Fei Cao - Issaquah WA, US Shaoyu Zhou - Issaquah WA, US Zhuoqing Wu, Jr. - Bellevue WA, US Sijian Zhang - Bellevue WA, US Siddhartha Roy - Bellevue WA, US Michael A. Elizarov - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/177 G06F 15/16
US Classification:
709224
Abstract:
Large sets of unorganized data may provide little value in identifying useful observations from such data. For example, an online merchant may maintain a database of millions of user IDs (e. g. , a cookie ID, a login ID, a device ID, a network ID, etc. ) along with content viewed and/or actions taken with the user IDs, where minimal associations are known between user IDs. It may be advantageous to link together user IDs of respective users to capture a comprehensive view of respective users' activities. Accordingly, one or more systems and/or techniques for identifying a cluster of nodes based upon transforming a set of node pairings (e. g. , pairings of related nodes) one or more times are disclosed herein. Iterative transformations may be performed until respective nodes are paired with merely their smallest neighboring node and are paired with no other node. In this way, node clusters may be identifiable.
Fei Cao - Issaquah WA, US Shaoyu Zhou - Issaquah WA, US Siddhartha Roy - Kirkland WA, US Michael Elizarov - Sammamish WA, US Zhuoqing Wu - Redmond WA, US James Zhang - Bellevue WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06Q 30/00
US Classification:
705 1443, 705 1453
Abstract:
Systems and methods for mapping identifiers are provided. Activity logs illustrate activities and/or events associated with a plurality of identifiers. The identifiers may be registered identifiers, unregistered identifiers, or a combination thereof. When at least two identifiers share a linking attribute, the at least two identifiers may be mapped to one another, along with information associated therewith (if any) such as a user profile. Each subsequent line of an activity line may also be mapped to the identifiers of the initial single line when a linking attribute or an overlapping identifier is present. A number of identifiers associated with each other may be increased by mapping identifiers and, thus, a targeted audience for a customized advertisement may, in turn, be increased.
Maintaining Targetable User Inventory For Digital Advertising
ERH-CHUN YEH - New Castle WA, US SIJIAN ZHANG - Bellevue WA, US SHAOYU ZHOU - Issaquah WA, US LEI JIN - Issaquah WA, US FEI CAO - Issaquah WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06Q 30/00
US Classification:
705 144
Abstract:
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain a targetable user inventory for digital advertising. In embodiments, a request is made for user data associated with a user identification. If the user data or user identification is not available, a list of alternative user identifications is ranked according to various criteria based on identification signals. A match is selected from the list of alternative user identifications and user data associated with the alternative user identification is communicated in response to the request.
Propagating User Privacy Preferences Across Multiple Applications
SIDDHARTHA ROY - KIRKLAND WA, US SIJIAN ZHANG - BELLEVUE WA, US MICHAEL ELIZAROV - SAMMAMISH WA, US SHAOYU ZHOU - ISSAQUAH WA, US FEI CAO - ISSAQUAH WA, US
Assignee:
MICROSOFT CORPORATION - REDMOND WA
International Classification:
G06F 21/00
US Classification:
726 1
Abstract:
Methods and systems for maintaining user privacy preferences based on one or more user identifications across a plurality of applications are provided. Two or more user identifications are received with associated user privacy preferences. The received user identification is compared against other user identifications to determine if the user identifications relate to the same user. It may be determined that two user identifications are related if they have at least one browser property in common. A consolidated data stream of the user privacy preferences for the related user identifications is created. The consolidated data stream is communicated to one or more applications and propagated to maintain the user privacy preferences across the applications relating to the user identification.
Flickr
Youtube
Cao Fei's immersive retrospective comes to li...
The Midnight Wanderer is an experiential adaptation of the Beijing sho...
Duration:
9m 16s
Cao Fei () - Whose Utopia, 2006
Duration:
20m 7s
The Tenacious Alchemy of China's Cao Fei | Br...
Chinese artist Cao Fei is one of the most ground-breaking and talked-a...
Duration:
24m 11s
Conversations: Cao Fei and Hans Ulrich Obrist
For this online conversation, pioneering artist Cao Fei joined Hans Ul...
Duration:
46m 33s
Excerpt From Cao Fei's Video Work 'Asia One' ...
Cao Fei's Asia One takes viewers to a modern high-tech warehouse in Sh...
Duration:
2m 29s
Cao Fei: Blueprints | Serpentine Exhibition
DISCLAIMER: Please note the opening dates in this film no longer apply...