Advertising (“ad”) Networks/Ad Agencies/Advertisers (“Buyers”) are using targeting information to improve the performance of their campaigns that in many cases is measured based on conversion ratio. Conversion ratio may be the ratio between actual responses of users to the displayed advertisement content and the number of displayed advertisements. The buyers pay data publishers (e.g., owners of web sites) to tag users who visit their web sites with special cookies used for the targeting purposes while browsing into media publisher's sites. The payment for those services may be calculated by the number of tagged users or by the actual income associated with the cookies that were used.
By buying advertising spaces on the Data Publishers sites, the Buyers can tag the users browsed those sites and use this information in a later stage in the same way as described above. By doing that, the Buyers pay for user exposures and take advantage of the targeting data collected during this session without paying the Data Publishers for this information.
The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, and components have not been described in detail so as not to obscure the present invention.
A method and system for Web site access monitoring can be offered as a service to the data publishers, but this is not necessarily so. This service will include on going or on demand monitoring on the web pages and alerts (real time or according to other time plans) on illegal data writing. Illegal or unauthorized data writing will be referred to herein after as writing of data by a Buyer in cookies of a User that was directed to the Buyer by a Data Publisher, without the consent of the Data Publisher. Illegal or unauthorized cookies may be cookies including illegal data.
Methods and system according to embodiments of the present invention can monitor and detect illegal or unauthorized data writing. Such system and methods may detect and inform the Data Publisher (who is the owner of targeting information) about unauthorized data theft.
A system according to embodiments of the present invention may include one or more servers that are configured to simulate a request of Web User workstations (e.g., standard browser accessing web site via HTTP, HTTPS or other protocols) to access a monitored web site. According to other embodiments Web user workstations may include application/feature that may monitor their browsing activity, analyze it and report to a central unit. A monitored web site, according to embodiments of the present invention, may be a web site of Data Publisher. The returned data (HTTP, HTTPS or other suitable format) may be analyzed by the system. The User side cookies (e.g. cookies that were sent as a result of the request) may be isolated and identified. Cookies of a targeted User that were written by a Buyer without the consent of the respective Data Publisher (e.g., the site owner) may be defined as unauthorized or illegal cookies. Unauthorized cookies may be logged and trigger an alarm to the site owner and/or be viewed via the system's reports.
Reference is made now to
One or more of remote monitors 4A, 4B etc or remote probes 8A, 8B etc. may communicate with main controller 3 for receiving missions, such as which sites should be monitored and what are the values of the monitoring parameters (such as schedule of invoking of a simulation process, what origin of the simulated User should be simulated, etc.). Main controller 3 may further send updates to remote monitors or remote probes (such as updates to cookies identification database). One or more of remote monitors 4A, 4B etc or remote probes 8A, 8B etc. may send to main controller 3 results of monitoring sessions, e.g. cookies which were identified as unauthorized cookies. Remote monitors 4A, 4B, etc. may be located in locations as may be required for simulating User calls from desired Internet protocol (IP) addresses (e.g., different geographical locations). Remote probes 8A, 8B etc. may be for example installed on user workstations in different geographical places. It is noted that the source and nature of each cookie can be identified and linked to a specific Buyer, by analyzing the cookie.
Reference is made now to
Modules 51, 53A, 53B, 54, 56, 58 and 59 may be embodied as separate units each with its own processor, storage device(s), etc. but may be embodied as modules in a single unit with a single processor or processors, single set of storage device(s), etc. According to some embodiments of the invention any other embodiment for realizing modules 51, 54, 56 and 58 may be utilized. Remote simulator 72 may include processor 73A (e.g. one or more processors, central processing units, etc.), memory 73B, simulator module 74, cookies identifier module 76, process manager 78 and storage device 79. Processor 73A may be any suitable processing device such a central processing unit (CPU), controller etc., specially designed or a general purpose processing unit. Memory 73B may any suitable memory such as read-only memories (ROMs), random access memories (RAM's), electrically programmable read-only memories (EPROMs), electrically erasable and programmable read only memories (EEPROMs), FLASH memory and the like, Processor 73A may perform instructions stored, for example, in memory 73B to control the operation of simulator module 74, cookies identifier module 76, process manager 78 and storage device 79. Simulator module 74 may be configured to compose and send simulated load calls of web pages based on definable parameters or set(s) of rules. Cookies identifier module 76 may be configured to read, analyze and identify cookies received during loading of web pages. Process manager module 78 may be configured to control the simulation process and the cookies identification process. Storage device 79 may be used to store data received during the operation of simulator 72, such as web pages, cookies, web page loading history, etc. Modules 73A, 73B, 74, 76, 78 and 79 may be embodied as separate units each with its own processor, storage device, etc. but may be embodied as modules in a single unit with a single processor, single storage device, etc. According to some embodiments of the invention any other embodiment for realizing modules 73A, 73B, 74, 76, 78 and 79 may be utilized. According to some embodiments simulation assembly 10 may be controlled via administration unit 82, which may be located remotely from main controller 52, proximal to main controller 52 or included within main controller 52. Administration unit 82 may comprise cookies definition tool 84 and reports module 86. It will be noted that more then one process manager 52 may be used in simulation assembly 10 to improve the performance (such as cookie's identification time and cookie's identification accuracy) and stability.
According to some embodiments of the present invention an application running on a computer in system 10 may allow a user of the system, which may be for example customers or service administrators, to operate, to control and to monitor the operation of the system and information gathered and processed in or by the system. Reports sub module 86 may produce, provide or generate on-demand reports in response to requests initiated by the users. This sub module may be used for the automatic scheduled reports creation as well. Additionally report sub module 86 may be configured to provide access to historical verification information. The reports can also be provided to an E-mail address on a predefined schedule. There may be several levels of reports, such as Detailed report for a defined period: list all verification and actual results received (including ad images, cookies, and so on); Summary report for a defined period: provide statistical information on the monitoring results.
Reference is made now to
Reference is made now to
A network user, such as web visitor 122A, 122B, 130 whose cookies are written or modified as a result of a visit to data publisher 121A, 121B, will be denoted herein after as a “tagged user”. The data written in these cookies may indicate data such as: this visitor has visited that web site once or more; whether this visit establishes compliance with one or more behavioral classifications as dictated by the details of a contract between data buyer and data publisher, etc. It will be noted that when data publisher 121A, 121B is engaged with more than one data buyer, the cookies for each data buyer are modified separately, according to parameters, data format and other features that may be dictated by each data buyer. Thus, a cookie written and stored in the storage device of a user that is associated with one data buyer may include indications of first group of trends, behavioral characteristics and possibly history of previous visits while a classifying cookie or cookies of a second data buyer may include indications of a second group of classifying characteristics.
In some embodiments of the present invention, the effecting of desired policy of writing/modifying cookies may be done by a software program that may be installed and running under the control of behavioral targeting module (not shown).
As seen in
System 100 may include one or more monitor services 123 which comprise storage device 123A, simulator module 123B, cookies identifier module 123C and process manager 123D. Cookies may be written, stored and modified in and read from storage device 123A. Monitor services 123 may be located in several geographical locations. Monitor services 123 may be embodied as a program running on a dedicated computer, or on a computer running also other programs, or on a server or servers connected to system 100, or the like. Monitor services 123 may be in active communication with media sites 120A, 120B which include one or more data publishers 121A, 121B. Monitor service 123 is adapted to simulate web visitors 122A, 122B by appearing in system 100 as a certain web visitor, having controllable characteristics, at any given time. Monitor service 123 is adapted to emulate said certain web visitor using different characterizing situations and parameters of said certain web visitor, such as web visitor 122A, 122B who visits media site 120A, 120B without previously visiting data publisher 121A, 121B, after visiting data publisher 121A, 121B one time, after visiting data publisher 121A, 121B two times, etc. Emulation of a web visitor visiting data publisher 121A, 121B a variable number of times before monitor service 123 emulates a visit to media site 120A, 120B may effect the content of a cookie indicative of the history of visits of said web visitor and thus effect analyses of said emulated visits, as is discussed in details below. Monitor service 123 may emulate one of a plurality of web visitors, as may be required. Monitor service 123 is further adapted to invoke controlled visits to monitored data publishers 121A, 121B and to a controlled list of media sites 120A, 120B. Said controlled visits to monitored data publishers 121A, 121B and to the list of media sites 120A, 120B may be in a controlled order. Further, the time frame within which the emulated visits of web visitor 122A, 122B to media sites 120A, 120B in the various configurations relative to visiting data publisher 121A, 121B described above, and the controlled list of media sites 120A, 120B. Said controlled visits to monitored data publishers 121A, 121B and the list of media sites 120A, 120B may be controlled, for example to have a definable value. It would be appreciated by those skilled in the art that the characteristics of this time frame may have an implication on the meaning of tests performed according to some embodiments of the present invention, as will be described in more details below. Monitor service 123 is further adapted to collect and analyze cookies received during browsing into data publishers site 121A, 121B.
A set of tests may be defined to check and verify whether an illegal or unauthorized modification to cookies was performed. Those tests will check whether there are cookies of a web visitor, such as web visitor 122A, 122B, emulated by simulator service 123, that may be identified as been created and/or modified by a data buyer, such as advertiser 112A, 112B or ad network 114A, 114B in cases where web visitor 122A, 122B could have been directed to these data buyers by a data publisher, such as data publisher 121A, 121B. The verification may be done using cookies identifier module such as module 76 and process manager 78 (
Those tests may be performed by invoking a plurality of web visitors' accessing data publishers 121A, 121B and media sites 120A, 120B, according to sets of test parameters. These test parameters may include geographical related information (such as origin country, simulated by using IP address belonging to the simulated origin country), time-of-day, day-of-week, number of visits to be emulated in targeted and in non-data publishers, scheduling of the visits—how often and when, flow of the order of visits (e.g. whether the emulated visitor previously visited data publisher site once or more, and how often, etc.), the type of browser and the like.
A testing scenario may be defined as a set of testing parameters having each a certain value. A testing scenario may include one or more visits to data publishers 121A, 121B and/or media sites 120A, 120B. Thus, two different testing scenarios may differ from each other by having at least one parameter with different value in each. A testing session may be defined as a set of testing scenarios performed with a certain set of parameters. A single test may include one or more test sessions with optionally with varying parameter values.
User simulation can be carried out by a dedicated application executed as part of a simulator, such as remote simulator server 72 (
In embodiments where system 100 comprises of web visitor equipped with probe 130 capability (not shown), during the browsing session probe 130 may control its operation by a process manager (not shown) to analyze and identify cookies by a cookies identifier (not shown) and store in storage device (not shown data related to identification of cookies and of identified cookies, as well as of browsing history, similarly to the operation of monitor service 123 described above, with the necessary changes.
Reference is made now to
Reference is made now to
Reference is made now to
Test execution module 612 establishes and executes test sessions and test scenarios, as detailed above with respect to
Result analysis module 620 may analyze received lists of illegal cookies according to a definable set of rules and may perform additional identifications tests, for example by re-examining data related to cookies that was received and examined previously. Result analysis module 620 may compare the result data with the definitions of alert policy executed in block 622 and may issue alerts accordingly.
Alerts module 622 may dispatch alerts to the user according to definitions that were pre-stored in it.
Control and monitor module 614 may allow the user to monitor and control the execution of the tests including stopping or suspending the test process, monitoring of the actual execution of the test process, view issued alerts and initiate an on-demand tests.
The various functionalities and operations of the modules of sub-system 600 may be executed on one or more computers or servers which may be located in different physical locations which may be spaced apart. Similarly, the storage of the various data entities may be on one or more storage mediums using one or more computers or servers, which may be located in different physical locations and may be spaced apart.
As part of HTTP returned data, cookies included in the HTTP header can be isolated and analyzed according to their origin site and the structure of the data contained in the cookies. The Origin site of a cookie is the web site that provided that cookie. It will be noted that as part of the response to HTTP request, some parts of the loaded page may originate from different servers, different web sites and the like, which may, in general, be provided by other content providers or advertising agencies who provide content to be presented in certain areas of the loaded WEB page.
Each cookie is formed as a dedicated data item that is meant to be used in a later stage by its originating server application owner. Different origin sites may have different cookies structures, and the different cookies may be used for different purposes. For example, the following example of three different cookies were provided by some data exchange servers:
To identify and isolate specific cookie's parameters the number of lines in the cookie and the line content expression type (such as <number>.<number> . . . and the like) may be used or relied upon. In some cases standard regular expressions may be used to describe/identify the content of a line in a cookie data item. In some cookies data structures there may be used a descriptive text that may describe some of the meaning of data elements in that cookie.
Cookie definition tool, such as cookie definition tool 84 (
For example, given the following cookie data:
The above cookie data can be described by the following rule set:
and so on. Composing and maintaining such rules sets may be of value in the process of analysis of cookies. This will be made using the cookies definition tool 618 (
A site depended ‘white list’ may be administered. This may include documentation of all ‘legal’ (authorized) cookies and sites that should not be identified as unauthorized sites (prevent false alerts). A white list can have a date stamp, e.g. the stamped cookie is legal until a certain date. The data and definitions of the white list will be kept in the main database 59 (
Any cookie that could not be identified by a system according to some embodiments of the present invention may be treated as or illegal cookie. The system will allow later ‘manual’ analysis using the result viewer and cookies definitions tool 618 (
A system constructed and operating according to some embodiments of the present invention may provide an administration interface for the Data Publishers (customers of the service) and for the System operators. Using this interface, the following services may be available:
1. Monitored site definition
2. Set alert notifications
3. Report access (including automatic reports)
The definition of a monitored site (data publisher site) may include general settings of the service, such as:
A system constructed and operating according to some embodiments of the present invention may provide real time notifications settings may contain detailed information of the illegal activity. The notifications can be sent via e-mails or SMS or the like and may include the following information (note that in some cases, partial information will be available for a certain alert):
A system constructed and operating according to some embodiments of the present invention may provide access to historical verification information. Reports of the system may also be provided to an E-mail address on a predefined schedule. There may be several levels of reports, such as:
A system constructed and operating according to some embodiments of the present invention may provide the ability to define automatic reporting policy, which may trigger automatic predefined reports to be sent via e-mail to the target user.
Embodiments of the invention may include an article such as a computer or processor non-transitory readable medium, or a computer or processor non-transitory storage medium, such as for example a memory, a disk drive, or a USB flash memory, encoding, including or storing instructions, e.g., computer-executable instructions, which when executed by a processor or controller, carry out methods disclosed herein.
While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents will now occur to those of ordinary skill in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.
This application claims the benefit of U.S. Provisional Application Ser. No. 61/297,862, filed Jan. 25, 2010, which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5848396 | Gerace | Dec 1998 | A |
5948061 | Merriman et al. | Sep 1999 | A |
5991735 | Gerace | Nov 1999 | A |
6026368 | Brown et al. | Feb 2000 | A |
6134532 | Lazarus et al. | Oct 2000 | A |
6594691 | McCollum et al. | Jul 2003 | B1 |
6662215 | Moskowitz et al. | Dec 2003 | B1 |
6925440 | Shkedi | Aug 2005 | B1 |
6973436 | Shkedi | Dec 2005 | B1 |
6983379 | Spalink et al. | Jan 2006 | B1 |
7039599 | Merriman et al. | May 2006 | B2 |
7062510 | Eldering | Jun 2006 | B1 |
7072853 | Shkedi | Jul 2006 | B2 |
7089195 | Rosenberg | Aug 2006 | B2 |
7162522 | Adar et al. | Jan 2007 | B2 |
7428493 | Shkedi | Sep 2008 | B2 |
7454364 | Shkedi | Nov 2008 | B2 |
7496943 | Goldberg et al. | Feb 2009 | B1 |
7533012 | Walsh et al. | May 2009 | B2 |
7617122 | Kumar et al. | Nov 2009 | B2 |
7991800 | Lawrence et al. | Aug 2011 | B2 |
8019777 | Hauser | Sep 2011 | B2 |
8024323 | Nayfeh | Sep 2011 | B1 |
8027879 | Ramer et al. | Sep 2011 | B2 |
8073738 | Protheroe et al. | Dec 2011 | B2 |
8108245 | Hosea et al. | Jan 2012 | B1 |
8234166 | Filice et al. | Jul 2012 | B2 |
8296643 | Vasilik | Oct 2012 | B1 |
8321273 | Briggs | Nov 2012 | B2 |
20020166258 | Posa | Nov 2002 | A1 |
20030014304 | Calvert et al. | Jan 2003 | A1 |
20030033196 | Tomlin | Feb 2003 | A1 |
20030036949 | Kaddeche et al. | Feb 2003 | A1 |
20030088485 | Feinberg | May 2003 | A1 |
20030135460 | Talegon | Jul 2003 | A1 |
20030167212 | Monteverde | Sep 2003 | A1 |
20040003036 | Eagle et al. | Jan 2004 | A1 |
20040015397 | Barry et al. | Jan 2004 | A1 |
20040024632 | Perry | Feb 2004 | A1 |
20040117460 | Walsh et al. | Jun 2004 | A1 |
20040117486 | Bourne et al. | Jun 2004 | A1 |
20040199397 | Dresden | Oct 2004 | A1 |
20050165643 | Wilson et al. | Jul 2005 | A1 |
20050166233 | Beyda et al. | Jul 2005 | A1 |
20050187818 | Zito et al. | Aug 2005 | A1 |
20050193020 | Shkedi | Sep 2005 | A1 |
20050222901 | Agarwal et al. | Oct 2005 | A1 |
20050235030 | Lauckhart et al. | Oct 2005 | A1 |
20050246736 | Beyda et al. | Nov 2005 | A1 |
20060026061 | Collins | Feb 2006 | A1 |
20060041562 | Paczkowski et al. | Feb 2006 | A1 |
20060059042 | Zohar | Mar 2006 | A1 |
20060212349 | Brady | Sep 2006 | A1 |
20060212350 | Ellis et al. | Sep 2006 | A1 |
20060242267 | Grossman | Oct 2006 | A1 |
20060282328 | Gerace et al. | Dec 2006 | A1 |
20070022009 | Cataldi et al. | Jan 2007 | A1 |
20070061195 | Liu et al. | Mar 2007 | A1 |
20070067215 | Agarwal et al. | Mar 2007 | A1 |
20070088609 | Reller et al. | Apr 2007 | A1 |
20070168506 | Douglas et al. | Jul 2007 | A1 |
20070294401 | Shkedi | Dec 2007 | A1 |
20080010155 | Shkedi | Jan 2008 | A1 |
20080040175 | Dellovo | Feb 2008 | A1 |
20080183561 | Zohar et al. | Jul 2008 | A1 |
20080195462 | Magdon-Ismail et al. | Aug 2008 | A1 |
20080209037 | Zernik et al. | Aug 2008 | A1 |
20080243531 | Hyder et al. | Oct 2008 | A1 |
20080243592 | Song et al. | Oct 2008 | A1 |
20080263627 | Berteau et al. | Oct 2008 | A1 |
20080275980 | Hansen | Nov 2008 | A1 |
20090006363 | Canny et al. | Jan 2009 | A1 |
20090024546 | Ficcaglia et al. | Jan 2009 | A1 |
20090055332 | Lee | Feb 2009 | A1 |
20090063250 | Burgess et al. | Mar 2009 | A1 |
20090063268 | Burgess et al. | Mar 2009 | A1 |
20090106296 | Sickmiller et al. | Apr 2009 | A1 |
20090125398 | Cochran et al. | May 2009 | A1 |
20090150126 | Sellamanickam et al. | Jun 2009 | A1 |
20090157494 | Kirovski et al. | Jun 2009 | A1 |
20100082507 | Ganapathi et al. | Apr 2010 | A1 |
20100082808 | Vaynblat et al. | Apr 2010 | A1 |
20100088177 | Lu et al. | Apr 2010 | A1 |
20100100415 | Plummer et al. | Apr 2010 | A1 |
20100179855 | Chen et al. | Jul 2010 | A1 |
20100228595 | Dempster et al. | Sep 2010 | A1 |
20100241510 | Zhang | Sep 2010 | A1 |
20100332426 | Van Bemmel | Dec 2010 | A1 |
20110125587 | Netzer et al. | May 2011 | A1 |
20110131099 | Shields et al. | Jun 2011 | A1 |
20110166927 | Bandi et al. | Jul 2011 | A1 |
20110173063 | Bhatia et al. | Jul 2011 | A1 |
20110173071 | Meyer et al. | Jul 2011 | A1 |
20110187717 | Jagannath et al. | Aug 2011 | A1 |
20110191169 | Cui et al. | Aug 2011 | A1 |
20110191170 | Zhang et al. | Aug 2011 | A1 |
20110191191 | Bax et al. | Aug 2011 | A1 |
20110208591 | Chen et al. | Aug 2011 | A1 |
20110218866 | Wilson | Sep 2011 | A1 |
20110231242 | Dilling et al. | Sep 2011 | A1 |
20110231244 | Bhatia et al. | Sep 2011 | A1 |
20110231245 | Bhatia et al. | Sep 2011 | A1 |
20110231246 | Bhatia et al. | Sep 2011 | A1 |
20110231253 | Crawford et al. | Sep 2011 | A1 |
20110238468 | Shen et al. | Sep 2011 | A1 |
20110246285 | Ratnaparkhi et al. | Oct 2011 | A1 |
20110258052 | Kakade et al. | Oct 2011 | A1 |
20110258054 | Pandey et al. | Oct 2011 | A1 |
20110270670 | Leathern | Nov 2011 | A1 |
20110270686 | Patwa et al. | Nov 2011 | A1 |
20110276391 | Hillard et al. | Nov 2011 | A1 |
20110282732 | Bax et al. | Nov 2011 | A1 |
20110282815 | Thomas | Nov 2011 | A1 |
20110310891 | Howe et al. | Dec 2011 | A1 |
20120004979 | Bhatia et al. | Jan 2012 | A1 |
20120004980 | Bhatia et al. | Jan 2012 | A1 |
20120004981 | Bhatia et al. | Jan 2012 | A1 |
20120010942 | Bax et al. | Jan 2012 | A1 |
20120022952 | Cetin et al. | Jan 2012 | A1 |
20120023043 | Cetin et al. | Jan 2012 | A1 |
20120036007 | Robertson et al. | Feb 2012 | A1 |
20120036008 | Robertson et al. | Feb 2012 | A1 |
20120066072 | Kanigsberg et al. | Mar 2012 | A1 |
20120078705 | Megdal | Mar 2012 | A1 |
20120078709 | Dunham et al. | Mar 2012 | A1 |
20120078711 | Mehta et al. | Mar 2012 | A1 |
20120084149 | Gaudiano et al. | Apr 2012 | A1 |
20120095845 | Shani | Apr 2012 | A1 |
20120095848 | Chan | Apr 2012 | A1 |
20120095985 | Shen et al. | Apr 2012 | A1 |
20120109745 | Bhamidipati | May 2012 | A1 |
20120116885 | Krishnamoorthy | May 2012 | A1 |
20120123851 | Bax et al. | May 2012 | A1 |
20120123859 | Gupta | May 2012 | A1 |
20120123863 | Kaul et al. | May 2012 | A1 |
20120150641 | Dobbs et al. | Jun 2012 | A1 |
20120166272 | Wiley et al. | Jun 2012 | A1 |
20120173326 | Tao et al. | Jul 2012 | A1 |
20120191528 | Bax et al. | Jul 2012 | A1 |
20120203642 | Park et al. | Aug 2012 | A1 |
20120253928 | Jackson et al. | Oct 2012 | A1 |
20120278158 | Farahat | Nov 2012 | A1 |
20120290403 | Galitzky et al. | Nov 2012 | A1 |
Entry |
---|
Soltani, A. et al., “Flash Cookies and Privacy”, 2009, Summer Undergraduate Program in Engineering Research at Berkeley (SUPERB) 2009, p. 158-163. |
“Nielsen Bridges Online and Offline Behaviors with Innovative Cross-Platform Offering,” The Nielsen Company, 2012, Retrieved from the internet: Aug. 14, 2012, pp. 1-2. |
“Online Advertising,” Fresh Patents.com, Retrieved from the internet: Nov. 20, 2012, pp. 1-2, http://tgs.freshpatents.com/Online-Advertising-bx1.phphttp://tgs.freshpatents.com/Online-Advertising-bx1.php , retrieved on Nov. 20, 2012. |
LaRue, “eXelate, Nielsen Catalina Solutions Partner to Bring CPG Data Online,” Adotas, Jan. 31, 2012, Retrieved from the internet: Aug. 14, 2012, pp. 1-2. |
Lykou et al., “Sparse CCA using a Lasso with positivity constraints,” Computational Statistics and Data Analysis, 2010 vol. 54, pp. 3144-3157. |
Stage et al., “Measuring Similarity in Nearest Neighbor Imputation: Some New Alternatives,” Proceedings of the Symposium on Statistics and Information technology in Forestry, 2003, pp. 1-6. |
Witten et al., “A penalized matrix decomposition, with applications to sparse principal components and canonical correlation analysis,” Biostatistics, 2009, vol. 10, No. 3, pp. 515-534. |
Number | Date | Country | |
---|---|---|---|
20110209216 A1 | Aug 2011 | US |
Number | Date | Country | |
---|---|---|---|
61297862 | Jan 2010 | US |