| 7997485 |
Content presentation based on user preferences |
Gary W. Flake, Eric J. Horvitz, Eric D. Brill, Bradly A. Brunell, Susan T. Dumais +4 more |
2011-08-16 |
| 7984169 |
Anonymous and secure network-based interaction |
Bradly A. Brunell, Susan T. Dumais, Eric J. Horvitz, Gary W. Flake, Anoop Gupta +3 more |
2011-07-19 |
| 7930353 |
Trees of classifiers for detecting email spam |
David M. Chickering, Geoffrey J. Hulten, Robert L. Rounthwaite, Christopher A. Meek, David E. Heckerman |
2011-04-19 |
| 7921173 |
Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles |
Robert G. Atkinson, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry S. Katz +3 more |
2011-04-05 |
| 7917514 |
Visual and multi-dimensional search |
Stephen L. Lawler, Eric J. Horvitz, Anoop Gupta, Christopher A. Meek, Eric D. Brill +4 more |
2011-03-29 |
| 7908328 |
Identification of email forwarders |
Geoffrey J. Hulten, Anthony Penta, David M. Chickering, Eliot C. Gillum, Gopalakrishnan Seshadrinathan +4 more |
2011-03-15 |
| 7904517 |
Challenge response systems |
Nina Kang, Robert L. Rounthwaite, Josh Benaloh, Elissa E. S. Murphy, Manav Mishra +3 more |
2011-03-08 |
| 7899866 |
Using message features and sender identity for email spam filtering |
Jay T. Buckingham, Geoffrey J. Hulten, Robert L. Rounthwaite |
2011-03-01 |
| 7873620 |
Desktop search from mobile device |
Raymond E. Ozzie, Eric J. Horvitz, William H. Gates, III, Susan T. Dumais, Gary W. Flake +4 more |
2011-01-18 |
| 7848501 |
Storage abuse prevention |
Carl M. Kadie, Christopher A. Meek |
2010-12-07 |
| 7822762 |
Entity-specific search model |
Christopher D. Payne, Eric J. Horvitz, Alexander G. Gounares, Susan T. Dumais, Kyle Peltonen +9 more |
2010-10-26 |
| 7739221 |
Visual and multi-dimensional search |
Stephen L. Lawler, Eric J. Horvitz, Anoop Gupta, Christopher A. Meek, Eric D. Brill +4 more |
2010-06-15 |
| 7730081 |
Searching based on messages |
Kristin Bromm, Denise Hui, Omar H. Shahine, Ethan Nelson Ray, Matthew S. Carr +7 more |
2010-06-01 |
| 7711779 |
Prevention of outgoing spam |
Robert L. Rounthwaite, Eliot C. Gillum |
2010-05-04 |
| 7702680 |
Document summarization by maximizing informative content words |
Wen-tau Yih, Lucretia H. Vanderwende, Hisami Suzuki |
2010-04-20 |
| 7693806 |
Classification using a cascade approach |
Wen-tau Yih, Geoffrey J. Hulten |
2010-04-06 |
| 7689652 |
Using IP address and domain for email spam filtering |
Manav Mishra, Elissa E. S. Murphy, Geoffrey J. Hulten, Wen-tau Yih |
2010-03-30 |
| 7665131 |
Origination/destination features and lists for spam prevention |
Robert L. Rounthwaite, Daniel Gwozdz, John D. Mehr, Nathan Howell, Micah C. Rupersburg +1 more |
2010-02-16 |
| 7664740 |
Automatically displaying keywords and other supplemental information |
Bryan T. Starbuck, Ojiakonobi Udezue, Stephen Lardieri, Manish M Anand, Alexei Bocharov |
2010-02-16 |
| 7664819 |
Incremental anti-spam lookup and update service |
Elissa E. S. Murphy, Derek Hazeur, Robert L. Rounthwaite, Geoffrey J. Hulten |
2010-02-16 |
| 7665107 |
Viral advertising for interactive services |
Christopher A. Meek, Carl M. Kadie |
2010-02-16 |
| 7660865 |
Spam filtering with probabilistic secure hashes |
Geoffrey J. Hulten, Robert L. Rounthwaite, Manav Mishra, Elissa E. S. Murphy, John D. Mehr |
2010-02-09 |
| 7660779 |
Intelligent autofill |
Carl M. Kadie, David M. Chickering, Donald Bradford, Dane Glasgow |
2010-02-09 |
| 7640313 |
Adaptive junk message filtering system |
Robert L. Rounthwaite, David E. Heckerman, John C. Platt, Carl M. Kadie |
2009-12-29 |
| 7634810 |
Phishing detection, prevention, and notification |
Paul Rehfuss, Robert L. Rounthwaite, Manav Mishra, Geoffrey J. Hulten, Kenneth Grey Richards +3 more |
2009-12-15 |