The present disclosure relates to forming crowds of users.
With the proliferation of location-aware mobile devices, crowd tracking and services based thereon are starting to emerge. For example, an exemplary system for forming and tracking crowds of users is described in U.S. patent application Ser. No. 12/645,532 entitled FORMING CROWDS AND PROVIDING ACCESS TO CROWD DATA IN A MOBILE ENVIRONMENT, U.S. patent application Ser. No. 12/645,539 entitled ANONYMOUS CROWD TRACKING, U.S. patent application Ser. No. 12/645,535 entitled MAINTAINING A HISTORICAL RECORD OF ANONYMIZED USER PROFILE DATA BY LOCATION FOR USERS IN A MOBILE ENVIRONMENT, U.S. patent application Ser. No. 12/645,546 entitled CROWD FORMATION FOR MOBILE DEVICE USERS, U.S. patent application Ser. No. 12/645,556 entitled SERVING A REQUEST FOR DATA FROM A HISTORICAL RECORD OF ANONYMIZED USER PROFILE DATA IN A MOBILE ENVIRONMENT, U.S. patent application Ser. No. 12/645,560 entitled HANDLING CROWD REQUESTS FOR LARGE GEOGRAPHIC AREAS, and U.S. patent application Ser. No. 12/645,544 entitled MODIFYING A USER'S CONTRIBUTION TO AN AGGREGATE PROFILE BASED ON TIME BETWEEN LOCATION UPDATES AND EXTERNAL EVENTS, all of which were filed Dec. 23, 2009 and are hereby incorporated herein by reference in their entireties.
One issue with existing crowd formation techniques is that they do not account for tangible physical boundaries, such as walls, that may physically prevent spatially proximate users from being in the same crowd. Similarly, existing crowd formation techniques do not account for intangible physical boundaries, such as boundaries between departments in a department store, that may logically prevent spatially proximate users from being in the same crowd. As such, there is a need for a system and method for forming crowds of users in a manner that takes into account known physical boundaries.
The present disclosure relates to forming crowds of users taking into account known physical boundaries. In general, current locations of a number of users are obtained. A crowd of users is then formed based on the current locations of the users while taking into account one or more known physical boundaries. Preferably, the one or more physical boundaries are taken into account such that the crowd does not include spatially proximate users that are located on opposite sides of the one or more known physical boundaries. The one or more known physical boundaries preferably include tangible physical boundaries of a Point of Interest (POI). As an example, the POI may be a store within a shopping mall, where the tangible physical boundaries of the store are walls and in some embodiments the floor and ceiling of the store. In addition or alternatively, the one or more known physical boundaries of the POI may include one or more intangible physical boundaries for the POI (e.g., intangible boundaries between departments in a department store). By utilizing known physical boundaries in a spatial crowd formation process, users that are spatially proximate to one another but are separated by a physical boundary are not included in the same crowd. In this manner, the spatial crowd formation process provides accurate and meaningful crowd formation in environments such as, but not limited to, buildings with multiple rooms, shopping malls, or the like.
Those skilled in the art will appreciate the scope of the present disclosure and realize additional aspects thereof after reading the following detailed description of the preferred embodiments in association with the accompanying drawing figures.
The accompanying drawing figures incorporated in and forming a part of this specification illustrate several aspects of the disclosure, and together with the description serve to explain the principles of the disclosure.
The embodiments set forth below represent the necessary information to enable those skilled in the art to practice the embodiments and illustrate the best mode of practicing the embodiments. Upon reading the following description in light of the accompanying drawing figures, those skilled in the art will understand the concepts of the disclosure and will recognize applications of these concepts not particularly addressed herein. It should be understood that these concepts and applications fall within the scope of the disclosure and the accompanying claims.
As discussed below in detail, the MAP server 12 operates to obtain current locations, including location updates, and user profiles of the users 20 of the mobile devices 18. The current locations of the users 20 can be expressed as positional geographic coordinates such as latitude-longitude pairs, and a height vector (if applicable), or any other similar information capable of identifying a given physical point in space in a two-dimensional or three-dimensional coordinate system. Using the current locations and user profiles of the users 20, the MAP server 12 is enabled to provide a number of features such as, but not limited to, forming crowds of users using current locations and/or user profiles of the users 20, generating aggregate profiles for crowds of users, and tracking crowds. Note that while the MAP server 12 is illustrated as a single server for simplicity and ease of discussion, it should be appreciated that the MAP server 12 may be implemented as a single physical server or multiple physical servers operating in a collaborative manner for purposes of redundancy and/or load sharing.
In general, the one or more profile servers 14 operate to store user profiles for a number of persons including the users 20 of the mobile devices 18. For example, the one or more profile servers 14 may be servers providing social network services such as the Facebook® social networking service, the MySpace® social networking service, the LinkedIN® social networking service, or the like. As discussed below, using the one or more profile servers 14, the MAP server 12 is enabled to directly or indirectly obtain the user profiles of the users 20 of the mobile devices 18. The location server 16 generally operates to receive location updates from the mobile devices 18 and make the location updates available to entities such as, for instance, the MAP server 12. In one exemplary embodiment, the location server 16 is a server operating to provide Yahoo!'s FireEagle service.
The mobile devices 18 may be mobile smart phones, portable media player devices, mobile gaming devices, or the like. Some exemplary mobile devices that may be programmed or otherwise configured to operate as the mobile devices 18 are the Apple® iPhone, the Palm Pre®, the Samsung Rogue™, the Blackberry Storm™, the Motorola Droid or similar phone running Google's Android™ Operating System, an Apple® iPad, and the Apple® iPod Touch® device. However, this list of exemplary mobile devices is not exhaustive and is not intended to limit the scope of the present disclosure.
The mobile devices 18-1 through 18-N include MAP clients 30-1 through 30-N (generally referred to herein collectively as MAP clients 30 or individually as MAP client 30), MAP applications 32-1 through 32-N (generally referred to herein collectively as MAP applications 32 or individually as MAP application 32), third-party applications 34-1 through 34-N (generally referred to herein collectively as third-party applications 34 or individually as third-party application 34), and location functions 36-1 through 36-N (generally referred to herein collectively as location functions 36 or individually as location function 36), respectively. The MAP client 30 is preferably implemented in software. In general, in the preferred embodiment, the MAP client 30 is a middleware layer operating to interface an application layer (i.e., the MAP application 32 and the third-party applications 34) to the MAP server 12. More specifically, the MAP client 30 enables the MAP application 32 and the third-party applications 34 to request and receive data from the MAP server 12. In addition, the MAP client 30 enables applications, such as the MAP application 32 and the third-party applications 34, to access data from the MAP server 12.
The MAP application 32 is also preferably implemented in software. The MAP application 32 generally provides a user interface component between the user 20 and the MAP server 12. More specifically, among other things, the MAP application 32 enables the user 20 to initiate requests for crowd data or crowd tracking data from the MAP server 12 and presents corresponding data returned by the MAP server 12 to the user 20. The MAP application 32 also enables the user 20 to configure various settings. For example, the MAP application 32 may enable the user 20 to select a desired social networking service (e.g., Facebook®, MySpace®, LinkedIN®, etc.) from which to obtain the user profile of the user 20 and provide any necessary credentials (e.g., username and password) needed to access the user profile from the social networking service.
The third-party applications 34 are preferably implemented in software. The third-party applications 34 operate to access the MAP server 12 via the MAP client 30. The third-party applications 34 may utilize data obtained from the MAP server 12 in any desired manner. As an example, one of the third-party applications 34 may be a gaming application that utilizes crowd data to notify the user 20 of Points of Interest (POIs) or Areas of Interest (AOIs) where crowds of interest are currently located. It should be noted that while the MAP client 30 is illustrated as being separate from the MAP application 32 and the third-party applications 34, the present disclosure is not limited thereto. The functionality of the MAP client 30 may alternatively be incorporated into the MAP application 32 and the third-party applications 34.
The location function 36 may be implemented in hardware, software, or a combination thereof. In general, the location function 36 operates to determine or otherwise obtain the location of the mobile device 18. For example, the location function 36 may be or include a Global Positioning System (GPS) receiver. In addition or alternatively, the location function 36 may include hardware and/or software that enables improved location tracking in indoor environments such as, for example, shopping malls. For example, the location function 36 may be part of or compatible with the InvisiTrack Location System provided by InvisiTrack and described in U.S. Pat. No. 7,423,580 entitled “Method and System of Three-Dimensional Positional Finding” which issued on Sep. 9, 2008, U.S. Pat. No. 7,787,886 entitled “System and Method for Locating a Target using RFID” which issued on Aug. 31, 2010, and U.S. Patent Application Publication No. 2007/0075898 entitled “Method and System for Positional Finding Using RF, Continuous and/or Combined Movement” which published on Apr. 5, 2007, all of which are hereby incorporated herein by reference for their teachings regarding location tracking.
The subscriber device 22 is a physical device such as a personal computer, a mobile computer (e.g., a notebook computer, a netbook computer, a tablet computer, etc.), a mobile smart phone, or the like. The subscriber 24 associated with the subscriber device 22 is a person or entity. In general, the subscriber device 22 enables the subscriber 24 to access the MAP server 12 via a web browser 38 to obtain various types of data, preferably for a fee. For example, the subscriber 24 may pay a fee to have access to crowd data such as aggregate profiles for crowds located at one or more POIs and/or located in one or more AOIs, pay a fee to track crowds, or the like. Note that the web browser 38 is exemplary. In another embodiment, the subscriber device 22 is enabled to access the MAP server 12 via a custom application.
Lastly, the third-party service 26 is a service that has access to data from the MAP server 12 such as aggregate profiles for one or more crowds at one or more POIs or within one or more AOIs. Based on the data from the MAP server 12, the third-party service 26 operates to provide a service such as, for example, targeted advertising. For example, the third-party service 26 may obtain anonymous aggregate profile data for one or more crowds located at a POI and then provide targeted advertising to known users located at the POI based on the anonymous aggregate profile data. Note that while targeted advertising is mentioned as an exemplary third-party service 26, other types of third-party services 26 may additionally or alternatively be provided. Other types of third-party services 26 that may be provided will be apparent to one of ordinary skill in the art upon reading this disclosure.
Before proceeding, it should be noted that while the system 10 of
The business logic layer 42 includes a profile manager 52, a location manager 54, a history manager 56, a crowd analyzer 58, and an aggregation engine 60, each of which is preferably implemented in software. The profile manager 52 generally operates to obtain the user profiles of the users 20 directly or indirectly from the one or more profile servers 14 and store the user profiles in the persistence layer 44. The location manager 54 operates to obtain the current locations of the users 20 including location updates. As discussed below, the current locations of the users 20 may be obtained directly from the mobile devices 18 and/or obtained from the location server 16.
The history manager 56 generally operates to maintain a historical record of anonymized user profile data by location. Note that while the user profile data stored in the historical record is preferably anonymized, it is not limited thereto. The crowd analyzer 58 operates to form crowds of users. In one embodiment, the crowd analyzer 58 utilizes a spatial crowd formation algorithm. However, the present disclosure is not limited thereto. In addition, the crowd analyzer 58 may further characterize crowds to reflect degree of fragmentation, best-case and worst-case degree of separation (DOS), and/or degree of bi-directionality. Still further, the crowd analyzer 58 may also operate to track crowds. The aggregation engine 60 generally operates to provide aggregate profile data in response to requests from the mobile devices 18, the subscriber device 22, and the third-party service 26. The aggregate profile data may be historical aggregate profile data for one or more POIs or one or more AOIs or aggregate profile data for crowd(s) currently at one or more POIs or within one or more AOIs. For additional information regarding the operation of the profile manager 52, the location manager 54, the history manager 56, the crowd analyzer 58, and the aggregation engine 60, the interested reader is directed to U.S. patent application Ser. No. 12/645,532, entitled FORMING CROWDS AND PROVIDING ACCESS TO CROWD DATA IN A MOBILE ENVIRONMENT, which was filed Dec. 23, 2009; U.S. patent application Ser. No. 12/645,539, entitled ANONYMOUS CROWD TRACKING, which was filed Dec. 23, 2009; U.S. patent application Ser. No. 12/645,535, entitled MAINTAINING A HISTORICAL RECORD OF ANONYMIZED USER PROFILE DATA BY LOCATION FOR USERS IN A MOBILE ENVIRONMENT, which was filed Dec. 23, 2009; U.S. patent application Ser. No. 12/645,546, entitled CROWD FORMATION FOR MOBILE DEVICE USERS, which was filed Dec. 23, 2009; U.S. patent application Ser. No. 12/645,556, entitled SERVING A REQUEST FOR DATA FROM A HISTORICAL RECORD OF ANONYMIZED USER PROFILE DATA IN A MOBILE ENVIRONMENT, which was filed Dec. 23, 2009; U.S. patent application Ser. No. 12/645,560, entitled HANDLING CROWD REQUESTS FOR LARGE GEOGRAPHIC AREAS, which was filed Dec. 23, 2009; and U.S. patent application Ser. No. 12/645,544, entitled MODIFYING A USER'S CONTRIBUTION TO AN AGGREGATE PROFILE BASED ON TIME BETWEEN LOCATION UPDATES AND EXTERNAL EVENTS, which was filed Dec. 23, 2009; all of which have been incorporated herein by reference in their entireties.
The persistence layer 44 includes an object mapping layer 62 and a datastore 64. The object mapping layer 62 is preferably implemented in software. The datastore 64 is preferably a relational database, which is implemented in a combination of hardware (i.e., physical data storage hardware) and software (i.e., relational database software). In this embodiment, the business logic layer 42 is implemented in an object-oriented programming language such as, for example, Java. As such, the object mapping layer 62 operates to map objects used in the business logic layer 42 to relational database entities stored in the datastore 64. Note that, in one embodiment, data is stored in the datastore 64 in a Resource Description Framework (RDF) compatible format.
In an alternative embodiment, rather than being a relational database, the datastore 64 may be implemented as an RDF datastore. More specifically, the RDF datastore may be compatible with RDF technology adopted by Semantic Web activities. Namely, the RDF datastore may use the Friend-Of-A-Friend (FOAF) vocabulary for describing people, their social networks, and their interests. In this embodiment, the MAP server 12 may be designed to accept raw FOAF files describing persons, their friends, and their interests. These FOAF files are currently output by some social networking services such as LiveJournal® and Facebook®. The MAP server 12 may then persist RDF descriptions of the users 20 as a proprietary extension of the FOAF vocabulary that includes additional properties desired for the system 10.
While the focus of the present disclosure is crowd formation, before discussing the crowd formation process, a description of an exemplary manner in which the MAP server 12 obtains the user profiles and location updates for the users 20 is beneficial.
At some point after authentication is complete, a user profile process is performed such that a user profile of the user 20 is obtained from the profile server 14 and delivered to the MAP server 12 (step 1002). In this embodiment, the MAP client 30 of the mobile device 18 sends a profile request to the profile server 14 (step 1002A). In response, the profile server 14 returns the user profile of the user 20 to the mobile device 18 (step 1002B). The MAP client 30 of the mobile device 18 then sends the user profile of the user 20 to the MAP server 12 (step 1002C). Note that while in this embodiment the MAP client 30 sends the complete user profile of the user 20 to the MAP server 12, in an alternative embodiment, the MAP client 30 may filter the user profile of the user 20 according to criteria specified by the user 20. For example, the user profile of the user 20 may include demographic information, general interests, music interests, and movie interests, and the user 20 may specify that the demographic information or some subset thereof is to be filtered, or removed, before sending the user profile to the MAP server 12.
Upon receiving the user profile of the user 20 from the MAP client 30 of the mobile device 18, the profile manager 52 of the MAP server 12 processes the user profile (step 1002D). More specifically, in the preferred embodiment, the profile manager 52 includes social network handlers for the social network services supported by the MAP server 12. Thus, for example, if the MAP server 12 supports user profiles from Facebook®, MySpace®, and LinkedIN®, the profile manager 52 may include a Facebook handler, a MySpace handler, and a LinkedIN handler. The social network handlers process user profiles to generate user profiles for the MAP server 12 that include lists of keywords for each of a number of profile categories. The profile categories may be the same for each of the social network handlers or different for each of the social network handlers. Thus, for this example assume that the user profile of the user 20 is from Facebook®. The profile manager 52 uses a Facebook handler to process the user profile of the user 20 to map the user profile of the user 20 from Facebook® to a user profile for the MAP server 12 including lists of keywords for a number of predefined profile categories. For example, for the Facebook handler, the profile categories may be a demographic profile category, a social interaction profile category, a general interests profile category, a music interests profile category, and a movie interests profile category. As such, the user profile of the user 20 from Facebook® may be processed by the Facebook handler of the profile manager 52 to create a list of keywords such as, for example, liberal, High School Graduate, 35-44, College Graduate, etc. for the demographic profile category; a list of keywords such as Seeking Friendship for the social interaction profile category; a list of keywords such as politics, technology, photography, books, etc. for the general interests profile category; a list of keywords including music genres, artist names, album names, or the like for the music interests profile category; and a list of keywords including movie titles, actor or actress names, director names, movie genres, or the like for the movie interests profile category. In one embodiment, the profile manager 52 may use natural language processing or semantic analysis. For example, if the Facebook® user profile of the user 20 states that the user 20 is 20 years old, semantic analysis may result in the keyword of 18-24 years old being stored in the user profile of the user 20 for the MAP server 12.
After processing the user profile of the user 20, the profile manager 52 of the MAP server 12 stores the resulting user profile for the user 20 (step 1002E). More specifically, in one embodiment, the MAP server 12 stores user records for the users 20 in the datastore 64 (
Note that while the discussion herein focuses on an embodiment where the user profiles of the users 20 are obtained from the one or more profile servers 14, the user profiles of the users 20 may be obtained in any desired manner. For example, in one alternative embodiment, the user 20 may identify one or more favorite websites. The profile manager 52 of the MAP server 12 may then crawl the one or more favorite websites of the user 20 to obtain keywords appearing in the one or more favorite websites of the user 20. These keywords may then be stored as the user profile of the user 20.
At some point, a process is performed such that a current location of the mobile device 18 and thus a current location of the user 20 is obtained by the MAP server 12 (step 1004). In this embodiment, the MAP application 32 of the mobile device 18 obtains the current location of the mobile device 18 from the location function 36 of the mobile device 18. The MAP application 32 then provides the current location of the mobile device 18 to the MAP client 30, and the MAP client 30 then provides the current location of the mobile device 18 to the MAP server 12 (step 1004A). Note that step 1004A may be repeated periodically or in response to a change in the current location of the mobile device 18 in order for the MAP application 32 to provide location updates for the user 20 to the MAP server 12.
In response to receiving the current location of the mobile device 18, the location manager 54 of the MAP server 12 stores the current location of the mobile device 18 as the current location of the user 20 (step 1004B). More specifically, in one embodiment, the current location of the user 20 is stored in the user record of the user 20 maintained in the datastore 64 of the MAP server 12. Note that, in the preferred embodiment, only the current location of the user 20 is stored in the user record of the user 20. In this manner, the MAP server 12 maintains privacy for the user 20 since the MAP server 12 does not maintain a historical record of the location of the user 20. As discussed below in detail, historical data maintained by the MAP server 12 is preferably anonymized in order to maintain the privacy of the users 20.
In addition to storing the current location of the user 20, the location manager 54 sends the current location of the user 20 to the location server 16 (step 1004C). In this embodiment, by providing location updates to the location server 16, the MAP server 12 in return receives location updates for the user 20 from the location server 16. This is particularly beneficial when the mobile device 18 does not permit background processes. If the mobile device 18 does not permit background processes, the MAP application 32 will not be able to provide location updates for the user 20 to the MAP server 12 unless the MAP application 32 is active. Therefore, when the MAP application 32 is not active, other applications running on the mobile device 18 (or some other device of the user 20) may directly or indirectly provide location updates to the location server 16 for the user 20. This is illustrated in step 1006 where the location server 16 receives a location update for the user 20 directly or indirectly from another application running on the mobile device 18 or an application running on another device of the user 20 (step 1006A). The location server 16 then provides the location update for the user 20 to the MAP server 12 (step 1006B). In response, the location manager 54 updates and stores the current location of the user 20 in the user record of the user 20 (step 1006C). In this manner, the MAP server 12 is enabled to obtain location updates for the user 20 even when the MAP application 32 is not active at the mobile device 18.
At some point after authentication is complete, a user profile process is performed such that a user profile of the user 20 is obtained from the profile server 14 and delivered to the MAP server 12 (step 1102). In this embodiment, the profile manager 52 of the MAP server 12 sends a profile request to the profile server 14 (step 1102A). In response, the profile server 14 returns the user profile of the user 20 to the profile manager 52 of the MAP server 12 (step 1102B). Note that while in this embodiment the profile server 14 returns the complete user profile of the user 20 to the MAP server 12, in an alternative embodiment, the profile server 14 may return a filtered version of the user profile of the user 20 to the MAP server 12. The profile server 14 may filter the user profile of the user 20 according to criteria specified by the user 20. For example, the user profile of the user 20 may include demographic information, general interests, music interests, and movie interests, and the user 20 may specify that the demographic information or some subset thereof is to be filtered, or removed, before sending the user profile to the MAP server 12.
Upon receiving the user profile of the user 20, the profile manager 52 of the MAP server 12 processes the user profile (step 1102C). More specifically, as discussed above, in the preferred embodiment, the profile manager 52 includes social network handlers for the social network services supported by the MAP server 12. The social network handlers process user profiles to generate user profiles for the MAP server 12 that include lists of keywords for each of a number of profile categories. The profile categories may be the same for each of the social network handlers or different for each of the social network handlers.
After processing the user profile of the user 20, the profile manager 52 of the MAP server 12 stores the resulting user profile for the user 20 (step 1102D). More specifically, in one embodiment, the MAP server 12 stores user records for the users 20 in the datastore 64 (
Note that while the discussion herein focuses on an embodiment where the user profiles of the users 20 are obtained from the one or more profile servers 14, the user profiles of the users 20 may be obtained in any desired manner. For example, in one alternative embodiment, the user 20 may identify one or more favorite websites. The profile manager 52 of the MAP server 12 may then crawl the one or more favorite websites of the user 20 to obtain keywords appearing in the one or more favorite websites of the user 20. These keywords may then be stored as the user profile of the user 20.
At some point, a process is performed such that a current location of the mobile device 18 and thus a current location of the user 20 is obtained by the MAP server 12 (step 1104). In this embodiment, the MAP application 32 of the mobile device 18 obtains the current location of the mobile device 18 from the location function 36 of the mobile device 18. The MAP application 32 then provides the current location of the user 20 of the mobile device 18 to the location server 16 (step 1104A). Note that step 1104A may be repeated periodically or in response to changes in the location of the mobile device 18 in order to provide location updates for the user 20 to the MAP server 12. The location server 16 then provides the current location of the user 20 to the MAP server 12 (step 1104B). The location server 16 may provide the current location of the user 20 to the MAP server 12 automatically in response to receiving the current location of the user 20 from the mobile device 18 or in response to a request from the MAP server 12.
In response to receiving the current location of the mobile device 18, the location manager 54 of the MAP server 12 stores the current location of the mobile device 18 as the current location of the user 20 (step 1104C). More specifically, in one embodiment, the current location of the user 20 is stored in the user record of the user 20 maintained in the datastore 64 of the MAP server 12. Note that, in the preferred embodiment, only the current location of the user 20 is stored in the user record of the user 20. In this manner, the MAP server 12 maintains privacy for the user 20 since the MAP server 12 does not maintain a historical record of the location of the user 20. As discussed below in detail, historical data maintained by the MAP server 12 is preferably anonymized in order to maintain the privacy of the users 20.
As discussed above, the use of the location server 16 is particularly beneficial when the mobile device 18 does not permit background processes. As such, if the mobile device 18 does not permit background processes, the MAP application 32 will not provide location updates for the user 20 to the location server 16 unless the MAP application 32 is active. However, other applications running on the mobile device 18 (or some other device of the user 20) may provide location updates to the location server 16 for the user 20 when the MAP application 32 is not active. This is illustrated in step 1106 where the location server 16 receives a location update for the user 20 from another application running on the mobile device 18 or an application running on another device of the user 20 (step 1106A). The location server 16 then provides the location update for the user 20 to the MAP server 12 (step 1106B). In response, the location manager 54 updates and stores the current location of the user 20 in the user record of the user 20 (step 1106C). In this manner, the MAP server 12 is enabled to obtain location updates for the user 20 even when the MAP application 32 is not active at the mobile device 18.
The crowd analyzer 58 then creates a new bounding region that encompasses the new location taking into account physical boundaries of any relevant POI(s) (step 1204) and an old bounding region that encompasses the old location taking into account physical boundaries of any relevant POI(s) (step 1206). Note that if the user 20 does not have an old location (i.e., the location received in step 1200 is the first location received for the user 20), then the old bounding region is essentially null. As used herein, a physical boundary is either a tangible physical boundary or an intangible physical boundary. A tangible physical boundary is a tangible structure such as, for example, a wall, a fence, or the like. An intangible physical boundary is a conceptual boundary that separates one area from another such as, for example, a boundary between departments in a department store. A POI is relevant to the new location if the new location is within the physical boundaries defined for the POI or the POI is proximate to the new location. Likewise, a POI is relevant to the old location if the old location is within the physical boundaries defined for the POI or the POI is proximate to the old location. Note that while physical boundaries of relevant POIs are referred to in this exemplary embodiment, the present disclosure is not limited to physical boundaries of POIs. In addition or alternatively, other types of physical boundaries that would prevent users on opposite sides of the physical boundaries from being in the same crowd even though the users are spatially proximate to one another or other types of physical boundaries for which it is desirable for users on opposite sides of the physical boundaries to not be considered part of the same crowd can be used for the crowd formation process.
Next, the crowd analyzer 58 determines whether the new and old bounding regions overlap (step 1208). If so, the crowd analyzer 58 combines the new and old bounding regions to provide a combined bounding region (step 1210). The crowd analyzer 58 then determines the individual users and crowds relevant to the combined bounding region created in step 1210 (step 1212). The crowds relevant to the combined bounding region are crowds that are within or overlap the combined bounding region (e.g., have at least one user located within the combined bounding region, have all users located within the combined bounding region, or have crowd centers located within the combined bounding region). The individual users relevant to the combined bounding region are users that are currently located within the combined bounding region and are not already part of a crowd.
Next, the crowd analyzer 58 computes an optimal inclusion distance for individual users based on user density (step 1214). In one embodiment, the optimal inclusion distance for individuals, which is also referred to herein as an initial optimal inclusion distance, is computed based on user density within the combined bounding region. More specifically, the optimal inclusion distance for individuals may be computed according to the following equation:
where a is a number between 0 and 1, ABoundingRegion is an area of the combined bounding region, and number_of_users is the total number of users in the combined bounding region. The total number of users in the combined bounding region includes both individual users that are not already in a crowd and users that are already in a crowd. In one embodiment, a is ⅔.
In another embodiment, in addition to having defined physical boundaries, POIs may have one or more rules defined for crowd formation within the physical boundaries defined for the POIs. The rules for each of the POIs may be independently defined and controlled by, for example, an owner or administrative user associated with the POI. The rules may include a minimum user density for crowd formation to be used in lieu of average user density (i.e., number of users within the bounding region divided by the area of the bounding region). In this embodiment, if the combined bounding region is within the physical boundaries of a POI and a minimum user density for crowd formation has been defined for the POI, the initial optimal inclusion distance for individuals may be computed based on the minimum user density defined for the POI. More specifically, the initial optimal inclusion distance may be computed according to the following equation:
where a is a number between 0 and 1 and DefinedMinimumUserDensity is the defined minimum user density for the POI. In one embodiment, a is ⅔. Note that in the situation where the defined minimum user density for the POI is zero, the initial optimal inclusion distance for individuals may be set to a predefined or predetermined maximum value (e.g., a value that is large enough to ensure that all users within the bounding region are determined to be part of the same crowd).
The crowd analyzer 58 then creates a crowd for each individual user within the combined bounding region that is not already included in a crowd and sets the optimal inclusion distance for the crowds to the initial optimal inclusion distance (step 1216). At this point, the process proceeds to
Next, the crowd analyzer 58 determines the two closest crowds for the bounding region (step 1224) and a distance between the two closest crowds (step 1226). The distance between the two closest crowds is the distance between the crowd centers of the two closest crowds. The crowd analyzer 58 then determines whether the distance between the two closest crowds is less than the optimal inclusion distance of a larger of the two closest crowds (step 1228). If the two closest crowds are of the same size (i.e., have the same number of users), then the optimal inclusion distance of either of the two closest crowds may be used. Alternatively, if the two closest crowds are of the same size, the optimal inclusion distances of both of the two closest crowds may be used such that the crowd analyzer 58 determines whether the distance between the two closest crowds is less than the optimal inclusion distances of both of the two closest crowds. As another alternative, if the two closest crowds are of the same size, the crowd analyzer 58 may compare the distance between the two closest crowds to an average of the optimal inclusion distances of the two closest crowds.
If the distance between the two closest crowds is not less than the optimal inclusion distance, then the process proceeds to step 1238. Otherwise, the two closest crowds are combined or merged (step 1230), and a new crowd center for the resulting crowd is computed (step 1232). Again, a center of mass algorithm may be used to compute the crowd center of a crowd. In addition, a new optimal inclusion distance for the resulting crowd is computed (step 1234). In one embodiment, the new optimal inclusion distance for the resulting crowd is computed as:
where n is the number of users in the crowd and di is a distance between the ith user and the crowd center. In other words, the new optimal inclusion distance is computed as the average of the initial optimal inclusion distance and the distances between the users in the crowd and the crowd center plus one standard deviation.
At this point, the crowd analyzer 58 determines whether a maximum number of iterations have been performed (step 1236). The maximum number of iterations is a predefined number that ensures that the crowd formation process does not indefinitely loop over steps 1218 through 1234 or loop over steps 1218 through 1234 more than a desired maximum number of times. If the maximum number of iterations has not been reached, the process returns to step 1218 and is repeated until either the distance between the two closest crowds is not less than the optimal inclusion distance of the larger crowd or the maximum number of iterations has been reached. At that point, the crowd analyzer 58 discards crowds with less than three users, or members (step 1238) and the process ends.
Note that in this example, the minimum number of users needed to form a crowd is three. However, the present disclosure is not limited thereto. The minimum number of users for a crowd may be any number greater than or equal to 2. Further, the minimum number of users for a crowd may be independently defined for each POI having physical boundaries. In this case, if the combined bounding region is within the physical boundaries, then the minimum number of users needed to form a crowd is the minimum number of users for a crowd defined for the POI, if any. Otherwise, the system defined minimum number of users needed for a crowd is used as a default.
Returning to step 1208 in
where a is a number between 0 and 1, ABoundingRegion is an area of the bounding region, and number_of_users is the total number of users in the bounding region. The total number of users in the bounding region includes both individual users that are not already in a crowd and users that are already in a crowd. In one embodiment, a is ⅔.
In another embodiment, in addition to having defined physical boundaries, POIs may have one or more rules defined for crowd formation within the physical boundaries defined for the POIs. The rules for each of the POIs may be independently defined and controlled by, for example, an owner or administrative user associated with the POI. The rules may include a minimum user density for crowd formation to be used in lieu of average user density (i.e., number of users within the bounding region divided by the area of the bounding region). In this embodiment, if the bounding region is within the physical boundaries of a POI and a minimum user density for crowd formation has been defined for the POI, the initial optimal inclusion distance for individuals may be computed based on the minimum user density defined for the POI. More specifically, the initial optimal inclusion distance may be computed according to the following equation:
where a is a number between 0 and 1 and DefinedMinimumUserDensity is the defined minimum user density for the POI. In one embodiment, a is ⅔. Note that in the situation where the defined minimum user density for the POI is zero, the initial optimal inclusion distance for individuals may be set to a predefined or predetermined maximum value (e.g., a value that is large enough to ensure that all users within the bounding region are determined to be part of the same crowd).
The crowd analyzer 58 then creates a crowd of one user for each individual user within the bounding region that is not already included in a crowd and sets the optimal inclusion distance for the crowds to the initial optimal inclusion distance (step 1246). At this point, the crowd analyzer 58 analyzes the crowds for the bounding region to determine whether any crowd members (i.e., users in the crowds) violate the optimal inclusion distance of their crowds (step 1248). Any crowd member that violates the optimal inclusion distance of his or her crowd is then removed from that crowd (step 1250). The crowd analyzer 58 then creates a crowd of one user for each of the users removed from their crowds in step 1250 and sets the optimal inclusion distance for the newly created crowds to the initial optimal inclusion distance (step 1252).
Next, the crowd analyzer 58 determines the two closest crowds in the bounding region (step 1254) and a distance between the two closest crowds (step 1256). The distance between the two closest crowds is the distance between the crowd centers of the two closest crowds. The crowd analyzer 58 then determines whether the distance between the two closest crowds is less than the optimal inclusion distance of a larger of the two closest crowds (step 1258). If the two closest crowds are of the same size (i.e., have the same number of users), then the optimal inclusion distance of either of the two closest crowds may be used. Alternatively, if the two closest crowds are of the same size, the optimal inclusion distances of both of the two closest crowds may be used such that the crowd analyzer 58 determines whether the distance between the two closest crowds is less than the optimal inclusion distances of both of the two closest crowds. As another alternative, if the two closest crowds are of the same size, the crowd analyzer 58 may compare the distance between the two closest crowds to an average of the optimal inclusion distances of the two closest crowds.
If the distance between the two closest crowds is not less than the optimal inclusion distance, the process proceeds to step 1268. Otherwise, the two closest crowds are combined or merged (step 1260), and a new crowd center for the resulting crowd is computed (step 1262). Again, a center of mass algorithm may be used to compute the crowd center of a crowd. In addition, a new optimal inclusion distance for the resulting crowd is computed (step 1264). As discussed above, in one embodiment, the new optimal inclusion distance for the resulting crowd is computed as:
where n is the number of users in the crowd and di is a distance between the ith user and the crowd center. In other words, the new optimal inclusion distance is computed as the average of the initial optimal inclusion distance and the distances between the users in the crowd and the crowd center plus one standard deviation.
At this point, the crowd analyzer 58 determines whether a maximum number of iterations have been performed (step 1266). If the maximum number of iterations has not been reached, the process returns to step 1248 and is repeated until either the distance between the two closest crowds is not less than the optimal inclusion distance of the larger crowd or the maximum number of iterations has been reached. At that point, the crowd analyzer 58 discards crowds with less than three users, or members (step 1268). Again, note that in this example, the minimum number of users needed to form a crowd is three. However, the present disclosure is not limited thereto. The minimum number of users for a crowd may be any number greater than or equal to 2. Further, the minimum number of users for a crowd may be independently defined for each POI having physical boundaries. In this case, if the combined bounding region is within the physical boundaries, then the minimum number of users needed to form a crowd is the minimum number of users for a crowd defined for the POI, if any. Otherwise, the system defined minimum number of users needed for a crowd is used as a default.
Lastly, the crowd analyzer 58 determines whether the crowd formation process for the new and old bounding regions is done (step 1270). In other words, the crowd analyzer 58 determines whether both the new and old bounding regions have been processed. If not, the bounding region is set to the new bounding region (step 1272), and the process returns to step 1242 and is repeated for the new bounding region. Once both the new and old bounding regions have been processed, the crowd formation process ends.
Next, the crowd analyzer 58 determines whether the new location is within the physical boundaries of a POI (step 1302). If so, the crowd analyzer 58 limits the initial bounding box to the physical boundaries of the POI to provide the new bounding region (step 1304). In this manner, only users and existing crowds that are located within the physical boundaries of the same POI will be considered for the crowd formation process with respect to the new bounding region. As a result, users located on opposite sides of the physical boundaries of the POI will not be included in the same crowd even if the users are otherwise sufficiently close to one another to be in the same crowd.
More specifically, in one embodiment, the physical boundaries of a POI may define a perimeter of the POI in 2-Dimensional (2D) space. For example, the physical boundaries of a box-shaped POI may be defined by a latitude and longitude pair defining a north-west corner of the box-shaped POI and a latitude and longitude pair defining a south-east corner of the box-shaped POI. In this case, the initial bounding box would be limited by the physical boundaries of the box-shaped POI. In another embodiment, the physical boundaries may define a perimeter of the POI in 3-Dimensional (3D) space. For example, the physical boundaries of a box-shaped POI may be defined by a latitude and longitude pair defining a north-west corner of the box-shaped POI, a latitude and longitude pair defining a south-east corner of the box-shaped POI, an altitude of a floor of the box-shaped POI, and an altitude of a ceiling of the box-shaped POI. Three-dimensional physical boundaries of a POI may be desired, for example, for POIs located in a multi-level building such as, for example, a multi-level shopping mall. In the case of 3D physical boundaries, the initial bounding box is limited to the 3D physical boundaries of the POI.
Returning to step 1302, if the new location of the user 20 is not within the physical boundaries of a POI, the crowd analyzer 58 then determines whether there are any POI(s) with defined physical boundaries located within or overlapping the initial bounding box (step 1306). If not, the new bounding region is set equal to the initial bounding box created in step 1300 (step 1308). Otherwise, the new bounding region is set equal to the initial bounding box created in step 1300 minus region(s) defined by the physical boundaries of the POI(s) located within or otherwise overlapping the initial bounding box (step 1310). In this manner, if the new location of the user 20 is outside of known physical boundaries of the POIs, then the crowd formation process does not take into account users and existing crowds that are located within the physical boundaries of nearby POIs. As a result, users located inside the physical boundaries of nearby POIs cannot be included in crowds outside the physical boundaries of the POIs even if the users would otherwise be located sufficiently close to one another to be included in the same crowd.
Next, the crowd analyzer 58 determines whether the old location is within the physical boundaries of a POI (step 1402). If so, the crowd analyzer 58 limits the initial bounding box to the physical boundaries of the POI to provide the old bounding region (step 1404). In this manner, only users and existing crowds that are located within the physical boundaries of the same POI will be considered for the crowd formation process with respect to the old bounding region. As a result, users located on opposite sides of the physical boundaries of the POI will not be included in the same crowd even if the users are otherwise sufficiently close to one another to be in the same crowd.
Returning to step 1402, if the old location of the user 20 is not within the physical boundaries of a POI, the crowd analyzer 58 then determines whether there are any POI(s) with defined physical boundaries located within or overlapping the initial bounding box (step 1406). If not, the old bounding region is set equal to the initial bounding box created in step 1400 (step 1408). Otherwise, the old bounding region is set equal to the initial bounding box created in step 1400 minus region(s) defined by the physical boundaries of the POI(s) located within or otherwise overlapping the initial bounding box (step 1410). In this manner, if the old location of the user 20 is outside of known physical boundaries of the POIs, then the crowd formation process does not take into account users and existing crowds that are located within the physical boundaries of nearby POIs. As a result, users located inside the physical boundaries of nearby POIs cannot be included in crowds outside the physical boundaries of the POIs even if the users would otherwise be located sufficiently close to one another to be included in the same crowd.
Once the new bounding region 76 is created, the crowd formation process proceeds as outlined above. Specifically, the crowd analyzer 58 identifies all individual users currently located within the new bounding region 76 and all crowds located within or overlapping the new bounding region 76, as illustrated in
The crowd analyzer 58 then identifies the two closest crowds 80 and 82 in the new bounding region 76 and determines a distance between the two closest crowds 80 and 82. In this example, the distance between the two closest crowds 80 and 82 is less than the optimal inclusion distance. As such, the two closest crowds 80 and 82 are merged and a new crowd center and new optimal inclusion distance are computed, as illustrated in
Once the new bounding region 90 is created, the crowd formation process proceeds as outlined above. Specifically, the crowd analyzer 58 identifies all individual users currently located within the new bounding region 90 and all crowds located within or overlapping the new bounding region 90, as illustrated in
The crowd analyzer 58 then identifies the two closest crowds 94 and 96 in the new bounding region 90 and determines a distance between the two closest crowds 94 and 96. In this example, the distance between the two closest crowds 94 and 96 is less than the optimal inclusion distance. As such, the two closest crowds 94 and 96 are merged and a new crowd center and new optimal inclusion distance are computed, as illustrated in
Since the old bounding region 106 and the new bounding region 108 overlap, the crowd analyzer 58 combines the new and old bounding regions 106 and 108 to provide a combined bounding region 114, as illustrated in
Next, the crowd analyzer 58 analyzes the crowds 110, 112, and 116 through 122 to determine whether any members of the crowds 110, 112, and 116 through 122 violate the optimal inclusion distances of the crowds 110, 112, and 116 through 122. In this example, as a result of the user leaving the crowd 110 and moving to his new location, both of the remaining members of the crowd 110 violate the optimal inclusion distance of the crowd 110. As such, the crowd analyzer 58 removes the remaining users from the crowd 110 and creates crowds 124 and 126 of one user each for those users, as illustrated in
The crowd analyzer 58 then identifies the two closest crowds in the combined bounding region 114, which in this example are the crowds 120 and 122. Next, the crowd analyzer 58 computes a distance between the two crowds 120 and 122. In this example, the distance between the two crowds 120 and 122 is less than the initial optimal inclusion distance and, as such, the two crowds 120 and 122 are combined. In this example, crowds are combined by merging the smaller crowd into the larger crowd. Since the two crowds 120 and 122 are of the same size, the crowd analyzer 58 merges the crowd 122 into the crowd 120, as illustrated in
At this point, the crowd analyzer 58 repeats the process and determines that the crowds 112 and 118 are now the two closest crowds. In this example, the distance between the two crowds 112 and 118 is less than the optimal inclusion distance of the larger of the two crowds 112 and 118, which is the crowd 112. As such, the crowd 118 is merged into the crowd 122 and a new crowd center and optimal inclusion distance are computed for the crowd 112, as illustrated in
More specifically, as illustrated in
As illustrated in
The crowds formed using the process described above may be used to provide any type of desired service. For instance, in one embodiment, the MAP server 12 may process crowd requests from the mobile devices 18, the subscriber device 22, and/or the third-party service 26. Using the mobile device 18-1 as an example, the mobile device 18-1 may send a crowd data request to the MAP server 12 for a particular POI or AOI. The MAP server 12 then identifies a crowd(s) at the POI or within the AOI, generates crowd data for the identified crowd(s), and returns the crowd data to the mobile device 18-1. The crowd data for a crowd may include an aggregate profile of the crowd created from the user profile of the users in the crowd. However, the crowd data is not limited thereto. Further note that snapshots of the crowds may be captured and stored over time to enable a crowd tracking feature. Each crowd snapshot may include, for example, location information defining the location of the crowd at the corresponding point in time and an aggregate profile of the crowd at the corresponding point in time.
Optionally, the MAP server 12 may receive user input from the owner that defines one or more rules for crowd formation to be used when forming crowds within the physical boundaries of the POI (step 1504). For example, the one or more rules may include a minimum user density for crowd formation, a minimum number of users required to be in a crowd, or the like. Lastly, the MAP server 12 stores or updates a POI record or similar data structure to store the physical boundaries of the POI and the one or more crowd formation rules for the POI, if any (step 1506). The POI record also includes the name and location of the POI. Note that crowds may be tagged with the name and, optionally, location of the corresponding POIs while the crowds are located within the physical boundaries of the POIs. These POI tags may then be removed from the crowds once the crowds are no longer located within the physical boundaries of the POIs.
The present disclosure provides substantial opportunity for variation without departing from the scope of the concepts disclosed herein. For example, the crowd formation process of
Those skilled in the art will recognize improvements and modifications to the preferred embodiments of the present disclosure. All such improvements and modifications are considered within the scope of the concepts disclosed herein and the claims that follow.
This application claims the benefit of provisional patent application Ser. No. 61/258,838, filed Nov. 6, 2009, the disclosure of which is hereby incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5539232 | Nakanishi et al. | Jul 1996 | A |
6204844 | Fumarolo et al. | Mar 2001 | B1 |
6240069 | Alperovich et al. | May 2001 | B1 |
6529136 | Cao et al. | Mar 2003 | B2 |
6708172 | Wong et al. | Mar 2004 | B1 |
6819919 | Tanaka | Nov 2004 | B1 |
6961562 | Ross | Nov 2005 | B2 |
6968179 | De Vries | Nov 2005 | B1 |
6987885 | Gonzalez-Banos et al. | Jan 2006 | B2 |
7116985 | Wilson et al. | Oct 2006 | B2 |
7123918 | Goodman | Oct 2006 | B1 |
7236739 | Chang | Jun 2007 | B2 |
7247024 | Bright et al. | Jul 2007 | B2 |
7272357 | Nishiga et al. | Sep 2007 | B2 |
7398081 | Moran | Jul 2008 | B2 |
7423580 | Markhovsky et al. | Sep 2008 | B2 |
7509131 | Krumm et al. | Mar 2009 | B2 |
7558404 | Ma et al. | Jul 2009 | B2 |
7620404 | Chesnais et al. | Nov 2009 | B2 |
7680959 | Svendsen | Mar 2010 | B2 |
7692684 | Ku et al. | Apr 2010 | B2 |
7787886 | Markhovsky et al. | Aug 2010 | B2 |
8010601 | Jennings et al. | Aug 2011 | B2 |
8208943 | Petersen et al. | Jun 2012 | B2 |
20010013009 | Greening et al. | Aug 2001 | A1 |
20020049690 | Takano | Apr 2002 | A1 |
20020086676 | Hendrey et al. | Jul 2002 | A1 |
20040009750 | Beros et al. | Jan 2004 | A1 |
20040025185 | Goci et al. | Feb 2004 | A1 |
20040192331 | Gorday et al. | Sep 2004 | A1 |
20050038876 | Chaudhuri | Feb 2005 | A1 |
20050070298 | Caspi et al. | Mar 2005 | A1 |
20050174975 | Mgrdechian et al. | Aug 2005 | A1 |
20050176406 | Krishnakumar et al. | Aug 2005 | A1 |
20050210387 | Alagappan et al. | Sep 2005 | A1 |
20050231425 | Coleman et al. | Oct 2005 | A1 |
20060161599 | Rosen | Jul 2006 | A1 |
20060166679 | Karaoguz et al. | Jul 2006 | A1 |
20060195361 | Rosenberg | Aug 2006 | A1 |
20060256959 | Hymes | Nov 2006 | A1 |
20060270419 | Crowley et al. | Nov 2006 | A1 |
20070005419 | Horvitz et al. | Jan 2007 | A1 |
20070015518 | Winter et al. | Jan 2007 | A1 |
20070030824 | Ribaudo et al. | Feb 2007 | A1 |
20070032242 | Goodman | Feb 2007 | A1 |
20070075898 | Markhovsky et al. | Apr 2007 | A1 |
20070135138 | Brown et al. | Jun 2007 | A1 |
20070142065 | Richey et al. | Jun 2007 | A1 |
20070167174 | Halcrow et al. | Jul 2007 | A1 |
20070174243 | Fritz | Jul 2007 | A1 |
20070203644 | Thota et al. | Aug 2007 | A1 |
20070218900 | Abhyanker | Sep 2007 | A1 |
20070255785 | Hayashi et al. | Nov 2007 | A1 |
20070282621 | Altman et al. | Dec 2007 | A1 |
20080016018 | Malik | Jan 2008 | A1 |
20080016205 | Svendsen | Jan 2008 | A1 |
20080076418 | Beyer, Jr. | Mar 2008 | A1 |
20080086741 | Feldman et al. | Apr 2008 | A1 |
20080097999 | Horan | Apr 2008 | A1 |
20080106599 | Liu et al. | May 2008 | A1 |
20080118106 | Kilambi et al. | May 2008 | A1 |
20080140650 | Stackpole | Jun 2008 | A1 |
20080155080 | Marlow et al. | Jun 2008 | A1 |
20080182563 | Wugofski et al. | Jul 2008 | A1 |
20080182591 | Krikorian | Jul 2008 | A1 |
20080188261 | Arnone | Aug 2008 | A1 |
20080222295 | Robinson et al. | Sep 2008 | A1 |
20080227473 | Haney | Sep 2008 | A1 |
20080250312 | Curtis | Oct 2008 | A1 |
20080306826 | Kramer et al. | Dec 2008 | A1 |
20090023410 | Ghosh | Jan 2009 | A1 |
20090024315 | Scheibe | Jan 2009 | A1 |
20090030999 | Gatzke et al. | Jan 2009 | A1 |
20090047972 | Neeraj | Feb 2009 | A1 |
20090076894 | Bates et al. | Mar 2009 | A1 |
20090082038 | McKiou et al. | Mar 2009 | A1 |
20090112467 | Jiang et al. | Apr 2009 | A1 |
20090115570 | Cusack, Jr. | May 2009 | A1 |
20090115617 | Sano et al. | May 2009 | A1 |
20090132652 | Athale et al. | May 2009 | A1 |
20090144211 | O'Sullivan et al. | Jun 2009 | A1 |
20090164431 | Zivkovic et al. | Jun 2009 | A1 |
20090164459 | Jennings et al. | Jun 2009 | A1 |
20090201896 | Davis et al. | Aug 2009 | A1 |
20090287783 | Beare et al. | Nov 2009 | A1 |
20100130226 | Arrasvuori et al. | May 2010 | A1 |
20100197318 | Petersen et al. | Aug 2010 | A1 |
20100197319 | Petersen et al. | Aug 2010 | A1 |
20100198826 | Petersen et al. | Aug 2010 | A1 |
20100198828 | Petersen et al. | Aug 2010 | A1 |
20100198862 | Jennings et al. | Aug 2010 | A1 |
20100198870 | Petersen et al. | Aug 2010 | A1 |
20100198917 | Petersen et al. | Aug 2010 | A1 |
20110136506 | Stewart | Jun 2011 | A1 |
20120041983 | Jennings | Feb 2012 | A1 |
20120063427 | Kandekar et al. | Mar 2012 | A1 |
20120066138 | Curtis et al. | Mar 2012 | A1 |
Number | Date | Country |
---|---|---|
1463354 | Dec 2005 | EP |
2008000046 | Jan 2008 | WO |
2009039350 | Mar 2009 | WO |
2009055501 | Apr 2009 | WO |
2009077655 | Jun 2009 | WO |
Entry |
---|
Levent Ertoz et al., “Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data,” Proceedings of the 2003 SIAM International Conference on Data Mining (SDM 2003), Jan. 24, 2003, pp. 47-58, San Francisco, CA, 12 pages. |
Wang Kay Ngai et al., “Efficient Clustering of Uncertain Data,” Proceedings of the Sixth International Conference on Data Mining (ICDM'06), Dec. 18-22, 2006; pp. 436-445; copyright 2006 IEEE, 10 pages. |
“CitySense—Powered by Sense Networks,” http://www.citysense.com/moreinfo.php, copyright 2008 Sense Networks, printed Sep. 8, 2009, 2 pages. |
“ConnectingCadence.com—Mapping the social world.,” http://replay.web.archive.org/20090331100459/http://www.connectingcadence.com/, copyright 2008 ConnectingCadence, printed Apr. 28, 2011, 1 page. |
D. Hardt et al., “OpenID Attribute Exchange 1.0—Final,” http://openid.net/specs/openid-attribute-exchange-1—0. html, Dec. 5, 2007, 11 pages. |
Dirk Helbing et al., “Self-Organized Pedestrian Crowd Dynamics: Experiments, Simulations, and Design Solutions,” Transportation Science, vol. 39, Issue 1, Feb. 2005, http://portal.acm.org/citation.cfm?id=1247227, printed Apr. 28, 2011, 2 pages. |
“Fire Eagle,” http://fireeagle.yahoo.net, copyright 2007-2011 Yahoo! Inc., printed Apr. 28, 2011, 2 pages. |
Nicolas Anciaux et al., “Data Degradation: Making Private Data Less Sensitive Over Time,” CIKM 2008, Oct. 26-30, 2008, Napa Valley, California, 2 pages. |
“OpenID Foundation website,” http://openid.net, copyright 2006-2011 OpenID Foundation, printed Apr. 28, 2011, 2 pages. |
“Sense Networks,” http://www.sensenetworks.com/about—us.php, copyright 2008-2010 Sense Networks, printed Apr. 28, 2011, 1 page. |
“Six degrees of separation,” http://en.wikipedia.org/wiki/Six—degrees—of—separation, printed Apr. 28, 2011, 11 pages. |
Steve Benford et al., “Crowded Collaborative Virtual Environments,” Proceedings of the SIGCHI confernece on Human factors in computing systems, 1997, 8 pages. |
“What is LinkedIn?,” http://www.linkedin.com/static?key=what—is—linkedin&trk=hb—what, copyright 2011 LinkedIn Corporation, printed Apr. 28, 2011, 1 page. |
Arrington, M., “I Saw the Future of Social Networking the Other Day,” TechCrunch, Apr. 9, 2008, at <http://www.techcrunch.com/2008/04/09/i-saw-the-future-of-social-networking-the-other-day/>, printed May 27, 2009, 28 pages. |
Cox et al., “SmokeScreen: Flexible Privacy Controls for Presence-Sharing,” Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (2007) (MobiSys '07), Jun. 11-13, 2007, San Juan, Puerto Rico, 13 pages. |
Cox, L.P. et al., “Presence-Exchanges: Toward Sustainable Presence-Sharing,” In Proc. of 7th IEEE Workshop on Mobile Computing Systems and Applications, Apr. 6-7, 2006, Semiahmoo Resort, Washington, pp. 55-60, 6 pages. |
Estrin, M., “Is the MySpace crowd lying to marketers?”, Oct. 16, 2007, posted at iMedia Connection, at <http://www.imediaconnection.com/content/16993.asp>, copyrighted by iMedia Communications, Inc., printed Apr. 28, 2011, 2 pages. |
“Flickr Shapefiles Public Dataset 1.0,” posted by aaron on May 21, 2009, found at <http://code.flickr.com/blog/2009/05/21/flickr-shapefiles-public-dataset-10/>, Yahoo! Inc., printed Jul. 13, 2011, 5 pages. |
“MobiClique,” copyright 2007-2009, Thomson, originally found at <http://www.thlab.net/˜apietila/mobiclique/>, printed Oct. 23, 2009, 5 pages. |
Oh, Sejin et al., “CAMAR: Context-aware Mobile Augmented Reality in Smart Space,” In Proceedings of International Workshop on Ubiquitous Virtual Reality 2009, Bruce Thomas et al. (Eds.), Jan. 15-18, 2009, University of South Australia, Adelaide, Australia, pp. 48-51, 4 pages. |
Quinn, M. et al., “Parallel Implementation of the Social Forces Model,” Proceedings of the Second International Conference in Pedestrian and Evacuation Dynamics, Greenwich, England, 2003, pp. 63-74, found at <http://web.engr.oregonstate.edu/˜metoyer/docs/parallelPeds.pdf>, 12 pages. |
Vigueras, G. et al., “A comparative study of partitioning methods for crowd simulations,” Applied Soft Computing, vol. 10, Issue 1, Jan. 2010, received Dec. 20, 2008, received in revised form Jul. 1, 2009, available online Jul. 22, 2009, pp. 225-235, 12 pages. |
Wu et al., “Crowd Flow Segmentation Using a Novel Region Growing Scheme,” in Proceedings PCM 2009, 10th Pacific Rim Conference on Multimedia, Bangkok, Thailand, Dec. 15-18, 2009, pp. 898-907, 10 pages. |
Number | Date | Country | |
---|---|---|---|
20120066302 A1 | Mar 2012 | US |
Number | Date | Country | |
---|---|---|---|
61258838 | Nov 2009 | US |