31 2012-04-24 Google Inc. Method, system, and graphical user interface for improved searching via user-specified annotations
US9256685B2 (en) * 2005-03-31 2016-02-09 Google Inc. Systems and methods for modifying search results based on a user's history
US7747632B2 (en) * 2005-03-31 2010-06-29 Google Inc. Systems and methods for providing subscription-based personalization
US20060224608A1 (en) * 2005-03-31 2006-10-05 Google, Inc. Systems and methods for combining sets of favorites
US8990193B1 (en) 2005-03-31 2015-03-24 Google Inc. Method, system, and graphical user interface for improved search result displays via user-specified annotations
US7783631B2 (en) 2005-03-31 2010-08-24 Google Inc. Systems and methods for managing multiple user accounts
US8589391B1 (en) 2005-03-31 2013-11-19 Google Inc. Method and system for generating web site ratings for a user
US20060224583A1 (en) * 2005-03-31 2006-10-05 Google, Inc. Systems and methods for analyzing a user's web history
US20070129999A1 (en) * 2005-11-18 2007-06-07 Jie Zhou Fraud detection in web-based advertising
US8903810B2 (en) 2005-12-05 2014-12-02 Collarity, Inc. Techniques for ranking search results
US8429184B2 (en) 2005-12-05 2013-04-23 Collarity Inc. Generation of refinement terms for search queries
US20080086356A1 (en) * 2005-12-09 2008-04-10 Steve Glassman Determining advertisements using user interest information and map-based location information
US20080086368A1 (en) * 2006-10-05 2008-04-10 Google Inc. Location Based, Content Targeted Online Advertising
US20080215416A1 (en) * 2007-01-31 2008-09-04 Collarity, Inc. Searchable interactive internet advertisements
US20080208803A1 (en) * 2007-02-27 2008-08-28 Wazap Ag System and method for characterising a web page
US7895197B2 (en) * 2007-04-30 2011-02-22 Sap Ag Hierarchical metadata generator for retrieval systems
JP5211557B2 (en) * 2007-06-15 2013-06-12 富士通株式会社 Web conference support program, recording medium recording the program, Web conference support device, and Web conference support method
US20090089246A1 (en) * 2007-09-28 2009-04-02 Yahoo! Inc. System and method for history clustering
US20090228296A1 (en) * 2008-03-04 2009-09-10 Collarity, Inc. Optimization of social distribution networks
US8051068B2 (en) * 2008-04-21 2011-11-01 Yahoo! Inc. Trail-based exploration of a repository of documents
US8438178B2 (en) * 2008-06-26 2013-05-07 Collarity Inc. Interactions among online digital identities
US20100088299A1 (en) * 2008-10-06 2010-04-08 O'sullivan Patrick J Autonomic summarization of content
US8533582B2 (en) * 2009-03-20 2013-09-10 Xerox Corporation Trail-based data content discovery, organization, and processing
US8856645B2 (en) * 2009-03-20 2014-10-07 Xerox Corporation Generating formatted documents based on collected data content
US20100251270A1 (en) * 2009-03-31 2010-09-30 Comscore, Inc. Selective Mobile Metering
US20120173338A1 (en) * 2009-09-17 2012-07-05 Behavioreal Ltd. Method and apparatus for data traffic analysis and clustering
US8875038B2 (en) 2010-01-19 2014-10-28 Collarity, Inc. Anchoring for content synchronization
US8321382B2 (en) * 2010-03-25 2012-11-27 Xerox Corporation Validating aggregate documents
US8775444B2 (en) 2010-10-29 2014-07-08 Xerox Corporation Generating a subset aggregate document from an existing aggregate document
US8856100B2 (en) * 2012-07-31 2014-10-07 International Business Machines Corporation Displaying browse sequence with search results
DE102013206825B4 (en) * 2013-04-16 2016-10-06 Siemens Aktiengesellschaft Method and apparatus for providing an additional data structure in a request for a resource
US20150112818A1 (en) 2013-10-22 2015-04-23 Google Inc. Content item selection criteria generation
US10380120B2 (en) 2014-03-18 2019-08-13 International Business Machines Corporation Automatic discovery and presentation of topic summaries related to a selection of text
US20160148321A1 (en) * 2014-11-20 2016-05-26 Hrb Innovations, Inc. Simplified screening for predicting errors in tax returns
US10657102B2 (en) 2017-01-03 2020-05-19 International Business Machines Corporation Storage space management in union mounted file systems
US10649955B2 (en) 2017-01-03 2020-05-12 International Business Machines Corporation Providing unique inodes across multiple file system namespaces
EP3743813A4 (en) * 2018-01-24 2021-11-10 Qomplx, Inc. Platform for hierarchy cooperative computing
US11328732B2 (en) 2020-09-16 2022-05-10 International Business Machines Corporation Generating summary text compositions

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2048039A1 (en) * 1991-07-19 1993-01-20 Steven Derose Data processing system and method for generating a representation for and random access rendering of electronic documents
US5619648A (en) * 1994-11-30 1997-04-08 Lucent Technologies Inc. Message filtering techniques
US5530852A (en) * 1994-12-20 1996-06-25 Sun Microsystems, Inc. Method for extracting profiles and topics from a first file written in a first markup language and generating files in different markup languages containing the profiles and topics for use in accessing data described by the profiles and topics
GB9426165D0 (en) * 1994-12-23 1995-02-22 Anthony Andre C Method of retrieving and displaying data
US5708825A (en) * 1995-05-26 1998-01-13 Iconovex Corporation Automatic summary page creation and hyperlink generation
US5781785A (en) * 1995-09-26 1998-07-14 Adobe Systems Inc Method and apparatus for providing an optimized document file of multiple pages
US5911140A (en) * 1995-12-14 1999-06-08 Xerox Corporation Method of ordering document clusters given some knowledge of user interests
US5813007A (en) * 1996-06-20 1998-09-22 Sun Microsystems, Inc. Automatic updates of bookmarks in a client computer
US5918237A (en) * 1996-09-30 1999-06-29 At&T Corp. System and method for providing multimedia bookmarks for hypertext markup language files
US5796393A (en) * 1996-11-08 1998-08-18 Compuserve Incorporated System for intergrating an on-line service community with a foreign service
US5819258A (en) * 1997-03-07 1998-10-06 Digital Equipment Corporation Method and apparatus for automatically generating hierarchical categories from large document collections

Cited By (219)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE42167E1 (en) * 1999-05-20 2011-02-22 Evresearch Ltd. Information management, retrieval and display systems and associated methods
US7594187B2 (en) * 1999-12-07 2009-09-22 Microsoft Corporation Bookmarking and placemarking a displayed document in a computer system
US20040236774A1 (en) * 1999-12-07 2004-11-25 Microsoft Corporation Bookmarking and placemarking a displayed document in a computer system
US6665710B1 (en) * 2000-05-11 2003-12-16 International Business Machines Corporation Searching local network addresses
US8689238B2 (en) 2000-05-18 2014-04-01 Carhamm Ltd., Llc Techniques for displaying impressions in documents delivered over a computer network
US6983320B1 (en) * 2000-05-23 2006-01-03 Cyveillance, Inc. System, method and computer program product for analyzing e-commerce competition of an entity by utilizing predetermined entity-specific metrics and analyzed statistics from web pages
US7013323B1 (en) * 2000-05-23 2006-03-14 Cyveillance, Inc. System and method for developing and interpreting e-commerce metrics by utilizing a list of rules wherein each rule contain at least one of entity-specific criteria
US20020091836A1 (en) * 2000-06-24 2002-07-11 Moetteli John Brent Browsing method for focusing research
US20080319955A1 (en) * 2000-10-04 2008-12-25 John Douglass Web browser page rating system
US7849160B2 (en) 2000-10-24 2010-12-07 Aol Inc. Methods and systems for collecting data for media files
US8918812B2 (en) 2000-10-24 2014-12-23 Aol Inc. Method of sizing an embedded media player page
US9595050B2 (en) 2000-10-24 2017-03-14 Aol Inc. Method of disseminating advertisements using an embedded media player page
US20110055026A1 (en) * 2000-10-24 2011-03-03 Aol Inc. Method of collecting data using an embedded media player page
US8595475B2 (en) 2000-10-24 2013-11-26 AOL, Inc. Method of disseminating advertisements using an embedded media player page
US20040051812A1 (en) * 2000-10-24 2004-03-18 Hayward Monte Duane Method of collecting data using an embedded media player page
US8819404B2 (en) 2000-10-24 2014-08-26 Aol Inc. Method of disseminating advertisements using an embedded media player page
US9454775B2 (en) 2000-10-24 2016-09-27 Aol Inc. Systems and methods for rendering content
US20040015398A1 (en) * 2001-10-24 2004-01-22 Hayward Monte Duane Method of disseminating advertisements using an embedded media player page
US8122236B2 (en) * 2001-10-24 2012-02-21 Aol Inc. Method of disseminating advertisements using an embedded media player page
US8316003B2 (en) 2002-11-05 2012-11-20 Carhamm Ltd., Llc Updating content of presentation vehicle in a computer network
US8170912B2 (en) 2003-11-25 2012-05-01 Carhamm Ltd., Llc Database structure and front end
US7305406B2 (en) 2003-12-17 2007-12-04 International Business Machines Corporation Computer aided authoring, electronic document browsing, retrieving, and subscribing and publishing
US20050154702A1 (en) * 2003-12-17 2005-07-14 International Business Machines Corporation Computer aided authoring, electronic document browsing, retrieving, and subscribing and publishing
US11860921B2 (en) 2004-03-01 2024-01-02 Huawei Technologies Co., Ltd. Category-based search
US11163802B1 (en) * 2004-03-01 2021-11-02 Huawei Technologies Co., Ltd. Local search using restriction specification
US20050222973A1 (en) * 2004-03-30 2005-10-06 Matthias Kaiser Methods and systems for summarizing information
US20060053109A1 (en) * 2004-07-02 2006-03-09 Srinivasan Sudanagunta Relevant multimedia advertising targeted based upon search query
US11768900B2 (en) 2004-07-02 2023-09-26 Yahoo Ad Tech Llc Systems and methods for providing media content over an electronic network
US9910920B2 (en) 2004-07-02 2018-03-06 Oath Inc. Relevant multimedia advertising targeted based upon search query
US10789624B2 (en) 2004-07-02 2020-09-29 Oath Inc. Systems and methods for providing media content over an electronic network
US8255413B2 (en) 2004-08-19 2012-08-28 Carhamm Ltd., Llc Method and apparatus for responding to request for information-personalization
US8078602B2 (en) 2004-12-17 2011-12-13 Claria Innovations, Llc Search engine for a computer network
US20060136528A1 (en) * 2004-12-20 2006-06-22 Claria Corporation Method and device for publishing cross-network user behavioral data
US9495446B2 (en) 2004-12-20 2016-11-15 Gula Consulting Limited Liability Company Method and device for publishing cross-network user behavioral data
US7693863B2 (en) * 2004-12-20 2010-04-06 Claria Corporation Method and device for publishing cross-network user behavioral data
US20130166528A1 (en) * 2004-12-21 2013-06-27 Scenera Technologies, Llc System And Method For Generating A Search Index And Executing A Context-Sensitive Search
US8645941B2 (en) 2005-03-07 2014-02-04 Carhamm Ltd., Llc Method for attributing and allocating revenue related to embedded software
US8073866B2 (en) 2005-03-17 2011-12-06 Claria Innovations, Llc Method for providing content to an internet user based on the user's demonstrated content preferences
US8086697B2 (en) 2005-06-28 2011-12-27 Claria Innovations, Llc Techniques for displaying impressions in documents delivered over a computer network
US9633356B2 (en) 2006-07-20 2017-04-25 Aol Inc. Targeted advertising for playlists based upon search queries
US11526482B2 (en) 2006-10-05 2022-12-13 Splunk Inc. Determining timestamps to be associated with events in machine data
US11537585B2 (en) 2006-10-05 2022-12-27 Splunk Inc. Determining time stamps in machine data derived events
US10977233B2 (en) 2006-10-05 2021-04-13 Splunk Inc. Aggregating search results from a plurality of searches executed across time series data
US11947513B2 (en) 2006-10-05 2024-04-02 Splunk Inc. Search phrase processing
US10740313B2 (en) 2006-10-05 2020-08-11 Splunk Inc. Storing events associated with a time stamp extracted from log data and performing a search on the events and data that is not log data
US11249971B2 (en) 2006-10-05 2022-02-15 Splunk Inc. Segmenting machine data using token-based signatures
US10891281B2 (en) 2006-10-05 2021-01-12 Splunk Inc. Storing events derived from log data and performing a search on the events and data that is not log data
US11144526B2 (en) 2006-10-05 2021-10-12 Splunk Inc. Applying time-based search phrases across event data
US10747742B2 (en) 2006-10-05 2020-08-18 Splunk Inc. Storing log data and performing a search on the log data and data that is not log data
US11561952B2 (en) 2006-10-05 2023-01-24 Splunk Inc. Storing events derived from log data and performing a search on the events and data that is not log data
US11550772B2 (en) 2006-10-05 2023-01-10 Splunk Inc. Time series search phrase processing
US20080162537A1 (en) * 2006-12-29 2008-07-03 Ebay Inc. Method and system for utilizing profiles
US8620952B2 (en) 2007-01-03 2013-12-31 Carhamm Ltd., Llc System for database reporting
US20080172380A1 (en) * 2007-01-17 2008-07-17 Wojciech Czyz Information retrieval based on information location in the information space.
US20100082673A1 (en) * 2008-09-30 2010-04-01 Kabushiki Kaisha Toshiba Apparatus, method and program product for classifying web browsing purposes
US9189562B2 (en) * 2008-09-30 2015-11-17 Kabushiki Kaisha Toshiba Apparatus, method and program product for classifying web browsing purposes
US20100192069A1 (en) * 2009-01-23 2010-07-29 Cisco Technology, Inc. Differentiating a User from Multiple Users Based on a Determined Pattern of Accessing a Prescribed Network Destination
US10445675B2 (en) * 2009-06-03 2019-10-15 Oracle International Corporation Confirming enforcement of business rules specified in a data access tier of a multi-tier application
US20100312592A1 (en) * 2009-06-03 2010-12-09 Oracle International Corporation Confirming enforcement of business rules specified in a data access tier of a multi-tier application
US11055183B2 (en) 2009-08-04 2021-07-06 Axxana (Israel) Ltd. Data gap management in a remote data mirroring system
US10467188B2 (en) * 2009-12-08 2019-11-05 Netapp, Inc. In-line policy management with multi-level object handle
US20110219029A1 (en) * 2010-03-03 2011-09-08 Daniel-Alexander Billsus Document processing using retrieval path data
US20110218883A1 (en) * 2010-03-03 2011-09-08 Daniel-Alexander Billsus Document processing using retrieval path data
US20110219030A1 (en) * 2010-03-03 2011-09-08 Daniel-Alexander Billsus Document presentation using retrieval path data
US10366055B2 (en) * 2010-05-13 2019-07-30 Microsoft Technology Licensing, Llc Decreasing duplicates and loops in an activity record
US20130227401A1 (en) * 2010-06-03 2013-08-29 Rhonda Enterprises, Llc Systems and methods for presenting a content summary of a media item to a uesr based on a position within the media item
US9495344B2 (en) * 2010-06-03 2016-11-15 Rhonda Enterprises, Llc Systems and methods for presenting a content summary of a media item to a user based on a position within the media item
US8655648B2 (en) * 2010-09-01 2014-02-18 Microsoft Corporation Identifying topically-related phrases in a browsing sequence
US20120053927A1 (en) * 2010-09-01 2012-03-01 Microsoft Corporation Identifying topically-related phrases in a browsing sequence
US10613762B2 (en) * 2012-01-18 2020-04-07 Cloudera, Inc. Memory allocation buffer for reduction of heap fragmentation
US11899937B2 (en) 2012-01-18 2024-02-13 Cloudera, Inc. Memory allocation buffer for reduction of heap fragmentation
US10318239B2 (en) * 2012-03-01 2019-06-11 International Business Machines Corporation Finding a best matching string among a set of strings
US10353938B1 (en) * 2012-03-02 2019-07-16 Google Llc Aggregating activity data for multiple users
US11238080B2 (en) 2012-03-02 2022-02-01 Google Llc Aggregating activity data for multiple users
US10311537B1 (en) 2012-04-29 2019-06-04 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US10755371B1 (en) 2012-04-29 2020-08-25 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US11423502B1 (en) 2012-04-29 2022-08-23 Subject Packet Solutions, Llc System for facilitating the execution of law enforcement duties
US10042836B1 (en) * 2012-04-30 2018-08-07 Intuit Inc. Semantic knowledge base for tax preparation
US10997191B2 (en) 2013-04-30 2021-05-04 Splunk Inc. Query-triggered processing of performance data and log data from an information technology environment
US11119982B2 (en) 2013-04-30 2021-09-14 Splunk Inc. Correlation of performance data and structure data from an information technology environment
US10614132B2 (en) * 2013-04-30 2020-04-07 Splunk Inc. GUI-triggered processing of performance data and log data from an information technology environment
US11250068B2 (en) 2013-04-30 2022-02-15 Splunk Inc. Processing of performance data and raw log data from an information technology environment using search criterion input via a graphical user interface
US10877987B2 (en) 2013-04-30 2020-12-29 Splunk Inc. Correlating log data with performance measurements using a threshold value
US10225136B2 (en) 2013-04-30 2019-03-05 Splunk Inc. Processing of log data and performance data obtained via an application programming interface (API)
US10592522B2 (en) 2013-04-30 2020-03-17 Splunk Inc. Correlating performance data and log data using diverse data stores
US11782989B1 (en) 2013-04-30 2023-10-10 Splunk Inc. Correlating data based on user-specified search criteria
US10318541B2 (en) 2013-04-30 2019-06-11 Splunk Inc. Correlating log data with performance measurements having a specified relationship to a threshold value
US20170169134A1 (en) * 2013-04-30 2017-06-15 Splunk Inc. Gui-triggered processing of performance data and log data from an information technology environment
US10877986B2 (en) 2013-04-30 2020-12-29 Splunk Inc. Obtaining performance data via an application programming interface (API) for correlation with log data
US10346357B2 (en) 2013-04-30 2019-07-09 Splunk Inc. Processing of performance data and structure data from an information technology environment
US10353957B2 (en) 2013-04-30 2019-07-16 Splunk Inc. Processing of performance data and raw log data from an information technology environment
US10474714B2 (en) * 2013-05-01 2019-11-12 Kble Ltd Method and component for classifying resources of a database
US10248671B2 (en) 2013-07-09 2019-04-02 Oracle International Corporation Dynamic migration script management
US10540335B2 (en) 2013-07-09 2020-01-21 Oracle International Corporation Solution to generate a scriptset for an automated database migration
US11157664B2 (en) 2013-07-09 2021-10-26 Oracle International Corporation Database modeling and analysis
US10198255B2 (en) 2013-07-09 2019-02-05 Oracle International Corporation Method and system for reducing instability when upgrading software
US10776244B2 (en) 2013-07-09 2020-09-15 Oracle International Corporation Consolidation planning services for systems migration
US10691654B2 (en) 2013-07-09 2020-06-23 Oracle International Corporation Automated database migration architecture
US10769028B2 (en) 2013-10-16 2020-09-08 Axxana (Israel) Ltd. Zero-transaction-loss recovery for database systems
US10713315B2 (en) * 2014-02-21 2020-07-14 Apple Inc. Personalized targeting of media stations
US10810250B2 (en) * 2014-02-21 2020-10-20 Apple Inc. Revisiting content history
US10387492B2 (en) * 2014-05-12 2019-08-20 Rakuten, Inc. Information processing system, information processing method, and program
US20170169129A1 (en) * 2014-05-12 2017-06-15 Rakuten, Inc. Information processing system, information processing method, and program
CN106462661A (en) * 2014-05-13 2017-02-22 爱克发医疗保健公司 A system and a related method for automatically selecting a hanging protocol for a medical study
US10877982B1 (en) 2014-05-21 2020-12-29 Google, Llc Detection of popular content with narrow appeal
US10360204B2 (en) * 2014-05-22 2019-07-23 Entit Software Llc User defined function, class creation for external data source access
US10387499B2 (en) * 2014-05-29 2019-08-20 Panasonic Intellectual Property Management Co., Ltd. Cooking recipe supply method and control program
US10725891B2 (en) 2014-05-30 2020-07-28 Micro Focus Llc Evaluating user experience
US11138221B1 (en) 2014-06-19 2021-10-05 Wells Fargo Bank, N.A. Data aggregation and reporting environment for data center infrastructure management
US10380135B2 (en) * 2014-06-19 2019-08-13 Wells Fargo Bank, N.A. Data aggregation and reporting environment for data center infrastructure management
US10353927B2 (en) * 2014-07-10 2019-07-16 Entit Software Llc Categorizing columns in a data table
US10404799B2 (en) * 2014-11-19 2019-09-03 Commvault Systems, Inc. Migration to cloud storage from backup
US10303693B2 (en) * 2014-11-20 2019-05-28 International Business Machines Corporation Normalization of confidence thresholds in federated environments
US11055296B2 (en) 2014-11-20 2021-07-06 International Business Machines Corporation Normalization of confidence thresholds in federated environments
US10102290B2 (en) * 2015-03-12 2018-10-16 Oracle International Corporation Methods for identifying, ranking, and displaying subject matter experts on social networks
US20160267188A1 (en) * 2015-03-12 2016-09-15 Oracle International Corporation Methods for identifying, ranking, and displaying subject matter experts on social networks
US10296514B2 (en) * 2015-04-30 2019-05-21 Ricoh Company, Ltd. Information processing system, method for acquiring information, information processing apparatus and recording medium
US10474678B1 (en) * 2015-06-03 2019-11-12 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US11636158B1 (en) 2015-06-03 2023-04-25 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US11676235B1 (en) 2015-06-03 2023-06-13 Subject Packet Solutions, Llc Computer-based system for facilitating the execution of law enforcement duties
US10379958B2 (en) * 2015-06-03 2019-08-13 Axxana (Israel) Ltd. Fast archiving for database systems
US10922094B2 (en) * 2015-06-05 2021-02-16 Apple Inc. Systems and methods for proactively providing recommendations to a user of a computing device
US20160357808A1 (en) * 2015-06-05 2016-12-08 Apple Inc. Systems and methods for proactively providing recommendations to a user of a computing device
US10331705B2 (en) * 2015-06-07 2019-06-25 Apple Inc. Moments naming based on location accuracy
US10055498B2 (en) 2015-07-07 2018-08-21 Oracle International Corporation Methods for assessing and scoring user proficiency in topics determined by data from social networks and other sources
US10282473B2 (en) * 2015-09-08 2019-05-07 Molbase (Shanghai) Biotechnology Co., Ltd Task-crawling system and task-crawling method for distributed crawler system
US10969131B2 (en) 2015-10-28 2021-04-06 Johnson Controls Technology Company Sensor with halo light system
US10162327B2 (en) 2015-10-28 2018-12-25 Johnson Controls Technology Company Multi-function thermostat with concierge features
US10310477B2 (en) 2015-10-28 2019-06-04 Johnson Controls Technology Company Multi-function thermostat with occupant tracking features
US10529033B2 (en) * 2015-11-06 2020-01-07 Clarifize, Inc Network connection system and method
US10255335B2 (en) * 2015-11-06 2019-04-09 Cloudera, Inc. Database workload analysis and optimization visualizations
US10210248B2 (en) * 2015-12-04 2019-02-19 Fujitsu Limited Computer-readable recording medium, display control method, and information processing device
US10409847B2 (en) * 2015-12-04 2019-09-10 Fujitsu Limited Computer-readable recording medium, learning method, and mail server
US10726003B2 (en) * 2016-01-05 2020-07-28 Caavo Inc Simultaneous search on multiple living room devices
US10324915B2 (en) * 2016-02-05 2019-06-18 Hitachi, Ltd. Information processing apparatus, processing apparatus, data search method
US20170249335A1 (en) * 2016-02-29 2017-08-31 Red Hat, Inc. Snapshot management in distributed file systems
US10733153B2 (en) * 2016-02-29 2020-08-04 Red Hat, Inc. Snapshot management in distributed file systems
US11797494B2 (en) 2016-02-29 2023-10-24 Red Hat, Inc. Snapshot management in distributed file systems
US10438500B2 (en) 2016-03-14 2019-10-08 Pearson Education, Inc. Job profile integration into talent management systems
US10360190B2 (en) * 2016-03-31 2019-07-23 Microsoft Technology Licensing, Llc Migrate data in a system using extensions
US10599633B2 (en) 2016-04-05 2020-03-24 International Business Machines Corporation Change stream analytics for data replication systems
US11392609B2 (en) 2016-04-05 2022-07-19 International Business Machines Corporation Supplementing change streams
US10545943B2 (en) 2016-04-05 2020-01-28 International Business Machines Corporation Change stream analytics for data replication systems
US20170351740A1 (en) * 2016-06-07 2017-12-07 International Business Machines Corporation Determining stalwart nodes in signed social networks
US20170351716A1 (en) * 2016-06-07 2017-12-07 Oracle International Corporation Resource allocation for database provisioning
US11036696B2 (en) * 2016-06-07 2021-06-15 Oracle International Corporation Resource allocation for database provisioning
US10474704B2 (en) * 2016-06-27 2019-11-12 International Business Machines Corporation Recommending documents sets based on a similar set of correlated features
US11409775B2 (en) 2016-06-27 2022-08-09 International Business Machines Corporation Recommending documents sets based on a similar set of correlated features
US10360201B2 (en) * 2016-07-11 2019-07-23 Investcloud Inc Data exchange common interface configuration
US10475090B2 (en) * 2016-07-11 2019-11-12 Micro Focus Llc Calculating user experience scores
US10635661B2 (en) * 2016-07-11 2020-04-28 Facebook, Inc. Keyboard-based corrections for search queries on online social networks
US10409834B2 (en) * 2016-07-11 2019-09-10 Al-Elm Information Security Co. Methods and systems for multi-dynamic data retrieval and data disbursement
US20180011855A1 (en) * 2016-07-11 2018-01-11 Hewlett Packard Enterprise Development Lp Calculating user experience scores
US11194860B2 (en) 2016-07-11 2021-12-07 Baidu Usa Llc Question generation systems and methods for automating diagnosis
US10521436B2 (en) * 2016-07-11 2019-12-31 Baidu Usa Llc Systems and methods for data and information source reliability estimation
US20180011900A1 (en) * 2016-07-11 2018-01-11 Facebook, Inc. Keyboard-Based Corrections for Search Queries on Online Social Networks
US20180011884A1 (en) * 2016-07-11 2018-01-11 Investcloud Inc Data exchange common interface configuration
US11232122B2 (en) 2016-07-11 2022-01-25 Al-Elm Information Security Co. Method for data retrieval and dispersement using an eligibility engine
US20180018330A1 (en) * 2016-07-12 2018-01-18 International Business Machines Corporation Multi-field search query ranking using scoring statistics
US10698908B2 (en) * 2016-07-12 2020-06-30 International Business Machines Corporation Multi-field search query ranking using scoring statistics
US10650318B2 (en) 2016-07-20 2020-05-12 Baidu Usa Llc Systems and methods of determining sufficient causes from multiple outcomes
US11157540B2 (en) * 2016-09-12 2021-10-26 International Business Machines Corporation Search space reduction for knowledge graph querying and interactions
US20180075070A1 (en) * 2016-09-12 2018-03-15 International Business Machines Corporation Search space reduction for knowledge graph querying and interactions
US20180121496A1 (en) * 2016-11-03 2018-05-03 Pearson Education, Inc. Mapping data resources to requested objectives
US10885024B2 (en) * 2016-11-03 2021-01-05 Pearson Education, Inc. Mapping data resources to requested objectives
US20180121508A1 (en) * 2016-11-03 2018-05-03 Soundhound, Inc. Dynamic choice of data sources in natural language query processing
US10585891B2 (en) * 2016-11-03 2020-03-10 Soundhound, Inc. Dynamic choice of data sources in natural language query processing
US10558626B2 (en) * 2016-11-07 2020-02-11 Salesforce.Com, Inc. Merging and unmerging objects using graphical representation
US10459959B2 (en) * 2016-11-07 2019-10-29 Oath Inc. Top-k query processing with conditional skips
US11386125B2 (en) 2016-11-08 2022-07-12 Ebay Inc. Crowd assisted query system
US11645315B2 (en) 2016-11-08 2023-05-09 International Business Machines Corporation Clustering a set of natural language queries based on significant events
US10452688B2 (en) * 2016-11-08 2019-10-22 Ebay Inc. Crowd assisted query system
US10628457B2 (en) * 2016-11-08 2020-04-21 International Business Machines Corporation Method and system for self-organizing an online community of news content readers and authors
US10708370B2 (en) * 2016-11-08 2020-07-07 International Business Machines Corporation Method and system for assigning privileges in an online community of news content readers and authors
US11048697B2 (en) 2016-11-08 2021-06-29 International Business Machines Corporation Determining the significance of an event in the context of a natural language query
US10459922B2 (en) * 2016-11-08 2019-10-29 At&T Intellectual Property I, L.P. Unique identification generation for records in a data streaming processing system
US11036776B2 (en) 2016-11-08 2021-06-15 International Business Machines Corporation Clustering a set of natural language queries based on significant events
US20180129698A1 (en) * 2016-11-08 2018-05-10 At&T Intellectual Property I, L.P. Unique identification generation for records in a data streaming processing system
US10783125B2 (en) * 2016-11-08 2020-09-22 International Business Machines Corporation Automatic data purging in a database management system
US10423614B2 (en) * 2016-11-08 2019-09-24 International Business Machines Corporation Determining the significance of an event in the context of a natural language query
US10319255B2 (en) 2016-11-08 2019-06-11 Pearson Education, Inc. Measuring language learning using standardized score scales and adaptive assessment engines
US20180129687A1 (en) * 2016-11-08 2018-05-10 International Business Machines Corporation Automatic data purging in a database management system
US11341140B2 (en) 2016-11-08 2022-05-24 At&T Intellectual Property I, L.P. Unique identification generation for records in a data streaming processing system
US10459960B2 (en) * 2016-11-08 2019-10-29 International Business Machines Corporation Clustering a set of natural language queries based on significant events
US10489402B2 (en) * 2016-11-08 2019-11-26 International Business Machines Corporation Bridging native JDBC calls with DBaaS using ESB
US10489456B2 (en) * 2016-11-08 2019-11-26 International Business Machines Corporation Topic bridging determination using topical graphs
US11194862B2 (en) 2016-11-08 2021-12-07 International Business Machines Corporation Topic bridging determination using topical graphs
US10496401B2 (en) * 2016-11-08 2019-12-03 Sap Se Managing rename of tables and table fields
US10956463B2 (en) 2016-11-22 2021-03-23 International Business Machines Corporation System and method for generating improved search queries from natural language questions
US11429568B2 (en) 2017-01-03 2022-08-30 International Business Machines Corporation Global namespace for a hierarchical set of file systems
US10585860B2 (en) * 2017-01-03 2020-03-10 International Business Machines Corporation Global namespace for a hierarchical set of file systems
US10579598B2 (en) * 2017-01-03 2020-03-03 International Business Machines Corporation Global namespace for a hierarchical set of file systems
US10592479B2 (en) * 2017-01-03 2020-03-17 International Business Machines Corporation Space management for a hierarchical set of file systems
US10579587B2 (en) * 2017-01-03 2020-03-03 International Business Machines Corporation Space management for a hierarchical set of file systems
US11216509B2 (en) 2017-01-04 2022-01-04 International Business Machines Corporation Dynamic faceting for personalized search and discovery
US10311524B2 (en) * 2017-01-04 2019-06-04 International Business Machines Corporation Hashtag segmentation
US10606708B2 (en) * 2017-01-04 2020-03-31 International Business Machines Corporation Risk measurement driven data protection strategy
US11294909B2 (en) 2017-01-04 2022-04-05 International Business Machines Corporation Detection and utilization of attributes
US10726074B2 (en) * 2017-01-04 2020-07-28 Microsoft Technology Licensing, Llc Identifying among recent revisions to documents those that are relevant to a search query
US10311029B2 (en) * 2017-01-04 2019-06-04 Sap Se Shared database dictionaries
US10733613B2 (en) * 2017-01-04 2020-08-04 Salesforce.Com, Inc. Methods and systems for performing data assessment
US10649857B2 (en) * 2017-01-04 2020-05-12 International Business Machine Corporation Risk measurement driven data protection strategy
US10394823B2 (en) * 2017-01-04 2019-08-27 International Business Machines Corporation Detection and utilization of attributes
US10430465B2 (en) * 2017-01-04 2019-10-01 International Business Machines Corporation Dynamic faceting for personalized search and discovery
US11061979B2 (en) 2017-01-05 2021-07-13 International Business Machines Corporation Website domain specific search
US10528633B2 (en) 2017-01-23 2020-01-07 International Business Machines Corporation Utilizing online content to suggest item attribute importance
US11144606B2 (en) 2017-01-23 2021-10-12 International Business Machines Corporation Utilizing online content to suggest item attribute importance
US10592326B2 (en) 2017-03-08 2020-03-17 Axxana (Israel) Ltd. Method and apparatus for data loss assessment
US10747795B2 (en) 2018-01-11 2020-08-18 International Business Machines Corporation Cognitive retrieve and rank search improvements using natural language for product attributes
US11663223B1 (en) 2018-03-30 2023-05-30 Atlassian Pty Ltd. Search based on group relevance
US10282359B1 (en) * 2018-03-30 2019-05-07 Atlassian Pty Ltd Search based on group relevance
US11107390B2 (en) 2018-12-21 2021-08-31 Johnson Controls Technology Company Display device with halo
US11405672B2 (en) 2019-06-14 2022-08-02 A&E Television Networks Intellectual property rights management software systems for video content and methods of their manufacture and use
US11044504B2 (en) 2019-06-14 2021-06-22 A&E Television Networks Intellectual property rights management software systems for video content and methods of their manufacture and use
US11256671B2 (en) 2019-09-13 2022-02-22 Oracle International Corporation Integrated transition control center
US11822526B2 (en) 2019-09-13 2023-11-21 Oracle International Corporation Integrated transition control center
KR102477893B1 (en) 2020-09-15 2022-12-15 주식회사 딥서치 Automated data processing method for topic adoption
KR20220036324A (en) * 2020-09-15 2022-03-22 주식회사 딥서치 Automated data processing method for topic adoption
KR102269425B1 (en) * 2020-09-15 2021-06-25 주식회사 딥서치 Automated data processing method for topic adoption

Also Published As

Publication number Publication date
EP1224578A4 (en) 2004-09-08
WO2000029985A8 (en) 2001-02-15
WO2000029985A1 (en) 2000-05-25
EP1224578A1 (en) 2002-07-24
IL143107A0 (en) 2002-04-21
AU1914300A (en) 2000-06-05
CA2352174A1 (en) 2000-05-25
US6356898B2 (en) 2002-03-12

Similar Documents

Publication Publication Date Title
US6356898B2 (en) Method and system for summarizing topics of documents browsed by a user
US6377983B1 (en) Method and system for converting expertise based on document usage
Tanasa et al. Advanced data preprocessing for intersites web usage mining
US8843481B1 (en) System and method of forming action based virtual communities and related search mechanisms
US6493702B1 (en) System and method for searching and recommending documents in a collection using share bookmarks
Kautz et al. The hidden web
US6006217A (en) Technique for providing enhanced relevance information for documents retrieved in a multi database search
US6671681B1 (en) System and technique for suggesting alternate query expressions based on prior user selections and their query strings
US8478792B2 (en) Systems and methods for presenting information based on publisher-selected labels
EP0958541B1 (en) Intelligent network browser using incremental conceptual indexer
US7747654B2 (en) Method and apparatus for applying a parametric search methodology to a directory tree database format
JP4623820B2 (en) Network-based information retrieval system and document search promotion method
Xue et al. Log mining to improve the performance of site search
Tan et al. Web information monitoring for competitive intelligence
CA2251043A1 (en) Method of organizing information retrieved from the internet using knowledge based representation
WO2000048057A2 (en) Bookmark search engine
Arnoux et al. Automatic clustering for the web usage mining
Beale Improving internet interaction: from theory to practice
Wai Loke et al. A knowledge‐based approach to domain‐specialized information agents
Choudhary et al. Adaptive Query Recommendation Techniques for Log Files Mining to Analysis User’s Session Pattern
Pujeri et al. Constraint based frequent pattern mining for generalized query templates from web log
Intersites Advanced Data Preprocessing for Intersites Web Usage Mining
Patil et al. Content and usage based ranking for enhancing search result delivery
Amento User Interfaces for Topic Management of Web Sites
Wen Enhancing web search through query log mining

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:COHEN, ANDREW L.;MAGLIO, PAUL P.;BARRETT, ROBERT C.;AND OTHERS;REEL/FRAME:009804/0417;SIGNING DATES FROM 19990118 TO 19990219

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12

SULP Surcharge for late payment

Year of fee payment: 11