| 12355651 |
Scalable and low computation cost method for optimizing sampling/probing in a large scale network |
Christophe Diot, Muhammad Jehangir Amjad, Dimitris Konomis, Augustin Soule, Xiaolong Yang |
2025-07-08 |
| 12182713 |
Multi-task equidistant embedding |
Handong Zhao, Zheng Wen, Sungchul Kim, Sheng Li |
2024-12-31 |
| 11593860 |
Method, medium, and system for utilizing item-level importance sampling models for digital content selection policies |
Shuai Li, Zheng Wen, Yasin Abbasi Yadkori, Vishwa Vinay |
2023-02-28 |
| 11551256 |
Multivariate digital campaign content exploration utilizing rank-1 best-arm identification |
Zheng Wen, Yasin Abbasi Yadkori, Mohammad Ghavamzadeh, Claire Vernade |
2023-01-10 |
| 11354720 |
Item recommendation techniques |
Hung Bui, Suvash Sedhain, Nikolaos Vlassis, Jaya Kawale |
2022-06-07 |
| 11080732 |
Audience comparison |
Trevor Paulsen, Craig Mathis, Nikolaos Vlassis, Kristopher Paries, Ivan Andrus +2 more |
2021-08-03 |
| 11062346 |
Multivariate digital campaign content testing utilizing rank-1 best-arm identification |
Zheng Wen, Yasin Abbasi Yadkori, Mohammad Ghavamzadeh, Claire Vernade |
2021-07-13 |
| 11055317 |
Methods and systems for determining and outputting correlations between metrics in a web analytic dataset |
Hamid Dadkhahi, Mohammad Ghavamzadeh, Hung Bui |
2021-07-06 |
| 10984058 |
Online diverse set generation from partial-click feedback |
Zheng Wen, Prakhar Gupta, Iftikhar Ahamath Burhanuddin, Harvineet Singh, Gaurush Hiranandani |
2021-04-20 |
| 10878451 |
Change point detection in a multi-armed bandit recommendation system |
Yang Cao, Zheng Wen |
2020-12-29 |
| 10783361 |
Predictive analysis of target behaviors utilizing RNN-based user embeddings |
Sungchul Kim, Deepali Jain, Deepali Gupta, Eunyee Koh, Nikhil Sheoran +3 more |
2020-09-22 |
| 10706454 |
Method, medium, and system for training and utilizing item-level importance sampling models |
Shuai Li, Zheng Wen, Yasin Abbasi Yadkori, Vishwa Vinay |
2020-07-07 |
| 10657574 |
Item recommendation techniques |
Hung Bui, Suvash Sedhain, Nikolaos Vlassis, Jaya Kawale |
2020-05-19 |
| 10558852 |
Predictive analysis of target behaviors utilizing RNN-based user embeddings |
Sungchul Kim, Deepali Jain, Deepali Gupta, Eunyee Koh, Nikhil Sheoran +3 more |
2020-02-11 |
| 10332015 |
Particle thompson sampling for online matrix factorization recommendation |
Jaya Kawale, Hung Bui |
2019-06-25 |
| 10275532 |
Method and system for content discovery |
Sandilya Bhamidipati |
2019-04-30 |
| 9862352 |
User identification and personalized vehicle settings management system |
Victor B. Lortz, Vijay Sarathi Kesavan, Somya Rathi, Anand Rangarajan |
2018-01-09 |
| 8903315 |
Secure context-based computing |
Trevor Pering, Meiyuan Zhao |
2014-12-02 |
| 8630963 |
Automatic user identification from button presses recorded in a feature vector |
Mariano J. Phielipp, Magdiel F. Galán |
2014-01-14 |
| 8625860 |
Adaptive face recognition using online learning |
Kenton M. Lyons |
2014-01-07 |