One or more embodiments of the invention are related to the field of data processing and electronic messaging systems. More particularly, but not by way of limitation, one or more embodiments of the invention enable a system for annotation of electronic messages with contextual information, which transforms the electronic messages into annotated messages with added information related to the original message to provide a context for the electronic message to aid a recipient in utilizing the electronic message, understanding its meaning, and responding to the electronic message.
Existing systems that enable communication of electronic messages include email, instant message, text message, calendar, and audio and video messaging systems. These systems are designed to transmit messages to a recipient, or for communications between two individuals, between a sender and a receiver. Transformations made to messages by a communication system, such as encryption or compression, are designed to be transparent to the recipient.
Recipients of messages frequently need to search manually for information related to the messages to provide context for the messages. Alternatively the sender of a message may anticipate some of the recipients' contextual information needs, and perform these searches prior to sending the message. In either case, users, such as the senders, receivers, or both, need to manually determine the contextual information needs associated with a message, perform searches for this information, and integrate the information with the message.
There are no known systems that automatically transform messages by adding relevant information for the recipients. There are no known systems that extract meaning and context from messages and use this extracted data to search for contextual information. There are no known systems that annotate messages automatically with relevant data derived from the message context.
For at least the limitations described above there is a need for a system that annotates electronic messages with contextual information to provide a context for the electronic message to aid the recipient in utilizing the electronic message, understanding its meaning, and responding to the message.
One or more embodiments described in the specification are related to a system for annotation of electronic messages with contextual information. Embodiments of the system transform electronic messages into messages with annotations that provide additional contextual information for the recipients. These annotations are selected automatically based on analysis of the message's contents, other message artifacts, and other available information such as files, user profiles, databases, and message archives. They are added to a message for example as attachments, hyperlinks or as additional text inserted into the message contents. Recipients therefore receive a richer, more complete message with relevant data related to the original message to aid the recipients in utilizing the electronic message, understanding its meaning, or responding to the message. The system provides productivity gains by eliminating the manual effort required by senders or receivers of messages to search for and screen relevant contextual data.
For example, one or more embodiments of the system may be utilized in medical applications that annotate messages referring to a medical case with information about related or similar cases, or with background information on the conditions or treatments associated with the case. For example, the contextual information may include medical imagery similar to X-rays or other scans in the original message, to enable faster diagnosis, or information as to how a particular medical situation was treated in the past, or how the injury may have been obtained. The information may include potential remedies based on the original message, including any equipment or drugs utilized previously with good effect or bad effect.
Embodiments may also be utilized in real estate applications that annotate messages with recent information about a particular house or neighborhood, potential buyers for the type of property listed in the message, or “comps” or comparable listings for the particular house or neighborhood.
Embodiments may also be utilized in police or emergency worker applications that annotate messages to include geo-location data, such as for example crime hot spots or recent locations of criminals or accidents. One or more embodiments may for example annotate a message referencing a location with the identities of individuals that have recently been within a predefined distance from the location, for example as obtained from security cameras near the location, or from cell phones or other location-detecting devices that track people's locations. Embodiments may utilize face recognition for faces in images obtained from security cameras or social media posts to add context to the message associated with a crime or emergency scene.
Similarly, one or more embodiments may include legal applications that annotate messages referring to a legal case or action, for example with information about related or similar cases, background information on the law associated with the case, background or contact information for the parties to the action, or the case file for the action.
Embodiments of the system may operate on any type of electronic message, including for example, without limitation, an email message, an instant message, calendar message, social media message, a text message, a picture message, a voice message, a voicemail, a video message, a chat message, and a video call message. Electronic messages in the form of social media messages may include a posting to a social networking site, a blog, a wiki, an RSS feed, a mailing list, a newsgroup, or any other information repository. Senders and receivers of messages may be persons, and they may be automated systems, repositories, databases, groups, or any other systems that generate or receive information.
Electronic messages contain one or more message “artifacts,” which are portions or elements of the message. Any portion of a message or data related to a message may be a message artifact. Types of message artifacts may include, without limitation, senders, sender addresses, sender organizations, recipients, recipient addresses, recipient organizations, message subjects, message contents, message body parts, message threads associated with a message, events, timestamps, locations, links, dates, times, importance indicators, media, media types, message metadata, and attachments.
Examples of potential annotations may include for example, similar documents, related cases or projects, other users working on or interested in the same or similar topics, background information, detailed documents supporting summaries in a message, and other documents authored by senders or recipients of the message. Annotations may also be derived from or include information contained in communication archives, geo-location related information, public information in commercial and private databases, news, social media databases or any other context related information source for example. Annotations may also be for example active links to websites, databases, search engines, or forms, potentially with search fields or form fields prepopulated based on the message or the message context.
Embodiments of the system may contain several modules that collectively transform a message into an annotated message. These modules execute on a hardware platform with processors, memory, and network interfaces. Embodiments may use any desired number and types of processors, memory devices, and network interfaces. One or more embodiments are distributed systems with modules executing over multiple processors, possibly in multiple locations, communicating and coordinating their activities over a network. Networks may be wired or wireless, and may use any desired media and protocols. Embodiments may also use multiple networks and mixed network types.
One or more embodiments of the system may transform a message into an annotated message on the processor or processors used by or available to a message sender. In one or more embodiments the message sender may therefore be able to review and modify the annotated message prior to sending the annotated message. Alternatively, or in addition, one or more embodiments may transform a message into an annotated message after it has been sent; for example, a message may be transformed into an annotated message on the processor or processors of a message recipient, or any any processors in the network path between the sender and the recipient. Embodiments may use any desired combination of transformations at the sending end of the transmission path, at the receiving end of the transmission path, or at any node along the transmission path.
One or more embodiments may contain the following modules: A Message Input Module that accepts incoming messages; A Feature Extraction Module that analyzes the message and generates a set of features describing the message; An Information Selection Module that selects relevant contextual information items from one or more Contextual Information Sources accessible to the system (potentially over network connections); A Message Annotation Module that adds the selected items to the message; and A Message Output Module that transmits the annotated message to the recipients.
In one or more embodiments of the system, the Message Input Module accepts or otherwise retrieves messages from any of the types of information sources available. The message is then sent to the Feature Extraction Module for analysis.
In one or more embodiments of the system, the Feature Extraction Module analyzes the message artifacts of the message received by the Message Input Module, and generates a set of features associated with these artifacts. Embodiments may use any number and type of features to describe the message. Examples may include, without limitation, word counts, keywords, key phrases, inferred topics, characteristics of senders or receivers, and any data items referenced in a message or derived from any of the message artifacts. One use of the features is to characterize the message so that relevant contextual data for the message can be located. Finding this relevant contextual data is the role of the Information Selection Module.
The Information Selection Module has an interface to one or more Contextual Information Sources. These sources may be internal to the system, or external to the system. Sources may be proprietary or open, public or private, and unsecured or secured. They may include for example, without limitation, websites, databases, repositories, archives, file systems, publications, wikis, logs, blogs, news feeds, RSS feeds, mailing lists, contact lists, or any other source of potentially relevant data. The Information Selection Module searches these sources using the message features, and it retrieves a set of contextual information items that appear to be relevant for the message. These items are then passed to the Message Annotation Module.
The Message Annotation Module transforms the original message by adding the selected contextual information items. Embodiments may execute these transformations in various ways, including for example, without limitation, attaching items to a message, modifying the text of a message, modifying subject lines of a message, adding new recipients to a message, or highlighting text in a message or otherwise modifying the message format. Embodiments may insert information inline or via references, hyperlinks, attachments, or added or modified message body parts.
The Message Output Module transmits the now annotated message to the original recipients, and potentially to other recipients identified during the annotation process.
Specifically, one or more embodiments of the Feature Extraction Module generate word or symbol or phrase “n-grams” to form part of the feature set for the message. N-grams are sequences of items extracted from the message; for example, word 1-grams are individual words, and word 2-grams are consecutive word pairs. One or more embodiments may use frequency distributions of n-grams in the message to locate relevant items from the Contextual Information Sources. For example, relevant items may be selected as those with similar n-gram frequency distributions to those of the message.
One or more embodiments of the Information Selection Module select relevant contextual information items by calculating, assigning, or retrieving a relevance score for each item based on the message features, and then ranking items by their relevance scores. A set of top-ranked items may be selected to add to the message as annotations. In some embodiments the Information Selection Module may perform one or more initial queries to generate a set of possibly relevant items, and then calculate relevance scores for that set only. Embodiments may use any method, formula, or algorithm to calculate relevance scores.
In one or more embodiments, relevance scores may be derived from a distance metric or a similarity metric. A distance metric measures how far apart items are in some “feature space;” a similarity metric is the reverse: it measures how close items are in a feature space.
In one or more embodiments the Information Selection Module may use one or more external search engines to locate or rank a set of possibly relevant contextual information items. Search terms for the search engines may be derived from the message features. Top-ranked results from search engine queries may be added to the message as annotations.
In some embodiments, one or more of the Contextual Information Sources may be protected with access rules that limit who can view information from the sources. In some of these embodiments, the Feature Extraction Module may include the recipient or recipients of the message as well as their organizations and access credentials in the set of features passed to the Information Selection Module. The Information Selection Module may then retrieve information from a protected Contextual Information Source only for those recipients that have access to that information. In some embodiments the Information Selection Module may need to log in or otherwise gain access to a secured information source; gaining access may for example use the credentials of the senders or receivers, or use credentials configured for the system overall. Annotated messages may therefore be different for different recipients, since the Message Annotation Module may selectively add protected information only to the messages sent to recipients authorized to view this information.
One or more embodiments may customize annotations by recipient based on any characteristics of the recipients, including but not limited to each recipient's access to secured information. For example, recipients from different organizations may receive different annotations based on policies of the receiving organizations. One or more embodiments may provide configuration options to collect preference information from recipients; embodiments may then use this preference information to customize annotations for each recipient. For example, one recipient may prefer very terse annotations, while another may prefer verbose annotations; the system may take these preferences into account in creating annotations for each recipient.
One or more embodiments of the system may incorporate one or more classifiers into the Feature Extraction Module. A classifier categorizes the message or an artifact of the message into one or more classes. These classes may then be used to modify the subsequent feature extraction or information selection processes. Some embodiments may employ probabilistic classifiers, which assign a probability that a message (or a message artifact) is in each possible class. In one or more embodiments, message annotation may be based in part on the class probabilities. For example, annotation of a message may occur only if a message is classified into a specific class with a sufficiently high probability; the system may choose to skip or limit annotations if the classifier shows significant uncertainty about the correct class of a message.
One or more embodiments of the system may use a probabilistic topic model to classify messages into topics. A probabilistic topic model views a message as a mixture of topics, and it uses word frequencies to determine the mixture. One or more embodiments may also use a probabilistic topic model to generate the topic model that defines the set of topics and the word frequencies for each topic.
One or more embodiments of the system may incorporate a Machine Learning Module into the system to generate or refine the methods used by the Feature Extraction and Information Selection Modules. Embodiments may use, create, or access a training set of examples for the Machine Learning Module. For example, a training set may consist of a set of example messages with example annotations that are known to be relevant. A training set may for example be extracted from message archives of senders, receivers, or message delivery or storage services. The Machine Learning Module may use any of the machine learning techniques known in the art to develop generalized methods from a training set.
One or more embodiments of the system may incorporate a Feedback Module into the system that tracks whether and how recipients use the annotations added to messages. For example, one or more embodiments may track when recipients download or view attachments that are added to messages as annotations. One or more embodiments of the Feedback Module may provide direct user feedback mechanisms to allow users to indicate or rate the usefulness of the annotations or to provide comments on the annotation system. In some embodiments the Feedback Module may provide feedback data to the Machine Learning Module to improve feature extraction and information selection for future message annotations.
One objective of some embodiments of the system is to provide recipients with data that they would otherwise need to search for themselves. To improve the system's information selection and annotation capabilities, one or more embodiments of the system may monitor a recipient's searches for and uses of information after he or she receives a message. This data may be provided to the Feedback Module to incorporate into training set data to improve future annotations.
One or more embodiments of the system may include media-processing capabilities. For example, some embodiments of the Feature Extraction Module may analyze images contained in message artifacts, and extract sub-images of interest or other image features of interest. Some embodiments of the Information Selection Module may access Contextual Information Sources that include image databases, and they may use image-matching techniques to find similar images to those in a message or to identify sub-images extracted by the Feature Extraction Module. Additional information about objects identified using image matching may be provided as annotations to the message. One or more embodiments may include similar searching and matching capabilities for audio, video, or any other media contained in message artifacts. Embodiments may identify segments of interest in these media that may represent objects of interest, and search Contextual Information Sources for matching objects or matching segments. As an example, a message may contain an audio recording that includes a fragment of a song. An embodiment of the system may for example scan the audio recording to extract the segment associated with the song, search a database of song audio to identify the song, and annotate the message with detailed information on the song, such as for example the lyrics, author, singer, publisher, and sheet music.
One or more embodiments of the system may use location data in a message to find information about items within a predefined proximity to the locations mentioned in the message. Temporal settings may be utilized to indicate how far back in time to search for contextual information. In some embodiments the Feature Extraction Module may find or access locations in message artifacts and convert them to various geographical data formats (such as latitude and longitude); the Information Selection Module may then access Contextual Information Sources with geo-tagged data to find information about the location or about items in proximity to the location, for example within a given time period before the message was received by the system. This location-based information may then be added to the message as annotations.
One or more embodiments may derive relevant locations from other information in a message. For example, if a message is sent between two users proposing a meeting, the system may recognize that the office locations of each user are relevant features for the message. Information about those locations may therefore be added as annotations to the message. For example, an embodiment may add a map automatically to a message about a meeting at the sender's office, where the location is derived from known information about the sender. One or more embodiment may combine location information with additional information extracted from the message to generate annotations. For example, if a message is sent between two users proposing a meeting for lunch, an embodiment may generate a list of restaurants near one or both of the user's offices and include this list as an annotation. Moreover, if it is known that one of the users is for example a vegetarian, an embodiment may limit its restaurant search to vegetarian restaurants or restaurants serving vegetarian options. One or more embodiments of the system may combine message features with any additional information about users or other context to determine relevant annotations.
The above and other aspects, features and advantages of the invention will be more apparent from the following more particular description thereof, presented in conjunction with the following drawings wherein:
A system for annotation of electronic messages with contextual information will now be described. In the following exemplary description numerous specific details are set forth in order to provide a more thorough understanding of embodiments of the invention. It will be apparent, however, to an artisan of ordinary skill that the present invention may be practiced without incorporating all aspects of the specific details described herein. In other instances, specific features, quantities, or measurements well known to those of ordinary skill in the art have not been described in detail so as not to obscure the invention. Readers should note that although examples of the invention are set forth herein, the claims, and the full scope of any equivalents, are what define the metes and bounds of the invention.
The functionality of the embodiment shown in
In
Features 135 are provided to Information Selection Module 140. The role of the Information Selection Module is to select a relevant set of contextual information that will be added to the message as an annotation. As with feature extraction, the specific methods used by the Information Selection Module may depend on the application. In general, the system may include an interface to one or more Contextual Information Sources 141 that provide the possible data for annotations. Information sources may be internal to the system or external to the system. Examples of contextual information sources may include, without limitation, databases, file repositories, personal archives, corporate or organizational archives, websites, the entire World Wide Web or subsets thereof, mail archives, news feeds, media repositories or databases, local or remote filesystems, contact lists, publications, journals, social media sites, or catalogs. Internal sources for a company may include for example any archives or repositories of company data or company communications. Contextual Information Sources may be highly structured, like relational databases for example, or largely unstructured, like raw document repositories. One example of an embodiment of a Contextual Information Source is the list of all electronic messages 115 received by the system; such a source may be used for example to annotate messages with other similar messages that have been received previously. In some embodiments the system may preprocess one or more Contextual Information Sources to generate indexes or other data structures to facilitate searching and retrieval.
Contextual Information Sources contain sets of contextual information items, which are the individual elements that can be retrieved and used for annotating messages. Such items may include for example, without limitation, documents, extracts, paragraphs, other messages, data items, data tables, lists, words, phrases, publications, articles, images, videos, audio clips, resumes, instructions, or web pages. Embodiments may use any desired level of granularity for contextual information items. Contextual information items may also be structured in a hierarchy or a network, where one item may include or refer to other items.
The Information Selection Module 140 uses the features 135 extracted from the message to identify appropriate and relevant contextual information items from the Contextual Information Sources 141. Any method of matching, searching, retrieving, sorting, analyzing, or inferring may be used to select appropriate items. Embodiments may use simple methods such as matching of features, or complex methods involving artificial intelligence to infer the meaning of the features and to infer relevant items to select for annotation of the message. Contextual Information Sources may be searched in parallel or serially, or using a combination of methods. In the example shown in
The function of the Message Annotation Module 150 is to transform the original message 115 into annotated message 155. Embodiments may use different techniques to transform messages, including adding information as attachments, or modifying or augmenting the contents or format of the original message. In the embodiment shown in
In the final step of the embodiment shown in
Having described the architectural overview of the embodiment of the system shown in
Message 115 has an In-Reply-To field 205 that shows that the message is a response to a previous message. In general one or more message artifacts may identify any number of other messages in a conversation or thread associated with the message. Related messages artifacts may for example be obtained from an In-Reply-To field like 205, or from a References field that may list a set of related messages in a message thread. Related messages may also be obtained or inferred from other fields or from the message contents or other artifacts; for example, if the subject field of a message refers to the subject a previous message, then one or more embodiments may link the message with the previous message or with other messages in a message thread by correlating their subject fields. For example, when replying to a message with subject “Foo”, a mail client may often generate the subject field for the reply as “Re: Foo” or some similar reference. Similarly, when forwarding a message with subject “Foo”, a mail client may often generate the subject field for the forwarded message as “Fwd: Foo” or some similar reference. One or more embodiments may therefore be able to construct a message thread (or portions thereof) by comparing and correlating subject fields, or by comparing and correlating other message artifacts.
The received timestamp 206 is an artifact. Other timestamps may also be present, such as a sent timestamp or timestamps associated with events identified in the message. Urgency flag 207 is also a message artifact. The message subject 208 is an artifact; this particular artifact may be particularly useful in some embodiments to assist in classifying the message and extracting features for information selection. Message 115 refers to an upcoming meeting, and includes the location 209 and time 210 of the meeting, which are artifacts. The message has an attachment 211, which is an artifact. The contents of the attachment may include other artifacts. The contents 212 of the message is an artifact. It includes an image 213, with a MIME type 214; both the image itself and its media type are artifacts. Finally the “source data” 215 of message 115 includes various flags describing message routing and message content types. Any of this message metadata may also be used as artifacts. The examples of message artifacts shown in
In
Information Selection Module 140 searches Medical Cases Database 141 to find cases that are similar to the one identified by the features 135. Each case in database 141 is assigned a relevance score based on the features 135. The cases with the top-ranked relevance scores are selected as the contextual information items that will be attached to the message. In the example in
Embodiments using relevance scores may use any desired function to map contextual information items and message features into relevance scores.
Embodiments may use any desired distance metric or any other desired method to select relevant contextual information items. In the embodiment shown, the distance metric d between the message features (s1, a1, d1) (corresponding to sex, age, and diagnosis) and a case in the Medical Cases Database with features (s2, a2, d2) is calculated as value 720, d[(s1,a1,d),(s2,a2,d2]. In this example, the value 720 is a sum of distance metrics 711, 712, and 713 applied to the individual features Sex, Age, and Diagnosis, respectively. This illustrative example uses an additive model for distance that effectively treats the feature differences as independent. One or more embodiments may take into account feature interrelationships as well. For example, diagnosis may be highly correlated with age or sex for certain conditions, such as prostate cancer. One or more embodiments may take feature correlations into account for example by transforming features into linearly independent factors (using for example principal components analysis), and computing distance functions on the independent factors instead of the original features.
The illustrative individual feature distance metrics 711 and 713 use auxiliary function δ* defined at 710. This function maps equal values into 0, and maps unequal values into 1. It is the inverse of the Kronecker delta function that maps equal values to 1, and unequal values to 0.
The Sex distance metric 711 is simply the δ* distance weighted by the weighting factor 20. The weighting factor 20 here is for illustration only; embodiments using feature distance metrics may use any desired weights to reflect the relative importance of each feature in determining the overall distance between items.
The Age distance metric 712 is simply the absolute value of the difference in ages. As for the Sex distance metric, the weighting here may be adjusted in different embodiments to reflect the relative importance of this feature in determining overall distance between items.
The Diagnosis distance metric 713 is an example of a hierarchical distance metric. In this example the diagnosis consists of two components: the condition (carcinoid tumor) and the body part affected (appendix for the case mentioned in the message). In the distance metric illustrated in
In
Some embodiments may use “similarity metrics” instead of or in addition to distance metrics. A similarity metric is in a sense the inverse of a distance metric, in that larger values indicate that items are closer. As an illustrative example of a similarity metric, an embodiment that uses n-grams as features (as illustrated in
One or more embodiments may use an external search engine to locate or rank relevant contextual information items.
Some embodiments of the system may use one or more classifiers to categorize messages into classes. Classification may affect subsequent feature extraction and information selection. For example, different methods may be used to select information based on the class or classes of a message. To continue the medical example from the previous figures, physicians may send a variety of types messages to colleagues. It may be appropriate to search for matching cases only for messages that refer to a medical case. A classifier may be used to determine whether annotation with related cases is appropriate. Many types of classifiers are known in the art; embodiment may employ any of these techniques to classify messages.
In the example embodiment of
One or more embodiments may use machine learning to develop or refine methods for feature extraction and for information selection.
Many techniques for machine learning are known in the art. Embodiments of the system may use any of these techniques, including for example, without limitation, supervised learning, unsupervised learning, neural networks, support vector machines, classifiers, linear and nonlinear classifiers, nearest neighbor methods, clustering, decision trees, Bayesian networks, hidden Markov models, logic programming, and genetic algorithms.
As a simple example of a machine learning approach, an embodiment of the system may use a training set with hand-selected examples of messages and corresponding examples of relevant contextual information items. The Machine Learning Module may then use any machine learning techniques with these examples to infer generalized rules for extracting features and selecting information. As another example, an embodiment of the system may use message archives as a training set, and infer the topics each user is most interested in from the topics of messages sent from or sent to that user. The system may then tailor information selection rules to provide annotations to each user that focus on that user's preferred topics.
A key objective of one or more embodiments of the system is to provide annotations that are useful to the recipients. One measure of the usefulness of an annotation is whether it is viewed or used by the recipients.
In the embodiment shown in
One or more embodiments of the system may analyze media contained in messages to extract message features and to select contextual information for annotations. Media may include for example, without limitation, images, video, audio, graphics, or combinations thereof.
One or more embodiments of the invention may use location data in messages to annotate messages with contextual information about items in proximity to the location.
One or more embodiments may derive locations associated with a message even if these locations are not explicitly identified in the message artifacts. For example, the home office location of a sender or receiver may be known; these locations may be used in generating message annotations. For mobile users, the current location of a sender or receiver may be available to the system, for example from GPS receivers embedded in a mobile device; the system may use these current locations to identify relevant contextual information. As an example, a sender may send a message to a receiver with the contents “I am here; meet me now.” Even if the current location of the sender is not explicitly included in the message, the system may obtain this current sender location and for example annotate the message with a map to the sender's location.
While the invention herein disclosed has been described by means of specific embodiments and applications thereof, numerous modifications and variations could be made thereto by those skilled in the art without departing from the scope of the invention set forth in the claims.
Number | Name | Date | Kind |
---|---|---|---|
6965968 | Touboul | Nov 2005 | B1 |
7058822 | Edery et al. | Jun 2006 | B2 |
7418731 | Touboul | Aug 2008 | B2 |
7647633 | Edery et al. | Jan 2010 | B2 |
8141154 | Gruzman et al. | Mar 2012 | B2 |
8554873 | Ganesh | Oct 2013 | B1 |
8762302 | Spivack et al. | Jun 2014 | B1 |
8843481 | Xu | Sep 2014 | B1 |
8935192 | Ventilla et al. | Jan 2015 | B1 |
8989713 | Doulton | Mar 2015 | B2 |
9065827 | Taylor | Jun 2015 | B1 |
9451092 | Qureshi | Sep 2016 | B2 |
9467410 | Liebmann et al. | Oct 2016 | B2 |
10277628 | Jakobsson | Apr 2019 | B1 |
10296568 | Hancock | May 2019 | B1 |
10609073 | Jakobsson | Mar 2020 | B2 |
20050256866 | Lu | Nov 2005 | A1 |
20060041848 | Lira | Feb 2006 | A1 |
20070043583 | Davulcu | Feb 2007 | A1 |
20070136245 | Hess et al. | Jun 2007 | A1 |
20070198951 | Frank | Aug 2007 | A1 |
20070239831 | Basu | Oct 2007 | A1 |
20080010605 | Frank | Jan 2008 | A1 |
20080065685 | Frank | Mar 2008 | A1 |
20080091834 | Norton | Apr 2008 | A1 |
20080182598 | Bowman | Jul 2008 | A1 |
20080268823 | Shalev | Oct 2008 | A1 |
20090063372 | Lu | Mar 2009 | A1 |
20090112457 | Sanchez et al. | Apr 2009 | A1 |
20090112608 | Abu-Hakima et al. | Apr 2009 | A1 |
20090177745 | Davis | Jul 2009 | A1 |
20090292785 | Leedberg | Nov 2009 | A1 |
20100205061 | Karmarkar | Aug 2010 | A1 |
20110014933 | Karmarkar et al. | Jan 2011 | A1 |
20110035681 | Mandel et al. | Feb 2011 | A1 |
20110238762 | Soni et al. | Sep 2011 | A1 |
20120105475 | Tseng | May 2012 | A1 |
20120136923 | Grube | May 2012 | A1 |
20120240062 | Passmore | Sep 2012 | A1 |
20120278164 | Spivack | Nov 2012 | A1 |
20130096813 | Geffner et al. | Apr 2013 | A1 |
20130165086 | Doulton | Jun 2013 | A1 |
20130166280 | Quast et al. | Jun 2013 | A1 |
20130174058 | Kaul | Jul 2013 | A1 |
20130226453 | Trussel et al. | Aug 2013 | A1 |
20130262168 | Makanawala | Oct 2013 | A1 |
20130268828 | Bucchieri | Oct 2013 | A1 |
20130275429 | York | Oct 2013 | A1 |
20130290339 | LuVogt et al. | Oct 2013 | A1 |
20130298038 | Spivack | Nov 2013 | A1 |
20130339000 | Zhang | Dec 2013 | A1 |
20140040374 | Olsen et al. | Feb 2014 | A1 |
20140046976 | Zhang et al. | Feb 2014 | A1 |
20140055491 | Malamud et al. | Feb 2014 | A1 |
20140108143 | Davitz | Apr 2014 | A1 |
20140129239 | Utter, II | May 2014 | A1 |
20140129331 | Spivack et al. | May 2014 | A1 |
20140164529 | Kleppmann et al. | Jun 2014 | A1 |
20140164921 | Salinas | Jun 2014 | A1 |
20140171039 | Bjontegard | Jun 2014 | A1 |
20140188541 | Goldsmith | Jul 2014 | A1 |
20150026260 | Worthley | Jan 2015 | A1 |
20150058324 | Kauwe | Feb 2015 | A1 |
20150100647 | Agustin | Apr 2015 | A1 |
20150100893 | Cronin et al. | Apr 2015 | A1 |
20150112709 | Bowman et al. | Apr 2015 | A1 |
20150264093 | Madisch et al. | Sep 2015 | A1 |
20150294377 | Chow | Oct 2015 | A1 |
20150304437 | Vaccari et al. | Oct 2015 | A1 |
20150331997 | Joao | Nov 2015 | A1 |
20150356436 | Sanchez | Dec 2015 | A1 |
20160004711 | Soon-Shiong | Jan 2016 | A1 |
20160027023 | Kulkarni | Jan 2016 | A1 |
20160078471 | Hamedi | Mar 2016 | A1 |
20160173428 | Balasubramanian et al. | Jun 2016 | A1 |
20160189317 | Papandrea | Jun 2016 | A1 |
20160197872 | Khattar | Jul 2016 | A1 |
20160225059 | Chow | Aug 2016 | A1 |
20160259902 | Feldman et al. | Sep 2016 | A1 |
20160294771 | Yuan | Oct 2016 | A1 |
20160342691 | He | Nov 2016 | A1 |
20160360336 | Gross et al. | Dec 2016 | A1 |
20160371791 | Lee | Dec 2016 | A1 |
20170048170 | Smullen | Feb 2017 | A1 |
20170148055 | Boothroyd | May 2017 | A1 |
20170235848 | Van Dusen | Aug 2017 | A1 |
20170372271 | Goldsmith | Dec 2017 | A1 |
Entry |
---|
Jurafsky, “Text Classification and Naive Bayes”, Powerpoint Presentation, 2012, 74 slides. |
Hoffman, “Probabilistic Latent Semantic Indexing”, International Computer Science Institute, Berkley, CA, 1999. |
Blei, “Introduction to Probabilistic Topic Models”, Princeton University, 2011. |
Dietz, et al., “Utilize Probabilistic Topic Models to Enrich Knowledge Bases”, Fraunhofer Integrated Publication and Information Systems Institute (IPSI); Darmstadt, Germany; 2006. |
Chen, et al., “On the similarity metric and the distance metric”, Theoretical Computer Science, vol. 410, Issues 54-25, May 2009, pp. 2365-2376. |
Number | Date | Country | |
---|---|---|---|
20170289080 A1 | Oct 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14813034 | Jul 2015 | US |
Child | 15489198 | US |