Professional Documents
Culture Documents
sERACESS WIS
1:03 - cLAEFRFESK
saET acts
(5 - USERS8ECTSAACE
- FRMREMES
TLs
ARTICLE
bic:FAACH
407 - -
Articl:S AERA) :
s: EISE
(8 - PREFERECE PROFES
5,754939
Page 2
U.S. PATENT DOCUMENTS Sincoskie, W.D. & Cotton C.J. "Extended Bridge Algo
5,301,09 4/1994 Landauer et al. ....................... 364/49 rithms for Large Networks", IEEE Network. Jan. 1988
5.321,833 6/1994 Chang et al. ........................... 395/600 vol. 2, No. 1. pp. 16-24.
5.331554 7/1994 Graham ........... ... 364/419.07
5,331556 7/1994 Black, Jr. et al. ... ... 364/419.01 Deering, S.; Estrin, D.; Farinacci. D.; Jacobson, W.; Liu. C.;
5,373.558 12/1994 Chaum ...................................... 380/23 Wei, L; "An Architecture for Wide-Area Multicast Rout
5,410,344 4/1995 Graves et al. ... ... 34871 ing". Computer Communication Review, vol. 24. No. 4. Oct.
5,469.206 11/1995 Strubbe et al. . ... 348/7 1994, Proceedings of SIGCOMM 94, pp. 126-135.
5,483.278 1/1996 Strubbe et al. . ... 348/7
5.534,911 7/1996 Levitan ....... ... 348/1 Bolot, J.; Turletti. T. & Wakeman. I.: "Scalable Feedback
5.541,638 7/1996 Story ................... ... 348/7 Control for Multicast Video Distribution. In the Internet",
5,600,364 2/1997 Hendricks et al. ......................... 348/1 Computer Communication Review, vol. 24, No. 4, Oct.
OTHER PUBLICATIONS 1994, Proceedings of SIGCOMM 94, PP. 58-67.
Foltz, P.W., Dumais, S.T., "Personalized Information Deliv Rivest, R.L.; Shamir, A. & Adleman. L.; "A Method for
ery: An Analysis Of Information Filtering Methods". Com Obtaining Digital Signatures and Public-Key Cryptosys
munications of the ACM, Dec. 1992, vol. 35, No. 12, pp. tems”. Communications of the ACM, Feb. 1978, vol. 21. No.
51-60.
Belkin, N.J., Croft, W.B., “Information Filtering and Infor 2, pp. 120-126.
mation Retrieval: Two Sides of the Same Coin'?". Commu Chaum, D. "Security without Identification: Card Comput
nications of the ACM, Dec. 1992. vol. 35. No. 12, pp. 29-38. ers to Make Big Brother Obsolete". Communications of the
Chalmers, M., Chitson, P., "Bead: Explorations In Informa ACM, 28(10). Oct. 1985, pp. 1030-1044.
tion Visualization", 15th Ann. Intl SIGIR 92/Denmark
Jun. 1992, pp. 330-337. Chaun, D. "Untraceable Electronic Mail, Return Addresses.
Willett, P. "Recent Trends in Hierarchic Document Clus and Digital Pseudonyms". Communications of the ACM,
tering: A Critical Review". Information Processing & Man vol. 24, No. 2 Feb., 1981.
agement, vol. 24, No. 5, pp. 557-597, 1988.
Tak W. Yan & Hector Garcia-Molina, SIFT-A Tool for Sheth, B. & Maes, P. "Evolving Agents For Personalized
Wide-Area Information Dissemination, 1995 USENIX InformationFiltering", Proc. 9th IEEE Conference, 1993 pp.
Technical Conference, New Orleans, LA., Jan. 16-20, pp. 345-352.
177-186.
Masahiro Morita & Yoichi Shinoda, Information Filtering Cutting, D.R.; Karger, D.R.; Pedersen. J.O. & Tukey, J.W.
Based on User Behavior Analysis and Best Match Text "ScatterfQather: A Cluster-based Approach to Browsing
Retrieval, Proceedings of the Seventeenth Annual Interna Large Document Collections", 15 Ann. Intl SIGIR'92, ACM,
tional ACM-SIGIR Conference on Research and Develop 1992, pp. 318-329.
ment in Information Retrieval, Dublin, Jul. 3-6, 1994. Pages Rose, D.E.; Mander, R.; Oren, T., Ponceleon, D.B.;
Title p. (272)-281.
Jim Binkley & Leslie Young. Rama: An Architecture for Salomon, G. & Wong, Y.Y. "Content Awareness in a File
Internet Information Filtering, Journal of Intelligent Infor System Interface Implementing the "Pile" Metaphor for
mation Systems: Integrating Artificial Intelligence and Data Organizing Information", 16 Ann. Intl SIGR'93. ACM, pp.
base Technologies, vol. 5, No. 2, Sep. 1995, pp. 81-99. 260-269.
U.S. Patent May 19, 1998 Sheet 1 of 13 5,754,939
------
5 OG)
III H -- - - - -\
O): V- - - - - - J
--
s
Z t H.
t
H
HHHHH
III
HHHHH
U.S. Patent May 19, 1998 Sheet 2 of 13 5,754.939
8
3
WHHH
XII a
HHHHHH
E
r
3
3 & OS - - - -
I g:Se Z
MO
(N
3 S
HHHHH
EII, it
N
EI in
U.S. Patent May 19, 1998 Sheet 3 of 13 5,754,939
">
u1 s C
C
FIG. 3
-N S
">
us C
C
D
Ns
U.S. Patent May 19, 1998 Sheet 4 of 13 5,754,939
CALCULATE
502 -- DOCUMENT PROFILES
GENERATEMENUS FROM
505 CLUSTER STRUCTURE
AND LABELS
F.G. 5
U.S. Patent May 19, 1998 Sheet 5 of 13 5,754,939
F.G. 6
(a, b, C, d e, f, 9, h, l, j, k, )
U.S. Patent May 19, 1998 Sheet 6 of 13 5,754,939
U.S. Patent May 19, 1998 Sheet 7 of 13 5,754,939
1 101 USERLOGIN
MONITOR WHICH
11 O7 ARTICLES ARE READ
UPDATE USER
1108 PREFERENCE PROFILES
FIG. 10
U.S. Patent May 19, 1998 Sheet 8 of 13 5,754939
p A r
N/ B
C
/ FIG 11
ASSIGNATRIBUTE
WEIGHT ASA FUNCTION 12O2
OF THE USER
COMPUTE WEIGHTED
SUM OF SELECTED N-1203
NORMATIVE ATRIBUTES
OF TARGET OBJECT
RETRIEVE SUMMARIZED
WEIGHTED RELEVANCE -- 1204
FEEDBACKDATA
F.G. 13A
INITIALZELIST OF
TARGET OBJECTS TO THE 13A-00
EMPTY LIST
RETURN LIST OF
TARGET OBJECTS 3A-03
U.S. Patent May 19, 1998 Sheet 10 of 13 5,754,939
i= 1,
n = NUMBER OF CHLD 13B-OO
F.G. 13B SUBTREES OF CURRENT TREE
CALCULATE d(P,p)
WHEREp, IS 3B-02
PROFFLE OF it
CHILDSUBTREE
DOES
ith CHILD
SUBTREE CONTAIN YES
ONLY ONE TARGET
OBEC/ 13B-05
ADD ARGET OBJECT
SCAN ith CHILDSUBTREE TO LIST OF
FOR TARGET OBJECTS SMAR TARGET OBJECTS
TOP BY NWOKING PROCESS
13B RECURSIVELY
RETURN
U.S. Patent May 19, 1998 Sheet 11 of 13 5,754.939
F.G. 14
USER GENERATES
A PSEUDONYM
CLIENT PROCESSORFORMS
ENCRYPTED MESSAGE WITH 1500
SIGNED WALIDATED PSEUDONYM
F.G. 15
MESSAGE IS ROUTED TO N
PROXY SERVER 15O1
PROXY SERVER
DECODES MESSAGE 1502
INFORMATION SERVER
PROCESSES RECEIVED 1504
REQUEST
INFORMATION SERVER
TRANSMTS RESPONSE 1505
TO PROXY SERVER
CLIEN PROCESSORTRANSMITS
MESSAGE TO PROXY SERVER 1508
TO UPDATE PROFILE
INTEREST SUMMARY
U.S. Patent May 19, 1998 Sheet 13 of 13 5,754939
USERESTABLISHES
F.G. 16 COMMUNICATION CONNECTION 16OO
WITH NETWORK WENDOR