Wei Peng - Fremont CA, US Tong Sun - Penfield NY, US
Assignee:
Xerox Corporation - Norwalk CT
International Classification:
G06F 17/30
US Classification:
707802, 705319
Abstract:
A system and method for identifying a key influencer in a social media environment for enterprise marketing utilizing topic modeling and social diffusion analysis. A user interest profile can be generated by analyzing historical data stored in a database utilizing. A social graph can be generated and an influence measuring process based on the social graph data can be performed utilizing a static diffusion model and a dynamic diffusion model to calculate a set of key influencers. The dynamic diffusion model considers time stamp information to assess an impact of each user communication on the growth of a conversation within a time period. The key influencer can be identified in a specific topic area and a number of total users that can be reached via the influencer within a specific time window can be predicted.
Apparatus And Method For Transmitting Forward Link Data To A Handoff Mobile Station In A Cdma Communication System
Yu-Suk Yun - Seoul, KR Soon-Young Yoon - Seoul, KR Hee-Won Kang - Songnam-shi, KR Jae-Heung Yeom - Seoul, KR Sang-Hyun Yang - Seoul, KR Hoon Huh - Daejeon-Kwangyok-shi, KR Alfred Lin - Los Angeles CA, US Wei Peng - Los Angeles CA, US
Assignee:
SAMSUNG ELECTRONICS CO., LTD. - KYUNGKI-DO
International Classification:
H04Q007/00
US Classification:
370/331000, 370/336000, 370/342000, 455/436000
Abstract:
An apparatus and method for transmitting forward link data to a handoff mobile station in a CDMA communication system. A service sector for the handoff mobile station registers the other sectors in the active set of the handoff mobile station as idle sectors upon request of a data service from the handoff mobile station, and transmits data traffic to the handoff mobile station, while the sectors designated as idle sectors discontinue transmission of data traffic and transition to an idle state.
System And Method Of Estimating The Cost Of A Print Job
Shi Zhao - Rochester NY, US Sudhendu Rai - Fairport NY, US Wei Peng - Sunnyvale CA, US
Assignee:
XEROX CORPORATION - Norwalk CT
International Classification:
G06F 17/00 G06F 3/12
US Classification:
358 115, 705400
Abstract:
A method of estimating the cost of a target print job may include identifying a target print job having a document type and one or more attributes, for each attribute of the target print job, determining a correlation between the attribute and a cost of the target print job using a plurality of historical print jobs associated with the document type, and identifying one or more of the attributes as cost drivers based on the correlation of the attribute to the cost of the target print job. The method may include identifying one or more relevant historical print jobs from the plurality of historical print jobs based on values for the identified cost drivers, estimating a cost of the target print job using the one or more relevant historical print jobs, and displaying the estimated cost associated with the target print job.
Systems, Methods And Devices For Generating An Adjective Sentiment Dictionary For Social Media Sentiment Analysis
Wei Peng - Sunnyvale CA, US Dae Hoon Park - Champaign IL, US
Assignee:
Xerox Corporation - Norwalk CT
International Classification:
G06F 17/27
US Classification:
704 9, 704E11001
Abstract:
Embodiments generally relate to systems and methods for generating a sentiment dictionary and calculating sentiment scores of adjectives within the sentiment dictionary. A set of seed words can be identified and expanded using synonyms and antonyms of the set of seed words. Social media data can be parse to identify adjectives that link to the set of seed words with the words “and” or “but.” Matrices representing the attraction and repulsion among the linked adjectives can be generated. A factorization algorithm can be minimized to determine an output matrix that comprises positive and negative sentiment scores for each of the adjectives. In embodiments, a sentiment score for part of all of the social media data can be calculated using the output matrix, and one or more parts of the social media data can be classified as a positive or negative sentiment.
Methods And Systems For Measuring Engagement Effectiveness In Electronic Social Media
Lei Li - Miami FL, US Tong Sun - Penfield NY, US Wei Peng - Fremont CA, US
Assignee:
XEROX CORPORATION - Norwalk CT
International Classification:
G06Q 10/00
US Classification:
705 738
Abstract:
A system and method for measuring engagement effectiveness with respect to a service agent by analyzing a conversation between the agent and a customer in a social media environment. A conversation history between the agent and the customer can be mapped into a multi-resolution space based on different time frames via a mapping module. A polarized topical and sentimental distance between the continuous conversations can be calculated by applying a topic-sentiment mixture model and a divergence theorem onto the conversation history with respect to the time frame. Finally, the polarized topical distances can be aggregated in a time-sensitive way based on a time function and an effectiveness score can be calculated and represented as a weighted pyramid kernel of multiple levels. Such a time-sensitive pyramid kernel function based on the implicit topical and sentimental correspondences between daily conversations enables discriminative evaluation for the agent engagement in a customer care.
Method And System For Extracting And Classifying Geolocation Information Utilizing Electronic Social Media
Wei Peng - Fremont CA, US Anuj Jaiswal - State College PA, US Tong Sun - Penfield NY, US Matthew DeRoller - Webster NY, US
Assignee:
XEROX CORPORATION - Norwalk CT
International Classification:
G06F 17/30
US Classification:
707743, 707754, 707E1711, 707E17018
Abstract:
Methods, systems and processor-readable media for extracting and classifying location information utilizing social media messages and/or data thereof. The social media messages can be sampled from a social media database and the messages filtered based on a heuristic rule. A geolocation entity from the unstructured social media messages can be extracted utilizing a geolocation entity extracting module. The messages with the geoentities can be uploaded onto a crowd sourcing platform to manually annotate the messages with a label. A text classification model can be built and learned from the label utilizing a machine learning algorithm and the messages can be classified by a location classifier in order to extract the user location. The user location can then be transformed into a geocode so that a spatial search can be enabled and the distance between the locations can be easily calculated.
Systems And Methods For Scalable Topic Detection In Social Media
Lei Li - Miami FL, US Wei Peng - Fremont CA, US Tong Sun - Penfield NY, US
Assignee:
Xerox Corporation - Norwalk CT
International Classification:
G06F 17/30
US Classification:
707740, 707E17005, 707E17089
Abstract:
Embodiments generally relate to systems and methods for detecting topics in social media data. More particularly, the systems and methods can extract a concept hierarchy from a set of data, wherein the concept hierarchy comprises a plurality of layers. Further, the systems and methods can train topic models based on the content in each of the layers. Still further, the systems and methods can select the most appropriate topic model for social media data by balancing the complexity of the model and the accuracy of the topic detection result. Moreover, the systems and methods can use the most appropriate topic model to detect topics in social media data.
Systems And Methods For Controlling Data Access In Client-Side Encryption
- Mountain View CA, US Wei Hua Peng - San Francisco CA, US
International Classification:
G06F 21/62 G06F 21/60
Abstract:
Systems and methods for controlling access to data in applications using client-side encryption. In that regard, in some examples, a first application (e.g., an email application, calendar application, messaging application, word processing application, file storage application, etc.) hosted from a particular web domain may be configured to invoke a second application hosted from a different origin (e.g., a different web domain or subdomain) to handle receiving and encrypting any sensitive information from a client entered through a client application (e.g., a web browser), and to handle decrypting information to be provided to the client through the client application. This second application may be loaded in an inline frame or similar subwindow or subroutine configured to prevent or limit the first application from having access to sensitive information in the second application.