Recommendation system that identifies a valuable user action...

Data processing: artificial intelligence – Machine learning

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C706S061000, C707S793000, C707S793000

Reexamination Certificate

active

07657493

ABSTRACT:
Personal data mining mechanisms and methods are employed to identify relevant information that otherwise would likely remain undiscovered. Users supply personal data that can be analyzed in conjunction with data associated with a plurality of other users to provide useful information that can improve business operations and/or quality of life. Personal data can be mined alone or in conjunction with third party data to identify correlations amongst the data and associated users. Applications or services can interact with such data and present it to users in a myriad of manners, for instance as notifications of opportunities.

REFERENCES:
patent: 5263165 (1993-11-01), Janis
patent: 5537404 (1996-07-01), Bentley et al.
patent: 6064656 (2000-05-01), Angal et al.
patent: 6195683 (2001-02-01), Palmer et al.
patent: 6209039 (2001-03-01), Albright et al.
patent: 6226260 (2001-05-01), McDysan
patent: 6341127 (2002-01-01), Katsube et al.
patent: 6434532 (2002-08-01), Goldband et al.
patent: 6469991 (2002-10-01), Chuah
patent: 6496482 (2002-12-01), Kubota
patent: 6628770 (2003-09-01), Jain et al.
patent: 6707820 (2004-03-01), Arndt et al.
patent: 6745224 (2004-06-01), D'Souza et al.
patent: 6820070 (2004-11-01), Goldman
patent: 6917975 (2005-07-01), Griffin et al.
patent: 6961318 (2005-11-01), Fichou et al.
patent: 7002926 (2006-02-01), Eneboe et al.
patent: 7065041 (2006-06-01), Sen
patent: 2001/0047355 (2001-11-01), Anwar
patent: 2002/0124053 (2002-09-01), Adams et al.
patent: 2003/0093792 (2003-05-01), Labeeb
patent: 2003/0105734 (2003-06-01), Hitchen et al.
patent: 2003/0115105 (2003-06-01), Lin
patent: 2003/0229623 (2003-12-01), Chang et al.
patent: 2004/0076160 (2004-04-01), Phaltankar
patent: 2004/0098456 (2004-05-01), Kryzanowski et al.
patent: 2005/0138419 (2005-06-01), Gupta et al.
patent: 2005/0238024 (2005-10-01), Taylor et al.
patent: 2005/0262132 (2005-11-01), Morita et al.
patent: 2005/0289234 (2005-12-01), Dai et al.
patent: 2006/0020700 (2006-01-01), Qiu et al.
patent: 2006/0031518 (2006-02-01), Jennings
patent: 2006/0036904 (2006-02-01), Yang
patent: 2006/0048224 (2006-03-01), Duncan et al.
patent: 2006/0062161 (2006-03-01), Tang et al.
patent: 2006/0123005 (2006-06-01), Burnett et al.
patent: 2007/0106754 (2007-05-01), Moore
patent: 2008/0154698 (2008-06-01), Flake
patent: 2008/0215428 (2008-09-01), Ramer
patent: 2005022826 (2006-10-01), None
Stohr, Recommendation Systems: Decision Support for the Information Economy, 1998.
Srivastava, et al., Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data http://www.sigkdd.org/explorations/issues/1-2-2000-01/srivastava.pdf. Last accessed on Nov. 28, 2008, 12 pages.
News Room http://www.democraticmedia.org/book/export/html/28. Last accessed on Nov. 28, 2008, 153 pages.
Letters to the Editor http://letters.computing.co.uk/security/index.html. Last accessed on Nov. 28, 2008, 46 pages.
Brunner, et al. “Disruption Tolerant Networking” Dagstuhl Seminar Proceedings (2005) NEC Europe Ltd., Network Labooratories, 4 pages.
Fox, et al. “Towards Flexible Messaging for SOAP Based Services” (2004) IEEE, 11 pages.
Gunduz, et al. “A Framework for Aggregation Network Performance in Distributed Brokering Systems” (2000) Deptartment of Electrical Engineering & Computer Science, Syracuse University, 11 pages.
Chekuri, et al. “Building Edge-Failure Resilient Networks” (2002) Lucent Bell Labs, 18 pages.
Hota, et al. “Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model” (2004) GESTS International Transaction on Computer Science and Engineering, vol. 6 and No. 1, Journal ISSN No. 1738-6438, 12 pages.
Brightwell, et al. “Reserving Resilient Capacity in a Network” (2003) Networks 41, No. 2, 20 pages.
Duffield, et al. “A Flexible Model for Resource Management in Virtual Private Networks” (1999) ACM SIGCOMM Computer Communication Review vol. 29 , Issue 4, 14 pages.
Create Buzz Marketing & Word of Mouth Marketing Campaigns. 2004-2005 Buzzoodle, A Liquid Learning Inc. Company. http://www.buzzoodle.com. Last accessed Sep. 20, 2006.
Seth Godin. Unleashing the Ideavirus. Do You Zoom, Inc., 2000.
James Surowiecki. The Wisdom of Crowds. Doubleday, 2004.
Sandhu, et al. Access Control: Principles and Practice. IEEE Communications Magazine, Sep. 1994.
System Management Concepts: Operating System and Devices, http://www.dlib.indiana.edu/doc—link/en—US/a—doc—lib/aixbman/admnconc/audit.htm. Last accessed Sep. 20, 2006.
Hughes, et al. Automated Verification of Access Control Policies. http://www.cs.ucsb.edu/˜bultan/publications/tech-report04.pdf. Last accessed Sep. 20, 2006.
Cederquist, et al. An Audit Logic for Accountability. 2005. http://www.citebase.org/fulltext?format=application/pdf&identifier=oai:arXiv.org:cs/0502091. Last accessed Sep. 20, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Recommendation system that identifies a valuable user action... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Recommendation system that identifies a valuable user action..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Recommendation system that identifies a valuable user action... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4178220

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.