Rockstar Consortium US LP et al v. Google Inc

Filing 220

MOTION to Amend/Correct Invalidity Contentions by Google Inc. (Attachments: # 1 Affidavit of Lance Yang, # 2 Exhibit 1, # 3 Exhibit 2, # 4 Exhibit 3, # 5 Exhibit 4, # 6 Exhibit 5, # 7 Exhibit 6, # 8 Exhibit 7, # 9 Exhibit 8, # 10 Exhibit 9, # 11 Exhibit 10a, # 12 Exhibit 10b, # 13 Exhibit 11)(Perlson, David) (Additional attachment(s) added on 10/27/2014: # 14 Text of Proposed Order) (ch, ).

Download PDF
EXHIBIT 10b Reference Disclosure 1507, and the “Quarks” article 1519 are both science and technology related. The other two articles 1515 and 1511 are not. Each article and advertisement contains information that can be categorized in multiple ways. This categorization includes at least one topic classifying the information. These topics are developed and maintained by the information provider. Using gaze tracking, the information provider can determine the user’s interest in each displayed article 1505, 1509, 1513 and 1517 and advertisement 1521. Then, by using the topics categorizing the presented information, the information provider can dynamically adjust the selection of subsequent information presented to this user. In the example above, suppose the user read the scientific based articles 1507 and 1519 but did not spend any time reading the other articles 1511 or 1515 or the advertisement 1521. The information provider populates the next page of information presented to the user with articles and advertisements that have similar topics as the previously read information. TOGNAZZINI, 16:44-60: FIG. 16 illustrates a possible second page of information. Again, the information is provided within views contained in a window 1601. Now a plurality of articles 1607, 1611, 1615 and 1619 are all scientific or technology based, but with different levels of difficulty extending from articles of interest to the lay reader to those that are directed toward the advanced elemental particle physicist. Further, both a Major Scientific Headline 1603 and an advertisement 1621 can be selected to be of interest to the user. This allows the information provider to narrowly target advertising and articles to each user. Again the information provider can continue to refine and narrow the selection of information presented to the user on subsequent pages depending on the interest shown in a plurality of article titles 1605, 1609, 1613, 1617, the time spent with reading each article 1607, 1611, 1615 and 1619; and the time spent looking at the advertisement 1621 of the current page. TOGNAZZINI, 16:61-17:12: FIG. 17 illustrates the process used to select information for presentation to a user. The process starts at a terminal 1701 after an initial selection of information is displayed to the user. Using the gaze position developed as described above, a step 1705 monitors the user’s reading pattern. Further a step 1709, determines the amount of interest shown by the user in the displayed information. This interest is determined by measuring the user’s reading speed, determining whether the user only skimmed the information or read the information in 198 Reference Disclosure depth, and by measuring the amount of time spent with each article and advertisement. Then in a step 1711, the process retrieves the topics associated with each displayed information and in a step 1713 correlates these topics with the user’s interest. Next in a step 1715, the process selects additional information based on this correlation. This selection of information is displayed in a step 1717 for the user. Finally, the process completes through a terminal 1719. In this manner, the user is presented with a customized set of information that reflects the user’s interest. TOGNAZZINI, Fig. 15: TOGNAZZINI, Fig. 16: 199 Reference Disclosure TOGNAZZINI, Fig. 17: 200 Reference Disclosure Kamba, Bharat, and Albers, The Krakatoa Chronicle – An Interactive, Personalized Newspaper on the Web (“KAMBA”) See e.g., KAMBA, p. 1 (“we describe an experimental system which implements an interactive, personalized newspaper on the WWW. Some of the parameters for personalization are computed at the server end, based on user profiles and the composition of the newsfeed. Personalized layout happens at the client end, based on other parameters under user control.”); id., p. 2 (“A user’s profile is modified by the explicit feedback provided by the user on the relevance of various articles, and when this is unavailable, from implicit feedback, derived from observations made by the embedded Java agent. The agent observes the manner in which the user interacts with the articles in the document, and based on the time spent, the interaction techniques used (e.g. scrolling, peeking at, maximizing, resizing), it tries to estimate the user’s interest and modifies the user’s profile suitably.”); id., p. 4 (“The weight of each keyword represents the system’s reckoning of the user’s interest in the keyword. It is computed when feedback is given. Feedback provides a score for the 201 Reference Edwards, Bayer, Green & Payne, Experience with Learning Agents which Manage Internet-Based Information, AAAI Technical Report SS96-05, 1996 (“EDWARDS”) Lieberman, Letizia: An Agent That Assists Web Browsing (“LIEBERMAN”) Disclosure whole article which is then used to compute scores for individual keywords in its document-vector. Then it is integrated into the user’s profile.”); id., p. 7 (“Layout is a function of several parameters: the score that each article receives based on the user’s profile (the user score), the average score received by each article over the community of users (the community score), and also the size and composition of each article . . . The order of articles . . . for a user is decided by each article’s score, and the score is a function of the user’s score and the community score.”); id., p. 8 (“all these interactions give feedback about the relevance of the article to various degrees . . . When the user scrolls, peeks at, maximizes, resizes, or saves an article to a scrapbook, the Krakatoa Chronicle increments the user’s interest in the article by a corresponding amount, and subsequently changes the personal profile.”) See e.g., EDWARDS, p. 31 (“An alternative solution is to build a profile which reflects the user’s preferences when using an application, such as a World-Wide Web browser.”); id., p. 33 (“The architecture can be divided into two broad areas: the Profile Generation Phase and the Classification/Prediction Phase. The Profile Generation phase is responsible for inducing the user profile . . . Actions performed by the user on a document (news article, Web page, etc.) are recorded together with the text of the document. Features are extracted from these observations, and used to create a training instance. The training instances are then used to induce the user profile. . . . The Classification/Prediction phase is responsible for determining the actions to be performed on new documents. . . . Features are extracted from each document, and the user profile employed to generate a classification (with an associated confidence rating). The confidence rating is used by the Prediction Stage to determine whether a prediction should be made.”); id., p. 35 (“LAW (Bayer 1995) is a system that helps a user find new and interesting information on the World-Wide Web. It provides assistance in two ways: by interactively suggesting links to the user as they browse the Web; and through the use of a separate Web robot that autonomously searches for pages that might be of interest.”). See e.g., LIEBERMAN, p. 2 (“This paper introduces an agent, Letizia, which operates in tandem with a conventional Web browser such as Mosaic or Netscape. The agent tracks the user’s browsing behavior – following links, initiating searches, requests for help – and tries to anticipate what items may be of interest to the user. It uses a simple set of heuristics to model what the user’s browsing behavior might be.”); id. (“Letizia uses the past behavior of the user to anticipate a rough approximation of the user’s interests.”); id., p. 3 (“The goal of the Letizia agent is to automatically perform some of the exploration that the user would have done while the user is browsing these or other 202 Reference Disclosure documents, and to evaluate the results from what it can determine to be the user’s perspective.”); id. (“One of the strongest behaviors is for the user to save a reference to a document, explicitly indicating interest. . . . Following a link is, however, a good indicator of interest in the document containing the link. . . . Repeatedly returning to a document also connotes interest . . . a link that has been ‘passed over’ can be assumed to be less interesting.”); id., p. 4 (“it is Letizia’s job to recommend which of the several possibilities available is most likely to satisfy the user.”); id., p. 6 (“the agent serves the role of remembering and looking out for interests that were expressed with past actions.”). Lam, Mukhopadhyay, See e.g., LAM, p. 317 (“Information filtering is concerned with the Mostafa, and Palakal, problem of delivering useful information to a user while preventing an Detection of Shifts in overload of irrelevant information. Information selected for User Interests for presentation is commonly based on descriptions of user preferences Personalized called profiles. Typically, the user profile is not known in advance, Information Filtering, and can also change with time. The user may choose to provide a SIGIR’96, ACM 1996 limited amount of feedback information concerning the relevance of (“LAM”) specific items. The objective is to estimate the user profile from the feedback data so that the filtering system can effectively choose and present information as relevant to the user as possible.”); id., (“in the case of text-based document filtering, the overall problem of information filtering may be broadly posed as learning a map from a space of documents to the space of real-valued user relevance factors. . . . a finite set of documents can always be rank-ordered and presented in a prioritized fashion to the user.”); id., p. 318 (“a user profile learning module that learns user interests over the document categories, based on on-line user relevance feedback and a reinforcement machine learning algorithm.”); id., p. 320 (“The user profile learning module consists of a learning agent that interacts directly with the user and sorts the incoming documents according to its belief of the user preferences for the various categories of documents. To accomplish this task, the learning agent maintains and updates a simplified model of the user.”). See e.g., O’RIORDAN, p. 205 (“We present here an overview of a O’Riordan and Sorensen, An Intelligent research project aimed at reducing information overload for individual Agent for Highcomputer users.”); id. (“It is generally acknowledged that the volume Precision Text of information which is accessible over various networks has exceeded Filtering, CIFM ’95, the capability of users to sift through it in order to access that which is ACM 1995 relevant to them.”); id. (“an information filter was built which can be (“O’RIORDAN”) personalized by individual users and which models the user’s interests so as to route through to him/her those articles which are deemed as relevant. The user may evaluate the significance of received information, thus providing relevance feedback which is used in finetuning the filter (or user profile) so as to improve its precision and to 203 Reference Bloedorn, Mani, MacMillan, Machine Learning of User Profiles: Representational Issues, Proceedings of AAAI-96, Portland, OR, Aug. 4-8, 1996 (“BLOEDORN”) Pazzani, Muramatsu, & Billsus, Syskill & Webert: Identifying interesting web sites, AAAI 1996 (“PAZZANI”) Maes, Agents that Disclosure better model a user’s changing interests. In this sense, the profile learns of a user’s preferences through assimilation of an initial set of interesting documents and continues this learning process via relevance feedback throughout its lifetime.”); id., p. 206 (“The basic assumption is that a software agent acts on behalf of the user – embodying his/her beliefs, intentions and goals – behaving as an intermediary between the user and the system with which he/she is interacting.”); id., p. 208 (“The comparison of a user profile with a document representation involves the localized matching of structural similarity between the profile network and incoming article networks, using profile weights to influence this comparison.”); id., p. 209 (“Those articles considered relevant to the user’s needs are forwarded by the agent, while the others are screened out. Forwarded articles are also ranked according to estimated relevance.”); id. (“Via the user interface, the user may provide relevance feedback on those articles routed to him/her.”). See e.g., BLOEDORN, p. 1 (“The goal of the research described here is to build a system for gathering comprehensible user profiles that accurately capture user interest with minimum user interaction.”); id., p. 2 (“Our experiments were conducted in the context of a contentbased profiling and summarization system for on-line newspapers on the World Wide Web, the IDD News Browser. In this system, the user can set up and edit profiles, which are periodically run against various collections built from live Internet newspaper and USENET feeds, to generate matches in the form of personalized newspapers. These personalized newspapers provide multiple views of the information space in terms of summary-level features. When reading their personalized newspapers, users provide positive or negative feedback to the system, which are then used by a learner to induce new profiles. These system-generated profiles can be used to make recommendations to the user about new articles and collections.”) See e.g., PAZZANI, p. 1 (“In this paper, we discuss Syskill & Webert, a software agent that learns a profile of a user’s interest, and uses this profile to identify interesting web pages in two ways. First, by having a user rate some of the links from a manually collected ‘index page’ Syskill & Webert can suggest which other links might interest the user. . . . Second, Syskill & Webert can construct a LYCOS query and retrieve pages that might match a user’s interest, and then annotate this result of the LYCOS search.”); id., p. 3 (“The user profile is learned by analyzing all of the previous classifications of pages by the user on this topic. If a profile exists, a new profile is created by reanalyzing all previous pages together with any newly classified pages. Once the user profile has been learned, it can be used to determine whether the user would be interested in another page.”). See e.g., MAES, p. 32 (“The machine learning approach is inspired by 204 Reference Reduce Work and Information Overload, Communications of the ACM, July 1994 (“MAES”) Sheth and Maes, Evolving Agents for Personalized Information Filtering, 1993 IEEE (“SHETH”) Disclosure the metaphor of a personal assistant. Initially, a personal assistant is not very familiar with the habits and preferences of his or her employer and may not even be very helpful. The assistant needs some time to become familiar with the particular work methods of the employer and organization at hand. However, with every experience the assistant learns, either by watching how the employer performs tasks, by receiving instructions from the employer, or by learning from other more experienced assistants within the organization. Gradually, more tasks that were initially performed directly by the employer can be taken care of by the assistant. The goal of our research is to demonstrate that a learning interface agent can, in a similar way, become gradually more helpful and competent.”); id., p. 33 (“the interface learns by continuously ‘looking over the shoulder’ of the user as the user is performing actions.”); id. (“A second source for learning is direct and indirect user feedback. Indirect feedback happens when the user neglects the suggestion of the agent and takes a different action instead. This can be as subtle as the user . . . not reading some articles suggested by the agent . . .”); id., p. 34 (“the agent can learn from examples given explicitly by the user.”); id., p. 38 (“A user can create one or many ‘news agents’ and train them by means of examples of articles that should or should not be selected. . . . The user can also program the agent explicitly and fill out a set of templates of articles that should be selected (e.g., select all articles by Michael Schrage in the Los Angeles Times). Once an agent has been bootstrapped, it will start recommending articles to the user. The user can give it positive or negative feedback for articles or portions of articles recommended.”); id., p. 39 (“The agents are able to recommend articles to the user that concern topics (or authors or sources) in which the user has shown a continued interest.”). See e.g., SHETH, p. 340 (“Filtering system can be viewed as a search process. It involves searching over the large and complex space of possible user profiles, for an ‘optimal’ user profile (or set of profiles) that match the user’s different interests. This ‘optimal’ user profile has to vary as the user’s interests change over time.”); id. (“The system consists of a number of news categories which a user has defined. Each of these news categories consists of a population of filtering agents. These are ‘organisms’ that retrieve articles which match an internal representation of the type of article they are interested in. The internal representation consists of whatever the organism inherited generically from its parents (the genotype) augmented with information it learns during its lifetime. Agents are assigned a fitness value based on the user feedback regarding their performance. The user conveys whether an article that was retrieved by one or several agents was appreciated or not. The agents learn from this feedback by changing their internal representation to reflect 205 Reference Balabanovic, An Adaptive Web Page Recommendation Service, 1997 ACM (“BALABANOVIC”) Disclosure this training example. For each positive/negative feedback received, an agent gets positive/negative fitness points.”); id., p. 347 (“When an agent receives positive feedback, it extracts information from the corresponding article and incorporates it into its internal representation. Presently, the agent extracts most of the information provided in the header of the news article (Figure 1), in particular the author, keywords, location, category and priority fields. If, say, a keyword is already present in the internal representation, it’s weight is increased, so that the agent is more likely to retrieve similar articles in the future. Conversely, in the case of negative feedback, the information is stored with negative weight, so as to make it less likely that similar articles will be retrieved in the future. The user can also manually indicate preference for particular keywords occurring in an article.”); id., p. 349 (“The user can give positive or negative feedback by clicking on the ‘thumbs-up’ or the ‘thumbs down’ icon respectively.”). See e.g., BALABANOVIC, p. 378 (“In this paper we introduce the ‘Fab’ adaptive Web page recommendation service. . . . Running since March 1996, it has been populated with a collection of agents for the collection and selection of Web pages, whose interaction fosters emergent collaborative properties.”); id. (“The operation of the system is as follows: users can request recommendations at any time, and will be shown the ten highest-ranking Web pages according to their profile.”); id., p. 380 (“All agents maintain a profile: each user has a selection agent, which maintains their user profile; each collection agent maintains a search profile which is used to guide it in its collection of web pages.”); id. (“At regular intervals collection agents submit the pages they have gathered which bets match their search profiles to the central repository, replacing the pages they previously submitted. Thus at any time the repository contains each collection agent’s best pages (in their own opinions). When a user requests their Fab recommendations their selection agent (of which there is one per user) picks, from the entire repository, those pages which best match the user’s personal profile. The user then rates these pages. These ratings are used as feedback for the agents to learn from, and the resulting rankings are used for evaluation purposes (discussed in section 4). The selection agent uses the feedback to update the user’s personal profile (using the function u). It also forwards the feedback, via the central repository to the originating agent A, which will update its search profile in the same way.”); id. (“A brand new user to the system is shown a selection of pages which are randomly chosen from the repository. However the repository contains pages which various agents believe will best match the current user population. Thus the new user is already starting from a much higher level than would be expected from an empty profile, especially if the system is deployed in 206 Reference Disclosure an organization or special interest group where there will be significant overlap between users’ interests.”); id., p. 381 (“Rather than actually searching the Web, these agents attempt to construct queries for existing Web indexes in an attempt to avoid duplicating work. The indexes used are Alta Vista, Inktomi and Excite.”); id., p. 382 (“The highest-scoring pages are shown to the user, with the proviso that no two are identical or from the same site, and that the user has not seen an identical page in the last month.”); id. (“On a dayto-day basis the system supplies the user with a number of documents it thinks the user will rate highly. It uses the resulting scores in order to perform relevance feedback and improve the user profile.”) Fox, Hix, Nowell, See e.g., FOX 1993, p. 485 (“The Query Window has two categories of Brueni, Wake, and use: . . . Access to previously completed (old) queries and the results Heath, Users, User of the related searches are provided. Old queries may simply be Interfaces, and Objects: viewed or they may be revised and used for another search. Results of Envision, a Digital searches from old queries may also be redisplayed via a query history Library, Journal of the feature.”); id. (“As queries are stored or related searches are American Society for performed, the user establishes a history that is accessible through the Information Science, Query History field across the top of the window . . . The Query 44(8):480-491, 1993 History provides access to the results of previous searches, means to (“FOX 1993”) redisplay the full content of previous queries for possible revision, and a mechanism for combining the results for completed searches.”) Little, Commerce on See e.g., LITTLE, p. 75 (“On-line services can incorporate customer the Internet, 1994 IEEE preferences and use history, such as past purchases or chapters read, to (“LITTLE”) provide a personal environment to the customer, saving access time.”); id., p. 76 (“For example, a customer might, through an interactive form, indicate current age, number of children, expendable income, and home value to identify investment options for a mutual fund buying service. Using that information, the service might steer the customer to performance indices that help in choosing investments.”); id. (“Once interaction is supported, data on individuals can be maintained both by direct customer involvement (for example, updating the name and mailing address) and by monitoring the documents accessed. A personal profile can capture basic demographics as well as individual information and environmental preferences. This information can be used for a number of interesting purposes, including 1. to configure the interface presentation 2. to fuel Web ‘agents’ who actively search the net or site based on the profile, and 3. to tailor and select site-specific information to present to the customer (for example, showing children’s ads to children and adultoriented ads to adults).”). Adam and Yesha, See e.g., ADAM, p. 822 (“From a consumer’s perspective, EC/DL Strategic Directions in systems require decision agents that can learn an individual Electronic Commerce consumer’s preferences, seek out appropriate providers and negotiate and Digital Libraries: requests for further information (e.g., to bring to the user’s attention) 207 Reference Towards a Digital Agora, ACM Computing Surveys, Vol. 28, No. 4, Dec. 1996 (“ADAM”) U.S. Patent No. 5,933,811 to Angles et al. (“‘811 PATENT”) Disclosure or initiate purchases.”) ‘811 PATENT at Abstract, “The present invention is a system and method for delivering customized electronic advertisements in an interactive communication system. The customized advertisements are selected based on consumer profiles and are then integrated with offerings maintained by different content providers. The preferred interactive communication system interconnects multiple consumer computers, multiple content provider computers and multiple Internet provider computers with an advertisement provider computer. Whenever a consumer directs one of the consumer computers to access an offering existing in one of the content provider computers, an advertising request is sent to the advertisement provider computer. Upon receiving the advertising request, the advertising provider computer generates a custom advertisement based on the consumer's profile. The custom advertisement is then combined with the offering from the content provider computer and displayed to the consumer. The advertisement provider computer also credits a consumer account, a content provider account and an internet provider account each time a consumer views a custom advertisement. Furthermore, the advertisement provider computer tracks consumer responses to the customized advertisements.” ‘811 PATENT, e.g., Col. 2, “As the popularity of the Internet and the World Wide Web has increased over the years, more companies are trying to find ways of promoting their product in a cost-effective manner. Thus, there has been a tremendous proliferation of corporate advertising across the Internet. For example, some companies such as Yahoo Corporation offer free services, such as the ability to search for particular sites on the Internet, but post advertising messages to consumers to help offset the cost of their service. Unfortunately, there is so far no effective way of targeting particular advertisements to those consumers most likely to use the product or service being offered. Therefore, a tremendous amount of advertising is wasted on promoting goods or services to an improper audience. As the number of people accessing the Internet increases, it will become more important to specifically target advertising to those individuals most likely to purchase the goods or services being offered. It will also be important for advertisers to know how effective a particular ad has become by tracking the responses of individual consumers. Unfortunately, there is currently no convenient mechanism for predetermining which users might be interested in a particular 208 Reference BROADVISION Disclosure category of advertised goods or services. There is also no current method for tracking consumer responses to particular advertisements.” ‘811 PATENT, e.g., Summary of the Invention; Claims 1, 4, 6, 12; Figures 1-11 Press Release (1.22.96)13, e.g., “One, the first application system for dynamic personalized marketing and selling on the Internet's World Wide Web. Over two years in development, the BroadVision One-ToOne software product transforms static "brochureware" Web sites into interactive, one-to-one marketing communities. These online communities, built around consumer brands, virtual malls, or valueadded services, will enable businesses to build long-term relationships with their customers through personalized content, services and promotions. Using the product's innovative Dynamic Command Center feature (for which the company has a pending patent), marketing, advertising and Web content managers, can: Personalize editorial content, advertising and incentive programs based on individual consumer demographics, psychographies and usage patterns; Observe consumer interactions in real time to identify and seize opportunities based on understanding and responding to consumers' online activity; Foster virtual communities by easily integrating electronic mail bulletin boards and online forums to OneTo-One applications; Establish collaborative online dialogues with customers to improve long-term satisfaction and retention. Press Release (1.22.96), e.g., “According to Don Peppers, a wellknown marketing consultant and co-author of the best-selling book "The One-To-One Future," the most important challenge facing marketers today is to build life-long customer relationships. "But to achieve this goal and realize the enormous potential of the Web, marketers need more than cool graphics and secure transactions. To keep consumers coming back, Web sites must 'learn' from interactions and remember from visit-to-visit the unique preferences and interests of each individual," Peppers said. "Savvy Web marketers will use sophisticated software like BroadVision One-To-One to progressively enhance the quality of information exchange with their customers, resulting in strong one-to-one relationships that deliver increasingly greater benefits to both producer and consumer."” 13 PRESS RELEASE (1.22.96) shall refer to Personalized Marketing and Selling on the Internet Unleashed by BroadVision One-To-One Application System Helps Marketers Build Long-Term Relationships Through Personalized Content, Services and Promotions,” dated Jan. 22, 1996. 209 Reference Disclosure Press Release (3.21.96)14, e.g., “Broadvision Inc is to offer personalised Web sites based on individual user profiles with its Oneto-One on-line marketing database. One-to-One, which has been two years in development, offers a three-tier environment enabling businesses to tailor their World Wide Web sites to individual customers by tracking their preferences as they move around the site. In this way, companies can build up very detailed 'psychographic' profiles of their customers, enabling them to target specific advertising and promotions to individuals.” Press Release (3.21.96), e.g., “Chen admits that interactive, personalised marketing is not new, but says that the Internet is enabling it to be practised on a very large scale. Broadvision is looking at the complete life-cycle, from attracting customers to the site, encouraging them to buy over the Internet, offering incentives to give their details to the company and finally supporting the actual payment transaction.” Press Release (5.15.95)15, e.g., “BroadVision Inc. today proposed the definition of a new category of software critical to manage the buying and selling of products and services via interactive networks. The new category, Interactive Commerce Management System (ICMS), is a comprehensive solution for electronic commerce that allows interactive service providers to conduct interactive marketing, ordering and billing online. BroadVision, based in Los Altos, Calif., is currently designing and developing the first ICMS product for delivery by year-end 1995.” Press Release (5.15.95), e.g., “An ICMS employs object technology to enable traditional database marketing and new interactive marketing practices, including tracking consumer usage and interests. Service providers can evaluate the effectiveness of a particular promotion to reward repeat customers or determine peak shopping times. Since an ICMS uses objects to represent business rules and processes, it can reflect the unique business models of the service providers and still respect the specific 'look and feel' of the storefronts, allowing for 14 PRESS RELEASE (3.21.96) shall refer to “Broadvision Uses Its On-Line Marketing Database To Deliver Personalised World Wide Web Sites,” dated Mar. 21, 1996. 15 PRESS RELEASE (5.15.95) shall refer to “BroadVision Developing First Interactive Commerce Management System To Support Online Sales & Marketing Process; New Software Category Necessary to Interactive Network Architecture,” dated May 15, 1995. 210 Reference Disclosure change over time.” Press Release (5.15.95), e.g., “Examples of electronic commerce applications that can be offered to consumers over an interactive network include full-service electronic malls, independent electronic retailing, personalized advertising, travel services, movies-on-demand, time-shifted TV, pay-per-view, automated ticket sales, educational programs and online games.” C/NET Press Release (12.18.95)16, e.g., “C/net unveiled a new system that allows advertisers to target narrow audiences by delivering different ads to different site visitors in real time. The technology, called DREAM (Delivery of Real-Time Electronic Advertising Messages), went into operation on c/net's two web sites Dec. 15. DREAM allows c/net to categorize visitors to its site based on demographic information (taken from site registrations) and hardware and software data gathered on the fly. “We know certain things about the people coming into our site,~ said Scott Waltz, c/net's vice president of marketing. ~we know what kind of platform they're coming with, their connection rate, their browser type, and so on. We use that information to affect how our database serves content.” DREAM allows an advertiser to display different banners to different users. Waltz explained, "If I know someone's coming in with a Mac instead of an Intel platform, I can tailor the software or peripherals that I offer to that person so I have a much higher chance of speaking to that person and offering them something that they want." In another example, a bank could present a standard credit card offer to all customers except those from .edu domains. Visitors from .edu -- many of which are college students -- would see a special first card offer.” APTEX www.aptex.com17, e.g., “Aptex provides text analysis software to enhance mission-critical, real-time business processes and decisions. Using proprietary Content Mining™ technology, Aptex develops and markets intelligent solutions for online publishing, market intelligence, customer response, and educational publishing. Aptex products include Convectis™, an intelligent document categorization and routing server, and VITAL ResourceMiner™, an interactive tool for correlating educational content to state and local instructional 16 PRESS RELEASE (12.18.95) shall refer to “Online Marketing: C/Net Introduces Customized Web Advertising,” dated Dec. 18, 1995. 17 WWW.APTEX.COM refers to webpages accessed through www.aptex.com homepage, available through www.archive.org (last accessed on May 19, 2014). 211 Reference Disclosure standards. SelectCast™, an intelligent advertising and audience management server for World Wide Web content providers, is scheduled for delivery in the second half of 1996.” www.aptex.com, e.g., “SelectCast is a Web advertising placement server with unique predictive modeling capabilities for increased advertising effectiveness. When integrated with a Web site, the SelectCast advertising server will present visitors with intelligentlyplaced, individually-tuned advertising and promotions. Using proprietary Aptex neural network techniques and Content Vector™ data model, SelectCast will develop self-adjusting, predictive models of user behavior. By correlating these user profiles with advertising performance, demographic databases, and content provider feedback, SelectCast will continually improve advertising placement effectiveness.” Press Release (5.6.96)18, e.g., “Infoseek Corporation, a leading Web search service, and Aptex, a newly formed division of HNC Software Inc., today announced a long-term development and marketing partnership. Under the terms of the agreement, HNC's Aptex Division and Infoseek will jointly design and market SelectCast™, an intelligent advertising and audience management server for the World Wide Web, based on HNC's text analysis technology. Infoseek will also use the Aptex division's Convectis™ product, a neural networkbased text analysis server, to automatically update the directory portion of Infoseek Guide, Infoseek Corporation's flagship Internet service. . . When integrated with Guide, SelectCast is designed to present visitors with intelligently disseminated, individually targeted advertising and promotion. Using proprietary neural network techniques and the HNC patented Context Vector™ data model, SelectCast is intended to deliver self-adjusting, predictive models of user behavior. . . To expand and enrich the user's Web experience, Infoseek will also employ the HNC/Aptex Convectis server as an "intelligent librarian" aide to its experts who categorize and summarize Web pages into thousands of categories within Infoseek's Guide directory. Convectis is expected to allow Infoseek's Guide directory to scale continually with the growth of the World Wide Web.” 18 PRESS RELEASE (5.19.14) refers to “HNC Software and Infoseek Announce Web Partnership,” dated May 6, 1996. 212 Reference Disclosure Press Release (12.3.96)19, e.g., “Aptex Software Inc. Tuesday announced the availability of SelectCast for Ad Servers, an intelligent software solution that revolutionizes Internet advertising by maximizing ad clickthrough and selectively targeting specific audiences. Press Release (12.3.96), e.g., “"Online advertisers are asking for higher response rates and more audience selectivity," said Michael Thiemann, President and CEO of Aptex. "SelectCast for Ad Servers delivers on both counts, with what we believe are the highest sustained clickthrough rates and most selective ad targeting available on the Internet." Aptex developed SelectCast for Ad Servers in partnership with Infoseek Corp. (NASDAQ: SEEK) to deliver industry-leading capabilities for a new Infoseek advertising service currently in development. Infoseek expects to use SelectCast technology throughout its service and the Infoseek Network. Early versions of SelectCast have been in use at Infoseek since the summer of 1996. "SelectCast capabilities represent the state of the art and a major improvement in ad serving technology," said Robin Johnson, Infoseek CEO. "We selected Aptex as a strategic partner because we believe their software is far superior to other technologies we evaluated for personalization and ad serving."” Press Release (12.3.96), e.g., “SelectCast for Ad Servers improves clickthrough rates by continuously evaluating user profiles as users click ads, and then delivering the same ads to similar users. SelectCast for Ad Servers delivers clickthrough increases of up to 50 percent compared to word- and topic-matching selection techniques -- until now the bestperforming technology available -- and up to 25 percent when measured against aggregated matching and general rotation results. SelectCast for Ad Servers targets audiences by developing profiles for all site visitors, analyzing and grouping profiles to identify users with similar interests, and then delivering designated ads consistently to users in selected groups. This "affinity modeling" process also identifies new audiences automatically as they emerge. SelectCast for Ad Servers provides comprehensive, site-wide user profiling while maintaining persistent, multi-visit profiles for every site visitor, and updating these profiles immediately with every user action. SelectCast for Ad Servers acts as an "intelligent observer," 19 PRESS RELEASE (12.3.96) refers to “Aptex announces SelectCast "turbocharger" for advertising servers,” dated Dec. 3, 1996. 213 Reference Disclosure mining the context and content of all actions -- including clicks, queries, page views and ad impressions -- so that no explicit user feedback or "taste" judgments are ever required. By irreversibly encoding all user profiles, SelectCast for Ad Servers ensures user privacy. Personal information is never requested or stored, and profiles cannot be reverse engineered to determine specific user actions. SelectCast for Ad Servers is based on Aptex's patented Content Mining technology, which employs neural networks and a Context Vector data model to optimize relationships between users and content. Future SelectCast products are expected to enhance the performance of other types of commercial servers - including those for electronic commerce, one-to-one marketing, online publishing, and community creation -- by personalizing the selection of product and service information, news and entertainment, forums and chat sessions, and other forms of content.” HYPER-TARGETED MARKETING Press Release (12.4.96)20, e.g., “Hyper-Targeted Marketing precisely targets marketing efforts based on user profiles and choices made while browsing a Web site. Hyper-Targeted Marketing is based on Alpha Base Interactive's Metropolis Database and Web Hypertext Applications Processor (WHAP), a complete system that builds sophisticated web services that are automatically customized to the interests of subscribers and customers. Together with the company's EZ-ID browser plug-in, which automatically provides user identification, the system keeps track of customer preferences, service history, and interests they have shown on previous visits to a WHAPsupported web site. "The ability to precisely target marketing efforts is one of the most compelling advantages to marketing on the Web," said Steve Fecske, CEO of ABI. "In a world of information overload, customers will respond best to companies that can match individuals to products and content of specific interest to them."” CYBERGOLD “The CyberGold Service,” e.g., “Upon logging in to the Net, Karen is presented with a short list of ad titles. Each of them involves a product or service in which she has actively expressed an interest either through her previous use of CyberGold facilities or through the user profile she filled out when she joined CyberGold Today's list contains ads for medium price hotels in New Orleans (where Karen's family is plaruting a vacation), a makeit-yourself telescope kit (a possibility for her husband's upcoming birthday), recently released movies (she's a 20 PRESS RELEASE (12.4.96) shall refer to “Alpha Base Interactive Provides Hyper-Targeted Marketing Service,” dated Dec. 4, 1996. 214 Reference Disclosure fan), some new nonfat organic dessert items (she's on a diet), and family minivans (with the new baby, the family has outgrown their present car). Not only are the subjects of the ads keyed to Karen's interests, but certain aspects of their style and depth are as well This permits the design of ads that are virtually custom-fitted to Karen's preferences, thus ensuring her attention The ad messages will be welcomed and attentively viewed. For the minivan ads, Karen has requested straightforward technical specs of models and configurations (she does not need to be sold on the idea of this kind of vehicle; she already knows she wants one). For the movie ads, Karen might request a film clip, while another subscriber might ask for a plot summary. Some consumers might prefer the entertainment value of ads like those generally found in the mass media, while a subscriber viewing an ad for food or drink might ask for a list of ingredients or nutrients.” “The CyberGold Service,” e.g., “Advertisers will find their potential customers through patent-pending "demographic routing" technology, which will steer ads directly to interested and willing buyers, as defined by the personal profiles in the CyberGold database. A welcome side-effect of this type of routing is that advertising will become 'orthogonal,' that is, unlinked to the editorial content of entertainment and information on the Net. When advertisers aim their messages at individual consumers rather than at demographic segments of the population ('blue-collar urban women under 30') they no longer need to worry about whether the editorial content of a particular magazine or television show is likely to attract potential buyers. Advertisers using orthogonal sponsorship typically would not even know what content they are sponsoring. Instead, they would simply explicitly delineate their target audience, provide ads, and offer some form of compensation directly to those viewers willing to view the ads. This unlinking between advertising and content is likely to be beneficial to consumers, advertisers, and society.” “The CyberGold Service,” e.g., “The CyberGold Marketing System is a more effective way of advertising for four reasons: * Reach: advertisers can entice more customers to interact with their advertising by rewarding customers directly for their attention. * Targetability: CyberGold makes more efficient use of advertising dollars by targeting customer by demographic, psychographic or behavioral characteristics. *Accountability: advertisers only pay customers who interact with their ads. CyberGold 215 Reference Disclosure provides information on the characteristics of the customers the ads have reached. * Integration: on-line promotional mechanisms including coupons and rebates are encapsulated into a single, easy-to-use system. CyberGold handles the complexity of electronic commerce for advertisers.” FREELOADER Press Release (9.30.96)21, e.g., “Beginning today, FreeLoader, a unit of Individual Inc. (NASDAQ:INDV), will make version 2.0 available for free downloading from the FreeLoader home page (http://www.freeloader.com). Among the unique features of the new version are: - User-defined, custom channels in addition to the "subscriptions" of version 1.0. These channels allow users to personalize exactly how they would like to retrieve selected Web content - "Premium" branded channels of content from popular Web sources including: MSNBC (www.msnbc.com), NewsPage (www.newspage.com), Pathfinder (www.pathfinder.com), Slate (www.slate.com), Sony Music Entertainment (www.sony.com/Music), Sportsline USA (www.sportsline.com), and ZD Net (www.zdnet.com). - Enhanced, easier-to-use interface -Support for Microsoft's Internet Explorer, as well as Netscape Navigator - Ability to track user clicks and preferences to offer valuable advertising and editorial content personalized for each user” Press Release (9.30.96), e.g., “FreeLoader provides an advertisersupported, free service which automatically retrieves and categorizes content from pre-selected Web sites at user-defined times. Unlike other offline services, FreeLoader employs intelligent agenting technology to passively create a user profile based on clicks and selections, providing one of the only platforms for advertisers to customize a marketing message at a specific and well-defined audience. The server side database keeps track of the statistics received from the user such as age group, sex, zip code, country, first name, e-mail address, occupation and salary group.” 21 PRESS RELEASE (9.30.96) shall refer to “FreeLoader releases Personalized Web Content Delivered Redesigned Interface And Screen Saver,” dated Sep. 30, 1996. 216 Reference Disclosure HYPER SYSTEM “Hyper System: Patent Pending,” e.g., “What is Hyper System? Hyper System employs message display application software called "Hot Cafe'" to transmit advertising and messages to precisely targeted audience of Internet. Hyper System can run simultaneously. with any Internet communications application, including WWW browser. It allows advertisements, information, and messages to be displayed continuously during a user's dial-up session. This will be forwarded to the providers via a leased line.” “Hyper System: Patent Pending,” e.g., “What is Hot Cafe? When using Hyper System, in addition to the web browser window on a user's screen, a section of the screen is devoted to another window "Hot Cafe" where advertising and information messages from corporations or individuals are continuously displayed. This information is updated every minute, irrespective of the Internet communications application. A feature of this "Hot Cafe" gives · advertisers the option of incorporating buttons with link capabilities to their messages, which enable users to easily dick onto the web page of the advertiser or infomation sender with their web browser. The application software, "Hot Café”, is distributed to users free of charge.” “Hyper System: Patent Pending,” e.g., “Establishing User Profile. When users register on-line, in addition to providing their names and addresses, users are asked to complete a detailed questionnaire about hobbies, interests and so on. Although no personal data is ever released, the questionnaire responses are plotted to create a statistical profile of Hot Cafe users. HYPER NET establishes a Database Center in Japan to match user profiles with the targeted data required by advertisers. This center will be connected to providers by a leased line to deliver advertising and information to users. Bendits of Using Hyper System. Hyper System has benefits for everyone: Providers have a new source of cash flow, advertisers and infonnation providers have a new direct marketing tool, and users can save their connection fees.” “Hyper System: Patent Pending,” e.g., “Benefit for Advertisers. Advertisers benefit in several ways using Hyper System. Information and advertising messages can be targeted precisely at a specific audience, whose composition is determined by the responses to the questionnaire. Since the advertising messages are interactive, an efficient response can be obtained and the results of advertising can be measured accurately and quickly.” 217 Reference I/PRO Disclosure “About I/Pro,” e.g., “With I/COUNT; site owners can monitor aspects of site usage such as number of visits, most frequently accessed files, and geographic and organization origin of visitors. I/COUNT has been commercially available since May 15.” “About I/Pro,” e.g., “I/ CODE: How It Works On Your Site The Exchange of Value The I/CODE system is based upon a value exchange between the user and the site. By providing you with their demographic profile, and potentially their identity, I/CODE members are sharing very valuable information. For sites, this demographic data translates into real dollars for I/CODE enabled sites who can interpolate content, exposure, and advertising potential from it. Sites should therefore be willing to compensate I/CODE members for their time and information with give-aways, sweepstakes, discounts and other benefits. Free Demographic Data. I/CODE provides sites with raw demographic data about all I/CODE members who sign-on at their site absolutely free. If you would like someone to provide data analysis, I/CODE offers analysis and reporting services on this data (see I/CODE Reports for more information, but the raw data is supplied to all participating sites at no cost.” F.J. Burkowski, “Delivery of Electronic News: A Broadband Application” (“BURKOWSKI”) “About I/Pro” (5.8,1996), e.g., “The I/ CODE Universal Registration System is an enabling product which benefits both content providers and Internet users. Sites benefit by obtaining detailed demographic data while avoiding redundant site-specific registration that negatively impacts traffic. *Raw Demographic Data on all I/CODE members who sign-on at your site is provided free of charge. * Obtain: data on age distribution, income levels, gender mix, and other characteristics. * Gain insights into the depth of repeat visits to your site. *Access aggregated audience demographics for all I/CODE members (not just those who register at your site). · * Allow visitors to share their anonymous demographics while respecting their privacy. * Understand audience preferences and their reaction to your site's content.” BURKOWSKI, e.g., Abstract, “The system will provide selective content delivery based on individual and group profiles, hypertext links into archival and external data, continuous coverage of news stories, interactive objects, and "smart" advertising. BURKOWSKI, e.g., at 2, “Such systems typically provide two types of 218 Reference Disclosure services: retrieval of stories (documents) in response to user queries and personalized clipping services (i.e., selective dissemination of information) based on user profiles.” BURKOWSKI, e.g., at 3, “The information content and functionality of such a system will include 1. Core content: This comprises the stories and advertisements considered important for all readers. It is transmitted to all users and is accepted by all clients for display. 2. Stereotyped content: Group profiles or stereotypes can be generated based on demographic information linking readers to various sections of the newspaper. Readers will be categorized by one or more such stereotypes and will receive various special interest sections, features, advertisements, etc., that meet the constraints of these stereotypes. 3. Supplemental content: While reading the news, a reader may request additional information by invoking a hypertext link or by querying a multimedia archive. Such an archive could be supported directly by the publisher of the newspaper, it could be a private archive held locally by the reader, or it could be a distributed archive on the Internet. 4. Individual profiles: The client subsystem will actively gather and filter information in accordance with an individualized reader profile. Such a profile might include gender, age, interest areas, income level, occupation, ethnic background, lists of products in which the reader has shown an interest, and reading habits such as preferred depth of news analysis. These last profile attributes will be updated dynamically as the client monitors the user's reading activity. 5. Advertisements: The system will feature customized, interactive advertisements that catch the attention of and involve the reader. These advertisements could gather information about the reader so that products and product advertising can be customized and targeted. This supports the trend to maintain marketing databases that keep track of customer related information.” BURKOWSKI, e.g., at 3, “The proposed architecture consists of three layers, n a distributed client/server environment; the news sources layer, the news packagers layer, and the readers layer. The news sources layer consists of news producers that generate the news items and supply them in some agreed upon markup format. The news packagers layer consists of client/servers that accept items from the news sources and produce electronic editions of “the news”, including advertisements, etc., based on stereotypes. The 219 Reference Disclosure readers layer consists of the end-user client/servers. These accept editions of the news and produce the individual editions of “the news”. This includes, dynamic layout and assembly and requesting supplemental material based on the profile or end-user actions. Current work, not discussed in this paper, is focussing on the details of such an architecture, scalability, and networking.” BURKOWSKI, e.g., at 4, “An abstract data representation was defined and applied to the source data. Using an abstract representation divorces the display and manipulation of the news items from the original format of the source. A reader stereotype was defined for the prototype, as per demographic data supplied by The Chronicle-Herald. The client selected data from the abstract representation and processed and formatted it to produce the news display for the reader, based on the stereotype. The client has control over the display and order of items in the sections and the order of access to sections, but in this case, not over content of the sections or the order of the news items in the sections.” Tim O’Reilly, “Publishing Models for Internet Commerce,” Vol. 39, No. 6 (1996) (“O’REILLY”) NAQVI WO BURKOWSKI, e.g., at 5, “An extremely important feature of such a system will be the two-way communications available. Ads will be able to track who views them, how often, and for how long, and will be able to report this information to the advertiser. . . In summary, we feel that the delivery of electronic news is well suited to exploit the promised high bandwidth, switched, interactive communication facilities of the information highway. The presentation of such news will be based initially on a newspaper metaphor and will exploit communication and multimedia technologies to integrate other news sources, such as newscasts and video clips, with the text backbone. The system will provide selective content delivery based on individual and group profiles, hypertext links into archival and external data, continuous coverage of news stories.” O’REILLY, e.g., at 82, “2. There is clear feedback to the advertiser about what works and what doesn’t, in the form of access logs. This feature tends to drive advertisers toward providing valuable content rather than hype. (Unfortunately, many of the people who followed our lead into net advertising haven’t yet learned that lesson!) In addition to varying the content of their advertising, advertisers can experiment with—and get detailed feedback on—the context in which advertising is most effective. For example, many advertisers are looking at the click rate---the rate at which readers actually click on an advertising hyperlink----as well as the overall page views or impressions in evaluating sites for advertising placements.” NAQVI WO, p. 3 – “It is a further object of the present invention to 220 Reference Disclosure provide a method and system for advertising on a computer network in which advertisements are more focused and targeted, for example, by user queries and user profiles, including the past history of the user's interactions with the system.” NAQVI WO, p. 4 – “The present invention provides a new process and system for online advertising. This new process will be referred to throughout this application as query-based advertising ("QBA"). In the QBA process, advertisements are primarily triggered by user queries. User queries, as 15 used herein, refer to requests from an information consumer for one or more pages of information from a computer network. As a result of a query, a user is exposed to advertisements with the present invention, i.e., the query triggers advertisements.” NAQVI WO, p. 5 - “When the user requests a certain page or a certain topic of information, the relevant pages are retrieved from the computer network and shown to the user. The present invention, upon receiving the user's request, retrieves advertisements that are related to the user's action, dynamically mixes the advertisements with the content of the pages according to a particular layout, and displays the pages with focused, targeted advertisements as a part of the page. The advertisements can be made to satisfy a set of constraints requested by the advertiser, as well as the constraints of the publisher of the page, as further discussed below. The advertisement triggering mechanism of the present invention is not random or coincidental, but rather, is prespecified in advance. This specification will be referred to in this application as a contract. A contract specifies the marketing rules that link advertisements with 20 specific queries. For example, a diet soft drink advertisement may be shown when a user asks for a page about exercising equipment. These rules are specified by advertisers implementing the concept of "focus" or "relevance" of advertisements and help the advertisers to 25 target a specific audience. Owners of pages specify the focus content of their pages through special tags within a page. These tags are not displayed to the information consumer; the tags are used to decide what advertisement can be shown when the page is requested by a consumer.”” NAQVI WO, p. 15-16 – “Initially, a user requests a particular piece of 221 Reference Disclosure information through one of the clients 17. The user's 10 request is given to the WWW Daemon 16, which passes the information to the gate 15. The gate 15 at this point decides what piece of information is being requested by the user and finds other relevant pieces of information that can be commingled with what the user has asked. The user, 15 for example, might ask the system to see certain car dealers, to find a phone number of a car dealer, or to get a page of a particular magazine. The gate 15 at this point gives the request to the matching rule engine 18 ("MRE"). The purpose of the MRE 18 20 is to look at the content of the user's query and to find a category within its active index SIC 19 that matches the same type. If the user has asked for car dealers, the MRE 18 invokes its rules to determine that car dealers are part of a class of things relating to transportation. Based on 25 the classification determined by the MRE 18, the system now knows that the user is asking about cars or about transportation or about whatever else that the user might be interested in. The MRE 18 at this point then returns to the gate 15 30 the category index of the user's query. If the user had asked about cars or about family sedans or about sports cars, at this point the MRE 18 would have figured out that the user's interest falls into a certain category. Based on the user's interest category, the system then retrieves the advertisements that are relevant to that category. Thus, the purpose of the MRE 18 is to figure out what the 5 user requested, to place the user's request in a category of a classification system (i.e., the active index SIC 19) and, based on that classification, to retrieve relevant advertisements.” NAQVI WO, p. 20 – “During the computation of the advertisements and all the other computations that the system of the present 5 invention performs, a logging module 22 of the system performs extensive logging of what the user has asked, what advertisements were shown, how long the advertisements were shown, and which advertisements were shown to which user. The logging module 22 then stores these logs in a SYS logs 10 database 23. Various scanned reports can be produced and defined using the information in the SYS logs database 23.” NAQVI WO, p. 26-27 – “The "focus" arrows 43 shown in Fig. 2 indicate that a certain focus is associated with each category. The query may have been directed to a category of listings or a particular vendor. In both cases there is a "focus" 222 Reference Disclosure associated with the content of the query (e.g., automobiles, physicians, lawyers, etc.). In addition, there may be a focus associated with the geographic 5 location of the user to permit advertisers to target users in particular geographic regions. The focus process plays a major part in the present invention. No advertisements are shown unless it can be determined that the advertisements are in some way focused or related to the 10 content of what the user requested.” NAQVI WO, p. 40 – “The user may also be asked to provide certain demographic or profile information. For instance, the user can require that his advertisement be shown only to people in age group 30 to 40 or only to people living in Morristown, NJ or any other geographic location. The last item that the user is asked to specify is the contract. The various contracts available to the advertiser are explained above. When the user is finished entering all of this information, the system updates the ad info database 3 0 ( step 115 ) .” Figures 1, 2, 7, 10, 11 (and associated text) BULL BULL at Col. 3 - “The user is presented with a variety of search, display and output options. The search options include: 1) Search using keywords or combinations; 2) Use of complex software text search agents that have been predefined by the information aggregation and synthesization system site operators. These agents take advantage of the expansive subject matter experetise in understanding which search parameters will best serve the user’s search needs; 3) Use of search patterns and agents from this user’s previous sessions, perhaps expanded by available specials and promotions; 4) Natural Language Query; and 5) Some combination of 1), 2), 3) and 4). During a user session or when a user completes a session, the user’s looking activity is analyzed for patterns, preferences and trends and the profile annotated or updated so that when they next use the information aggregation and synthesization system, the nominated searches will be customized to their individual desires.” BULL at Col. 3 – “The user logs on to the system either by name, address, etc. or with some pseudoonym (or some combination). This allows the user’s activity to be tracked and establishes a log of the user’s activity during the current online experience (session). The user is also asked for explicit profile information concerning preferences. 223 Reference Disclosure These preferences will be used to narrow the information retrieval.” BULL at Col. 4 - “Along with displays, including those for data entry, searches, search results, information retrieval, the user will be presented with advertisements and/or coupons based on criteria entered by advertisers. This criteria may take the form of simple logic, linking an ad/coupon with a display or be derived from complex software text search agents that analyze one or more of the following: The user’s looking pattern, the user’s psychographic profile, the user’s personal profile, the availability of the advertiser’s/couponer’s goods or services at the instant in time that the criteria is being exercised. The placement of the ad/coupon will be logged along with user profile information and provided to the advertiser/couponer in some form of report.” BULL at Col. 5 – “IV. Automated Profile Generation. Presently, user’s profiles are collected based on explicit entry by the user, and extraction from demographic data collected from a variety of sources. In the present invention, the searching patterns of the user on the Internet are monitored. A set of software text agent profiles is developed and may be integrated with explicitly collected profile information. The automated profile generation will have both explicit profile information gathering and implicit profile information gathering capabilities. As the user uses the information aggregation and synthesization system, the pattern of information being viewed is analyzed and the user presented with search ideas as well as promotions and specials from suppliers based on these patterns.” BULL at Col. 6 – “A theme or definition of a class of information (e.g., central California travel and tourism or new automobiles) is identified. Data sources (Local DataStores (500 . . . N) and Network Accessible DataStores (300 . . . N)) are screened for relevance, quality of information and appropriateness (or may be included de facto based on their title or description). These are indexed using a text indexing software tool 2981 and the indices stored on the system index DataStore 220. An initial set of Preestablished Software Text Agents are defined. These agents are words or combinations of words that form a word based search pattern. This initial set of agents is relevant to the searches that might be performed against the class of information that was indexed. (i.e., Agents about automobiles would be developed to search a class of indexed information about new cars). These are 224 Reference Disclosure stored in the Preestablished Software Text Agent DataStore 231. The System 200 uses any multipurpose computer central processing units with the ability to handle multiple inputs and outputs with the necessary hard disk storage and to run World Wide Web (WWW) or other network server software.” BULL at 7 - “Login and Profiles: Users using a user access system 100 access the infor mation aggregation and synthesization system 200 through the Internet or other public or private network. The user either logs in by name or by pseudonym or from data previously stored in the user access system 100. New users create an account on the user profile datastore 210. Previous users are identified to an existing account. The user is presented with a variety of options to create or update profile information in the user profile datastore 210. This involves a single data entry option or many mini-options based on the browsing activity.” BULL at Col. 7-8 – “The user is also presented with browsing options based on: activity from a previous session in the browsing activity datastore 240; predeveloped software text agents and personalized software text agents (developed in the Post Session Activity) stored in the Personal Search Text Agent DataStore 232; or combinations of all as well as situational opportunities developed by the user greeting subsystem 291. The user selects the search options to be used (or simply enters search criteria directly). This search criteria is used to search the index datastore 220 and a list of data sources is presented to the user for selection. The user indicates the information to be viewed. The user will also be presented with options to refine his search through the altering of search agent criteria (Search Reduction System 293).” BULL at Col. 10 - “User Profile DataStore This contains data about the user, preferences, situational preferences, accounting information, psychographic profile, personal profile and other relevant information related to the user by individual identifier.” BULL at Col. 10 – “232 Personal Search Text Agents These are complex software text search patterns that may be individual words or word sets and/or combinations of words and Preestablished Software Text Agents 231 includ 225 Reference Disclosure ing the results of the post session analysis 2921 that provide individually customized searching of the Index DataStore 220. BULL at Col. 12 – “IV. Automated Profile Generation Browsing patterns of the user are analyzed and these patterns update profiles automatically. FIG. 7 illustrates a how diagram for the Automated Profile Generation. The looking patterns of the user are monitored to develop a set of software text agent profiles that are integrated with explicitly collected profile information to assist the user in narrowing down information for future sessions as well as suggesting references, merchandise or services during the current session. This is accomplished by statistical analysis of the text stream. The searching patterns of the user on the Internet are monitored by monitoring the text stream. A set of software text agent profiles is developed and may be integrated with explicitly collected profile information. The explicit infor mation is gathered by queries to the user. The explicit and implicit data are merged to develop software text agents that support the user’s future shopping sessions.” BULL at Col. 12 – “Certain criteria will be entered which delineates a pattern that is requested to be monitored. When this pattern is seen (or is in close match) in the user’s WWW activity, the insertion mechanism is activated. If a certain web page is requested, the present invention will display a particular advertisement. The ad will be inserted based on the content of the existing web page being read. An analysis of the text stream of the user’s interactive session will be performed online. When certain text patterns are observed (or close matches are observed), an advertisement is inserted into the display. The advertising may be static or connected to the adver tiser’s computer datastore which designates specific ads or coupons based on the pattern match and other conditions which may be required. The software agent criteria is entered by the merchant in the agent data store 230 which delineates a pattern that needs to be monitored. As an example, if the user accesses web pages for “Holiday Inns on the West Coast”, the insertion mechanism Would be established to automatically insert ads for “Hilton Inns on the West Coast.”” BULL at Figs. 1 - 7 (and associated text) 226 Reference Disclosure KOHDA ’96 KOHDA ’96, §1: “An advertising agent is placed between the advertisers and the users. Advertisements fetched from advertisers' Web servers are merged with Web pages from ordinary Web servers by the agent, and the merged pages are displayed on the users' Web browser. Thus, the users see advertisements on any server around on the Internet. Moreover the agent has chances to deliver appropriate advertisements which suit each user's taste.” Id., §2.2: “Note that the agent is aware of the identity of the user and which page the user is about to read on the browser, so the advertising agent can tailor advertisements for individuals and their current interests. Thus it prevents the user from having to see advertisements that are unrelated to their current interests.” Id., §3.1: “At invocation, environment information is passed to each filter program as invocation parameters. The environment information includes at least the identity of the user and information about the selected anchor. The contents of a Web page designated by the anchor are input into the pipe of filters, and the output from the pipe is displayed on the browser's window as an HTML document.” Id., §3.2: “The filter keeps in memory the contact path (URL) to the agent's Web server. When it is invoked, it forwards the invocation parameters passed from the browser to the agent's Web server, and waits for a reply.” KOHDA ’853 KOHDA ’853 at 6:56 to 7:3: “The user inputs data for use in obtaining requested retrieved information (for example, articles from a newspaper relating to a specified item) through the input/output unit 1. Then, the information retrieving apparatus 100 obtains the retrieved information from the information retrieving server through the retrieved information obtaining unit 3, automatically obtains additional information such as advertising information from the information server through the additional information obtaining unit 4, incorporates the obtained information into the retrieved information obtained from the information converting unit 2, and outputs the result on a display unit.” Id. at 7:32-43: “The information retrieving apparatus 100 can be widely applied to, for example, advertisements through the WWW. That is, sufficient advertising effect can be gained even when access is concentrated on a very small number of popular information servers, and a large number of other information servers are rarely accessed. 227 Reference Disclosure Therefore, a sufficient number of advertisers can be collected. In the WWW, information users are individuals and there are not a large number of users concentrated in one access operation. However, since the advertising information has been preliminarily selected by the user, the user is interested in the provided advertisement in most cases.” Id. at 14:16-54: “The additional information use history storage unit 51 stores an actual use history of the user corresponding to the additional information. That is, the additional information use history storage unit 51 stores a private history in its memory if the data required to obtain retrieved information from the retrieval condition input unit 11 is in the additional information…. The frequency of uses refers to the number of times the information is used. Especially if the additional information is advertising information, it is also recorded whether the product in the advertisement has been purchased through the additional information. … For example, when the additional information describes a new personal computer of a specific manufacturer, it can be obtained as the detailed information about the practical specification, appearance, etc. of a desired model. The information is instructive for the user, and is also useful for the advertiser because it improves an advertising effect for the product.” Id. at 18:64 to 19:4: “The use of such additional information is recorded in the additional information use history storage unit 51. For example, the number of times the information is used is recorded ‘+2’ because the detailed information is obtained from the advertisement, and the contract information is obtained from the detailed information. When a purchase contract is signed for the advertised product, it is also recorded.” Id. at 15:65 to 16:2: “the information server 102 or advertising agent server 102A reads the additional information use history at predetermined intervals to be informed of the tendency of liking of the user.” “Firefly Licenses Targeting Technology,” by Debra Ahe Williamson, December 9, 1996, available at adage.com/article/news /firefly-licensestargetingtechnology/75969. (“WILLIAMSON”) See e.g., WILLIAMSON, p. 1 (identifying Yahoo! as licensing Firefly’s technology; “Firefly users provide basic demographic information, such as age, gender, ZIP code and e-mail addresses. As they traverse a site, entering different content areas and rating their interests, that information is added to a user profile.”); id. (“Participating sites will use Firefly’s Passport software to register visitors and build individual profiles based on visitors’ activity on a site.”) 228 Reference “Firefly Network and Yahoo! Offer Consumers Ability to Intelligently Navigate the Web; My Yahoo! Features Firefly Tools to Offer Personalized Recommendations for Web Sites and Build Dynamic Communities,” Dec. 11, 1996 (“FIREFLY NETWORK AND YAHOO! OFFER CONSUMERS ABILITY TO INTELLIGENTLY NAVIGATE THE WEB”) “Boston.Comment Today’s topic Shadow advertising,” The Boston Globe, November 14, 1996. (“BOSTON GLOBE”) ABOUT NETGRAVITY ADSERVER Lang, “NewsWeeder: Learning to Filter Netnews,” 1995 (“LANG”) Green, Bayer & Edwards, “Towards Practical Interface Disclosure See e.g., FIREFLY NETWORK AND YAHOO! OFFER CONSUMERS ABILITY TO INTELLIGENTLY NAVIGATE THE WEB, p. 1 (“Using Firefly software tools, customer sites can register and recognize Firefly PassportTM holders, deliver personalized recommendations, create relevant and dynamic communities, serve targeted content and ads and more accurately measure and report on site activity.”); id., p. 2: “The Passport Office also enables Firefly software tools customers to deliver targeted content and advertising, as well as, accurate measurements and reports regarding site activity.” See e.g., BOSTON GLOBE, p. 1 (“Firefly offers advertisers, a movie studio, for example, the opportunity to deliver an ad plugging a new Bruce Willis movie only to users who have rated previous Bruce Willis movies highly.”) See e.g., ABOUT NETGRAVITY ADSERVER, Getting Started, p. 1 (“AdServer uses a sophisticated scheduling algorithm to select the ad to show, reading the ad and scheduling information from its database. AdServer evaluates many scheduling criteria for choosing an ad, including . . . user profile targeting.”); id., NGAPI Basics, p. 1 (“Such custom functions may perform the following actions: target ads to users based on browser cookie information or lookups in a custom database” See e.g., LANG, Introduction (“the user can also use NewsWeeder’s virtual newsgroups. For example, user Bob might go to the virtual newsgroup nw.top50.bob to see NewWeeder’s personalized list of the top 50 out of all articles, according to learned preferences for Bob. He is then presented with a list of one-line article summaries, sorted by predicted rating. The user selects a group of articles from these summaries and reads them sequentially. After each article is read, the user clicks on a rating from one to five . . . NewsWeeder collects the user’s ratings for active feedback on the user’s interests. . . . Each night, the system uses the collected rating information to learn a new model of the user’s interests.”) See e.g., GREEN, Introduction (“The agent is given a minimum of background knowledge, and learns appropriate behavior from the user and perhaps other agents. The use of machine learning methods to 229 Reference Agents which Manage Internet-Based Information, 1995 (“GREEN”) MEEKER Disclosure develop a profile of user preferences allows the agent to adapt to changes in user behavior, as well as eliminating the need for explicit programming with rules or scripts. A common method of developing a user profile is by observing and analyzing user behavior.”); id. (“The user profile is then employed to generate classifications for the new documents, such as a user’s interest rating in a USENET news article or a World-Wide Web page.”); id., Section 4 (“LAW helps a user find new and interesting information on the World-Wide Web. It provides assistance in two ways: by interactively suggesting links to the user as they browse the Web and through the use of a separate Web robot that attempts to find pages that might be of interest.”) MEEKER at v.: “However, that same marketer should get even more interested if a Web site (such as CNET, at www.cnet.com) can route advertisements to a demographic group that includes only males who are at least 35 years old, have household incomes in excess of $100,000, live in California, and use Pentium PCs with Netscape Navigator.” Id. at 3-13: “However, for direct marketing, the Internet offers the ability to target and deliver messages to an audience with specific demographics and interests, and allows the user to interact instantly with that message. In essence, direct response advertisers sell goods and services to customers individually, and no other medium affords users such immediate access at the point of sale.” Id. at 6-2: “Each time the page is downloaded by a user, a designated space on the page (in the example in Figure 6-1, a rectangle across the top) is automatically filled with a banner. The method by which a site determines which ad to put into which download may depend on agreements or contracts with advertisers, the capability of the technology involved, the demographics of the user, and other factors.” Id. at 6-3: “This brings us to the concepts of inventory management and allocation, and ad tracking and rotation. The most important goal of advertising is to deliver to each person the message most appropriate to their tastes, buying habits, and so forth, and with the most effective frequency — in other words, to execute a campaign tailored to each individual. To this end, many Web sites use software packages to impose ad delivery schema over on-the-fly allocation of advertising inventory. By schema, we mean sets of rules governing which ads get delivered when. This software can be either off-the-shelf (from companies like Net Gravity, Bellcore, and Accipiter) or developed in-house (as HotWired and CNET, for instance, have done). The importance of the quality, flexibility, and reliability of ad management software is simple: more targeted, reliable, and verifiable 230 Reference Disclosure advertising delivery translates directly into the ability to charge more per impression…. Targeting gives advertisers the opportunity to filter messages to selected audiences based on certain criteria. This may be the most powerful aspect of the Internet as an advertising medium — the ability to dictate the exact composition of an advertisement’s audience…. This targeting ability has two pieces: 1) the process for ad delivery and measurement is precise and directed (e.g., each ad is individually delivered in response to a user-generated request — there is no TV- or radio-like “shotgun” delivery — followed by statistical sampling and averaging to determine the actual composition of the receiving audience); and 2) each individual delivery can be tailored, based on user information. The power of the second aspect is increased substantially with more detailed user data, potentially collected through registration or in the course of using the site. Thus, with the right user information, one could know that every advertisement delivered is received by teenage women using a Macintosh, or by college-educated middle-age men in specific (perhaps high-income) zip codes, and so on. Essentially, it’s a marketer’s dream.” Id. at 6-6: “Search engines, by definition, use text input by users to conduct searches of relevant content on the Web. Since advertisements are displayed along with the search results, these companies allow advertisers to buy “key words,” which display the advertiser’s banner when a user searches for the word purchased. It follows that the word or words purchased are generally related in some way to the advertiser’s products or services. Infoseek and Yahoo! charge $1,000 per month per keyword, and based on a target of 20,000 impressions, this would yield a CPM of $50. For example, Figure 6-3 shows how the results of a search for the word “router” yielded a typical list of sites but also netted an advertisement for Cabletron Systems (a maker of switches, considered an alternative to routers). In fact, any time this word was searched for, the same ad came up. A search for “hub” consistently resulted in a different ad for the same company. (Yes, we searched for “beer,” and each time we got a Miller Genuine Draft ad).” Id. at 6-10: “We reiterate our belief that the ability to marry content to creative will be a key driver of pricing. Essentially, this requires that the advertising be targeted at the audience for the particular site’s type of content. The next logical step in this process would then be to tailor not just to the audience, but also to each individual user according to his or her buying and browsing habits. Several makers of personalization software, most notably Firefly Network (formerly Agents, Inc.), provide products that personalize ad delivery based on a user’s past behavior or profile. If a user has come to an advertiser’s 231 Reference Disclosure site three times, looked at the same item each time, but has yet to purchase it, delivering an ad for that product as the user again enters the site would certainly be more valuable to an advertiser than the delivery of that ad indiscriminately. Once again, the more targeted the audience delivered, the higher the price advertisers will pay.” Id. at 7-11: “Another development in this area is the use of cookies, wherein a server-specific file is sent by a Web site server and automatically stored by a browser on a user’s hard disk. This cookie file’s data can be anything, like a date/time stamp, an IP address, or a unique user ID. Once a cookie is received from a given server, whenever that browser makes a request to that server for an HTML page, it will include the cookie with the request. The browser will only send a cookie to the server site that originally sent it, so it is not possible for one Web site to look at or request cookies from other sites. Cookies provide a signature, so that Web sites can track an individual’s number of visits and the path he or she took through a site. This information can be employed in a number of creative ways, including obtaining behavioral data, crafting marketing messages for a site owner’s or advertiser’s products, keeping track of purchasing activity at a site (if you visit and read all of my pages on espresso makers, but don’t buy one, I can still show you the product each time you return), and overall personalization of the user’s experience at the site. Some potential downsides to the use of this technology is the possibility of tampering by users or third parties. Cookies are located on a user’s local hard drive, and if altering the cookie data is beneficial enough to a user, it is likely that many will attempt to do so. In addition, third-party sites might have cause to tamper with the cookie data of competitors (or partners), or invade the privacy of users by reading their stored data for behavioral, purchasing, or other purposes. Despite these potential security and privacy issues, this tailored marketing approach adds significant value, we believe, that may be enhanced further by demographic information gained through user registration data, which are collected at such sites as CNET, ESPNET SportsZone, The Wall Street Journal Interactive, and the online services. In our view, it would make a very compelling value-added proposition if advertisers could be certain of the age, gender, occupation, or purchasing preferences of each person who views an ad.” Id. at 10-10: “Firefly Network (formerly Agents, Inc.; Cambridge, Mass.; www.firefly.com) was founded in 1995 and provides software that uses advanced algorithms based on certain collaborative filtering technologies to make recommendations to users based on their preferences. In January 1996, the company (then called Agents, Inc.) 232 Reference Disclosure launched this intelligent agent technology on the Web in the form of Firefly. As a user continues to visit the network, Firefly's technology “learns” his or her likes and dislikes, can compare and contrast these with other users’ patterns, and is able to offer members personalized recommendations for music, movies, and so forth. This technology therefore offers marketers the ability to target messages and advertisements based on an individual’s preferences and interests. As a result, marketers can maximize efforts on a prequalified audience and offer a more relevant experience for consumers. The company currently has 95 employees and more than 500,000 registered members. Firefly Network’s customers and partners include: Yahoo!, Ziff Davis’s ZD Net, Reuters, Rolling Stone, Newbury Comics, The All Music Guide, Hits World, and Muzak’s Enso Audio Imaging Division. They have raised in excess of $18 million from investors, including: Atlas Ventures, Dun & Bradstreet Enterprises, Merrill Lynch, PAFET, Softbank, Trident Capital, Goldman Sachs, and Reuters New Media.” U.S. Patents No. 6,183,366 to Goldberg et al. (“’366 PATENT”) ’366 PATENT, e.g., Abstract, “The present invention is an information service and advertising providing system for presenting interactive information services together with interactive advertising on a communications network such as the Internet and LANs. The information service may be a game played interactively on the network while advertising is communicated between users and an advertising network node. However, other interactive services, such as are available on the Internet, are also accessible for concurrent use with advertising presentations. Advertising or promotionals may be selectively presented to users by comparing archived user profiles with demographic profiles of desired users. User responses to advertising may be used for evaluating advertising effectiveness such as for test or microtarget marketing. Compensation to users for viewing advertising may also be provided. For instance, users may be provided with subsidized Internet access for receiving advertising while concurrently interacting with an Internet service. Users may also be provided with various games and/or game tournaments via interactive network communications. Thus, users may respond to advertising while being entertained (e.g., via games), or while interacting with another network service.” ’366 PATENT, e.g., Summary of the Invention, “The present invention is a computerized interactive advertising system (i.e., method and apparatus) for exchanging information regarding goods and/or services between a first population of users (hereinafter also known as "players" or "users") and a second population of users (hereinafter also 233 Reference Disclosure known as "sponsors" or "advertisers"). In particular, the sponsors or advertisers may present information related to goods and/or services to the players using the present invention and the players may view this information while, for example, interacting with the present invention for playing a game such as blackjack, craps, roulette, poker, pai gow or the like. Moreover, a player may also interact with the present invention so that the player has the capability for responding to sponsor or advertiser presented questionnaires, as well as for purchasing or viewing sponsor goods and/or services. Thus, the present invention provides an information exchange service within a gaming context for enticing players to view and/or interact with sponsor presentations such as interactive advertisements. It is also an aspect of the present invention that each player or user is presented with advertisements for products and/or services, wherein it is believed the player will be receptive to the advertisement. That is, the present invention selectively presents advertisements to each player, according to stored characteristics and preferences of the player that the present invention has determined from, for example, player supplied personal information, player responses to questions, and/or analysis of player interactions such as player requests for additional information related an advertisement. Thus, such a selective presentation of advertisements allows a sponsor or advertiser to provide information related to relatively extensive or expensive promotionals (e.g., demonstrations, samples, discounts, trial subscriptions, prizes, bonuses) to players most likely to subsequently purchase the advertised product or service. Consequently, such selectivity can greatly increase the cost effectiveness of advertising, wherein the term, advertising (or advertising presentation), as used herein is understood to include not only product or service presentations that are merely informational, but also more interactive advertising presentations such as promotionals wherein discounts, free samples or a trial usage may be offered. . . It is a further aspect of the present invention to require each player to use a distinct identification provided when the player "registers" with the present invention before playing any games so that a network site for the invention may be able to identify each player. Accordingly, it is an aspect of the present invention during registration, that each player provides personal information about him/herself both for gaming identification and/or use as selection criteria by sponsors or advertisers for presenting particular presentations. For example, in the case of an Internet embodiment of the present invention, such registering can be performed via the Internet prior to play of any games at a gaming/advertising web site. Thus, players may be required to provide the present invention with information about themselves such as name, address, E-mail address, age, sex, and/or other player characteristics 234 Reference Disclosure deemed pertinent to one or more sponsors or advertisers. Accordingly, the present invention provides a sponsor or advertiser with the capability to target its presentations substantially only to players or users having selected characteristics as, for example, determined from player information provided when registering with a network site for the present invention.” ’366 PATENT, e.g., Claims 1, 2, 3 ’366 PATENT, e.g., Figures 3, 4A-E, 6A-B, 7 (and associated text) U.S. Patents No. 7,496,943 to Goldberg et al. (“’943 PATENT”) ’943 PATENT, e.g., Abstract, “A networked system is disclosed for presenting advertising during on-line interactions between a user and a service of a network (e.g., the Internet, interactive cable, and/or a LAN). Advertisements (ads) are presented to a networked user unrequestedly during user interactions with the service. The user can activate the ads (via hyperlinks) for receiving additional advertising. The system gathers user data and/or develops user profiles for selectively presenting ads, promotionals, discounts, etc. targeted to receptive users. In exchange for viewing such selective presentations, on-line access to the service is provided, the service including, e.g., (a) playing on-line interactive games (e.g., blackjack and poker), (b) providing access to the network itself (e.g., an Internet service provider), and/or (c) providing access to substantially any interactive service accessible via (b). The system can provide free/reduced cost network services to the user for viewing unrequested advertising. The system can be provided for a casino.” PATENT, e.g., Summary of the Invention, “he present invention is a computerized interactive advertising system (i.e., method and apparatus) for exchanging information regarding goods and/or services between a first population of users (hereinafter also known as “players” or “users”) and a second population of users (hereinafter also known as “sponsors” or “advertisers”). In particular, the sponsors or advertisers may present information related to goods and/or services to the players using the present invention and the players may view this information while, for example, interacting with the present invention for playing a game such as blackjack, craps, roulette, poker, pai gow or the like. Moreover, a player may also interact with the present invention so that the player has the capability for responding to sponsor or advertiser presented questionnaires, as well as for purchasing or viewing sponsor goods and/or services. Thus, the present invention provides an information exchange service within a gaming context for enticing players to view and/or interact with 235 Reference Disclosure sponsor presentations such as interactive advertisements. It is also an aspect of the present invention that each player or user is presented with advertisements for products and/or services, wherein it is believed the player will be receptive to the advertisement. That is, the present invention selectively presents advertisements to each player, according to stored characteristics and preferences of the player that the present invention has determined from, for example, player supplied personal information, player responses to questions, and/or analysis of player interactions such as player requests for additional information related an advertisement. Thus, such a selective presentation of advertisements allows a sponsor or advertiser to provide information related to relatively extensive or expensive promotionals (e.g., demonstrations, samples, discounts, trial subscriptions, prizes, bonuses) to players most likely to subsequently purchase the advertised product or service. Consequently, such selectivity can greatly increase the cost effectiveness of advertising, wherein the term, advertising (or advertising presentation), as used herein is understood to include not only product or service presentations that are merely informational, but also more interactive advertising presentations such as promotionals wherein discounts, free samples or a trial usage may be offered. Moreover, it is an aspect of the present invention that each player may interact with and play a game at a time and pace (i.e., tempo) substantially of the player's choosing. In particular, the player is not bound by a required order or sequence of play involving other players, even though the player may be in competition with other players. In fact, a player may cease play for an extended time while in the midst of a game and subsequently continue the game at the point where the player ceased to play. Thus, if the present invention is easily accessible, then players may interact with the present invention at their leisure. . . “t is a further aspect of the present invention to require each player to use a distinct identification provided when the player “registers” with the present invention before playing any games so that a network site for the invention may be able to identify each player. Accordingly, it is an aspect of the present invention during registration, that each player provides personal information about him/herself both for gaming identification and for use as selection criteria by sponsors or advertisers for presenting particular presentations. For example, in the case of an Internet embodiment of the present invention, such registering can be performed via the Internet prior to play of any games at a gaming/advertising web site. Thus, players may be required to provide the present invention with information about themselves such as name, address, E-mail address, age, sex, and/or other player characteristics deemed pertinent to one or more sponsors or advertisers. Accordingly, the present invention 236 Reference Disclosure provides a sponsor or advertiser with the capability to target its presentations substantially only to players or users having selected characteristics as, for example, determined from player information provided when registering with a network site for the present invention.” ’943 PATENT, e.g., Claims 1, 2, 9, 11-14 ‘943 PATENT, e.g., Figures 3, 4A-E, 6A-B, 7 (and associated text) U.S. Patents No. 6,712,702 to Goldberg et al. (“’702 PATENT”) ’702 PATENT, e.g., Abstract, “The present invention is a game playing method and apparatus for automating games such as blackjack, poker, craps, roulette, baccarat and pai gow, wherein players may play continuously and asynchronously, and information related to advertised items can be exchanged between players and advertisers. In one embodiment, each instance of a game is likely unique from all other current game instances. The games do not require a manual dealer and in one embodiment, played in a gaming establishment using low cost gaming stations. The present invention may also, be used to play such games on the Internet or an interactive cable television network wherein a game controller communicates with players at network nodes in their homes and at their leisure since there is no game tempo requirement. During a game, advertising is selectively provided by comparing player personal information with a desired demographic profile. Player responses to advertising are used for evaluating advertising effectiveness. The invention is useful for test marketing of products, advertisements, and reduces advertising costs.” ‘702 PATENT, e.g., Summary of the Invention, “he present invention is a computerized interactive advertising system (i.e., method and apparatus) for exchanging information regarding goods and/or services between a first population of users (hereinafter also known as “players” or “users”) and a second population of users (hereinafter also known as “sponsors” or “advertisers”). In particular, the sponsors or advertisers may present information related to goods and/or services to the players using the present invention and the players may view this information while, for example, interacting with the present invention for playing a game such as blackjack, craps, roulette, poker, pai gow or the like. Moreover, a player may also interact with the present invention so that the player has the capability for responding to sponsor or advertiser presented questionnaires, as well as for purchasing or viewing sponsor goods and/or services. Thus, the present invention provides an information exchange service within a gaming context for enticing players to view and/or interact with 237 Reference Disclosure sponsor presentations such as interactive advertisements. It is also an aspect of the present invention that each player or user is presented with advertisements for products and/or services, wherein it is believed the player will be receptive to the advertisement. That is, the present invention selectively presents advertisements to each player, according to stored characteristics and preferences of the player that the present invention has determined from, for example, player supplied personal information, player responses to questions, and/or analysis of player interactions such as player requests for additional information related an advertisement. Thus, such a selective presentation of advertisements allows a sponsor or advertiser to provide information related to relatively extensive or expensive promotionals (e.g., demonstrations, samples, discounts, trial subscriptions, prizes, bonuses) to players most likely to subsequently purchase the advertised product or service. Consequently, such selectivity can greatly increase the cost effectiveness of advertising, wherein the term, advertising (or advertising presentation), as used herein is understood to include not only product or service presentations that are merely informational, but also more interactive advertising presentations such as promotionals wherein discounts, free samples or a trial usage may be offered. Moreover, it is an aspect of the present invention that each player may interact with and play a game at a time and pace (i.e., tempo) substantially of the player's choosing. In particular, the player is not bound by a required order or sequence of play involving other players, even though the player may be in competition with other players. In fact, a player may cease play for an extended time while in the midst of a game and subsequently continue the game at the point where the player ceased to play. Thus, if the present invention is easily accessible, then players may interact with the present invention at their leisure. . . “It is a further aspect of the present invention to require each player to use a distinct identification provided when the player “registers” with the present invention before playing any games so that a network site for the invention may be able to identify each player. Accordingly, it is an aspect of the present invention during registration, that each player provides personal information about him/herself both for gaming identification and for use as selection criteria by sponsors or advertisers for presenting particular presentations. For example, in the case of an Internet embodiment of the present invention, such registering can be performed via the Internet prior to play of any games at a gaming/advertising web site. Thus, players may be required to provide the present invention with information about themselves such as name, address, E-mail address, age, sex, and/or other player characteristics deemed pertinent to one or more sponsors or advertisers. Accordingly, the present invention 238 Reference Disclosure provides a sponsor or advertiser with the capability to target its presentations substantially only to players or users having selected characteristics as, for example, determined from player information provided when registering with a network site for the present invention.” ’702 PATENT, e.g., Claims 1, 3, 4, 12 ‘702 PATENT, e.g., Figures 3, 4A-E, 6A-B, 7 (and associated text) PHILLIPS BUSINESS DEDRICK 1994 PHILLIPS BUSINESS at 1: “But most vendors also have more to offer than just high volume, thanks to such approaches as "narrow casting," or placing ads based on key words entered in a search. These capabilities allow advertisers to target audiences through search engines like no other medium. "Not only can the engines track the things you're searching on, they can suggest target ads. This is one-toone marketing," Julian said.” PHILLIPS BUSINESS at 1: “While search engines can personalize ads based on search terms, another effective model is to personalize entire sections based on geographic and demographic factors. Vendors can not only index content for a targeted population, they can sell advertisers a guaranteed demographic.” See e.g., DEDRICK 1994, p. 57: “Consumer demographic and psychographic data are important to advertisers, because these are the data that allow an advertiser to target specific consumers. Demographic data include variables such as age, sex, income, marital status. Psychographic data include likes and dislikes, color preferences and personality traits that show consumer behavioral characteristics. The better the demographic and psychographic data available on a set of consumers, the better an advertiser is able to target an advertisement to this set of consumers.”); id., p. 59: “dad, a male, age 40-50, earning $70,000+ annually, may be presented with a portion of a Mt. FunSki ski resort advertisement concerning booking a reservation, along with a list of fun things to do. However, the consumer’s son, male, age 12-17, interested in girls, moguls, and hot tubs, may consume a presentation based totally upon on [sic] the ‘fun things’ that Mt. FunSki has to offer.”); id. (“consumers will have personal profiles residing within their consumption devices. These personal profiles may contain demographic and psychographic variables as well as other data. Such data may included a preferred payment method (Visa, Amex, etc. card numbers) enabling consumers to easily participate in electronic commerce. Other included data 239 Reference DEDRICK 1995 Disclosure might include key words and other variables used by consumption agents to go out on the network and find both electronic content and electronic advertisements that have a certain “hit-rate” when matched against a consumer’s profile. Additionally, the consumption device may have resident software that monitors consumption behavior on an ongoing basis, allowing a consumer’s personal profile to be automatically build and maintained. . . . they may begin to see advertisements that focus on their favorite subjects, presented primarily in their favorite colors. Also, consumer’s agents may report the availability of electronic content and advertisements matching their personal profiles.”); id. (“Acting upon the consumer’s personal profile data, an agent might send out queries to electronic yellow pages service providers, either locally or with a wider scope of interest.”); (“consumer’s agents may report the availability of electronic content and advertisements matching their personal profiles.”); id., p. 60 (“Additionally, the consumption device may have resident software that monitors consumption behavior on an ongoing basis, allowing a consumer’s personal profile to be automatically build and maintained. . . . they may begin to see advertisements that focus on their favorite subjects, presented primarily in their favorite colors. Also, consumer’s agents may report the availability of electronic content and advertisements matching their personal profiles.”); id., p. 60 (“More advanced agents may be given access to a consumer’s credit information and authority to use the credit information, enabling the agent to conduct electronic commerce on behalf of the consumer.” ); id., p. 62-63 (“the currently suggested attribute extension list is as follows: . . . Access control attributes, to limit access to electronic advertisements not available to all consumers, such as advertisements for alcohol, tobacco, and adult products, . . . Scope attributes, describing global, national, regional, and local preferences for distribution and announcement to yellow page services, Language support attributes, detailing which languages are supported by each object and providing network pointers to parallel objects authored using different languages . . .”); id., p. 63 (“Consumer’s personal profiles may include such variables as a collection of the consumer’s consumption characteristics, a collection of demographic and psychographic variables, bank account and credit card account numbers.” ) See e.g., DEDRICK 1995, p. 43 (“As another example of attribute extensibility, an element made available to a consumer could depend on that particular consumer’s target characteristics. For example, Dad, a male age 40 to 50, earning $70,000-plus annually, might see part of a Mt. FunSki ski resort ad about booking a reservation . . . However, the consumer’s son, male, ate 12 to 17, interested in girls, moguls, and hot tubs, might see a presentation based totally on the ‘fun things’ that Mt. 240 Reference GALLAGHER Disclosure FunSki has to offer. . . .”); id., p. 45 (“consumers will have portable personal profiles tied into their consumption devices. These portable profiles may contain such data as a preferred payment method (credit card numbers, for example) enabling consumers to easily participate in electronic commerce. Other profile data might include key words and other variables used by consumption agents for finding both electronic content and electronic ads that have a certain ‘hit rate’ when matched against a consumer’s profile.”); id., p. 45 (“a manual profile modification program is also required to enter personal data such as name, address, telephone numbers, credit card and bank account numbers, and the like . . . The consumer can use the manual profile modification program to correct such deviances from the actual electronic content consumption preferences.”); id., p. 45 (“2. When a consumption device presents one of these labeled electronic ads to a consumer, all input and output between the consumer and the multimedia element currently being consumed is monitored. 3. Each of these I\O interactions is correlated to the labels associated with the particular multi-media element being displayed on the consumption device. 4. Relations between the elements of the electronic ad that are not chosen for interaction by the consumer are also correlated with the labels associated with each multimedia element. 5. The correlations made in the previous steps are entered into the consumer’s profile, representing data on what a consumer likes and dislikes.”); id., p. 46 (“Acting upon the consumer’s personal profile data, an agent might send out queries to electronic yellow pages service providers, either locally or with a wider scope of interest.”); id., p. 46 (“As personal consumption profiles become more robust, consumers might begin to see ads focusing on their favorite subjects, presented primarily in their favorite colors, sizes and shapes. Also, their agents might report the availability of electronic content and ads matching their personal profiles.”); id., p. 46 (“If a cost or rebate is attached to each available element, the agents could report the monetary units involved with potential consumption. The agent could leave the final busy/sell decision up to the consumer, or perform the transaction if programmed to act on the consumer’s behalf.”) See e.g., GALLAGHER, p. 3 (“Current technology provides the capability to develop sophisticated and detailed profiles of individual users of information services based on individual characteristics and past patterns of behavior in using the information service.”); id. (“ It is possible to target users very precisely because data can remain associated with individuals, so advertisers can select exactly the users to whom they wish their advertising to be exposed.”); id., p. 4 (“the model requires that users be assigned unique identifiers . . . Users also complete an online questionnaire the first time they use the information service. The questionnaire allows data to be collected on 241 Reference NETGRAVITY ADSERVER CHOSEN BY Disclosure several dimensions, including: (1) demographic attributes such as geographic location, income, family lifecycle stage, occupation, and sex; (2) psychographic attributes such as travel patterns and hobbies; and (3) product and brand usage attributes. This element of the basic model permits a banner advertisement to be directed to users (and only those users) who fit certain criteria, assuming data were collected on relevant attributes.”); id. (“Each time a user connects, his/her profile is compared to all target audience profiles from all advertisers. The user’s profile will actually match some subset of those profiles.”); id. (“In summary, the basic model has three elements: individual user profiles, individual advertisement target audience profiles, and a selection mechanism for presenting advertisements to specific users who match the target audience profile.”); id., p. 5 (“In the enhanced model, we propose that patterns of search and browsing behavior exhibited by users while using an information service determine which advertisements are shown to that user during current or future sessions.”); id., p. 5 (“As before, this model relies on assigning a unique identifier to each user for recording his/her searching and browsing activities while using the information service. Each session constitutes a ‘record,’ consisting of data such as: sites visited in order; pattern of navigation through a hierarchical structure (as in Yahoo!); choice of search terms in keyword-based searches; and reaction to previously exposed targeted banner advertisements (e.g., which linked Web sites are selected and visited by the user and which ones are ignored). The aggregate of such records for each user provides a profile from which preferences can be implicitly generated. As a simple example, if a user has made several searches using keywords such as ‘Atlantic salmon’ and ‘fly fishing,’ and has visited the site of the Angling Club Lax-a of Iceland . . ., s/he may be targeted for a banner advertisement for a fishing lodge in Alaska.”); id., p. 7 (“Profiles accommodate the possibility that some users within the region of acceptability may be more desirable to an advertiser than others. Hen, a distance metric capturing the relative desirability of a user with respect to an ideal profile is possible. . . . recognizing a notion of distance allows the possibility for advertisers to ‘bid’ for the opportunity to display an advertisement to a user. Such bids would be determined by the advertiser, based on variables such as the user profile . . . and advertising budget.”); id., p. 8 (“When bids are received, they can be ranked. The banner advertisement corresponding to the winning bid is displayed to the user. Other advertisements may be displayed according to their ranking if there is an opportunity to display additional advertisements (e.g., if the user engages in several search or browse activities during a session).” ) See e.g., NETGRAVITY ADSERVER CHOSEN BY GNN (“NetGravity, the leader in Internet advertising technology, today announced GNN, a 242 Reference GNN Disclosure service of America Online Inc., will take advantage of the NetGravity AdServer technology for WebCrawler. . . . This allows GNN to . . . dynamically deliver targeted ads. . . . Now, through NetGravity’s relationship with I/Pro, Web sites will be able to develop and place advertising much more effectively using management tools with demographic profiles for targeted ad placement.”) Lycos, Inc. Registration See LYCOS PROSPECTUS at GOOG-WRD-00872480: Statement No. 333-354, dated April 3, 1996 (“LYCOS PROSPECUS”), produced at GOOGId. at GOOG-WRD-00872492: WRD-00872476GOOG-WRD00872549 Id. at GOOG-WRD-00872498: Id. at GOOG-WRD-00872499: 243 Reference Disclosure Id. at GOOG-WRD-00872500: Id. at GOOG-WRD-00872501: Id. at GOOG-WRD-00872506: Id. at GOOG-WRD-00872548: 244 Reference Disclosure Lycos, Inc. Form S-1 Registration Statement, dated February 14, 1996 (“LYCOS S-1”), produced at GOOGWRD-00872550GOOG-WRD00872923 See LYCOS S-1 at GOOG-WRD-00872557: Id. at GOOG-WRD-00872558: Id. at GOOG-WRD-00872568: 245 Reference Disclosure Id. at GOOG-WRD-00872574: Id. at GOOG-WRD-00872575: 246 Reference Disclosure Id. at GOOG-WRD-00872576: Id. at GOOG-WRD-00872582: Id. at GOOG-WRD-00872616: 247 Reference Disclosure Excite, Inc. SB-2 Registration Statement No. 333-2328-LA, March 11, 1996 (“Excite SB-2”) produced at GOOGWRD-00872006GOOG-WRD00872094 Id. at GOOG-WRD-00872010. 248 Reference Disclosure Id. Id. at GOOG-WRD-00872011. 249 Reference Disclosure Id. Id. at GOOG-WRD-00872013. Id. 250 Reference Disclosure Id. at GOOG-WRD-00872036. Id. at GOOG-WRD-00872038. Id. at GOOG-WRD-00872039. Id. at GOOG-WRD-00872041. 251 Reference Disclosure Id. at GOOG-WRD-00872043. Id. at GOOG-WRD-00872044. Id. 252 Reference Excite, Inc. Prospectus, dated April 3, 1996 (“Excite Prospectus”) produced at GOOGWRD-00871928GOOGL-WRD00872005 Disclosure Id. at GOOG-WRD-00871930. Id. Id. at GOOG-WRD-00871931. 253 Reference Disclosure Id. Id. at GOOG-WRD-00871933. Id. 254 Reference Disclosure Id. at GOOG-WRD-00871956. Id. at GOOG-WRD-00871958. Id. at GOOG-WRD-00871959. Id. at GOOG-WRD-00871961. 255 Reference Disclosure Id. at GOOG-WRD-00871963. Id. at GOOG-WRD-00871964. Id. 256 Reference InfoSeek Corporation S-1 Registration Statement No. 3334142, Amendment No. 1, dated May 3, 1996 (“InfoSeek S-1”) produced at GOOGWRD-00872371GOOG-WRD00872464 Disclosure InfoSeek S-1 at GOOG-WRD-00872378. Id. Id. Id. at GOOG-WRD-00872385. 257 Reference Disclosure Id. at GOOG-WRD-00872396. Id. at GOOG-WRD-00872401. Id. at GOOG-WRD-00872402. 258 Reference Disclosure Id. at GOOG-WRD-00872402-403. Id. at GOOG-WRD-00872403. Id. at GOOG-WRD-00872404. Id. at GOOG-WRD-00872404. 259 Reference Disclosure Id. at GOOG-WRD-00872404-05. Id. at GOOG-WRD-00872406. Id. at GOOG-WRD-00872408. Id. Id. at GOOG-WRD-00872410. 260 Reference Disclosure Id. at GOOG-WRD-00872411. Yahoo Prospectus Registration Statement No. 333-2142, dated April 12, 1996 (“Yahoo Prospectus”) produced at GOOG-WRD00874251-GOOGWRD-00874328 Id. at GOOG-WRD-00874255. Id. at GOOG-WRD-00874261. 261 Reference Disclosure Id. at GOOG-WRD-00874262. Id. at GOOG-WRD-00874263. Id. at GOOG-WRD-00874269. Id. at GOOG-WRD-00874275. Id. at GOOG-WRD-00874279. 262 Reference Disclosure Id. at GOOG-WRD-00874280. Id. at GOOG-WRD-00874280. Id. at GOOG-WRD-00874283. 263 Reference Disclosure Id. at GOOG-WRD-00874284. Id. at GOOG-WRD-00874284-85. 264 Reference Disclosure Id. at GOOG-WRD-00874285. Id. at GOOG-WRD-00874285-86. Id. at GOOG-WRD-00874286. Id. at GOOG-WRD-00874287. 265 Reference Disclosure Id. at GOOG-WRD-00874289. Id. at GOOG-WRD-00874292. Id. at GOOG-WRD-00874292. 266 Reference Disclosure Id. at GOOG-WRD-00874327. Yahoo Form SB-2 Registration Statement No. 333-2142, dated March 7, 1996 (“Yahoo Form SB-2”) produced at GOOG-WRD00874329-GOOGWRD-00874418 Id. at GOOG-WRD-00874335. 267 Reference Disclosure Id. at GOOG-WRD-00874340. Id. at GOOG-WRD-00874340-41. Id. at GOOG-WRD-00874341. 268 Reference Disclosure Id. at GOOG-WRD-00874343. Id. at GOOG-WRD-00874348. Id. at GOOG-WRD-00874357. 269 Reference Disclosure Id. at GOOG-WRD-00874358. Id. at GOOG-WRD-00874358. Id. at GOOG-WRD-00874361. 270 Reference Disclosure Id. at GOOG-WRD-00874362. Id. at GOOG-WRD-00874362. 271 Reference Disclosure Id. at GOOG-WRD-00874362. Id. at GOOG-WRD-00874363-64. 272 Reference Disclosure Id. at GOOG-WRD-00874364. Id. at GOOG-WRD-00874364. Id. at GOOG-WRD-00874366-67. Id. at GOOG-WRD-00874368. 273 Reference Disclosure Id. at GOOG-WRD-00874369. Id. at GOOG-WRD-00874369. 274 Reference Disclosure Id. at GOOG-WRD-00874404. Open Text Form F-1 Registration Statement No. 33-98858, dated November 1, 1995 (“Open Text Form F1”) produced at GOOG-WRD00873727-GOOGWRD-00873878 275 Reference Disclosure Id. at GOOG-WRD-00873603. 276 Reference Disclosure 277 Reference Disclosure Id. at GOOG-WRD-00873633-35. Id. at GOOG-WRD-00873635. 278 Reference Disclosure Id. at GOOG-WRD-00873637. Id. at GOOG-WRD-00873642. Id. at GOOG-WRD-00873642. Id. at GOOG-WRD-00873644. 279 Reference Open Prospectus, dated January 23, 1996 (“Open Text Prospectus”) produced at OT03652-3758 Disclosure Id. at OT03653. 280 Reference Disclosure 281 Reference Disclosure Id. at OT03689-91. 282 Reference Disclosure Id. at OT03692. Id. at OT03693. Id. at OT03698. 283 Table B5: Fuzzy Logic To the extent the references addressed in claim charts A-1 to A-39 does not disclose the limitations identified in each chart citing Table B5, one of ordinary skill in the art would be motivated to combine the references addressed in claim charts A-1 to A-39 with any one or more of the Table B5 references listed below because: it would have yielded predictable results; using the techniques of the Table B5 references would have improved the primary or obviousness references in the same way; and applying the techniques of the Table B5 references to improve primary or obviousness references would have yielded predictable results. Reference U.S. Patent No. 6,119,101 (“PECKOVER”) Disclosure See, e.g., PECKOVER, 19:3-32: A Preference Manager function 54 maintains data about the preferences of the user. Preferences indicate items of interest to the user, such as favorite brands, interest in sports, etc. Within Agent System 10, preference data also includes “demographic” data. Demographic data indicates facts about the user, such as whether the user is a homeowner, the user’s gender, the user’s age group, etc. Although marketing industry usage of the term “demographics” may include a person’s name, address, or other identifying data, a Preference Manager’s demographic data does not include data that identifies the particular user. Preference data may be entered manually by the user using, for example, a form on a Web page, or data may be loaded by a System Administrator. Preferences may also be updated automatically by the system as, for example, when the user instructs the system to “remember” a product brand name from a product search. Preference Manager 54 uses preference data to order search results, so that items that are more likely to be preferred by the user will be displayed first when the results are delivered to the user. Referring now to FIG. 5A, each preference datum 68 comprises not only a value 72, but also a key 70 for ease of searching. Referring to FIG. 5B, a small sample of preference data illustrates the kind of data that might be used. A particular user typically will have much more preference data. Some values are shown as “rank m in n” to illustrate that ranking data may also be stored. The specific keys of any particular set of preference data depends on what the user has entered, etc. Only keys that are relevant to a particular user are included in that user’s preferences, and the 284 Reference Disclosure specific data maintained will change over time. PECKOVER, 20:65-21:4: Referring again to FIG. 4A, a Target Manager function 66 assists the user in identifying Personal Agents to which targeted ads may be delivered. Target Manager 66 can identify Personal Agents based on preferences, demographic characteristics, and Decision Agent activity. Target Manager 66 does not have access to private data of consumer Personal Agents 12 such as name, address, etc. PECKOVER, Fig. 5B: PECKOVER, Fig. 18: 285 Reference Disclosure U.S. Patent No. 6,374,237 (“REESE”) REESE, 3:45-58: The invention contemplates that the matching server 120 works with the client user profile request 100 to pare down the data delivered to the client. The matching server 120 preselects an aggregate of data that is determined to be the most relevant to different sets of user profile requests 100. The matching server 120 does this by searching various content sites 130, 140, 150, 160 on the Internet or other network. A user profile request 100 is applied against the matching server 120 aggregate of data like a sieve, and only data matching the user profile request 100 is returned to the client 110. The invention contemplates that the matching server 120 need not match the user profile 100 exactly, but can accommodate a user’s designated acceptable range of variability, i.e., a quality factor. REESE, 5:55-6:8: The user profile form 600 includes a Search Type field 630 that allows a user to select whether the user wants an exact match of the user profile with the search data or whether the 286 Reference Disclosure user will accept some lesser amount of exactness as acceptable for retrieved data. The user profile form 600 further allows the user to enter demographics specific to the user. In FIG. 6, the demographics include area code 640, zip code 650, state 660, sex 670, age 680, and some other identifiers 690. Once the user enters the appropriate data in the user profile form 600, the user is instructed to save the profile by a “Save Profile” 694 button. This allows the user to save his user profile and include the user profile in subsequent searches at subsequent times without having to repeat the steps of completing a user profile for each search. Once the form is completed, the user may submit the user profile by indicating its submission with the “Submit Profile” 696. In this case, the user profile will be submitted with the search request as either a POST or GET method request as specified above with reference to FIGS. 3-5 and the accompanying text. REESE, 7:53-8:2: When assessing the database constructed by the matching server to the user profile, the matching server may require an exact match or a non-exact match. For an exact match, it is contemplated that each and every element of the user profile match that of the data collected in the query database on the matching server. If such stringent requirements are not necessary, the user may designate a lesser standard of stringency and retrieve data that is not an exact match to the query data and the user profile. In FIG. 9, for example, if the user profile contained ten distinct data categories, i.e., demographic specifics, a user might designate a non-exact match 934 and then only require a level of stringency 936 of between 20 and 80 percent matching. If the user demanded only two of ten elements of the user profile correspond to the retrieved data, the user might designate a non-exact match of 0.2 or 20 percent. Similarly, if the user wanted 80 percent accuracy, the user designates 0.8. REESE, 8:4-24: Instead of a match/non-exact match system, the invention contemplates that the retrieved data be associatively matched to the user profile. For instance, the user profile can specify as a profile increment “fruit”. The matching server would retrieve matching data that includes the various kinds of fruits, i.e., apples, oranges, etc. In such case, the matching server must be intelligent to know that an apple or an orange is a “fruit”. It is known in the art to employ various methods to accomplish artificial intelligence with computer systems, wherein artificial intelligence may be described as a system in which a computer 287 Reference U.S. Patent No. 5,710,884 (“DEDRICK PATENT”) Disclosure is able to reach conclusions based on certain inputs after it has been trained or instructed in a certain set of rules or experiences. The most popular artificial intelligence systems are the so called “heuristic search” models as well as “associative memory” systems and “connectionist” models. An associative memory system, for example, solves a current problem by examining symptoms or characteristics of the problem and comparing those systems to previous solutions to the problem. The invention contemplates that an associative user profile may be implemented with known artificial intelligent systems. DEDRICK PATENT, 7:40-52: When sufficient data has been collected for a particular consumer variable, then content adapter 25 uses that data to customize received electronic content to the end user. The amount of data which is sufficient is dependent on the particular consumer variable. For example, once personal profile database 27 has collected ten consumption format selections from this end user and all ten have been for video format, content adapter 25 may determine that this is sufficient data to customize incoming electronic information. However, content adapter 25 may determine that sufficient data has not been collected to customize colors if this end user has selected ten different fields, six of which were purple and four of which were green. DEDRICK PATENT, 7:53-64: In one embodiment of the present invention, the end user is able to override any compiled user profile data. For example, even though the end user may select a field with the color purple most frequently, the end user is able to modify the user profile data to indicate that green is the preferred color. In one implementation, the statistic compilation process 26 uses this input by the end user for its data compilation. Alternatively, the statistic compilation process 26 may use the data collected by client activity monitor 24 for its data compilation, or the statistic compilation process 26 may utilize both the end user and the data collected by client activity monitor 24. DEDRICK PATENT, 8:32-15: In one embodiment of the present invention, statistic compilation process 26 compiles electronic content-specific information for return to the metering server 14. This information includes, for example, how much time the end user spent consuming the electronic content, and how much of the content was consumed. For example, a particular advertisement may include ten different screens which are 288 Reference Disclosure displayed to the end user. If the end user spends 15 seconds viewing the first screen and 15 seconds viewing the second screen and then tenninates the advertisement, the statistic compilation process 26 transfers information to the metering server 14 indicating that an individual with this end user’s user profile data spent 30 seconds viewing the electronic information and that the content was 20 percent consumed (that is, two screens out of ten were consumed). Additionally, information indicating the specific elements of the advertisement that were consumed (that is, the first two screens in this example) is also transferred to the advertiser. Note that, as discussed above, this aggregate information does not reveal the identity of the end user who consumed the advertisement. DEDRICK PATENT, 9:28-45: When requesting electronic advertisements, the data returned to the end user is dependent on the end user’s request. For example, the end user may define certain results which should occur based on how well the electronic information matches the search criteria. The appraisal agent 28 may electronic ed to return the title of the electronic advertisement if it is only a 5% match to the search criteria, an abstract if it is a 25% match to the search criteria, and the entire advertisement if it is a 95% match to the search criteria. Alternatively, the appraisal agent 28 may be programmed to return only titles, regardless of how well the advertisements match. In addition, the appraisal agent 28 may know, based on the user profile data stored in personal profile database 27, that the end user only wants to consume five electronic advertisements per day. The appraisal agent may then retum titles of 25 electronic advertisements to the end user, and allow the end user to select which advertisements he or she will consume. Wilms, A Natural WILMS, p. 3: Language Interface For The natural language interface catches obvious misspellings An Intelligent and employs fuzzy logic techniques to automatically translate Document Information user specifications like “very”, “especially,” or “not” into And Retrieval System weights. The interface also employs a transparent synonym (1988) (“WILMS”) lookup to improve category matching. WILMS, p. 12: However, an interface based on key word matching and fuzzy set techniques is proposed, which is able to handle relatively unconstrained natural language queries and thus eliminate the need for mastering a formal query syntax. WILMS, p. 17-18: The chronology base also contains synonyms (“after” = “beyond” = “past” = “since”), and establishes concrete 289 Reference U.S. Patent No. 7,072,849 (“FILEPP”) Disclosure values for fuzzy specifications (“recent” = after 1986) (see Figure 4). Many of these concrete values are dynamic, and depend onthe current year (recent means different things in 1987 than in 1989) and on the oldest document in the collection (if the oldest document was published in 1957 or in 1976 “earliest papers” takes on quite a different meaning). It may even mean different things to different users (i.e., while “recent” means “the last two years” for one researcher, it may mean “the last two months” for another. The value of “now” (as in “all papers from 84 till now”) also depends on the current year, of course. It may even be possible to retrieve “new” documents, if the system keeps track of updates to the document collection since the last interaction with the IIRS. When intensifiers are used in combination with fuzzy specifications (e.g., “very recent”), the interface uses a dynamic weighting scheme (e.g., 1986 (0.6) 1987 (0.8) 1988 (1.0)) (See Chapter Four). WILMS, p. 37-38: These search terms consist of “crisp” items (“marketing,” “practice”), imprecise terms (“recent”), and fuzzy quantifiers (“very”). The last two are considered fuzzy because they convey imprecise information, and do not have sharp distinctions between membership or non-membership. To handle these uncertainties, each concept is given a weight, which is determined by fuzzy logic [ZADEH 81]. These weights range between -1.0 and1.0, and are used by the retrieval component in addition to weights stored in the inverted files to identify relevant documents (see step 6 in Figure 8). See, e.g., FILEPP, 21:19-34: If the string entered by the user matches a keyword existing on one of the keyword tables, and is thus associated with a specific PTO, RS 400 fetches and displays associated objects of the partitioned applications and builds the entry page in accordance with the page composition dictated by the target PTO. If the string entered by the user does not match a specific keyword, RS 400 presents the user with the option of displaying the table of keywords approximating the specific keyword. The approximate keywords are presented as initialized, cursorable selector fields of the type provided in connection with a Index command. The user may then move the cursor to the nearest approximation of the mnemonic he originally selected, and trigger navigation to the PTO associated with that keyword, navigation being as described 290 Reference Another Search Engine? Hotwired Introduces Hotbot, Powered By Inktomi, PR Newswire, May 20, 1996 (“ANOTHER SEARCH ENGINE”) https://web.archive.org/ Disclosure hereafter in connection with the RS 400 native code. FILEPP, 34:25-39: Data collection manager 441 gathers information concerning a user’s individual system usage characteristics. The types of informational services accessed, transactions processed, time information between various events, and the like are collected by data collection manager 441, which compiles the information into message packets (not shown). The message packets are sent to network 10 via object/communication manager interface 443 and link communications manager 444. Message packets are then stored by high function host 110 and sent to an offline processing facility for processing. The characteristics of users are ultimately used as a means to select or target various display objects, such as advertising objects, to be sent to particular users based on consumer marketing strategies, or the like, and for system optimization. See, e.g., ANOTHER SEARCH ENGINE, p. 1: “’The rules of the search engine game have changed. Internet users thought they’d get what they needed from traditional search engines, but they found the result to be thin on content, rigid in context, and often totally irrelevant,’ said Andrew Anker, president and CEO of HotWired Ventures. ‘Our quest to find a better search engine led us to Inktomi. By combining the best technology, the most relevant searches, and an innovative interface, we created HotBot -- a bigger, better, smarter way to search the Web.’” ANOTHER SEARCH ENGINE, p. 2: “HotBot includes a number of unique features. Users can get the most current information quickly, efficiently view and use that information, and interact with the search engine in a personal manner. Daily Updates: The HotBot spider crawls the Web every day, offering users the most current information. Reliable and Fast: HotBot's fault-tolerant engine reliably delivers query results in seconds, without frequent downtime. Convenient Previews: HotBot allows users to preview documents without leaving the search page, reducing search time. Personal Searching: The HotBot interface allows users to personalize their search engine to fit their own surfing style.” ANOTHER SEARCH ENGINE, p. 2: “HotBot identifies, customizes, and ranks millions of Web documents using an algorithm developed by a team of the world's leading experts in information retrieval. HotBot recognizes that users desire varying levels of information detail, so it allows users to control the amount and type of information searched. The computing power available to HotBot enables the user to define a search query using a wide range of criteria in a way that is not possible with more traditional search engines.” The first commercial application of Inktomi's innovative technology is 291 Reference web/1996110 6235936/http:// www.inktomi.com/ Sadaaki Miyamoto, “On Fuzzy Information Retrieval,” Japanese Journal of Fuzzy Theory and Systems, Vol. 3, No. 1 (1991) (“MIYAMOTO”) Development of the Coder System: A Testbed for Artificial Intelligence Methods in Information Retrieval (“Fox”) Disclosure the HotBot™ search engine service, offered in conjunction with HotWired, Wired magazine's electronic sibling. By leveraging this scalable technology, HotBot was the first search engine to index and search the entire World Wide Web, and represents the only search engine technology in existence that can expand to match the Web's growth as it doubles and doubles again. SmartRelevance. Based on algorithms developed by informationretrieval experts at the University of California at Berkeley, HotBot's SmartRelevance technology exploits syntactic clues in documents and relationships between documents, to rapidly identify the most meaningful information. MIYAMOTO, e.g., p. 93, “The book by Salton and McGill (1983) is a basic introduction to the field which divides the study of databases and information retrieval into five areas: (1) information retrieval, (2) database management systems, (3) operational information systems, (4) decision-making assistance, and (5) query response systems. Information retrieval also includes the study of scientific documents. We will pay attention to the above classifications while discussing fuzzy information retrieval. . . The study of fuzzy information retrieval was begun in the early 1970s. It was not until the 1980s that realization of fuzzy information retrieval seemed promising. To accomplish this it was necessary to have faster hardware, software, and database storage, and propagation of workstations, databases, etc. The importance of fuzzy information retrieval is now understood by researchers, who are primarily concerned with ordinary documentary information retrieval. This was made possible by the clearly stated methodical framework of fuzzy theory (Zadeh, 1973).” See, e.g., FOX, p. 349: Fifth, it is possible to combine natural language processing (as in group 4) with special query evaluation methods. CALIN, IOTA, and PROBIB-2, all mentioned above, have a natural language query-handling capability and distinctive document representation schemes. In addition, Biswas et al. [1 19,120], in their work on knowledge-assisted document retrieval, consider both the natural language interface and the retrieval components. They developed a modular design, and plan to carry out a variety of experiments with the System. Their natural language interface can handle a restricted query sublanguage through its augmented transition network and can determine the number of documents desired, the time range of interest, and the subject matter or content [I19]. The retrieval component uses fuzzy set theory and one of several combination of evidence schemes [I20]. FOX, p. 351: 292 Reference Disclosure FOX, p. 352: Retrieval is prompted by an explicit (or default, from the user model base) query. User model building, problem state transformation, and building of the problem description all proceed. When some terms are available, the lexicon can be accessed by a term expander to obtain other related terms that can be browsed or automatically used to help construct a query. Eventually a p-norm or other query is constructed, a search is made, and a report is prepared for the user. FOX, p. 352: Since development of CODER involves research assistants, students working on MS projects, and students completing class proiects, it is difficult to characterize precisely the status of implementation. The initial lexicon, the knowledge administration complex, the blackboard/strategist complex, the communications enhancements to MUProlog, a time/date handler, a p-norm search expert, and two versions of the user interface manager do function and are all nearly complete. initial versions of the document-type expert and the user model builder are being further developed. The document analyzer and some of the specialists it uses are partially complete. FOX, p. 357: 5.2. p-norm search expert The p-norm query notation, which extends Boolean expressions to allow relative weights to be attached to terms 293 Reference Architecture for AgentMediated Personal News Service (“TURPEINEN”) Disclosure and clauses and which allows “p-values” on the AND and OR operators to indicate the strictness of interpretation of the operation, is discussed in a work by Salton et al. [I42]. While other schemes for “soft Boolean evaluation” have been proposed [I43], none has been shown to perform as effectively as the p-norm method [i44]. p-norm query processing has been incorporated in both the SMART and SIRE systems [I45]. Because of its expressive power, the p-norm query form has been adopted in CODER as one of the canonical query forms. As can be seen in Fig. 8, a p-norm search expert has been developed that supports calls through the blackboard to attend to the “pnorm_query” area. The result of normal processing is to generate hypotheses for documents best satisfying the query expression, estimating the degree of relevance they have to the query. TURPEINEN, p. 3: Agents can be considered as mediators [Wiederhold92] that refine and forward information from heteregenous data sources to the users. Multi-agent intercommunication methods enable message passing between agents in a network environment. The consumer agent transmits user requests for potential producer agents and filters messages according to user preferences. The producer agent acts as an information broker that has a domain model of its own expertise [Fikes95]. The producer agent can advertise the services to the consumer agents in the network. Agents negotiate how, when, and which information items should be transmitted. Agents are also able to consult other agents for suggestions and further information. Finally the agents assist in completing necessary data transfer tasks and financial transactions. TURPEINEN, p. 6: 1. User modeling. Consumer's preferences are maintained in a user model. The maintenance can be done explicitly by the user or automatically a by a learning mechanism in the consumer agent. 2. Content queries and promotion. Consumer agent sends a query to the producer agent to receive items that match the user interests. Also parts of the consumer's user model can be sent to be used in social information filtering performed by the content producer. Producer advertises its services to consumer agents. TURPEINEN, p. 9: The system uses a combination of content-based filtering and social filtering techniques [Malone87, Shardanand95]. The news selection service is based on a user profile that 294 Reference Disclosure consists of: • keyword-based query profile on user-specified topics; • semantical matches based on predefined categories; • trusted agents that send recommendations to each other. TURPEINEN, p. 10: The keyword-based selections are defined entirely by the user. These are normally used to cover short-term information needs. Each topic is identified by a topic header, producer agent and a collection of keyword/weight -pairs. The keyword weight is measured as a value in the range between 0 and 1. The weight can be adjusted by the user or by the learning module of the consumer agent. Also exclusive keywords can be entered to discard articles. TURPEINEN, p. 352: P. Bosc, “Fuzzy querying in conventional databases,” Fuzzy Logic Management of Uncertainty (1992) (“BOSC”) BOSC, e.g., at 646-47, “We now make prech;e the meaning of "flexibility" assumed in the following. A system is flexible in so far as it allows imprecise terms in user queries. Consequently, it becomes necessary to determine to what extent a certain element matches more or less the query more than another element, which leads to a classification or ranking of the selected elements. According to this dermition, we are essentially concerned with items 4 and 5 of the above list. However, since very often an implicit objective is to avoid empty answers, the approaches reported hereafter are also connected with cooperative answers. Several approaches allowing imprecision in user queries can be imagined and some of them have been proposed and implemented in research prototypes. One idea is to consider queries made of two parts: a Boolean qualification selecting elements 295 Reference Disclosure and an imprecise condition intended for the ranking of these elements. Another approach is to allow imprecise queries. Then, two main cases appear depending on the interpretation of imprecise conditions. As a matter of fact, we can imagine translating an imprecise condition into a Boolean one expressing intervals of acceptance and such that some kind of "distance" is computed for each selected element. An alternate view is to use fuzzy sets as a basis for the evalution of imprecise conditions. Here again, some kind of distance is computed for each element, but this framework is more general than the previous one. In fact, we shall see that the central point of a system depends on whether or not it is based on the Boolean logic.” Mark Lager, “Spinning a Web Search,” (1996) (“LAGER”) LAGER, e.g., “The presentation is targeted toward WEB searchers, in particular, reference librarians and those who navigate the Internet on a frequent basis. This presentation will look at search engines, comparing search techniques and noting differences. The workshop will identify use of new computing strategies for information retrieval within each engine.” LAGER, e.g., “As Brian Pinkerton states, "The World Wide Web is decentralized, dynamic and diverse; nativagion is difficult and finding information can be a challenge." (Pinkerton, 1994). The useful and the innocuous are lumped together in this huge collection. Academic information (e.g., journal articles and course materials) is combined with social culture information and with personal home pages. There is no separation. Mark Nelson calls this information anxiety - the overwhelming feeling one gets from having too much information or being unable to find or interpret data. (Nelson, 1994). To be of any information value, the data must first be organized and retrievable, providing some structure. Search tools have begun to put some organization to these uncharted waters. Current trends in information retrieval offer better opportunities to make more efficient use of this information resource.” LAGER, e.g., “The search engine provides more control for the user in performing a search. Engines use the index to fetch terms of the query. This means that the more data in the index, the higher the recall. Indexing every word or the most used words can lead to higher recall depending on the search query. The larger the index, the more possibility of hitting upon the words of the query. And, with the size of the Web, the more often the index is updated, the greater the number of hits. Search engines on the Web incorporate a number of 296 Reference Disclosure techniques to assist in both recall and precision. There are search engines that employ traditional methods like thesauri or Boolean searching. Rather than being only a keyword search, the engine will make logical connections to a thesaurus to enhance recall. Using Boolean logic (and, or, not, adjacency operators) search engines can assist in making the query more precise. Different engines have different defaults. Natural Language Processing: Relevancy feedback/weighing probabilistic logic: query by example fuzzy logic: query expansion Bayesian networks: case-based reasoning parallel computing (Inktomi): concept based searching” LAGER, e.g., “Will it rain today? What is the possibility of my car needing an oil change? Or, what is the chance of getting an A on my history test?. There are many questions like these that cannot be answered with an affirmative or negative answer. Uncertainty reigns. In an effort to make a decision which accounted for such doubt, in the midst of chaos, a branch of logic was defined to study probability. Since the 16th and 17th centuries, probability theory has been used to explain chance. Such questions rely on a factual information as history coupled with probability. In information retrieval, the same applies. By setting up a formula, an algorithm, that places values on words, their interrelationships, proximity, and their frequency, the computer can be used to help locate relevant sites. By computing these terms together, the search engine can produce a relevancy ranking that is then displayed to the user. (De Bra, 1995) Probabilistic logic is founded on the presumption that certain factors can be established logically and mathematically to focus a search. It is similar to fuzzy logic where the central notion is that truth values (in fuzzy logic) or membership values (in fuzzy sets) are indicated by a value on the range [0.0, 1.0], with 0.0 representing absolute Falseness and 1.0 representing absolute Truth. (Brule, 1985)” LAGER, e.g., “A survey of the Search Engines available from Netscape's Net Search will help in explaining some of the techniques discussed. By conducting a search for current trends in information retrieval, differences can be seen in the structure and techniques of each engine. Alta Vista {http://www.altavista.com/} Techniques and features Boolean - must use and, or, not, near (10 words) in Advanced Search Allows user-influenced results ranking Ranking: title words or first few words 297 Reference Disclosure Closer to each other Document has more of the words More copies of the words throughout Parentheses for nesting Can restrict to field (qualifiers) Excite http://www.excite.com/ Techniques and features Concept based searching-use statistical strength of interrelationships between words Creates its own knowledge base (or internal thesaurus) QBE - "similar documents" Boolean searches Keyword searches Relevance - marked with red X Robot is called Architext Infoseek {http://infoseek.go.com/} Techniques and features Weight terms (required, desirable, undesirable) Similar pages - QBE Boolean operators Natural language Search mechanisms Lycos {http://www.lycos.com/} Techniques and features Probabilistic retrieval Indexes top 100 words and 20 lines of abstracts Keyword searching Boolean searching Automatic truncation Spinning a Web Search : Trends in Information Retrieval Page 7 of 10 http://misc.library.ucsb.edu/untangle/lager.html 4/22/2014 Adjacency 0.0 - 1.0 Results categorized Terms in bold Relevancy: early on vs. farther down Magellan {http://magellan.excite.com/} Techniques and features Reviewed by writers Boolean searching Green light for information for all age groups Web, ftp, gopher, newsgroups, telnet sites 298 Reference Disclosure Browse directory or Use search engine Relevancy = frequency of words Browse button Robot named Verity Lists up to 20 pages at the bottom of the screen Open Text {http://www.opentext.com/omw/f-omw.html} Techniques and features Boolean searching Field operators: anywhere, summary, title, first heading, URL Query-by-example.” LAGER, e.g., “Information search and retrieval is of major importance in locating relevant materials. The ability to aid and assist a user in finding relevant information is the goal of librarians and information scientists. On the Web, search engines have made the pr ocess easier by incorporating a number of newer techniques which include artificial intelligence, Bayesian statistics and probability theory, weighting, and query by example. With the goal of finding relevant materials, these new techniques locate infor mation and also refine the search query. Since search engines have different criteria in creating the indexes, it is most useful to use more than one engine in searching the Web to gain relevant information. As a rule, the more critical or focused the q uery, the more engines should be applied. With advances in the tools for information retrieval, the future holds exciting possibilities for searching on the World Wide Web.” Henrik Larsen and LARSEN II, e.g., Abstract, “The problem solving strategy applied in Ronald Yager, “The knowledge based systems may ofted be characterized as classification. Use of Fuzzy Relational Central to classification is computation of the degree to which an Thesauri for object is an instance of a given class (concept, category). Two kinds of Classificatory Problem problems are distinguished, object-querying and classquerying, as Solving in Information exemplified by, respectively, information retrieval systems and expert Retrieval and Expert systems. In the first kind, the problem is to identify the objects (e.g., Systems,” IEEE documents) to which a given concept (the query) applies. In the Transactions on second kind, the problem is to identify the concepts (categories) that Systems, Man, and apply to a given object (the observation). A fuzzy-set-based scheme Cybernetics, Vol. 23, for construction of efficient problem solving systems of the two kinds No. 1 (Jan./Feb. 1993) is developed. The problem of vocabulary mismatch is considered in (“LARSEN II”) information retrieval, and introduce the scheme as a solution to this problem. The knowledge base applies a term-centered representation form called a “fuzzy relational thesaurus.” To avoid recomputation of deductive information in problem solving tasks, we derive initially the deductive closure of the knowledge base. This closure is computed in O(n3) time as the transitive max-star closure of the fuzzy implication relation represented by the knowledge base; n is the number of terms 299 Reference Disclosure in the knowledge base. An upper bound for the closure is computed in only O( m log m ) time by an algorithm that pai-titioning the terms into similarity classes; m is the number of pairs of terms for which a relationship is represented in the knowledge base.” Peretz Shoval, “ERSE : An Expert Retrieval System for Electronics Databases,” in Expert Systems for Information Management, Vol. 3, No. 2 (1990) (“SHOVAL”) SHOVAL, e.g., Abstract, “This paper describes an expert system for information retrieval in electronic databases: ERSE. The objective of the system is to support engineering professionals in formulating proper queries and submitting them to a retrieval database. The system consists of: (a)a knowledge-base, which is a thesaurus of terms and semantic relationships, implemented as a semantic network; (b) a search and evaluation mechanism: the inference-engine, which conducts a guided search aimed at finding appropriate query terms. While doing so it invokes relevant knowledge, evaluates it, and suggests final findings to the user; (c) a database of patents in the domain of error-correction codes, implemented with a relational database management system (DBMS); (d) a retrieval mechanism, which measures the similarity between the system generated weighted query, and the index terms of patents, and returns a rank-ordered set of patents. The user is then able to provide feed-back and improve his query accordingly; (e) user interfaces, including system capability to explain its findings/decisions. The system is implemented in Pro log, C and INGRES, under Unix . The system design is described, and examples of its operation and evaluation of its performance are given.” SHOVAL, e.g., at 88-90, “ERSE takes this fourth approach for integrating expert and IR systems. However, ERSE is actually a complete system for information retrieval, including the other components: an interface, a database, and a retrieval mechanism. Other major features of the system are: (a) It accepts a user query composed of a list of weighted terms, and it generates an appropriate weighted query which is submitted to a retrieval database. Consequently it returns a set of rank ordered documents, using a fuzzy approach. (b) The thesaurus is built as a semantic network which is particularly suitable for representing declarative, conceptual knowledge. (c) Both the database of documents, and the knowledge-base of the expert system, are stored in a relational database. This allows the handling of large databases and knowledge-bases. (d) A convenient user interface is provided, enabling the system to explain and justify its decisions, and enabling the user to feedback and affect system behaviour. ERSE is based on and extends an earlier system that has been 300 Reference Disclosure developed by the first author for the domain of business administration11,12 and that has since been utilised in medicine. The principles and components of that system are described in Section 2. The domain used for our system is electronics, and specifically patents in error-correction codes technology. This domain is typical of many technological areas in which users often have specific and directed information needs. Section 3 discusses the specific information retrieval needs in electronics, which led us to develop ERSE. Section 4 details the architecture, components and processes utilised in ERSE, emphasising the specific contributions it makes, compared to its predecessor. Section 5 presents an annotated example of the system operation. Then Section 6 presents an evaluation of the performance of the system, based on a set of case-study queries. Section 7 highlights some implementation issues, and Section 8 points to future developments. Sameer Singh, “Fuzzy Pattern Recognition for Knowledge-Based Systems,” Proc. 6th International Conference on Data and Knowledge Systems for Manufacturing and Engineering (DKSME'96), Tempe, Arizona, USA, pp. 110, (24-25 October, 1996) (“SINGH”) SINGH, e.g., Abstract, “Knowledge-based systems have been severely restricted in areas where the speed of processing is a key factor. This is especially evident in large systems where the speed of knowledgebase searches is important. This paper proposes a fuzzy pattern recognition technique which identifies data patterns using possibility distributions and documents a fuzzy algorithm which is implemented. The technique is based on the theory of possibility. The results obtained using sensor data in manufacturing are encouraging: the fuzzy technique outperforms non-fuzzy techniques convincingly. The results for comparison with non-fuzzy techniques include shell-sort and quick-sort with binary search. The fuzzy technique identifies the correct pattern in the sensor database with nearly 99% accuracy. These results highlight the role of new fuzzy technologies for making knowledge-based systems more attractive in areas where they are currently limited by speed considerations.” Lotfi Zadeh, “The Role of Fuzzy Logic and Soft Computing in the Conception and Design of Intelligent Systems” (“ZADEH”) ZADEH, e.g., Abstract, “As one of the principal constituents of soft computing, fuzzy logic is playing a key role in the conception and design of what might be called high MIQ (Machine Intelligence Quotient) systems. There are two concepts within FL which play a central role in its applications. The first is that of a linguistic variable, that is, a variable whose values are words or sentences in a natural or synthetic language. The other is that of a fuzzy if-then rule in which the antecedent and consequent are propositions containing linguistic variables. The essential function served by linguistic variables is that of granulation of variables and their dependencies. In effect, the use of linguistic variables and fuzzy if-then rules results – through granulation - in soft data compression which exploits the tolerance for imprecision and uncertainty. In this respect, fuzzy logic mimics the 301 Reference Disclosure crucial ability of the human mind to summarize data and focus on decision-relevant information. Donald Kraft, “Research into Fuzzy Extensions Retrieval” (“KRAFT”) KRAFT, e.g., Abstract, “Modern computerized information retrieval systems consist of mechanisms to acquire, describe (e.g., index), and store "documents", and to receive, analyze, and respond to queries for information for users. A key element is the index language, by which the users (or user intermediaries) and indexers can communicate. Modern technology allows natural language processing mechanisms to begin to be incorporated in the sense of matching terms found in the free text specification of the query and the free text within the document. Various models of retrieval have evolved over time. The vector space model treats both documents and queries as points in the Cartesian space formed as the product of all possible index terms. Then, documents deemed "near" the query, i.e., "similar" to the query, are retrieved. Work has been done on clustering "similar" documents to facilitate the retrieval processing. A second model incorporates probability into the retrieval system by attempting to evaluate the likelihood that each document is relevant to a given query.” KRAFT, e.g., Abstract, “One key element in both these approaches is that the index terms assigned to the documents can be weighted. These weights may be derived from relative frequencies of term occurences or from subjective estimates of likelihood of relevance. Another weighting scheme can be considered that allows the incorporation of Boolean logic into the query mechanism; that of fuzzy set theory. This theory lets the concept of imprecision be entered into the model, and is well-known, albeit controversial.” KRAFT, e.g., Abstract, “One can extend the fuzzy Boolean model by generalizing to weights being assigned to the query terms as well. This can cause problems with the fuzzy Boolean l a t t i c e , however. One must consider such c r i t e r i a as s e p a r a b i l i t y , generalization, and self-consistency when designing query processing mechanisms. A mechanism for considering these query weights as thresholds solves some of these problems, but the semantics of the weights, especially as the low end, is not clear.” KRAFT, e.g., Abstract, “Extensions of the vector space and probability models have been considered by other researchers to try to incorporate Boolean logic. In addition, this has allowed consideration of adding relevance feedback to the fuzzy Boolean model. Another issue is to generate means of evaluating a fuzzy Boolean retrieval system. One 302 Reference Disclosure can obviously try to generalize recall and precision. However, the real problem is to properly incorporate rank ordering, which the weighting and fuzzy query processing mechanism provide.” G. Bordogna et al., “Fuzzy Inclusion in Database and Information Retrieval Query Interpretation” (1996) (“BORDOGNA”) BORDOGNA, e.g., Abstract, “Abstract. In this paper, a short review of the role of the inclusion operator in the interpretation of queries addressed to databases and Information Retrieval Systems (IRSs) is analyzed. Some properties and semantic aspects of various definitions of fuzzy, inclusion are discussed and applied to interpret queries in Data Base Management Systems and IRSs” BORDOGNA, e.g., at 548, “This basic model of IR has been extended to tile main aim of providing a flexible matching mechanism able to evaluate the degree of relevance or satisfaction of each retrieved document with respect to the query. These models are based on two main ideas the association of a weight with both each term in the representation of documents (index term weights) and each term in the query (query term weight). Index term weights express the significance of terms in representing the document contents, while query term weights indicate the importance that terms should have in the desired documents.” BORDOGNA, e.g., at 551, “In this paper the role played by the inclusion operation in both the division of fuzzy relations in DBMSs mid in weighted query evaluations in extended Boolean Information Retrieval is investigated. Some fuzzy approaches presented in the literature are reformulated in the unified framework of fuzzy inclusion. Future developments of this work will cone, era two points: i) the weakening of the universal quantifier implied in the division of fuzzy relations and ii) the consideration of more general queries (not only conjunctive) in IRSs.” “Automatic Thesaurus Construction Supporting Fuzzy Retrieval of Reusable Components,” (1995) (“DAMIANI”) DAMIANI, e.g., Abstract, “Effective access to repositories of reusable: components should rely on retrieval functionalities based also on imprecise queries. This paper presents a fuzzy retrieval model based on keywords describing the functionalities of reusable components. Fuzzy weights are assigned to these keywords automatically. Retrieval is supported by a Thesaurus where a fuzzy synonymia relationship is used to c:ompute adaptability of reusable components to the needs expressed by the user fuzzy query. The adaptability index is ameliorated along time via a quality function reporting feedback on the system usage.” 303 Reference Disclosure DAMIANI, e.g., at 542-43, “Software reuse needs effective retrieval techniques to make development with reusable components more convenient than development from scratch [Kru92]. To th,is aim, components should be appropriately described and user ‘queries should allow for a degree of uncertainty in order to isolate a set of components that can be adapted to the new application [Pri93]. Many of the existing software libraries or repositories exhibit both the classification problem (description of components), and the retrieval problem [Ban93. Bat92. Dev91]. This paper proposes a technique for Thesaurus-based software retrieval from a repository. The technique D based on software descriptors containing keywords weighted with fuzzy values to describe the behavioral proprties of reusable components. Central to this approach is Thesaurus automatic construction starting from the software descriptors. The approach supports imprecise queries through the use of fuzzy logic [Kli88, Kos92]. The descriptors are assumed to be constructed from. the code and from its accompanying documentation. The object oriented SIB (Software Information Base) repository is considered, whose descriptors are classes [Con93]. SIB classes have a usual class attribute part, and an additional keyword-list based part at the basis of the retrieval model. The model is given in terms of weighted pairs of related keywords (features) interpreted as open class keywords [Maa describing the component functionalities. The fuzzy weight associated to each feature expresses the degree of imprecision that characterizes the description. For the fuzzy weights in the SIB, the paper proposes an assignment algorithm employing a Feature Weighting Function (FWF) adapted from a classical term weighting function used for document retrieval [Sal88]. The retrieval model enables to pose imprecise queries, asking for a set of characteristics expected from the component. Imprecise queries are lists of features, describing the characteristics of the needed component and fuzzy weight in the query specifying how relevant each feature is for the developer. Returned candidates are ranked according to their degree of aduptabilify to the required limctionalities. Retrieval is assisted by a Thesaurus containing unique terms and synonyms. Terms are single keywords taken from descriptors in the SIB. or added by the Application Engineers in charge of SIB maintenance. Terms are organized in the SIB and in the Thesaurus by conrexrs (or facets [Pri87] or categories [Gib90]) acting as search environments. A term in a context gets a fuzzy value of relevance representing how significant the term is in that context. The automatic construction of the Thesaurus consists in extracting terms from the SIB descriptors and in computing the fuzzy relevance of each term in the contexts using a Context Relevance Function (CRF). 304 Reference Disclosure Terms are linked to one another via a fuzzy synonymia relationship which is interpreted as the adaptability index of the software components described by the synonyms. The adaptability is computed dynamically taking into account the fuzzy weight of synonymia between terms in the ThesaurusBoth the SIB weights and the Thesaurus weights are mantained automatically and ameliorated along the system life cycle employing a Quality Function (QF) which observes the user reactions to query answers from the system, and in batch mode, slowly variates the fuzzy weights. A QF is proposed in the paper which. exploiting the theory of fuzzy sets, implements an adaptative retrieval system (Kli88. Mun94], tunable with use along time. The paper is organized as follows: a general view of SIB descriptor is provided with the technique of fuzzy weighting of descriptors. The concept of adaptability between components is defined and applied to retrieval. Automatic Thesaurus construction and syonymia computation are presented.” DAMIANI, e.g., at 546, “This paper has presentes an approach to fuzzy retrieval of components from a repository based on fuzzy-weighted keyword pairs (features) describing the component functionalities. A method for automatic assignment of weigths to features has been described. The approach relies on a Thesaurus of terms used to describe the reusable components. The basic relation in the Thesaurus is synonymia which is also fuzzy; its connection to the retrieval model has been shown and a method for automatic construction of fuzzy synonyms in the Thesaurus has been illustrated. At the user interface level a prototype [Fau93] has been experimented using ranged values to simplify the user interaction. Evaluation of the software retrieval operations is undergoing using code and design documents. In particular. assuming that “nice” features are contained in the SIB descriptors and suitable contexts are initialized within the Thesaurus, we are evaluating the approach using a library of object-oriented code and a library of conceptual application schemas based on the E/R model.” Duncan Buell, “Performance Measurement in a Fuzzy Retrieval Environment,” 1981 (“BUELL”) BUELL, e.g., at 56, “Measuring the extent to which a computerized document retrieval system fulfills the goals set for the system is a complex problem that involves everything from initial goal specification to the actual underlying computer software. An average user will view the system as a "black box." The user makes requests; the system responds. Numerous factors will thus affect the evaluation of the system by such a user. These include such varied aspects as physical ease of use, the user's ability to understand how to formulate requests, the coverage of the desired topic by the collection (and the 305 Reference Disclosure coverage of new or old material at the user's appropriate level), and even the user's own knowledge of the topic in which he is interested. We emphasize that we are investigating only a narrow aspect of retrieval system evaluation. We consider not the "human engineering" required to provide the average user with the information he desires, but the establishment of quantitative standards by which to measure the ability of the mathematics and logic of the retrieval decision mechanism to select for retrieval in response to a request the same set of documents which would have been selected by a human expert unaided by the automated system. [9, 16, 18] Among these standards are recall and precision and associated measures and various measures of "value" returned in comparison to the search length. These measurements are well-defined for systems with Boolean indexing and standard Boolean query-to-document matching functions.” BUELL, e.g., at 58, “One problem which immediately arises in measuring performance is that, if the RSV's are no longer simply 0 and i, then a new interpretation must be made of "about" and of "retrieved." The first problem is resolved if a set-theoretic, indeed fuzzy settheoretic, interpretation can be placed on all numerical values involved. [7, 20] In a system in which RSVIs are not simply 0 and i, however, it is no longer the ease that one would simply retrieve a subset of the documents. The user might instead be given information on a ranked list of documents, for example, and asked to specify a threshold above which to actually retrieve. Or, following the ideas of Cooper [6], the user might be given the ranked list and allowed to retrieve one document at a time until he decided that he had seen enough . There are several possibilities; the problem remains the same--the set RT is definable not by the RSV, but by system convention or, worse yet (from the point of view of predictability for use in numerical measurement), by user whim. By a generalized retrieval system, then, we shall mean a system in which either 1. the indexing function is Boolean, the queries resemble Boolean queries, but the RSV's are not Boolean (this would include retrieval mechanisms such as the cosine coefficient); or 2. the indexing function is fuzzy, queries resemble Boolean queries, and RSV computations follow normal fuzzy subset rules (this would be a simply fuzzysubset system, as described by Sachs, Tahani, and others [i0, ii, 15, 17]); or 3. the indexing function is fuzzy, the queries have weights or thresholds attached to terms and/or subexpressions, and RSV computation is not necessarily simply a fuzzy-subset MF computation (this would include systems such as those suggested by Bookstein [i], 306 Reference Disclosure Buell and Kraft [4, 5], Radecki [12, 13, 14], and others).” BUELL, e.g., at 61, “We have seen that the usual performance evaluation measures of recall, precision, fallout, and generality have analogues in retrieval environments in which decisions about "retrieval" and "relevance" are no longer Boolean. Although problems do exist in interpreting the numerical values which will be obtained from these measures and in comparing those values to those obtained from Boolean retrieval systems, the problems can be overcome by taking into account the nature of the indexing function. Finally, we have raised the question as to whether rank-order comparison measures might not be more appropriate for evaluating those systems whose natural output consists of rank orderings of documents.” Bill Buckles, “An Information Retrieval Perspective on Fuzzy Database Systems,” Advances in Information Retrieval, ACM 82 Panel Session (“BUCKLES”) SALTON, e.g., Abstract, “In conventional information retrieval Boolean combinations of index terms are used to formulate the users' information request. Boolean queries are difficult to generate and the retrieved items are not presented to the user in any useful order. A new flexible retrieval system is described which makes it possible to relax the strict conditions of Boolean query logic thereby retrieving useful items that are rejected in a conventional retrieval situation. The query structure inherent in the Boolean system is preserved, while at the same time weighted terms may be incorporated into both queries and stored documents; the retrieved output can also be ranked in strict similarity order with the user queries. A conventional retrieval system can be modified to make use of the flexible metric system. Laboratory tests indicate that the extended system produces better retrieval output than conventional Boolean or vector processing system's.” BUCKLES, e.g., Abstract, “Database in which domain values are not crisp and precise exhibit properties normally associated with information retrieval systems. For instance, a boolean query induces a membership value for each tuple (i.e., record) that is analogous in function to a similarity measure. Thus, precision and recall measures are legitimate areas of interest that pertain to fuzzy databases but not ordinary databases. These ideas will be expounded in the context of a database for expert advice on national energy policies.” Donald Kraft, “Generalizations of Boolean Query Processing,” Advances in Information Retrieval, ACM 82 Panel Session (“KRAFT KRAFT II, e.g., Abstract, “Substantial work has been done recently applying fuzzy subset theory to the problems of document and query representation and processing in retrieval systems. The motivation has often been to generalize Boolean query processing to allow for non-Boolean index weights or measures of importance to be attached to the individual terms in the document or in the query representation. The problems of generalizing the Boolean lattice structure have been Gerard Salton, “Extended Boolean Information System,” Advances in Information Retrieval, ACM 82 Panel Session (“SALTON”) 307 Reference II”) Disclosure noted. Criteria have been generated for query processing mechanisms with relevance weights in the query, but these have been shown to be inconsistent. An alternative approach using thresholds in the query has been suggested, with the generation of appropriate document evaluation criteria for Boolean query processing. Problems remain unsolved. The exact form of the function to be used for the query processing mechanisms must still be specified and appropriate parameters must be obtained. Some researchers still prefer a vector space approach, others suggest alternatives to Boolean queries, others work on probabilistic approaches, and still others propose new lattice structures for weighted retrieval. These various models must he reconciled with each other and with an overall generalization that encompasses each and allows for analysis and comparison. Moreover, evaluation mechanisms must be sought for fuzzy systems, and it is necessary to generate a fuzzy concept to the notion of "retrieval" itself.” George Baklarz, “Using Neural Nets to Optimize Retrieval in a Fuzzy Relational Database” (“BAKLARZ”) BAKLARZ, e.g., Abstract, “This paper examines the theory behind Fuzzy Sets and Back-Propagation Neural Nets, and how neural nets can be used to replace fuzzy sets and improve the query performance in a Fuzzy Relational Database (FRDB).” BAKLARZ, e.g., at 191, “In most database systems, information is assumed to be exact, correct, well formulated , with no provisions for considering otherwise[l] . Because fuzzy set theory gives us a basis to manipulate real-world data in a formal way, this technology can be adapted to relational databases . By extending fuzzy set theory to relational databases, the user has the added benefit of: • Not having to state precisely the attributes of a query • The data can be represented in a fuzzy state • The relationships can be tailored to the individual user” BAKLARZ, e.g., at 192, “This paper examines how fuzzy-set theory can be used in a relational database to better model the information and facts available to the user. Although there have been various implementations of Fuzzy Relational Data - bases, the implementation described here optimizes information retrieval by using neural nets as a replacement for relations.” BAKLARZ, e.g., at 200, “Merging fuzzy-set theory with database technology is a powerful tool for manipulating imprecise information. By combining fuzzy set extensions to Structured Query Language (SQL) statements, a user can retrieve data based on imprecise information . Finally, introducing neural nets as a replacement for 308 Reference Disclosure membership functions, dramatically reduces the retrieval speed and further enhances the usefulness of a fuzzy relational database. The existing prototype has highlighted a number of areas that warrant further research : • Neural net selection The back-propagation neural net was chosen due to its storage capacity and for its ability to learn a variety of equations, but other neural net models may be more suitable. • Training Techniques The training time of the neural net needs to be improved. • Parallel Processing The back-propagation algorithm is well suited to parallel implementations, and implementing the algorithms on a parallel machine will highlight the performance benefits of using neural nets. Neural nets have proven to be a very useful replacement for relations in a Fuzzy Relational Database. Fuzzy set theory and neural nets complement one another, and this knowledge should lead to more applications where neural nets can replace fuzzy membership functions to improve performance.” P. Subtil et al., “A Fuzzy Information Retrieval and Management System and Its Applications,” (1996) (“SUBTIL”) SUBTIL, e.g., Abstract, “This paper presents a fuzzy information retrieval and management systems (FIRMS) we have developped for handling fuzzy objects. The originalities of this system consist of : i) the possibility to describe object with fuzzy aggregate attributes and to retrieve them at different description-levels of these attributes, ii) the definition of nuanced domain which gives the possible values of a fuzzy attribute, iii) the using of a fuzzy thesaurus and an associated grammar to go through its links in order to retrieve objects. In another hand, this paper explains how to build an application with this system and shows some real applications of FIRMS.” SUBTIL, e.g., at 537, “Vagueness and uncertainty are usual in the human knowledge and reasoning. Then it is necessary to handle these fuzzy data in databases when they are the only information known about the world to model. During the last years, several approaches (see [9] and [3] for example) have proposed extension of databases to take into account this imperfection of real world. Allmost of this approaches use the concept of fuzzy set [10] and possibility theory [11]. In this paper, we present our approach about a fuzzy information retrieval and management system called FIRMS. In the first section, we present the basic concepts of our system whence the original concepts of aggregate attribute and fuzzy thesaurus. In the second section, we present the modelling process of an application, an application being a set of fuzzy object. In the last section, we present real applications of FIRMS in economic fields.” 309 Reference Disclosure SUBTIL, e.g., at 537, “FIRMS allows to describe a set of objects defined by a collection of attributes. For instance, John is an object defined by the attributes Name, age, . . . . An attribute can take a fuzzy value called a nuanced value. In the first subsection, we give th three kinds of attributes used by FIRMS. In the second, we explain the concept of nuanced domaingrouping the possible values of an attribute. In the third subsection, we introduce the notion of fuzzy thesaurus as a particular nuanced domain. In the last subsection, we show the description of a fuzzy object.” SUBTIL, e.g., at 540, “Comnent of an european research system, the panel of Lorraine PME-PMI (Lorraine is a kind of state in France and PME-PMI designates firms under 500 employees) is a very important piece of a program developed by Institut Commercial de Nancy (commercial institute of Nancy) and the Conseil Rdgional de Lorraine. This panel must allow to know the management method of firms more precisely. It groups data on more 400 firms from 1989 to 1993. Each firms is defined by 700 variables about the following subjects : product, rivalry, export, human resources, strong and weak points, innovation, national assistance, ...Among these themes, we have selected those which present some interest for the representation of vague and/or uncertain information : strong and weak points, export, human resources and performance. We use the system FIRMS essentialy for two reasons. Firstly, the system allows a reality representation more reliable with the inherent vagueness and uncertainty. Secondly, the system allows rapidly and simply verification of hypothesis by the use of profiles.” SUBTIL, e.g., at 540-41, “The Institut Commercial de Nancy has developed an expert system in 1989 to formulate dignosis about the statement and the development of a firm. This analysis uses dynamic contextual factors which continually have an influence on firms framework. But the expert, using a set of simple rules, was not efficient because it cannot handle vagueness. For instance, it cannot take into account the following rules determined by an human expert to qualify an emergent firm. If roduction cost = high) and (customs experience = low) and (existence of infrastructure = low) and (strategic uncertainty = high) then emergent firm FIRMS has been used to solve the problem of vagueness and uncertainty. A firm is described by a list of attributes : production cost, customs experience, existence of infrastructure, strategic 310 Reference Disclosure uncertainty, technological resources, technological uncertainty, . . . . All attributes has the same nuanced domain.” SUBTIL, e.g., at 541, “FIRMS is a flexible system allowing the handling of vagueness and uncertainty. Among the basic concepts, two are very important. The first is the concept of aggregate attribute. It allows an user to describe two objects with different precision levels. The second is the concept of fuzzy thesaurus. It determinates a set of weighted linked terms and uses a grammar to go through it contrary to other approaches [4][5]. An iterative and incremental process allows to describe the basic elements of an application. The experiences with real data in economic fields has shown the flexibility of FIRMS.” C.T. Yu, “An Approach to Probabalistic Retrieval,” (1981) (“YU”) YU, e.g., Abstract, “The objective is to relate the effectiveness of retrieval, the fuzzy set concept and the processing of Boolean query. The use of a probabilistic retrieval scheme is motivated. It is found that there is a correspondence between probabilistic retrieval schmes and fuzzy sets. A fuzzy set corresponding to a potentially optimal probabilistic retrieval scheme is obtained. Then the retrieval scheme for the fuzzy set is constructed.” YU, e.g., at 46, “The effect of term weights on the performance of queries was analyzed in [24] , where it was shown that queries whose terms having higher "precision values" are assigned heavier weights yield better retrieval results than queries whose terms are assigned the same weights, under the assumption that terms are distributed independently. Thus, the precision value of a term characterizes the usefulness of the term in retrieval. This result was supported in [13], whre it was shown that if terms of a query are assigned weights proportional to the logarithm of their precision values, then optimal retrieval results are obtained under the same term independence assumption. When terms are distributed dependently, the incorporation of the term dependence into the retrieval process yields better retrieval results [9,20,23]. Even more general condition exists for the construction of the optimal queries [5,8,21]. The above results assume that certain parameter values (e.g. those needed to compute the term precision values) are known. When these values are not known, they may be estimated by relevance feedback [5,7,15,22] where the user identifies each retrieved document as either relevant or irrelevant, and input the information to the system. Where relevance feed back can not be employed (e.g. a user submits a query the f i r s t time), various attempts have been made [6,17,18,25] to yield reasonable retrieval results. All these techniques are used when the user's queries are expressed as sets of keywords.” 311 Reference Disclosure YU, e.g., at 46, “The use of a probabilistic retrieval scheme (PRS) is motivated. It is applied to the processing of Boolean queries. Our aim is to obtain a potentially optimal PRS. To achieve this, a correspondence between PRS and fuzzy sets is established. A process to obtain a fuzzy set corresponding to a potentially optimal PRS is presented. Then, a potentially optimal PRS is constructed from the fuzzy set. Finally, the performances of some natural retrieval schemes are compared using a partial ordering deduced from a given Boolean query. The main contributions of the work presented here are (1) a relationship between a retrieval scheme and its retrieval effectiveness is established analytically; (2) the use of fuzzy set, which has been employed by earlier researchers but not related to the effectiveness of retrieval, fits into the development of (1) naturally; and (3) a conceptually very simple process to obtain a potentially optimal PRS is provided. This procedure is independent of the given partial ordering. Thus, if a better partial ordering (than the one given here) is obtained by another interpretation of a Boolean query or by re-evance feedback, the procedure given here can still be applied.” Gary Mooney, “Intelligent information retrieval from the World Wide Web using fuzzy user modelling,” Library and Information Research News, Vol. 21, No. 67 (1996) (“MOONEY”) MOONEY, p. 25 – “This article investigates the effects of applying fuzzy logic and user modelling techniques to the process of information retrieval from the WWW, a major part of the Internet. This is a novel AI approach to the process of IR. To perform the investigation, a prototype system, the Fuzzy Query Modelling Assistant (FMQA), has been developed. The focus of the investigation was whether the results achieved by using the FMQA would improve upon those returned by using an existing search tool, specifically LycosTM (Mauldin, 1996), alone. To answer this question a user study of the FMQA is being performed and its early results are reported.” MOONEY, p. 25 – “A major problem with IR lies in the vagueness and lack of precision of the prospective searcher's information need. This vagueness and lack of precision leads to the aforementioned problems and these are exacerbated by the nature of the WWW. The problem of information overload is one example. A search with the tool LycosTM using the search string 'information retrieval' produced 61 ,000+ hits (Mauldin, 1996). However, information about the user's experiences and knowledge of the search subject and of the WWW in general can be used to modify the query intelligently and produce better IR results. 312 Reference Disclosure User modelling research has shown that adaptive user stereotypes are often used to represent different sorts of user and their characteristics (Rich, 1979). Fuzzy logic, with its inherent ability to capture and represent partial know ledge, is a valid AI technique to use in IR-a process involving the representation of information needs as queries, with all the attendant vagueness and semantic ambiguities (Zadeh, 1993). Here, the user stereotypes are represented as fuzzy sets to ensure flexibility and adaptivity. This concept is at the heart of the prototype system, the FMQA.” MOONEY, p. 25 – “The FMQA is not designed to act as a new 'intelligent' search engine. Within the field of distributed AI and computing in general there has been much research and development into the notion of searching and intelligence through the development of agents.(Wooldridge & Jennings, 1995). The FMQA seeks to alleviate IR problems through 'intelligently' assisting the user in a search. In this sense it is similar to the concept of interface agents defined in Maes(1994) but the FMQA applies fuzzy logic and user modelling to the query formulation of searches. The aim is to refine a query before it is submitted to an existing search engine. This refinement is based on knowledge about the user's beliefs and experiences (in the Internet and the subject domain of AI) captured through an on-line interactive session.” MOONEY, p. 25-26 – “The captured user knowledge is used to adapt default user models in order to represent an individual user. This representation is then combined with the user's query to produce the refined query. The knowledge is captured from two on-line interactive questionnaires. Each question is represented by a fuzzy set. The FKB combines the answers to these questions to produce two sets which represent the individual user model. The defuzzified values from these sets are used to refine the query. The user is then given the option to submit either the original or the refined query to LycosTM. Presently, the user must choose the original query from a list of topics representing different areas of AI but this is just a facet of the prototype. The system could easily be expanded to include other fields of interest and eventually to allow the user to enter the query words themselves. Additionally, the final fuzzy sets are lost when a user finishes accessing the FMQA and new sets are produced with every new session. However, the system could easily retain these sets and use the information they contain in future sessions.” MOONEY, p. 25-26 – “A user study has been performed in which a 313 Reference Disclosure number of DMU undergraduate students from the first year intake of two courses accessed the FMQA and provided feedback on its use and performance. . . .The study took place over a number of weeks with each user accessing the FMQA at a similar time each day. This ensured that each user's reaction to the system was not unduly influenced by differences in the Internet network traffic speeds. Each user was asked to submit the original topic they chose as a query and the refined query produced by the system. This is equivalent to using Lycos alone to search for the AI topic and then using the same FMQA-modified AI topic and allows the results to be used to answer the central question of the study. As part of each session, the user was presented with an e-mail form and asked to list the best and worst results for each query, and to rank these as well by giving them a score between 1 and 10. They were also asked to comment upon the results, in terms of usefulness and relevance, and upon the system, in terms of ease of use and design.” MOONEY, p. 25-26 – “Early results form the study indicate that the FMQA does indeed improve upon the IR results achieved by using LycosTM alone. . . . During a query looking for 'Fuzzy Logic', which afterwards the user remarked that the modifed results were more relevant, the best result for the modfied query was a website dedicated to fuzzy sets and systems (Brown, 1996). The dedicated website contains many WWW links to general sites of interest to fuzzy logic reserachers and would be a good starting point for a novice to the area, which was the category this user was placed in by the FMQA.” MOONEY, p. 25-26 – “This article has examined the application of fuzzy logic and user modelling to the process of IR from the WWW, the concept being to assist intelligently the user in searching for information and reduce the problems commonly associated with IR in general, eg irrelevance and redundancy. A prototype system, the FMQA, was developed, which realises the concept by employing knowledge about the user to modify queries before they are submitted to an existing WWW search tool. This knowledge is represented in fuzzy sets which act as adaptive user stereotypes. Early results from a live user study of the FMQA show that, in the opinion of the users, the results achieved from using the system do improve upon those obtained from using the search tool alone.” Henrik Larsen and Ronald Yager, “Query LARSEN, p. 1 - “The ascendancy of the Internet, and in particular the World Wide Web, is making the development of intelligent 314 Reference Fuzzification for Internet Information Retrieval,” (1996) (“LARSEN”) Disclosure information retrieval an extremely important issuer. An information retrieval system[1] is a system to retrieve relevant information objects from an information base. The information base stores a collection of objects some of which are of potential interest to the users. Each object is represented by an item which can be seen to be made up of two components. The first component is the index and the second component is the body. The index usually consists of highly organized pieces of information that can be used to help identify and select the objects that may be relevant to a user. The body consists of information which may not be organized but it contains the material that is of interest to the user. The fundamental problem in information retrieval is to find the subset of objects in the information base that is relevant to a given user. In a fuzzy information retrieval system, one can supply the list of relevant items with an ordering as to their potential interest to the user. Figure 1 shows a top-level view of the information retrieval system processes. In the first step the user enters a request in terms of features of interest employing the keywords in the indexing system used to describe the objects. The information in this query is then used by the information retrieval system to select items that may be potentially relevant to the user. The final step is a process where the user looks at the items suggested by the system and decides the ultimate relevance of the items. This final step greatly reduces the burden of the information retrieval process, for it allows the user to look at the items selected and decide the ultimate relevance. This means that not all the knowledge about the decision has to be formalized in a manner that can be manipulated by the computer. The user must only supply the information that is used to search through the index. As an example, we will consider the problem of selecting a house for purchase and assume that the user has access to an information base consisting of a collection of houses for sale. Here the user would express desired properties about the kind of house desired (price, size, location, etc.) in the query. The system would then search the information base and produce a listing of houses which closely match the user's request. This information could include text, more detailed information about the house as well as perhaps a picture of the house. The user then looks at this information and then decides which houses he wants to visit. In making this decision, the user may use all kinds of subjective criteria which may be hard to quantify and not necessarily specified in his query.” LARSEN, p. 2-3 – “In this paper we shall describe an information 315 Reference Disclosure retrieval system which uses fuzzy sets to help in the selection process, this kind of system can be viewed as an intelligent inquiry system. Figure 2, which is an expansion of the information retrieval system box of Figure 1, illustrates the steps involved in the information retrieval process. In the first step the crisp information provided by the user is softened with the aid of fuzzy sets. Using the index and a modified version of the requirements (“crisp envelope”, step 2), we search through the information base (step 3), to find a subset of objects in the information base that can be considered as potentially relevant to the user. Step 3 can be based on an ordinary crisp querying language. The set of objects found in this step is called the “crisp envelope” answer. The final step in the process is a ranking of the elements in this crisp envelope which is then presented to the user.” LARSEN, p. 4 – “An important characteristic of many of the criteria supplied in a user query is that the needs they intend to represent are not crisp. If persons looking for a house indicate their desire to spend between $100,000 and $140,000 for the house, it is not the case that they will be totally uninterested in a house costing $145,000. They may be less satisfied but not completely unsatisfied. The central observation here is that the boundary between a criteria being completely satisfied and not being satisfied is fuzzy rather than crisp. In building intelligent information retrieval systems we must take advantage of this fuzziness in the criteria. As we shall subsequently see, we use this fuzziness in two ways. First, we use it to soften the user query to allow potential interesting items to be retrieved, even if they do not directly satisfy the original user query. In particular, we shall use it in providing a query envelope, that is, a crisp query applied to retrieve the potentially most interesting items from the information base. The second way we shall use this fuzzy characteristic is to provide an ordering (ranking) of the items according to the degree to which they satisfy the softened user query.” LARSEN, p. 5 – “While many of the criteria in a user query can be softened (fuzzified) with the aid of fuzzy subsets some criteria are not amenable to this kind of softening. For example, the desire to have a fireplace or two bathrooms is not easily fuzzified.” LARSEN, p. 17 - In the preceding, we discussed the issue of criteria aggregation. We shall now specialize this to the ranking of objects for an information retrieval system. We discussed two classes of 316 Reference Disclosure aggregation, MOM and MAM operators. We recall that the MOM operator is a generalized or-like aggregation while the MAM operator is a generalized and-like operator. In information retrieval systems we see the criteria specified by the user as being connected by an and-like operator, assuming the user generally wants all the criteria satisfied. That is, a person desires to obtain further information about houses in a certain price range and in a particular location and having certain amenities. Thus, the appropriate family of operators are the MAM operators.” LARSEN, p. 20 – “We presented an approach to a weighted multicriteria information retrieval system that uses fuzzy subsets as mechanism to allow for the flexible evaluation of user requirements. Although we focused on numerical criteria, the approach is also applicable for non-numerical criteria (concepts, terms)—in the first case, the semantic similarity utilized relies on the numerical scale, in the second case, it relies on a similarity relation. We discussed the potential use of MAM and MOM operators as a tool for the aggregation of user requirements. Finally, we illustrated the application of the mechanism and tools in an application for a real estate agency. Our an approach is in particular interesting for retrieval through the Internet WWW. In this situation, the semantic elasticity supported by our approach allows the user to retrieve the most interesting objects, even when the description applied in the information base does not directly match the query formulation chosen by the user.” LARSEN, Figures 1, 2, 3 Tadeusz Radecki, “Fuzzy Set Theoretical Approach to Document Retrieval” Information Processing & Management, Vol. 15, pp. 247-259 (1979) (“RADECKI”) RADECKI at Abstract - “The aim of a document retrieval system is to issue documents which contain the information needed by a given user of an information system. The process of retrieving documents in response to a given query is carried out by means of the search patterns of these documents and the query. It is thus clear that the quality of this process, i.e. the pertinence of the information system response to the information need of a given user depends on the degree of accuracy in which document and query contents are represented by their search patterns. It seems obvious that the weighting of descriptors entering document search patterns improves the quality of the document retrieval process. A mathematical apparatus which takes into consideration, in a natural manner, the fact that the grades of importance of the descriptors in document search patterns are of the continuum type, that is an apparatus adequate to the description of a retrieval system of 317 Reference Disclosure documents indexed by weighted descriptors is-among known mathematical methods-the theory of fuzzy sets, formulated by L. A. Zadeh. It is the aim of this paper to present a new method of document retrieval based on the fundamental operations of the fuzzy set theory. We start by introducing basic notions, then the syntax and semantics of the proposed language for document retrieval will be given and an algorithm allocating documents to particular queries will be described and its properties discussed. The basic advantage of the use of the fuzzy set theory for document retrieval system description is that it takes into consideration, in a simple way, the differentiation of the importance of descriptors in document search patterns and the differentiation of the formal relevance grades of particular documents of an information system to a given query. Documents of the highest grades (in the given information system) of formal relevance to the given query may be retrieved by means of the application of simple operations of the fuzzy set theory.” RADECKI, p. 2 - “Of the known mathematical methods, the method best fulfilling the postulates formulated above, and therefore adequate for an analysis of document retrieval systems is the theory of fuzzy sets, whose bases L. A. Zadeh has given in [12-151. The idea of the theory of fuzzy sets is that the grades of membership of particular elements of the universe in a given fuzzy set are determined by the socalled membership function which is a generalization of the characteristic function. The transition from membership to nonmembership of the universe elements in the fuzzy set, in contrast to the ordinary set theory, is continuous. Many papers have already been written on investigations into the possibility of creating a uniform document retrieval system theory based on the theory of fuzzy sets. Besides the present author[16-201 many other specialists have also dealt with this question[21-271. In paper[21] C. V. Negoita used the theorem on the separation of fuzzy sets[l2] to divide a set of document search patterns into clusters where each cluster is made up of those document search patterns whose grades of membership in that particular cluster are not smaller than the established threshold value. The idea of using the theory of fuzzy sets, or, to be precise, the concept of the similarity relation to formulate an algorithm for the division of a set of document search patterns into clusters has also been used in[lS, 22, 25’1. In[22, 25]-making direct use of 318 Reference Chris Buckley, “Implementation of the SMART Information Retrieval System,” Department of Computer Science, Disclosure the definition of the max-min composition[l3] of fuzzy relations- a way is suggested of dividing the set of document search patterns into clusters where each cluster is made up of those document search patterns whose grades of similarity are not smaller than the established threshold value. One disadvantage of the way of organizing the document file, suggested in these papers, is that in the case of a large set of documents the process of dividing the set of document search patterns into clusters is very time-consuming and also expensive. This inconvenience can be significantly attenuated by using the method of organizing the document file proposed in paper [ 181 based on the notion of the maximum spanning tree. In paper [23] as in paper[24] C. V. Negoita defines the response of an information retrieval system as a fuzzy set and describes the relationships between various responses of the system in terms of the theory of fuzzy sets. Retrieval methods of documents indexed by weighted descriptors, which are a natural generalization of the set theory methods, have been described in papers[l6, 17, 19, 201 by the author. In paper[26] W. M. Sachs draws attention to the possibility of defining associative retrieval in terms of the fuzzy set theory, but does not provide any new solutions however. On the other hand, paper [27] by V. Tahani, based on an idea similar to that expressed by the author in paper[l6], contains a description of the organization of document file and a strategy for the retrieval of documents using basic notions and operations of the theory of fuzzy sets. The aim of the present paper is to describe a generalized method (in comparison to the strategies presented in papers [ 16, 271) of document retrieval. In the writing of this paper ideas contained in previous papers by the author[ 16, 17, 19,20,28] were utilized. Before entering a detailed description of the proposed method of document retrieval, we will present the basic notions used in the rest of the paper. We will then describe the proposed document retrieval language and present an algorithm for the allocation of documents to particular queries and describe the properties of the language and the algorithm. The proposed document retrieval strategy will also be illustrated by an example. Finally the results of the present paper will be summarized and modifications to the document retrieval method presented will be discussed.” BUCKLEY, p. 2, “The SMART information retrieval package is a set of programs composing a fully automatic document retrieval system. It allows easy creation, maintenance, and use of on-line document collections. As more information is being kept on-line every day; it becomes more essential to have methods of easy, natural access to the information. The SMART package is primarily a tool for investigating 319 Reference Cornell University (May 1985) (“BUCKLEY”) Disclosure some of these methods. In addition, it is quite usable itself for many applications.” BUCKLEY, p. 2-3, “This implementation of SMART contains few new or radical concepts. Instead, it attempts to provide a solid framework for future work in information retrieval. The two major goals of the current version are to 1. Provide a flexible experimental system for research in information retrieval. See [6] for a discussion of desirable system capabilities and design principles for experimental work. 2. Provide a fast, portable, interactive environment for actual users. These two goals naturally conflict with each other; the current SMART design is an attempt to satisfy each as much as possible. The system is concerned with three major types of users: the experimenters, the database administrators, and the naive users. The experimenters need the ability to easily change system parameters and to easily add or replace program modules. The database administrators must be able to create and maintain a collection of documents without worrying about the peculiarities of the particular. collection. It should be possible to initially specify the features of the collection and not worry about them again. The users need to be able to enter a query and view the results without knowing anything about the internal parameters of the system, being aware only of the collection features which are relevant to them such as the type of information contained in a document). An interactive help facility is necessary for the casual user. The current system is a first step in satisfying these goals. The major lack at the moment is a satisfactory user interface. There is a usable interface here at Cornell, but more work is needed.” BUCKLEY, p. 3, “The design of the SMART system concentrates on two types of flexibility. The first is complete flexibility at a number of levels in specifying the parameters for all operations. All parameters have reasonable default values. In addition they (possibly) can be given values within a collection dependent specification file. This means a database administrator can tailor the parameters to one particular database application. These values, in turn, can be overridden at command execution time by specifying a parameter and its value on the command line. At the program design level, flexibility is achieved by allowing very easy expansion of the most commonly used modules. For example, if an experimenter wishes to add a new procedure for computing the similarity between two vectors, two lines in one "data" file needs to be changed and the retrieval program needs to be re-linked.” BUCKLEY, p. 5-6, “Users come to the SMART system with an 320 Reference Disclosure information need and try to convey this need to the system. Their initial statement of their need can be a piece of natural language text, a query using Boolean connectives (AND, OR), a list of keywords, etc. The system assigns a query representative for the need, either a simple list of concepts and weights like the document representatives, or something a bit more involved which gives more structure to the representative. A retrieval function within the system then calculates the similarity of the query representative to each of the document representatives. (In practice, not every document needs to be examined - depending on the similarity function.) The documents are presented to the user in order of their similarity to the query. It is hoped that the similarity order will have some correspondence to likelihood that the user will judge the document useful.At this point, the user has the option to examine some of the top retrieved documents, and give a judgement of whether the documents were relevant to their information need. If the user desires more documents, a new query representative can be automatically constructed from the old representative and some of the concepts occurring in the relevant documents. This process is known as relevance feedback. The new feedback query can then be compared against the document collection and more documents can be retrieved for the user. This process continues until the user has as many documents as they desire.” BUCKLEY, p. 13, “There is only one program, retrieve, in the retrieval module, but it is a very flexible program! Retrieve runs an indexed query collection (possibly consisting of just one query) against an indexed document collection, calculating (theoretically) the similarity between each document and each query. The output is either a list of the documents which most closely match each query or a list of a given set of documents and the ranks which would be assigned them if the documents were sorted in decreasing order of similarity to the query. In an experimental research setting, this set of documents would be the known relevant documents for each query and The ranks of these relevant documents are used to evaluate the effectiveness of different retrieval methods. All of the options of retrieve are given in the retrieval specification file passed to it. These options include information like 1. Type of input query (vector, boolean tree, pnorm) 2. Retrieval method to be used (discussed below) 3. Type of output desired (just top documents, ranks of relevant documents, both) 4. The location of the input (document collection, query) and the output. 5. Etc. 321 Reference Disclosure The parameters whose values can be specified within the specification file are given reasonable default values. For most operational runs, as opposed to experimental runs, the specification file consists of a single line telling what collection is to be used. On the other hand, a complicated experimental run that, say, uses a different matching function for every type of information in the query, could run to 30 lines of parameters. The various retrieval methods form the heart of retrieve. To allow complete flexibility, there are three levels of retrieval methods: the collection access level, the vector access level, and the ctype access level.” BUCKLEY, e.g., p. 26, “Two methods are defined for accessing a dictionary entry: hashing on <token,ctype> or direct access through <con>. <con> is simply the dictionary entry index that <token,ctype> hashes into when the entry is originally placed in the dictionary. Thus, a quick direct access to the token and freq values exists given the values of <con>. This is used (possibly) during retrieval and feedback operations. There may be some similarity computations based upon the token for example, experiments using fuzzy matching of dates), and the freq information is used extensively by feedback. Accessing via <token,ctype> is essential during the indexing process.” BUCKLEY, e.g., pp. 35-36, “There is very little that is new about the current design of SMART. Instead, the standard information retrieval algorithms are implemented in an efficient and flexible manner. The core of the system is the set of low-level data access mechanisms that allow the rest of the system to look at stored information as sequences of tuples and to efficiently access individual tuples. The experimenter and database administrator are aided by a uniform approach to specifying parameter values. A rudimentary user interface exists that allows interactive help for many purposes. Concurrency issues in SMART are dealt with superficially, but in a manner that should be sufficient for most non-commercial uses of the system. The resulting system turns out to be quite usable for both casual and experimental purposes. A casual user can submit a query and receive back the relevant documents within a couple of seconds. The experimenter can change parameters and even algorithms with minimal effort. For example, one recent investigation into term weighting schemes involved implementing several different term weighting methods. It took 1 day (about 25 hours) to implement, run, and evaluate the methods (a total of 119 experimental runs were made). This type of investigation would previously have taken a couple of weeks. There are still a number of problems with SMART. The foremost of these is the user interface. There are clear improvements that can be made in the present interface; the need for other improvements will become 322 Reference Disclosure obvious as the system is used by more people. Another area for improvement already discussed is that of concurrency. Both the user interface and concurrency problems stem from the gradual change of SMART from an entirely experimental system to one that can be actually used. A number of the algorithms used in the implementation can be improved. In general, straight-forward algorithms were preferred. More complicated algorithms which are more efficient, especially space efficient, exist and should be implemented. The dictionary access procedures are a good example of this. The number of applications for SMART will undoubtedly increase in the next couple of years. At this time at Cornell, it is being used for 1. Searching a collection of CACM abstracts 2. Providing a help facility for UNIX. There was a lot of documentation for UNIX on-line that was inaccessible because nobody could find it. 3. Accessing a user information database (interests and hobbies as well as factual information). 4. Accessing reference databases (easy, non-factual searches of standard databases of references) 5. Searching electronic mail files (eg. the old mail to system support staff) 6. Searching archives of electronic bulletin boards (USENET news)” NAQVI WO NAQVI WO, p. 5-6 - “When the user requests a certain page or a certain topic of information, the relevant pages are retrieved from the computer network and shown to the user. The present invention, upon receiving the user's request, retrieves advertisements that are related to the user's action, dynamically mixes the advertisements with the content of the pages according to a particular layout, and displays the pages with focused, targeted advertisements as a part of the page. The advertisements can be made to satisfy a set of constraints requested by the advertiser, as well as the constraints of the publisher of the page, as further discussed below. The advertisement triggering mechanism of the present invention is not random or coincidental, but rather, is prespecified in advance. This specification will be referred to in this application as a contract. A contract specifies the marketing rules that link advertisements with specific queries. For example, a diet soft drink advertisement may be shown when a user asks for a page about exercising equipment. These rules are specified by advertisers implementing the concept of "focus" or "relevance" of advertisements and help the advertisers to target a specific audience. Owners of pages specify the focus content of their pages through special tags within a page. These tags are not displayed to the 323 Reference Disclosure information consumer; the tags are used to decide what advertisement can be shown when the page is requested by a consumer. The notion of a contract, however, goes well beyond just marketing rules. First of all, the advertising space on the online medium, although technically unlimited, is severely restricted by the user's attention span. Placing advertisements on the first page which constitutes the answer to a query gives the advertisements much higher probability to be seen than on later pages of the answer.” NAQVI WO, p. 15-16 – “Initially, a user requests a particular piece of information through one of the clients 17. The user's 10 request is given to the WWW Daemon 16, which passes the information to the gate 15. The gate 15 at this point decides what piece of information is being requested by the user and finds other relevant pieces of information that can be commingled with what the user has asked. The user, 15 for example, might ask the system to see certain car dealers, to find a phone number of a car dealer, or to get a page of a particular magazine. The gate 15 at this point gives the request to the matching rule engine 18 ("MRE"). The purpose of the MRE 18 20 is to look at the content of the user's query and to find a category within its active index SIC 19 that matches the same type. If the user has asked for car dealers, the MRE 18 invokes its rules to determine that car dealers are part of a class of things relating to transportation. Based on 25 the classification determined by the MRE 18, the system now knows that the user is asking about cars or about transportation or about whatever else that the user might be interested in. The MRE 18 at this point then returns to the gate 15 30 the category index of the user's query. If the user had asked about cars or about family sedans or about sports cars, at this point the MRE 18 would have figured out that the user's interest falls into a certain category. Based on the user's interest category, the system then retrieves the advertisements that are relevant to that category. Thus, the purpose of the MRE 18 is to figure out what the 5 user requested, to place the user's request in a category of a classification system (i.e., the active index SIC 19) and, based on that classification, to retrieve relevant advertisements.” NAQVI WO, p. 20 – “During the computation of the advertisements and all the other computations that the system of the present 5 invention performs, a logging module 22 of the system 324 Reference Disclosure performs extensive logging of what the user has asked, what advertisements were shown, how long the advertisements were shown, and which advertisements were shown to which user. The logging module 22 then stores these logs in a SYS logs 10 database 23. Various scanned reports can be produced and defined using the information in the SYS logs database 23.” NAQVI WO, p. 24-25 - In using a yellow page publisher there are two broad 20 distinctions for a query. A client may be asking for a certain category of listings, or the client may be asking for a particular vendor. For example, the user could ask for car dealers in Morristown, NJ (i.e., a category of listings), or the user could ask for Morristown BMW located 25 on South Street in Morristown, NJ (i.e., a particular vendor) . The system determines which of the two types of queries or searches the user has made, as illustrated by box 32 in Fig. 2. If the query is for a certain category, the process will go to the left hand side of the flow chart 30 of Fig. 2, and if the query is for a certain vendor, the process will go to the right hand side of the flow chart of Fig. 2. The left hand side of the flow chart will be explained first. After determining the type of query, the category search engine 33 next determines which category best fits 5 the user's request. The user may have asked for "car," but the category in the yellow page provider's index may in fact say "automobile." Or, the user may have asked for "spectacles," and the category in the yellow page provider may be called "optician." The matching of these variations 10 of terms is performed by the category search engine 33.” NAQVI WO, p. 26-27 – “The "focus" arrows 43 shown in Fig. 2 indicate that a certain focus is associated with each category. The query may have been directed to a category of listings or a particular vendor. In both cases there is a "focus" associated with the content of the query (e.g., automobiles, physicians, lawyers, etc.). In addition, there may be a focus associated with the geographic 5 location of the user to permit advertisers to target users in particular geographic regions. The focus process plays a major part in the present invention. No advertisements are shown unless it can be determined that the advertisements are in some way focused or related to the 325 Reference Disclosure 10 content of what the user requested.” NAQVI WO, p. 34 – “To start (step 80), the user enters a query. For example, the user may enter restaurants or cars as a query. The query has a focus, as described above. The system determines what the focus is and, as described above, the 25 system provides the user with a list of categories that relate to the query. For example, if the user requests restaurants, the user might be shown a list of restaurant types, such as Chinese, American, French, Italian, and so forth. The query entered by the user is evaluated by a 30 query form manager (step 81) to determine the focus of the query.” BULL Figures 1, 2, 7, 8B, 10, 11 (and associated text) BULL at Col. 3 – “The user logs on to the system either by name, address, etc. or with some pseudoonym (or some combination). This allows the user’s activity to be tracked and establishes a log of the user’s activity during the current online experience (session). The user is also asked for explicit profile information concerning preferences. These preferences will be used to narrow the information retrieval.” BULL at Col. 5 – “IV. Automated Profile Generation. Presently, user’s profiles are collected based on explicit entry by the user, and extraction from demographic data collected from a variety of sources. In the present invention, the searching patterns of the user on the Internet are monitored. A set of software text agent profiles is developed and may be integrated with explicitly collected profile information. The automated profile generation will have both explicit profile information gathering and implicit profile information gathering capabilities. As the user uses the information aggregation and synthesization system, the pattern of information being viewed is analyzed and the user presented with search ideas as well as promotions and specials from suppliers based on these patterns.” BULL at Col. 6 – “A theme or definition of a class of information (e.g., central California travel and tourism or new automobiles) is identified. Data sources (Local DataStores (500 . . . N) and Network Accessible DataStores (300 . . . N)) are screened for relevance, quality of information and appropriateness (or may be included de facto based on their title or description). These are indexed using a text indexing software tool 2981 and the indices stored on the system index DataStore 220. An initial set of Preestablished Software Text Agents are 326 Reference Disclosure defined. These agents are words or combinations of words that form a word based search pattern. This initial set of agents is relevant to the searches that might be performed against the class of information that was indexed. (i.e., Agents about automobiles would be developed to search a class of indexed information about new cars). These are stored in the Preestablished Software Text Agent DataStore 231. The System 200 uses any multipurpose computer central processing units with the ability to handle multiple inputs and outputs with the necessary hard disk storage and to run World Wide Web (WWW) or other network server software.” BULL at Col. 12 – “IV. Automated Profile Generation Browsing patterns of the user are analyzed and these patterns update profiles automatically. FIG. 7 illustrates a how diagram for the Automated Profile Generation. The looking patterns of the user are monitored to develop a set of software text agent profiles that are integrated with explicitly collected profile information to assist the user in narrowing down information for future sessions as well as suggesting references, merchandise or services during the current session. This is accomplished by statistical analysis of the text stream. The searching patterns of the user on the Internet are monitored by monitoring the text stream. A set of software text agent profiles is developed and may be integrated with explicitly collected profile information. The explicit infor mation is gathered by queries to the user. The explicit and implicit data are merged to develop software text agents that support the user’s future shopping sessions.” BULL at Figs. 1 - 7 (and associated text) KOHDA ’96 KOHDA ’96, §2.2: “Note that the agent is aware of the identity of the user and which page the user is about to read on the browser, so the advertising agent can tailor advertisements for individuals and their current interests. Thus it prevents the user from having to see advertisements that are unrelated to their current interests.” Id., §3.1: “At invocation, environment information is passed to each filter program as invocation parameters. The environment information includes at least the identity of the user and information about the selected anchor. The contents of a Web page designated by the anchor are input into the pipe of filters, and the output from the pipe is 327 Reference KOHDA ’853 Disclosure displayed on the browser's window as an HTML document.” Id., §3.2: “The filter keeps in memory the contact path (URL) to the agent's Web server. When it is invoked, it forwards the invocation parameters passed from the browser to the agent's Web server, and waits for a reply.” KOHDA ’853 at 38:30-35: “the advertising information server provides the advertising information automatically based upon the retrieval condition data, wherein another predetermined tag is added to the provided condition data to retrieve advertising information, and is derived from the retrieval information.” Id. at 23:60 to 24:7: “When the user is obtaining the information about the sales conditions of the latest automobiles, the information server 100 to obtains and analyzes the retrieval information to be obtained by the user, and recognizes that the information relates to the sales conditions of the latest automobiles.... Then, the information server 102 selects the advertising information about, for example, sports cars from a large volume of advertising information relating to automobiles, and transmits the selected information to the information retrieving apparatus 100. As a result, the advertising information in which the user may be interested can be transmitted to the user, thereby enhancing the advertising effect.” Sung Myaeng and Robert Korfhage, “Integration of User Profiles: Models and Experiments in Information Retrieval,” Information Processing & Management, Vol. 26, No. 6 (1990) (“MYAENG”) MYAENG, Abstract, “One difficult problem in information retrieval (IR) is the proper interpretation of user queries. It is extremely hard for users to express their information needs in a specific yet exhaustive way. In an effort to alleviate this problem, two theoretical models have been proposed to utilize user characteristics maintained in the form of a user profile. Although the idea of integrating user profiles into an IR system is intuitively appealing, and the models seem viable, no research to date has established a foundation for the roles of user profiles in such a system. Aiming at the investigation of the roles of user profiles, therefore, this study first identifies and extends various query/profile interaction models to provide a ground upon which the investigation can be undertaken. From a continuum of models characterized on the basis of interaction types, metrics, and parameters, nearly 400 models are chosen to investigate the “model space.” New measures are developed based on the notion of user satisfaction/frustration. In addition, three different criteria are used to guide users in making judgments on the quality of retrieved items. Analysis of the data obtained from the experiments shows that, for a wide variety of criteria and metrics, there are always some query/profile interaction models that outperform the query alone 328 Reference Disclosure model. In addition, preferable characteristics for different criteria are identified in terms of interaction types, parameters, and metrics.” MYAENG, p. 719, “The problem of retrieving information from natural language databases has been studied during the past quarter century. In traditional context, retrospective information retrieval (IR) systems are those in which a user initiates the search process by means of a set of active queries and receives a set of references to items of potential interest. One difficult problem in such systems is the transformation of the user’s information need to the form of an explicit query which accurately matches the original intention, and retrieves all items of interest in the database being searched, and only those. Therefore, users often have great difficulty in using an IR system successfully regardless of the query language implementation (e.g., a vector form, a boolean expression of terms, a combination of both [1,2,3], or other retrieval models [4,5,6,7,8]). As a result, user queries are not completely satisfactory in expressing the needs in most retrieval situations. It seems natural that the output of a system based on such a query is necessarily incomplete and unsatisfactory.” MYAENG, p. 720-21, “The difficulty of adequate query formulation also seems related to the subtlety of the human information seeking behavior. Widely recognized is the fact that different users usually expect different sets of items from the same query and make different relevance judgments on the same retrieved items. This means that user variability should be considered as a factor in information seeking process [ 121 and incorporated into the system design in some way. However, since the typical communication achieved between a user and a system is only through a set of queries and a set of retrieved items, this somewhat narrow and restricted channel inhibits the system from catering to the individual’s variability in terms of information needs.It is conceivable that by maintaining characteristics of an individual user in the form of a profile, the bandwidth of the communication channel can be widened. Used as a way of improving the level of user/system communication effectiveness, the profile information is expected to allow the underlying system to understand users better and to improve the quality of a retrieval output. For instance, the profile information allows a different interpretation of a query to produce a different result, and helps the initial output to be tailored to the user’s particular needs and ranked appropriately, based on the user’s preference. While the use of tools such as thesauri and stemming algorithms for a priori processing of a query aims at better query interpretation by depersonalizing the query in a sense, profiles are used for the same purpose by personalizing the query [13]. 329 Reference Disclosure The influence of the user profile on the quality of output depends on various factors. One important and immediate consideration is how to modulate the interaction between a query and a profile, so that reasonable quality of information is maintained. Some models of query/profile interaction have been developed and their theoretical foundations have been established [ 14,15,16]. Another aspect to be considered is how to maintain user profiles. Assuming that reasonably well-constructed profiles increase the system effectiveness, the nature and quality of the information in user profiles should determine the degree of improvement. Recognizing that people tend to be poor at self-description, a method of automatically and dynamically updating user profiles has been proposed to facilitate an intelligent and personalized IR system [17]. Researchers have recognized directly or indirectly the need for user modeling in various information systems. Given that information seeking is part of the problem solving process, it is difficult to study information seeking apart from a particular context or process [12]. In particular, IR system outputs need to be produced based not only on the topicality of documents and queries, but also on informativeness, often affected by such factors as novelty, understandability, the order of output presentation, and the suppression of redundancy [18], which are dependent on individual users. If an IR system is to be designed to take into account individual variability in backgrounds, interests, preferences, or other significant characteristics, it becomes obvious to develop a form of user models for individuals. Nonetheless, the possibilities for user representations have been explored only to a limited extent in experimental IR systems [ 191, and uncertainty about how to incorporate knowledge about users into system design is a major stumbling block in designing effective IR systems [20]. Indirect uses of the concept of user modeling in IR are found in [21] and in [22,23]. This study aims at demonstrating the superiority of IR systems with profiles, a limited form of user models, to those without profiles, and investigating the query/profile “model space” in order to develop a theory. In this paper, we first present the “model Integration of user profiles 721 space” constructed by identifying and extending the existing query/profile interaction models and then report the results of a series of experiments conducted to meet the objectives.” MYAENG, p. 721, “Since this research aims at investigating the roles of user profiles in a general sense, various interaction models have been reviewed and extended to serve as a ground on which the investigation can be undertaken. Given that a profile contains information about a user’s (or a group of users’) interest, it may be used in three distinct ways, depending on when and how it is applied to the retrieval process. First, the interest profile can play a role in 330 Reference Disclosure preprocessing a query to produce a modified query to be used in the subsequent retrieval process. Second, the profile and the query can be considered as the same kind of entity directing the retrieval process. The third possibility is to treat the profile as a filter to postprocess outputs retrieved based on the query alone. Although each method possesses its own potential merit, the first two have been the focus of this research; they lend themselves to the theoretical framework developed to date. Even with two methods of using interest profiles, there is a continuum of models from which 396 different models have been identified and selected to investigate the “model space. ” For ease of manipulation and theory development, they are organized along three different dimensions: 1. modes of query/profile interaction, 2. parameters embedded in the interaction modes, and 3. metrics used to discriminate among documents.” MYAENG, p. 727, “An experimental retrieval system called PBS (profile-based system) has been developed for this research. In addition to common features such as accepting a query, searching a database, and retrieving document surrogates, it provides capabilities to handle profiles and evaluate different models based on a query and a profile. The database consists of 3703 abstracts of Communications of the ACM from 1958 to 1985. Some standard methods have been employed to analyze and prepare the database for the retrieval purpose. For example, a stemming algorithm was used for both database processing and query processing, and the methods of computing discrimination values and term frequency information [l] were adopted to compute weights on term-document pairs. Details of the structure and components of the PBS as well as methods used for the database process are found in 1261. Considering the large number of models being tested, the goai of the experimental design was to maximize the efficiency of available human resources and minimize the error variances, especially those which might be incurred from uncontrolled individual differences. To this end, every query was processed by all models against the document database so that systematic differences among queries, and hence among users, co&d hardly mask the actual differences among models. The experimental design had to overcome two difficulties. It is well known that sequencing of the output affects a user’s judgment. That is, if document Dz is seen after document Di then the user’s judgment of D2 is affected by the judgment already made on Di . A similar sequencing effect pertains across models: judgment of the output of a given model is affected by the judgement of prior models. To 331 Reference Disclosure minimize sequencing effects two strategies were used: the output from a11 models was merged into a single set, and the documents were presented to the user in a randomized order rather than in an order related to their presumed relevance.” MYAENG, p. 728-29, “After an introductory session [26], the first nontrivial task for a subject was to construct a profile as a list of weighted terms that represent his or her real-life interests within the discipline of information and computer science and engineering. The following is an example of a profile constructed by a subject whose main interest lies in AI in general and human/computer communication interface in particular: ((artificial 7) (intelligence 7) (communication 10) (interface 7) (human 3) (factors 3) (network -2)). The last term ‘network’ with a weight of -2 was used to explicate her disinterest in the area of networking, which otherwise might be implied by the inclusion of the term communication. Unspecified weights defaulted to a value of 1. Subjects were then asked to formulate a query to be searched against the database in the PBS. There was a time interval of at last one day between profile construction and query formulation, which supposedly reduced any unnecessary dependence of a query on the content of a profile. Although they were encouraged to bring their own current information needs for queries to be submitted to the PBS, a pool of real questions drawn from comprehensive examinations given by the DIS at University of Pittsburgh was available as a guide to help them in conceptualizing and defining an information need and thus a query, not as a depository from which they should select an information need. When the subjects were given a randomized list of documents, they went through documents in that order and determined the quality of each document based on three criteriarelevance, pertinence, and usefulness. These fine-grained criteria were used to forcefully avoid confusion as to how the general term ‘relevancy’ can be interpreted, as well as to observe what aspects of ‘relevancy’ are affected by the use of profiles. Relevance was to be judged objectively based on how closely a document was related to a ‘stated query’, regardless of the user’s expectation or intention. Pertinence, in contrast, was to be judged on how Integration of user profiles 729 much a document satisfied the current information need or desire that was supposed to be reflected in the query. Obviously this is a more subjective measure in which pragmatics of documents and queries play an important role. If the user’s intention is not well embedded in a query, for example, a retrieved document could be relevant but not pertinent. Usefulness, finally, was related to the user’s 332 Reference Disclosure short-term and/or long-term interests, regardless of the current need embedded in the query. Thus a pertinent document is expected to be more or less useful, whereas a useful document may not be pertinent at all.” MYAENG, p. 732-34, “Another aspect of the models is examined by means of user assessments on the general usefulness of retrieved documents. As summarized in Tables 6 and 7, two prominent rends are observed across different metric groups (L, is excluded because of its anomaly,as indicated earlier.) First, almost all profile-based models appear to be better at retrieving useful documents than M4, regardless of measures and metrics. This experimental evidence that a profile alone retrieves more useful documents than a query alone, which is supposed to represent more direct and short-term information needs, seems counterintuitive; but it supports the premise that it is difficult to formulate a query that will reject useless but relevant documents. Thus, if an IR system is designed to meet a user’s general interests as well as temporary needs, a query alone does not seem sufficient to satisfy both demands. Second, although a profile alone can achieve relatively high performance in usefulness, it does not necessarily follow that the existence of query information always reduces satisfaction (or increases frustration). Instead, it seems essential for models to include and be guided by some query information in their retrieval process. As shown in the tables, the models in the Q’ & P category in the Lz and the inverse cosine metric groups always per-form better than the profile-alone model when W, is 0.5. In other words, unless the modified query is very close to the profile, documents retrieved by a well-balanced retrieval shell are more useful than those retrieved by a profile or a query alone, or by a shell distorted by emphasis on the query or profile.” MYAENG, p. 736-38, “There is little doubt about the importance and potential advantages of integrating user information into underlying systems. Especially in information retrieval, the difficulty of interpreting user queries, which are often incomplete and inaccurate, necessitates the adaptation of a system to their characteristics. This research aims at investigating the idea of integrating user interests in the form of user profile, and establishing a foundation that wili justify further development in this direction. The analysis of the experimental results has demonstrated the superiority of profilebased models over a wide range of criteria and metrics used for evaluation; there were always some models that outperformed the query alone model. Although overall effectiveness was improved for those better models, a dual phenomenon similar to the recall/precision relationship, which 333 Reference Disclosure often characterizes information retrieval, also occurred; user satisfaction evaluated in terms of pertinence appeared to be increased by integrating a profile, but user frustration was also increased. However, the integration of user profile improved use fulness in both satisfaction and frustration. It was particularly noteworthy that for usefulness almost all profile-based models outperformed the query alone model. Relevance was used as a device that isolated the subjective assessments related to the user’s intention from the objective ones. In spite of the theoretical and intuitive appeal of Cassini oval over ellipsoidal models, it was difficult to prove the superiority of the former in general. Instead, Cassini oval models appeared to be attractive in the L2 metric group, whereas ellipsoidal models seemed better in the inverse cosine metric group. Although the results support the main hypothesis and make it possible to select promising models for more detailed study, the strong regularity in connection with different parameters and different types of interactions also suggests further investigation of some aspects of the model space. There are numerous possible extensions and improvements to be made in the future. They can be categorized into three groups: methodologica1 improvements, extensions in query/profile interactions, and exploration of using profiling tools. In retrospect, the limitation of resources precluded possibilities of strengthening the validity of the experimental results; more human resources could have extended the cutoff point imposed on the number of documents reviewed by subjects. In addition, by using multiple, heterogeneous databases and subjects with diverse background, the query interpretation problem is more likely to surface, and it will be possible to investigate the roles of user profiles in more realistic and interesting situations. While there is room for improvement in terms of more realistic query/profile interaction models, it seems necessary to connect different user groups with different features of models. This will make it possible to map different interaction models to different groups of users and to develop a system that will adapt its query processing to user characteristics. On the other hand, it would also be interesting to see relationships between models and the proximity of a query and a profile in the document space. The third area of research is concerned with enhancing the quality of user profiles by means of profiling tools. Two approaches have been explored and are to be developed further. One is to update user profiles automatically based on the interaction with users. In this way, more accurate and up-todate user information is expected to be maintained [ 171. Another approach is based on the finding in psychology that people are better at recognition than at recall performance [28]. With relationships among terms available in a given database, the task of formulating a profile is expected to become less difficult and more effective in that 334 Reference Disclosure the task becomes a recognition process rather than a recall [29].” Sung Myaeng and Robert Korfhage, “Towards an Intelligent and Personalized Retrieval System” (“MYAENG II”) MYAENG II, e.g., Abstract, “Development of an information retrieval system that can be personalized to each user requires maintaining and continually updating an interest profile for each individual user. Since people tend to be poor at self-description, it is suggested that profile development and maintenance is an area in which machine learning and knowledge base techniques can be profitably employed. This paper presents a model for such an application of AI techniques.” MYAENG II, e.g., 121-22, “In the context of conventional information retrieval systems (IRS), the search process is initiated and completed by a set of queries from a user. Each query, usually in the form of a vector or Boolean expression, consists of a set of key terms to be matched with the contents of relevant items. To improve the retrieval effectiveness, modification of the user query through the application of user feedback has been studied with some successful results [13]. There have also been systems, called selective dissemination of information systems (SDI), that selectively distribute incoming information to appropriate users based on user interest profile. However, only recently has a set of models been proposed that effectively combines the two different modes of the systems, thereby attempting to enhance the quality of retrieved items [3,8,9]. One of the major stumbling blocks in the conventional IRS is the problem of formulating a query which accurately matches the user's needs and the contents of potentially relevant items[ 1,12]. Unfortunately, different users expect different sets of items from the same query and make different relevance judgements on the same retrieved items, directly related to their individual needs. But the conventional retrieval system disregards the individual user's characteristics and the fact that diverse users have different perceptions of the underlying system. While it is natural that a user perceives the system in the light of his or her experience and needs, both the restricted structure of a query and the nature of the conventional system itself make this perception unavailable to the system. We believe that knowledge captured in a user profile embedded in the system will play an essential role in making a personalized system. One effect can be to retrieve a broader range of items, some of which would never be brought to the user's attention on the basis of the query alone. People prefer a librarian who can surprisingly provide information not explicitly requested but judged to be important to them. Profile information will also help the system tailor the retrieved items to a particular user's needs and rank them appropriately. Again, a friendly and intelligent librarian can eliminate some information which is not of the user's concern but would have been retrieved by a novice librarian who had to 335 Reference Disclosure relyeffective from the user's point of view and cooperative with the user in terms of achieving his or her goal. Since we never guarantee that a user's characteristics and environment stay the same over time, it becomes necessary for the system to dynamically change the knowledge kept in the profile. Upon learning various aspects of a user's information needs and behavior, the system will use this information to respond in an intelligent and friendly manner. We elaborate on the concept of a dynamic user profile (DUP) with a learning strategy for modeling the DUP and discuss the heuristics and models that utilize the DUP. The next section shows how the system is configured as a learning system. Our main emphasis in this paper is in Section 3 where a strategy for learning users' interests and other characteristics is discussed. The rest of paper, showing the representation of the DUP, addresses the issues involved in the utilization of the DUP.” MYAENG II, e.g., 122-23, “We have developed a full retrieval system for the purpose of testing the validity and the sensitivity of the theoretical models with static profiles [8]. This base system can be modified to reflect the functions of DUP. Since our system should conduct learning, it is not surprising that its configuration is well projected on the synthesized model of learning systems proposed by Smith et al [14]. We adopt terms used in this model to show the function of each component in the system. The proposed model consists of six functional components: performance element, instance selector, critic, learning element, blackboard, and world model. The performance element uses the learned information to perform the stated task. The instance selector selects training instances from the environment of the learning system whereas the critic analyzes the current abilities of the performance element. The learning element, which is an essence of the learning system, is an interface between the critic and the performance element, responsible for translating the abstract recommendations of the critic into specific changes in rules or parameters used by the performance element. The blackboard is a global database used as a system communication means. It holds two types of informarion: the information in the knowledge base and the temporary information used by the the learning system components. Finally, the world model contains the fixed conceptual framework within which the system operates. Documents in the database are assumed to contain key words with associated weights. These weights can be assigned on a frequency-related basis, as is quite standard in information retrieval. While it is possible to adjust the weights dynamically on the basis of user response, for present purposes we assume the weights are fixed. In our system, as shown in the Fig.l, the query processor/responder is considered as a learning system 336 Reference Disclosure performance element. It is the nucleus in conventional systems and, based on a query, actually retrieves items, providing the user with a set of items ranked on the basis of the weights in the query and items in the database. In our system design, this component also integrate the user-dependent information from the profile. The profile controller serves mainly as a learning element with some additional functions taken care of by an instance selector and a critic. This component observes the interactions between the system and the user, selects useful instances, and makes specific changes to the profile and possibly the query in such a way that the system's performance will eventually approach the desired level. In the context of an IRS, the role of a critic is performed primarily by human users although the statistics gathered through operation of the system can be of importance. Currently, the user's relevance feedback on the retrieved items is the only valuable information from the critic. Feedback information from each user is interpreted using the profile, and therefore part of the critic's role is transferred to the profile controller.” MYAENG II, e.g., 123, “Our ultimate purpose in having the learning element is to build an IRS that incorporates an individual user's characteristics as much as possible, in an automatic and timedependent manner. Although this can only be achieved by monitoring the user's interaction with the system, initial dialogue with each user is expected to play an important role in obtaining skeletal information that will provide a direction to the system's inference. Without this kind of information available, the uncertainty we have to deal with is so high that, either we could never be sure that the system is on the right track in terms of learning, or the usability of DUP would be limited. This difficulty will arise especially with users whose background or interests lie in diverse fields and whose queries are not consistent with respect to a single field of interest.” MYAENG II, e.g., 123, “In addition to the need to automatically capture the user's interest, knowing information regarding individual user's habits seems also necessary. Typically the following are recognized as learnable characteristics: - Reading habits, i.e, preference on the kind of a document (e.g. theoretical vs. practical) - Perception on feedback - Preference on either high recall or high precision The reading habits can be obtained by simply accumulating statistics. Given a multidimensional space on which each periodical can be plotted based on the general trend of its difficulty or practicality, for example, the learning element of the system extracts the user's 337 Reference Disclosure preference along each dimension by observing his feedback on each document retrieved. If he assesses a document in JACM as pertinent and/or useful, for instance, the scale about his reading habit should move toward a more theoretical and difficult document group. The initial default value can be assigned based on each user's background information which is expected to be given to the system explicitly. It is to say that the higher education a user has received, the more theoretical and difficult documents he would tend to read. On the other hand, the more he is related to the industry, the more he might prefer a practical document to theoretical one. A user's perception on feedback seems to have an implication for any learning strategies. Since feedback, as a critic, plays an essential role in learning, a user's general habits on how to assess a retrieved document along different criteria must be taken into account so that any individual bias can be eliminated. It is expected that a conservative user will tend to rate a smaller number of documents positively whereas a more liberal user will rate a larger number of documents positively. Therefore, the history on how a user has evaluated retrieved documents will be a useful source of information. This implication not only facilitates unbiased learning of a user's characteristics and interest but also makes it possible to measure system performance more accurately, taking the bias into account.” K. Asai, ed. 1995. Fuzzy Systems for Information Processing (1st ed.) (“ASAI”) ASAI, e.g., at iv, “Fuzzy theory was first used in engineering applications in the fields of control and information, with many practical applications and product being brought out, and following these there was progress in applications in medicine, management, sociology, natural sciences, psychology and the like. In every case, approximate models were constructed of the general intelligent information processing of human beings using fuzzy theory, and using these either artificial intelligence was created or there were attempts to explain problems or phenomena that touch mankind. When these models are constructed, human knowledge, experience, consciousness and opinions are expressed in natural language, and hearings and surveys are used. This language is quantified using membership functions and the information processed, but in most of these cases, computers are used. Because of this, fuzzy theory has made a contribution to the extension of conventional computers, which are based on numbers, to the handling of natural human language.” ASAI,e.g., at 173, “In the chapters up to now, we have discussed the current state of hardware and software for fuzzy information processing. In this chapter, we will discuss fuzzy computers as systems which extend these and are fuzzy information processing computers. Fuzzy theory, which is the foundation for these fuzzy 338 Reference Disclosure computers, is a means for mathematical quantification of the meaning of human language, and it is technology indispensable for the development of human friendly computers.” Hua Li & Madan Gupta LI, e.g., Table of Contents, Chapter Abstracts, Back Cover, “Fuzzy (Eds.), Fuzzy Logic and logic offers attractive features for solving many real engineering Intelligent Systems problems. As many people have realized, the major obstacles in (1995) (“LI”) building a real intelligent machine are dealing with 5 random disturbances, processing large amounts of imprecise data, interacting with a dyn~imically changing environment, and 5 coping with uncertainty. The use of heural-fuzzy techniques can help solve many of these problems. Fuzzy Logic and Intelligent Systems reflects the most recent developments in neural networks and fuzzy logic and their applications in intelligent systems. In addition, the balance between theoretical work and applications makes this book not only suitable for researchers and engineers, but for graduate students as well.” 339 Table B6: Fee Records To the extent the references addressed in claim charts A-1 to A-39 does not disclose the limitations identified in each chart citing Table B6, one of ordinary skill in the art would be motivated to combine the references addressed in claim charts A-1 to A-39 with any one or more of the Table B6 references listed below because: it would have yielded predictable results; using the techniques of the Table B6 references would have improved the primary or obviousness references in the same way; and applying the techniques of the Table B6 references to improve primary or obviousness references would have yielded predictable results. Reference U.S. Patent No. 6,119,101 (“PECKOVER”) Disclosure See, e.g., PECKOVER, 10:20-29: A practical and viable electronic marketplace involves the exchange of market information, as well as the more obvious trading for goods and services. From a consumer’s point of view, shopping is a means of gathering data about goods and services offered. This data is used by the consumer to compare and rank offerings and to make decisions about purchases. From a provider’s point of view, consumer shopping is an opportunity to gather data about consumer needs and interests. This data is used by the provider to improve product and service offerings. PECKOVER, 11:16-19: Consumers have a standardized mechanism for receiving considerations from advertisers in exchange for allowing delivery of advertisements and other provider information. PECKOVER, 11:61-62: Providers can provide a consideration to consumers for viewing advertisements and other notices. PECKOVER, 21:5-11: A Consideration Account function 67 maintains a “consideration” account for the user. When the user earns a consideration by, for example, viewing a directly delivered advertisement or message, or completing a marketing survey, the consideration amount is credited to Consideration Account 67. The account is denominated in a convertible exchange media such as electronic cash tokens. PECKOVER, 11:44-46: Advertising may have higher success rates since the targeted consumers have expressed an interest in the product. PECKOVER, 11:54-64: The mechanism for quantifying consumer demand uses data based 340 Reference U.S. Patent No. 5,105,184 (“PIRANI”) Disclosure on individual buying decisions, not merely aggregate or estimated data. Providers can quantify demand in real-time. Providers have a mechanism for discovering the reasons for lost sales. Providers can provide a consideration to consumers for viewing advertisements and other notices. Providers can receive feedback in real-time about the success of promotions. PECKOVER, 20:13-19: A Decision Agent Archive 80 stores and accesses Decision Agents 14 that are expired, i.e., agents that have completed their tasks, whether successfully or not. For example, if a Demand Agent 16 needs more detailed data about a query than is stored in a Query Logger 136 of a Market 18, it can access the details of the related Decision Agent 14 through Decision Agent Archive 80. PECKOVER, 18:40-53: Referring to FIG. 4A, a Personal Agent 12 or 13 comprises the functional components of: a Unique identification (ID) 50, an Owner Manager 52, a Preference Manager 54, a Delivery Manager 56, an Individual Firewall 58, a Decision Agent Manager 60, a Demand Agent Manager 62, an Ad Manager 64, a Target Manager 66, and a Consideration Account 67. PECKOVER, 29:49-67: The Decision Agent’s Response Manager 108 collects references (step 326) to the matching ads found by Basic Search Engine. The Response Manager also sends a response to the Personal Agent that placed the advertisement (if the placer so desired and marked in the ad), providing real-time feedback to the placer. Immediate Agents then removes the Decision Agent from its internal queue and gives the Decision Agent back to Active Decision Agent Manager 152 (step 328). PIRANI, 3:1-7: This new use can also provide to a small or a new software developer much needed help to launch a software project. By convincing the viability of the project to a commercial company which advertise widely to sell their products, the software developer can receive revenue from such company in exchange for the right to advertise in the new software. 341 Reference U.S. Patent No. 5,710,884 (“DEDRICK PATENT”) Disclosure DEDRICK PATENT, 10:8-21: Thus, the metering server 14 contains an account balance, a user identification (such as an account number or a name), and may also include information indicating which information the user subscribes to. User profile data requested by metering server 14 from the client systems 12 is stored in user profile database 30, along with user profile data corresponding to electronic information being consumed by an end user. As discussed above, this user profile data does not specifically identify the individual end user. The account balance and user identification is contained in the transaction database 32. Therefore, the only information which is contained in the metering server which identifies an individual end user is that user’s identification and an account balance, thereby maintaining the user’s privacy. DEDRICK PATENT, 10:22-29: In one embodiment, the transaction database 32 also includes, in the log of a transaction, an indicator of the electronic information consumed. By maintaining such a log, the metering server 14 is able to summarize an end user’s consumption for that user’s review. For example, the metering server 14 may generate a monthly statement summarizing how much money the end user spent consuming electronic information. DEDRICK PATENT, 10:45-61: If the end user is not a subscriber, the metering process 36 calculates the price of the requested information and accesses the transaction database to subtract the price from the balance of the end user’s account. The balance is initially established when the end user requests an account in the system. The balance may be specified by the end user and approved by the clearinghouse server. Approval may be based upon a credit card nmnber or bank account number provided by the end user. The balance may be updated by the clearinghouse server when the end user pays his bill. If the balance minus price is greater than zero, the metering process 36 retrieves the information and sends the same to the end user. If the balance minus price is less than zero, the metering process 36 does not retrieve the information and may send a message to the end user that the balance has been exceeded. The initial balance of the account is typically set by a credit limit. DEDRICK PATENT, 11:35-55: The software tools include “cost type” and “cost value” fields that accompany each unit of electronic information. The cost type and cost value can be utilized to calculate a price that can be either credited to or debited from the end users. The fields allow the publisher/advertiser 18 to establish the manner in which the information will be charged to the end user’s account. One example 342 Reference Disclosure of a cost type is “pay per view” payment method, wherein the end user pays an associated cost each time the user consumes a unit of information. This cost may also be proportional to the amount consumed, so that the cost is higher for consuming the entire unit infonnation rather than a smallm portion, such as the abstract. This type of payment may be desirable for information which is typically seldom consumed by the end user. Other cost types include payment on a per byte or word of information viewed by the end user, or payment for the period of time that the user consumes the information. These cost types may be desirable when the end user is accessing a database that contains, for example, corporate or individual credit information, or the drawings and text of a patent database. DEDRICK PATENT, 12:1-26: DEDRICK PATENT, 12:43-54: The publisher/advertiser is also provided with an account number so that the charges associated with the consumption of information provided by the publisher/advertiser is charged to the account number of the publisher/advertiser. For example, a publisher may provide a unit of information which is subsequently consumed by the end user. The charge incurred by the end user is then debited against the user’s account and credited to the publisher’s account. By way of another example, the end user may view an advertisement, wherein the charge associated with the unit of information viewed is credited to the end user’s account and debited to the advertiser’s account. DEDRICK PATENT, 14:19-37: As shown in FIG. 4, each clearinghouse server 20 contains a 343 Reference Disclosure demographic database 50, a transaction database 52, billing process 54 and a session manager 56. The demographic database 50 contains user profile data collected from the metering servers 14. The transaction database 52 contains billing information relating to the end users. The transaction database 52 also contains data relating to the accounts of the publishers/advertisers 18. The billing process 54 can access and process data within the databases 50 and 52. For example, when an end user consumes a unit of electronic information, data relating to the consumption of the electronic information may be sent from the billing server 14 to the clearinghouse server 20. The session manager 56 instructs the billing process 54 to charge the publisher/advertiser account within the transaction database 52. The clearinghouse server 20 may also receive user profile data from the metering servers 14 which is subsequently stored by the billing process 54 in the demographic database 50. DEDRICK PATENT, 15:7-25: In one embodiment, the billing process 54 also generates bills for the end users and the publishers/advertisers. Upon a request from the publisher/advertiser, the session manager 56 instructs the billing process 54 to generate a bill. The billing process 54 retrieves the billing information from the transaction database 52 and generates a bill. The bill may be electronically transferred to the end user or sent through a conventional mail service. The billing process 54 may also generate bills that are transmitted to the publishers advertisers. The bill may be generated periodically in accordance with header information that accompanies the content that is generated by a publisher/advertiser. Alternatively, the clearinghouse server 20 may utilize consumer credit cards and or bank accounts for billing. For example, amounts owed by the consumer for consumption of electronic content and amounts due the consumer for consumption of electronic advertisements may be charged or credited, respectively, to the consumer's credit card or bank account. DEDRICK PATENT, 17:13-26: The metering server 14 in conjunction with the client activity monitor 24 of the client system may monitor the end user’s consumption of electronic advertising information and provide user profile data to the metering server 14 relating to the end user. For example, the metering process 36 may monitor the amount of time an end user spends viewing an electronic advertisement, or which particular advertisement or page of the advertisement was of interest to the end user. The metering process 36 may further monitor what answers were provided by the user, or paths taken by the user in an interactive model, along with follow-up requests 344 Reference U.S. Patent No. 7,072,849 (“FILEPP”) Disclosure initiated by the end user in an interactive model. This information is then forwarded to the clearinghouse server 20 for compilation. See, e.g., FILEPP, 3:1-4: And, it is still a further object of this invention to provide a method for presenting advertising in an interactive service which method enables the user to transactionally interact with the advertising presented. FILEPP, 3:44-67: Also in preferred form, the method includes step for maintaining an advertising object identification queue, and an advertising object store that are replenished based on predetermined criteria as advertising is called for association and presentation with applications. In accordance with the method, as applications are executed at the reception system, the application objects provide generalized calls for advertising. The application calls for advertising are subsequently forwarded to the reception system advertising queue management facility which, in turn supplies an identification of advertising who’s selection has been individualized to the user based on, as noted, the user’s prior interaction history with the service, demographics and local. Thereafter, the object identification for the advertising is passed to the object store to determine if the object is available at the reception system. In preferred fonn, ifthe advertising object is not available at the reception system, a sequence of alternative advertising object identifications can be provided which if also are unavailable at the reception system will resulting in an advertising object being requested from the network. In this way, advertising of interest can be targeted to the user and secured in time-efficient manner to increase the likelihood of user interest and avoid service distraction. FILEPP, 7:27-32: In preferred form, network 10 provides information, advertising and transaction processing services for a large number of users simultaneously accessing the network via the public switched telephone network (PSTN), broadcast, and/or other media with their RS 400 units. Services available to the user include display of information such as movie reviews, the latest news, airlines reservations, the purchase of items such as retail merchandise and groceries, and quotes and buy/sell orders for stocks and bonds. Network 10 provides an environment in which a user, via RS 400 establishes a session with the network and accesses a large number of services. These services are specifically constructed applications which as noted are partitioned so they may be distributed without undue transmission time, and may be processed and selectively stored on a user’s RS 400 unit. 345 Reference FLYNN U.S. Patent Nos. 5,948,061 (“MERRIMAN I”) and 7,844,488 (“MERRIMAN II”) Disclosure See e.g., FLYNN, p. 1 (“Once they begin running ads on various sites, advertisers analyze the number of times somebody clicked on their ad, then change the placement or timing of their ad to try and improve the ‘click rate.’”) See, e.g., MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 2:59-3:4: The basic architecture of the network 10 comprises at least one affiliate web site 12, an advertisement (ad) server web site 19 and one or more individual advertiser’s web sites 18. Affiliates are one or more entities that generally for a fee contract with the entity providing the advertisement server permit third party advertisements to be displayed on their web sites. When a user using a browser accesses or “visits” a web site of an affiliate, an advertisement provided by the advertisement server 19 will be superimposed on the display of the affiliate’s web page displayed by the user’s browser. Examples of appropriate affiliates include locator services, service providers, and entities that have popular web sites such as museums, movie studios, etc. MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 3:5-23: The basic operation of the system is as follows in the preferred embodiment. When a user browsing on the Internet accesses an affiliate’s web site 12, the user’s browser generates an HTTP message 20 to get the information for the desired web page. The affiliate’s web site in response to the message 20 transmits one or more messages back 22 containing the information to be displayed by the user’s browser. In addition, an advertising server process 19 will provide additional information comprising one or more objects such as banner advertisements to be displayed with the information provided from the affiliate web site. Normally, the computers supporting the browser, the affiliate web site and the advertising server process will be at entirely different nodes on the Internet. Upon clicking through or otherwise selecting the advertisement object, which may be an image such as an advertisement banner, an icon, or a video or an audio clip, the browser ends up being connected to the advertiser’s server or web site 18 for that advertisement object. MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 3:24-63: In FIG. 1, a user operates a web browser, such as Netscape or Microsoft Internet Explorer, on a computer or PDA or other Internet capable device 16 to generate through the hypertext transfer protocol (HTTP) 14 a request 20 to any one of preferably a plurality of affiliate web sites 12. The affiliate web site sends one or more messages back 22 using the same protocol. Those messages 22 preferably contain all of the information available at the particular web site 12 for the requested page to be displayed by the 346 Reference Disclosure user’s browser 16 except for one or more advertising objects such as banner advertisements. These objects preferably do not reside on the affiliate’s web server. Instead, the affiliate’s web server sends back a link including an IP address for a node running an advertiser server process 19 as well as information about the page on which the advertisement will be displayed. The link by way of example may be a hypertext markup language (HTML) <img> tag, referring to, for example, an inline image such as a banner. The user’s browser 16 then transmits a message 23 using the received IP address to access such an object indicated by the HTML tag from the advertisement server 19. Included in each message 23 typically to the advertising server 19 are: the user’s IP address, (ii) a cookie if the browser 16 is cookie enabled and stores cookie information, (iii) a substring key indicating the page in which the advertisement to be provided from the server is to be embedded, and (iv) MIME header information indicating the browser type and version, the operating system of the computer on which the browser is operating and the proxy server type. Upon receiving the request in the message 23, the advertising server process 19 determines which advertisement or other object to provide to user’s browser and transmits the messages 24 containing the object such as a banner advertisement to the user’s browser 16 using the HTTP protocol. Preferably contained within the HTTP message is a unique identifier for the advertiser’s web page appropriate for the advertisement. That advertisement object is then displayed on the image created by the web user’s browser as a composite of the received affiliate’s web page plus the object transmitted back by the advertising web server. MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), Fig. 1: 347 Reference ADSERVER 2.0 ADSERVER 2.0; AD REPORTING NETGRAVITY ADSERVER HELP ABOUT NETGRAVITY ADSERVER Disclosure MERRIMAN II (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 9:3841: 2. The method of claim 1, wherein selecting an advertisement based upon stored information about said user node comprises selecting an advertisement based upon a prior content request sent from said user node to an affiliate node. See e.g., ADSERVER 2.0, p. 2 (“By tracking viewer response to advertising, NetGravity reports allow agencies and advertisers to quickly test the effectiveness of their campaigns.”) See e.g., ADSERVER 2.0; AD REPORTING, p. 1 (“Performance is indicated by the number of ad impressions and click-throughs for ads and advertisers.”); id. (describing that reports are provided on impressions/clicks.); id. (“AdServer supports premium ad types, the ability to test different ads in real-time, and the delivery of reliable performance reports.”); id., p. 2 (“By tracking viewer response to advertising, NetGravity reports allow agencies and advertisers to quickly test the effectiveness of their campaigns. Such rapid and reliable feedback empowers advertisers with the information they need to maximize their advertising efforts.”) See e.g., NETGRAVITY ADSERVER HELP, Installing the Redirection Utility (“When a visitor to your site clicks on an ad, AdServer redirects them to the advertiser’s site. Before they go there, however, AdServer must record that they clicked on the ad.”); see also id., AdSpace Specs, Working with Ads; id., AdServer Tools Reference (“RepAd – generates ad reports.”) See e.g., ABOUT NETGRAVITY ADSERVER, Getting Started, p. 1 (“AdServer records when the ad is shown, and also when it is clicked. You can then generate reports that show ad and location performance.”); id., p. 3: 348 Reference NETGRAVITY ADSERVER CHOSEN BY GNN Disclosure “Instead of immediately sending a user to the advertiser’s site, all ad links automatically execute the redir program. This is a CGI program that first records the user’s click before redirecting the user’s browser to the advertiser’s site.”); id., Serving Ads Dynamically, p. 2 (“. . . 8. The visitor views the page and the ad. When they click on the ad, they issue a call to the redirect utility on your content server. 9. The redirect utility records the user’s click in the AdServer logs, then sends the user to the advertiser’s site.”); id., Serving Ads Dynamically, p. 5 (“When AdServer serves an ad, it records in the AdServer_log file that the ad has been shown. Similarly, the redirect utility records that an ad was clicked by writing to the AdServer_log. . . . During its normal operation, AdServer writes to the AdServer_log file each time an ad is requested, and each time the redirect utility is notified that an ad has been clicked.”); id., Serving Ads Dynamically, p. 6 (“The parselog tool reads the AdServer_log file, extracts statistics about which ads received impressions and clicks, and writes that information to the AdServer database.”); id., AdServer Tools, p. 2: “Parselog reads your content server’s log file and writes usage statistics into the AdServer database. AdServer uses this information to measure the number of impressions and clicks an ad has received.” ); see also id., p. 5 (same), p. 6 (same).); id., Internal Specifications, p. 9 (listing logging “the number of clicks received”), p. 11 (listing that the system records that a “dynamically served ad received an impression” and that a “dynamically served ad received a click”); id., NGAPI Function Reference, p. 22 (noting that the ID of the ad that is clicked is logged), p. 23 (“records that an ad was clicked”), p. 37 (records “the number of clicks received”), p. 42 (same) See e.g., NETGRAVITY ADSERVER CHOSEN: NetGravity, the leader in Internet advertising technology, today announced GNN, a service of America Online Inc., will take advantage of the NetGravity AdServer technology for WebCrawler, its Internet search service. This allows GNN to better manage its WebCrawler advertising inventory, dynamically deliver targeted ads, measure advertising results in real time, and automate ad sales efforts. As part of this agreement, GNN becomes the first company to capitalize on the alliance between NetGravity and I/Pro (Internet Profiles Corporation), the leading Internet measurement firm. This builds on GNN's longstanding relationship with I/Pro and enhances its ability to provide the most comprehensive reports on advertising effectiveness and to deliver them to advertisers far faster than sites not using the NetGravity technology. NetGravity was founded to enable Web publishers to retain complete control of their online advertising management. Unlike other companies which merely provide services for ad placement and scheduling, NetGravity offers a unique approach, providing the software and technology which empowers publishers to manage 349 Reference Disclosure advertising inventory, dynamically target ads to the right audiences, measure results in real time, and automate sales efforts. Now, through NetGravity's relationship with I/Pro, Web sites will be able to develop and place advertising much more effectively using management tools with demographic profiles for targeted ad placement. Sites using the NetGravity AdServer are able to retain all advertising revenues and eliminate the risks of dependency on external services such as downtime, increasing costs, unplanned maintenance and unpredictable management. “For More About Tide, Click Here” by Zachary Schiller, Bloomberg Businessweek, June 2, 1996. (“SCHILLER”) See e.g., SCHILLER: “In a test arrangement, instead of compensating online companies for each consumer who sees a P&G ad, P&G will pay only when the online customer ‘clicks’ from that ad to one of P&G’s own Web sites. This means that Yahoo!, a major online provider that agreed to P&G’s terms, won’t make any money if a customer sees a spot promoting P&G’s SunnyDelight juice drink unless the customer moves on to its Sunny Delight Web site, which has a game with various prizes.” DEDRICK 1994 See e.g., DEDRICK 1994, p. 57 (“Soon however, advertisers will be more attracted to a distribution medium that . . . provides proof back to the advertiser showing aggregate consumption statistics for an advertisement” ); id. (p. 57: “The advertisers will pay for the storage and distribution services of the yellow pages, based upon the quality of the targeted consumers currently served by the yellow pages.”);id., p. 59 (“Paying for usage of the electronic yellow pages may follow a variety of models. One likely model consists of the advertiser paying the electronic yellow pages service provider a fee for storing and distributing each advertisement for a specified period of time.”); id., p. 61 (“Electronic content metering capabilities must exist within the servers that communicate with the client consumption devices. This will enable charging consumers for electronic content consumption and to pay the same consumer rebates for the consumption of electronic advertisements. . . . Some metering methodologies that may be important are pay per view of object (same cost each time or a decreasing cost based upon number of views), pay per byte (or other designated unit of content),pay per second (or other designated unit of time) . . .”); id., p. 62: “Specifically, the currently suggested attribute extension list is as follows: . . . Metering methodology attributes (includes debit and credit capabilities), Metering methodology pricing attributes”) See e.g., DEDRICK 1995, p. 42 (“provides statistics to advertisers showing aggregate consumption for an advertisement.”); id. (“Advertisers will pay for storage and distribution services based on the quality of the targeted consumers currently served by the yellow pages.”); id., p. 44 ("Paying for use of the electronic Yellow Pages could follow a variety of models. One DEDRICK 1995 350 Reference GALLAGHER NETGRAVITY ADSERVER CHOSEN BY GNN Lycos, Inc. Registration Statement No. 333354, dated April 3, 1996 (“LYCOS PROSPECUS”), produced at GOOG-WRD00872476-GOOGWRD-00872549 Disclosure likely model consists of the advertiser paying the electronic Yellow Pages service provider a fee for storing and distributing each ad for a specified period of time." ) See e.g., GALLAGHER, p. 7 (“Profiles accommodate the possibility that some users within the region of acceptability may be more desirable to an advertiser than others. Hen, a distance metric capturing the relative desirability of a user with respect to an ideal profile is possible. . . . recognizing a notion of distance allows the possibility for advertisers to ‘bid’ for the opportunity to display an advertisement to a user. Such bids would be determined by the advertiser, based on variables such as the user profile . . . and advertising budget.”); id., p. 8 (“When bids are received, they can be ranked. The banner advertisement corresponding to the winning bid is displayed to the user. Other advertisements may be displayed according to their ranking if there is an opportunity to display additional advertisements (e.g., if the user engages in several search or browse activities during a session).”) NETGRAVITY ADSERVER CHOSEN BY GNN (NetGravity, the leader in Internet advertising technology, today announced GNN, a service of America Online Inc., will take advantage of the NetGravity AdServer technology for WebCrawler. . . . This allows GNN to . . . measure advertising results in real time . . .”) See LYCOS PROSPECTUS at GOOG-WRD-00872492: Id. at GOOG-WRD-00872503-504: 351 Reference Disclosure Id. at GOOG-WRD-00872503-505: Id. at GOOG-WRD-00872535: Lycos, Inc. Form S-1 Registration Statement, dated February 14, 1996 (“LYCOS S-1”), produced at GOOG-WRD00872550-GOOGWRD-00872923 See LYCOS S-1 at GOOG-WRD-00872568: Id. at GOOG-WRD-00872579: 352 Reference Disclosure Id. at GOOG-WRD-00872580: Id. at GOOG-WRD-00872581: Id. at GOOG-WRD-00872609: 353 Reference Disclosure Excite, Inc. SB-2 Registration Statement No. 3332328-LA, March 11, 1996 (“Excite SB-2”) produced at GOOG-WRD00872006-GOOGId. at GOOG-WRD-00872037. WRD-00872094 Id. at GOOG-WRD-00872039. Id. at GOOG-WRD-00872043. Id. 354 Reference Disclosure Id. at GOOG-WRD-00872044. Id. Excite, Inc. Prospectus, dated April 3, 1996 (“Excite Prospectus”) produced at GOOG-WRD00871928GOOGL-WRD00872005 Id. at GOOG-WRD-00871957. Id. at GOOG-WRD-00871959. 355 Reference Disclosure Id. at GOOG-WRD-00871963. Id. Id. at GOOG-WRD-00871964. Id. 356 Reference Disclosure InfoSeek Corporation S-1 Registration Statement No. 3334142, Amendment No. 1, dated May 3, 1996 (“InfoSeek Id. at GOOG-WRD-00872378. S-1”) produced at GOOG-WRD00872371-GOOGWRD-00872464 Id. at GOOG-WRD-00872380. Id. at GOOG-WRD-00872388. Id. at GOOG-WRD-00872402-403. 357 Reference Disclosure Id. at GOOG-WRD-00872404. Id. at GOOG-WRD-00872404-05. Id. at GOOG-WRD-00872405. Id. at GOOG-WRD-00872409-10. 358 Reference Disclosure Id. at GOOG-WRD-00872410. Id. at GOOG-WRD-00872410-411. Id. at GOOG-WRD-00872411. 359 Reference Disclosure Yahoo Prospectus Registration Statement No. 3332142, dated April 12, 1996 (“Yahoo Prospectus”) produced at GOOG-WRD00874251-GOOGWRD-00874328 Id. at GOOG-WRD-00874253. 360 Reference Disclosure GOOG-WRD-00874258-59. Id. at GOOG-WRD-00874261. Id. at GOOG-WRD-00874264-65. 361 Reference Disclosure Id. at GOOG-WRD-00874262. Id. at GOOG-WRD-00874275. Id. at GOOG-WRD-00874280. Id. at GOOG-WRD-00874289. 362 Reference Disclosure Id. at GOOG-WRD-00874316. Yahoo Form SB-2 Registration Statement No. 3332142, dated March 7, 1996 (“Yahoo Form SB-2”) produced at GOOG-WRD00874329-GOOGWRD-00874418 Yahoo Form SB-2 at GOOG-WRD-00874333. 363 Reference Disclosure GOOG-WRD-00874337-38. Id. at GOOG-WRD-00874339-40. 364 Reference Disclosure Id. at GOOG-WRD-00874343. Id. at GOOG-WRD-00874369. Id. at GOOG-WRD-00874353. 365 Reference Disclosure Id. at GOOG-WRD-00874358. Id. at GOOG-WRD-00874366-67. Id. at GOOG-WRD-00874393. 366 Reference Disclosure Open Text Form F1 Registration Statement No. 3398858, dated November 1, 1995 (“Open Text Form F-1”) produced at GOOG-WRD00873727-GOOGWRD-00873878 Id. at GOOG-WRD-00873739. Id. at GOOG-WRD-00873775. Id. at GOOG-WRD-00873779. 367 Reference Disclosure Id. at GOOG-WRD-00873783-84. Open Prospectus, dated January 23, 1996 (“Open Text Prospectus”) produced at OT03652-3758 Id. at OT03658. Id. at OT03694. Id. at OT03698. 368 Reference Disclosure Id. at OT037002-03. 369 Table B7: Databases, Clients, Servers To the extent the references addressed in claim charts A-1 to A-39 does not disclose the limitations identified in each chart citing Table B7, one of ordinary skill in the art would be motivated to combine the references addressed in claim charts A-1 to A-39 with any one or more of the Table B7 references listed below because: it would have yielded predictable results; using the techniques of the Table B7 references would have improved the primary or obviousness references in the same way; and applying the techniques of the Table B7 references to improve primary or obviousness references would have yielded predictable results. Reference PECKOVER Disclosure See, e.g., PECKOVER, 17:6-10: Various specialized agents are described in conjunction with other Figures. Agents and other components operating in Agent Marketplace 28 have access to a Product Database (Product DB or PDB) 32. PECKOVER, 23:17-20: A Product Listing function 124 maintains a list of the products that can be advertised in this market. Each product references detailed product data that is kept in a Product Database (PDB) 32 described in conjunction with FIG. 9A. PECKOVER, 23:43-47:61: An Active Ads function 146 maintains the ads that are currently active. As each new add is accepted by Active Ads function 146, an Active Decision Agent Manager 152 (see below) is notified so that pending searches can be matched against the new advertisement. PECKOVER, 25:10-36: A Remote Database Adaptor 140 provides communication and session management services to connect to a database (a “remote database”, not shown) belonging to a manufacturer or a provider. Remote Database Adaptor 140 also provides translation services to translate between the data formats used by a remote database and the data formats used by PDB 32. Remote Database Adaptor 140 allows a provider to submit ads directly from the provider’s remote database into Market 18. Remote Database Adaptor 140 also allows access “by reference” to advertisement data that remains stored in a remote database; that is, the data is not copied into Agent System 10, but is accessed as needed. Market 18 includes a 370 Reference U.S. PATENT NO. 5,710,884 (“DEDRICK PATENT”) Disclosure Remote Database Adaptor 140 for each provider that chooses to supply ads in this manner; alternatively, a provider uses various functional components accessed via provider’s Personal Agent 13 to place ads manually. PECKOVER, 25:36-57: Referring to FIG. 9A, a Product Database 32 (PDB) comprises functional components: a Database Administration function 166, a Product Data Storage function 168, a Product Template Manager function 170, and, (optionally) some number of Remote Database Adaptors 172. PDB 32 maintains generic data about products, to be referenced by ads placed by providers. Although PDB 32 is illustrated here as a single database (with several internal components) for ease of understanding, the contemplated PDB 32 will be split across several processors 38, as illustrated previously in FIG. 3A. Referring to FIG. 9A, a Database Administration function 166 provides conventional add, delete, update, query, and backup access for a System Administrator user to the other components of PDB 32. A Product Data Storage function 168 stores data about different products, for example, product name, product model number, manufacturer’s suggested retail price for product, etc. See, e.g., DEDRICK PATENT, 3:37-44: The metering server 14 is coupled to a publisher unit 18 through a plurality of clearinghouse servers 20. By way of example, the publisher 18 may be connected to the server 14 as part of an overall wide area network (WAN) that allows the server 14 and publisher unit 18 to transfer information. The system 10 may also have a yellow page server 22 coupled to the publisher unit 18 and the metering servers 14. The publisher unit and servers of the WAN system contain the interface hardware and software necessary to transfer electronic information between the components of the system. As shown in FIG. 1, the system 10 may have multiple client systems 12 coupled to a single metering server 14 and multiple servers 14 coupled to a single clearinghouse server 20, a regional content database server 21 and a single yellow page server 22. There may be multiple clearinghouse and yellow page servers located at regional centers throughout the country/world. In addition, depending on the size of a community, there may also be multiple yellow page servers for each local community. Although the computer 18 is referred to 371 Reference U.S. Patent No. 6,374,237 (“REESE”) Disclosure as a publishing unit, it is to be understood that the computer can also be a node for an advertiser 18 and that the use of the terms publisher and advertiser may be synonymous. DEDRICK PATENT, 5:39-51: Session manager 29 transfers data and control information to and from the components of client system 12, and acts as an interface between client system 12 and metering server 14. Electronic information which is transferred to client system 12 is received by session manager 29 and forwarded to client interface 23. In one embodiment, the electronic information. is forwarded to client interface 23 via content adapter 25. Content adapter 25 may then modify the electronic information, based on the end user’s data stored in personal profile database 27. Session manager 29 also instructs statistic compilation process 26 to compile the aggregate data stored in personal profile database 27 when the information is requested by metering server 14. DEDRICK PATENT, 7:28-39: Data is collected for personal profile database 27 by direct input from the end user and also by client activity monitor 24 monitoring the end user’s activity. When the end user consumes a piece of electronic information, each variable (or a portion of each variable) within the header block for that piece of electronic information is added to the database for this end user. For example, if this piece of electronic information is made available to the end user for consumption in both audio and video format, and the end user selects the audio format, then this choice of format selection is stored in personal profile database 27 for this end user. REESE, 1:12-21: The World Wide Web brings the vast amount of information on the Internet to the public's attention. A problem today in web browsing is that browsing is essentially flat, with no semantic meaning applied to query and search mechanisms. Between the client, an application program that establishes connections for the purpose of sending requests from a user, and the server, an application that accepts connections in order to service requests by sending back responses, there exists a bandwidth problem of not being able to get information quickly enough to the user on the client end to do meaningful operations. REESE, 2:49-65: FIG. 1 presents a block diagram of the invention. FIG. 1 shows a client 110 that is an application program that establishes connections for the purpose of sending requests to a matching 372 Reference U.S. Patent Nos. 5,948,061 (“MERRIMAN I”) and 7,844,488 (“MERRIMAN II”) Disclosure server 120. The client 110 contains a user agent that initiates the request. The user agent is, for example, a browser, editor, spider (web-traversing robot), or other end user tool that can service different requests by a user. Typical browsers include NETSCAPE NAVIGATORTM or INTERNET EXPLORERTM. The matching server 120 is an application program that accepts connections in order to service requests by sending back responses. In the case of a browser, a request is sent in a typical protocol, for example, hypertext transfer protocol (HTTP). Other protocols include Simple Mail Transfer Protocol (“SMTP”), Network News Transfer Protocol (“NNTP”), File Transfer Protocol (“FTP”), Gopher, and Wide Area Information Service (“WAIS”). REESE, 6:54-67: FIG. 8 presents a flow chart of the construction of a matching server database of the invention. In FIG. 8, a matching server is designated. In step 800, a matching server is designated to construct an aggregate database. In step 810, a list of content servers is designated from which to collect data that will make up the aggregate data of the matching server. The content servers designated could be any or all servers in an Internet environment or select servers in an Intranet or other network environment. Next, in step 820, the matching server walks each of the content servers and collects information that will make up the aggregate database. Next, in step 830, the matching server builds an aggregate database that is a representation of the content servers walked. See, e.g., MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 2:59-3:4: The basic architecture of the network 10 comprises at least one affiliate web site 12, an advertisement (ad) server web site 19 and one or more individual advertiser’s web sites 18. Affiliates are one or more entities that generally for a fee contract with the entity providing the advertisement server permit third party advertisements to be displayed on their web sites. When a user using a browser accesses or “visits” a web site of an affiliate, an advertisement provided by the advertisement server 19 will be superimposed on the display of the affiliate’s web page displayed by the user’s browser. Examples of appropriate affiliates include locator services, service providers, and entities that have popular web sites such as museums, movie studios, etc. MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 3:523: The basic operation of the system is as follows in the preferred 373 Reference Disclosure embodiment. When a user browsing on the Internet accesses an affiliate’s web site 12, the user’s browser generates an HTTP message 20 to get the information for the desired web page. The affiliate’s web site in response to the message 20 transmits one or more messages back 22 containing the information to be displayed by the user’s browser. In addition, an advertising server process 19 will provide additional information comprising one or more objects such as banner advertisements to be displayed with the information provided from the affiliate web site. Normally, the computers supporting the browser, the affiliate web site and the advertising server process will be at entirely different nodes on the Internet. Upon clicking through or otherwise selecting the advertisement object, which may be an image such as an advertisement banner, an icon, or a video or an audio clip, the browser ends up being connected to the advertiser’s server or web site 18 for that advertisement object. MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 3:24-63: In FIG. 1, a user operates a web browser, such as Netscape or Microsoft Internet Explorer, on a computer or PDA or other Internet capable device 16 to generate through the hypertext transfer protocol (HTTP) 14 a request 20 to any one of preferably a plurality of affiliate web sites 12. The affiliate web site sends one or more messages back 22 using the same protocol. Those messages 22 preferably contain all of the information available at the particular web site 12 for the requested page to be displayed by the user’s browser 16 except for one or more advertising objects such as banner advertisements. These objects preferably do not reside on the affiliate’s web server. Instead, the affiliate’s web server sends back a link including an IP address for a node running an advertiser server process 19 as well as information about the page on which the advertisement will be displayed. The link by way of example may be a hypertext markup language (HTML) <img> tag, referring to, for example, an inline image such as a banner. The user’s browser 16 then transmits a message 23 using the received IP address to access such an object indicated by the HTML tag from the advertisement server 19. Included in each message 23 typically to the advertising server 19 are: the user’s IP address, (ii) a cookie if the browser 16 is cookie enabled and stores cookie information, (iii) a substring key indicating the page in which the advertisement to be provided from the server is to be embedded, and (iv) MIME header information indicating the browser type and version, 374 Reference U.S. Patent No. 7,072,849 (“FILEPP”) Disclosure the operating system of the computer on which the browser is operating and the proxy server type. Upon receiving the request in the message 23, the advertising server process 19 determines which advertisement or other object to provide to user’s browser and transmits the messages 24 containing the object such as a banner advertisement to the user’s browser 16 using the HTTP protocol. Preferably contained within the HTTP message is a unique identifier for the advertiser’s web page appropriate for the advertisement. That advertisement object is then displayed on the image created by the web user’s browser as a composite of the received affiliate’s web page plus the object transmitted back by the advertising web server. MERRIMAN I (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), Fig. 1: MERRIMAN II (AND CORRESPONDING DISCLOSURE IN MERRIMAN II), 9:38-41: 2. The method of claim 1, wherein selecting an advertisement based upon stored information about said user node comprises selecting an advertisement based upon a prior content request sent from said user node to an affiliate node. See, e.g., FILEPP, 5:1-23: As seen in FIG. 1, interactive network 10 uses a layered structure that includes an information layer 100, a switch/file server layer 200, and cache/concentrator layer 300 as well as reception layer 401. This structure maintains active application databases and delivers requested parts of the databases on 375 Reference Disclosure demand to the plurality of RS 400’s, shown in FIG. 2. As seen in FIG. 2, cache/concentrator layer 300 includes a plurality of cache/concentrator units 302, each or which serve a plurality of RS 400 units over lines 301. Additionally, switch/file server layer 200 is seen to include a server unit 205 connected to multiple cache/concentrator units 302 over lines 201. Still further, server unit 205 is seen to be connected to information layer 100 and its various elements, which act as means for producing, supplying and maintaining the network databases and other information necessary to support network 10. Continuing, switch/filer layer 200 is also seen to include gateway systems 210 connected to server 205. Gateways 210 couple layer 200 to other sources of information and data; e.g., other computer systems. As will be appreciated by those skilled in the art, layer 200, like layers 401 and 300, could also include multiple servers, gateways and information layers in the event even larger numbers of users were sought to be served. https://web.archive. See, e.g., “The integration of traditional databases into scalable Web org/web/19961107 servers. Although the primary database for the HotBot search engine is 001155/http://www.inkt custom-built for high performance, we use an integrated multiomi.com/tec machine Informix database for tracking user preference profiles and ad hnology.html placement and accounting. Informix provides multi-platform parallel database queries that fit well with the building-block model used by Inktomi: each server has the full power of SQL transactions and we replicate information to provide fault tolerance. The pervasive use of dynamic HTML generation to allow every user to see a customized page. The use of mass customization, in which we treat millions of users individually within one framework, requires scalable computing resources and database integration, but also requires new tools and technology. In particular, we have developed a new form of dynamic HTML that includes a server-side scripting language that generates HTML on the fly based on the user profile and client browser information. In addition to the obvious benefit of allowing users to customize their page, this technology also enables more targeted advertising, and use of advanced HTML features such as frames and tables for those browsers that can support them; we are not limited to some "least-common denominator" subset of HTML (for example to support older browsers).” https://web.archive.org/ web/19961107001258/ http://www.inktomi. com/whitepap.html See, e.g., Database access. Audience1 comes with Dynamic tags that can access a DBMS for arbitrary persistent information and customize the HTML tracking, using either cookies or fat URLs. Unlike other offerings, while Audience1 supports SQL, it does not require publishers to know SQL to access the database. This allows Inktomi 376 Reference DUMMIES PINKERTON Disclosure servers to store and recall a user's preferences for user interface and query results presentation. More generally, Audience1 is ideal for allowing servers to access pre-existing databases such as products, inventory, etc. Browser targeting. Audience1 allows publishers to exploit leading-edge HTML features (such as Netscape's frames and Java, and Microsoft's font changes and embedded audio tags), without frustrating users who do not have those features. Audience1's browser targeting can be performed at various levels of detail, ranging from tags that are easy to use, but don't provide a lot of publishing control, to exposing the raw browser capabilities to the publisher. For example, advertisers on HotBot are shown as progressive JPEG if the client browser supports it, otherwise they are shown as JPEGs or GIFs for less-capable browsers. This allows Inktomi to make the most of each browser, rather than resorting to a least-common denominator. Access to high performance, scalable services. Dynamic Tags make it possible for publishers to introduce new, high performance, scalable services, without requiring the publisher to understand the intricacies of computing programming. For example, access to the Inktomi search engine is encapsulated into a single Dynamic Tag, hiding the complexity of interfacing to a parallel program such as Inktomi. In addition, Dynamic Tags can be multi-threaded, interleaving longlatency operations such as Inktomi queries and customized content selection (i.e. targeted advertisements). We know of no other Webbased publishing system with this capability and ease-of-use. Publishing support hides the complexity of creating and managing sites of dynamic Web pages, allowing sites with large amounts of content to control the publishing process. Unlike the CGI-based tools that are emerging, Audience1's publishing support is fault tolerant, high performance and scales to millions of users and millions of hits per day. In summary, Audience1 and Dynamic Tags allow a customizable and sophisticated user-interface to Web services such as search engine. HotBot's interface, including saved searches, personalization, and browser targeting, would have been nearly impossible without the simplification provided by the Audience1 toolset.” See e.g., DUMMIES, p. 87-88 (identifying the three databases that may be searched by the Lycos search engine: a2z directory, Lycos catalog, and Point reviews.); id., p. 103-104 (describing the different databases available to search with the Excite search engine, the Web, Usenet, Classifieds, and Reviews) PINKERTON, P., 2 (“After retrieving a document, the WebCrawler performs three actions: it marks the document as having been retrieved, deciphers any outbound links (href’s), and indexes the content of the document. All of these steps involve storing information in a database”); id., p. 2-3 (“The database handles the 377 Reference Disclosure persistent storage of the document metadata, the links between documents, and the full-text index”); id., p. 5 (“The WebCrawler’s database is comprised of two separate pieces: a full-text index and a representation of the Web as a graph. The database is stored on disk, and is updated as documents are added.”) NETGRAVITY ADSERVER HELP See e.g., NETGRAVITY ADSERVER HELP, Choosing an Installation Scenario: “AdServerUI Host – To manage your ads and ad schedules you install the AdServerUI, which provides a Web interface for administering the AdServer database. The machine on which the AdServerUI resides is called the AdServerUI host. Content Host – The content host is the machine that runs your Web server and contains your Web content tree. Your site may have multiple content hosts. Though described above as separate, the content host and the AdServerUI host can, in fact, be the same machine. In other words, all AdServer components may be installed on the same host. Or, you may choose to host them on separate machines . . . Though depicted in the above diagram as separate, the content host and the AsServerUI host can be the same machine.”); id., Configuration Directives, p. 5 (“When you restart AdServer, it copies the database from the DatabaseStageDir to the DatabaseDir, and begins serving ads from this new database.”); id., Configuring Your Content Server (“Your content server is the HTTP server that you use to serve your Web content.”); id., Dynamic Ad Placement: Overview (“To serve an ad dynamically means that whenever an ad needs to be shown, the content server asks AdServer which ad to display at that exact moment.”) See e.g., ABOUT NETGRAVITY ADSERVER, Getting Started, p. 2 (“AdManager writes to the AdServer database, recording ad and scheduling information. . . . The content server is the Web server that serves your site’s content pages.”); see also id., Installing AdServer. FLYNN, p. 2-3 (“In the NetGravity model, advertisers can store their ads on their own server or the site’s server.”) See e.g., DEDRICK 1994, p. 55 (“Typical consumption devices are personal home computers that are connected to an electronic content distribution network via transport technologies such as cable, satellite, ISDN, POTS, and wireless . . .”); id., p. 56 (“Fig. 1 shows an end-toend high-level view of a content distribution network. This network connects content authors of ‘rich media’ advertisements with business and home content consumers.”); id. (“Fig. 1 shows the network connections that will allow bi-directional communication between authors and consumers, consumers and authors, etc.”); id., p. 57 (“The model proposed for dissemination of interactive electronic advertisements is through a series of cooperating local electronic yellow pages services, each spanning a specified region (with ABOUT NETGRAVITY ADSERVER FLYNN DEDRICK 1994 378 Reference DEDRICK 1995 GALLAGHER Disclosure potential for overlapping regions). Additionally, these local yellow pages servers also have connectivity with larger regional, national, and global electronic yellow pages services. To enable electronic advertising to subsidize the consumption of electronic content, these yellow pages services are also integrated with a variety of related services.”); id., p. 59 (“All consumers having access to the local electronic yellow pages can search these yellow pages, compare prices when multiple listings of similar service offerings exist, and automatically schedule an appointment with a service provider.”); id., p. 59 (“Object-oriented database management is one of the core required technologies of an electronic yellow pages mechanism. Such a DBMS must have distributed data management capabilities to deal with electronic advertisements existing across multiple regions.”); id., p. 60 (“the content distribution architecture is largely client-server oriented, using large hard-disk intensive network servers to hold terabytes of electronic content.”); id., p. 61 (“Back-channel capabilities enable a client consumption device to send requests to the electronic content distribution network servers and also to other network clients.”); id., p. 62 (“Specifically, the currently suggested attribute extension list as follows: . . . Dynamic (e.g., hypertext) links to associated objects, residing on both local and remote servers.”) See e.g., DEDRICK 1995, p. 42 (An end-to-end electronic content distribution network connects connect authors of rich-media advertising with business and home content consumers. . . . Network connections must provide connectivity that will allow bidirectional communication between authors and consumers. In addition, the endto-end distribution network must include intermediate content repositories.”); id., p. 43 (“To enable electronic advertising to subsidize content, these yellow pages services are also integrated with related electronic services, including commerce financial clearinghouses, content databases, authors, and content delivery to consumers.”); id., p. 43, Fig. 1; id., p. 44 ( “Distributed database management is one of the core required technologies of an electronic yellow pages mechanism.”); id., p. 46 (“All information on a profile device is protected by encryption and made available to the consumer only when the profile device is plugged into a consumption device and the consumer has entered the correct decryption password or personal identification number (PIN). Second, using a portable hardware-based device as a repository of consumers’ personal profiles lets consumers plug into the content distribution network through any device at work or at home.”) See e.g., GALLAGHER, p. 5 (“The architecture required to implement the basic version of the model consists of two parts: data structure to represent user profiles and target audience profiles, and an algorithm to select banner advertisements to display to a user.”); id., p. 6 379 Reference Lycos, Inc. Registration Statement No. 333-354, dated April 3, 1996 (“LYCOS PROSPECUS”), produced at GOOGWRD-00872476GOOG-WRD00872549 Disclosure (“Operationally, profiles for ideal or acceptable users can be maintained in a relational database structure. In the case of ideal profiles, a table can be defined in which each row describes the ideal target audience member for each advertisement..”); id., p. 8, Fig. 4. See LYCOS PROSPECTUS at GOOG-WRD-00872482: Id. at GOOG-WRD-00872484: Id. at GOOG-WRD-00872497-498: Id. at GOOG-WRD-00872499: 380 Reference Disclosure Id. at GOOG-WRD-00872502: Lycos, Inc. Form S-1 Registration Statement, dated February 14, 1996 (“LYCOS S-1”), produced at GOOGWRD-00872550GOOG-WRD00872923 See LYCOS S-1 at GOOG-WRD-00872558: Id. at GOOG-WRD-00872560: Id. at GOOG-WRD-00872573: 381 Reference Disclosure Id. at GOOG-WRD-00872575: Id. at GOOG-WRD-00872578: Excite, Inc. SB-2 Registration Statement No. 333-2328-LA, March 11, 1996 (“Excite SB-2”) produced at GOOGWRD-00872006GOOG-WRD00872094 Id. at GOOG-WRD-0087209. Id. at GOOG-WRD-0087209. 382 Reference Disclosure Id. at GOOG-WRD-00872010. Id. at GOOG-WRD-00872011. 383 Reference Disclosure Id. at GOOG-WRD-00872017-18. Id. at GOOG-WRD-00872038. Id. at GOOG-WRD-00872043. 384 Reference Disclosure Id. at GOOG-WRD-00872044. Id. Id. at GOOG-WRD-00872035. 385 Reference Disclosure Id. Id. at GOOG-WRD-00872037. Id. at GOOG-WRD-00872038. Id. Id. at GOOG-WRD-00872039. 386 Reference Disclosure Id. at GOOG-WRD-00872042. Id. at GOOG-WRD-00872046. 387 Reference Disclosure Id. at GOOG-WRD-00872047-48. Id. at GOOG-WRD-00872048. Id. at GOOG-WRD-00872049. Excite, Inc. Prospectus, dated April 3, 1996 (“Excite Prospectus”) produced at GOOGWRD-00871928GOOGL-WRD00872005 Id. at GOOG-WRD-00871929. 388 Reference Disclosure Id. at GOOG-WRD-00871929. Id. at GOOG-WRD-00871930. 389 Reference Disclosure Id. at GOOG-WRD-00871931. Id. at GOOG-WRD-00871937-38. 390 Reference Disclosure Id. at GOOG-WRD-00871958. Id. at GOOG-WRD-00871963. Id. at GOOG-WRD-00871964. Id. 391 Reference Disclosure Id. at GOOG-WRD-00871955. Id. Id. at GOOG-WRD-00871957. Id. at GOOG-WRD-00871958. 392 Reference Disclosure Id. Id. at GOOG-WRD-00871959. Id. at GOOG-WRD-00871962. 393 Reference Disclosure Id. at GOOG-WRD-00871966. Id. at GOOG-WRD-00871967-68. 394 Reference Disclosure Id. at GOOG-WRD-00871968. Id. at GOOG-WRD-00871969. 395 Reference InfoSeek Corporation S-1 Registration Statement No. 3334142, Amendment No. 1, dated May 3, 1996 (“InfoSeek S-1”) produced at GOOGWRD-00872371GOOG-WRD00872464 Disclosure Id. at GOOG-WRD-00872375. Id. at GOOG-WRD-00872403. 396 Reference Disclosure Id. Id. at GOOG-WRD-00872404. Id. at GOOG-WRD-00872404-05. Id. at GOOG-WRD-00872405. 397 Reference Disclosure Id. at GOOG-WRD-00872406. Id. 398 Reference Disclosure Id. at GOOG-WRD-00872408. Id. at GOOG-WRD-00872408-09. Id. at GOOG-WRD-00872409-10. Id. at GOOG-WRD-00872410. Id. at GOOG-WRD-00872411. 399 Reference Disclosure Id. at GOOG-WRD-00872413. Yahoo Prospectus Registration Statement No. 333-2142, dated April 12, 1996 (“Yahoo Prospectus”) produced at GOOG-WRD00874251-GOOGWRD-00874328 Id. at GOOG-WRD-00874279. Id. at GOOG-WRD-00874280. 400 Reference Disclosure Id. at GOOG-WRD-00874281. Id. at GOOG-WRD-00874282. Id. at GOOG-WRD-00874287. Id. at GOOG-WRD-00874290. Id. at GOOG-WRD-00874291. 401 Reference Yahoo Form SB-2 Registration Statement No. 333-2142, dated March 7, 1996 (“Yahoo Form SB-2”) produced at GOOG-WRD00874329-GOOGWRD-00874418 Disclosure Id. at GOOG-WRD-00874357. Id. at GOOG-WRD-00874358. Id. at GOOG-WRD-00874359. 402 Reference Disclosure Id. at GOOG-WRD-00874360. Id. at GOOG-WRD-00874365. Id. at GOOG-WRD-00874368. Id. at GOOG-WRD-00874368-69. 403 Reference Disclosure Open Text Form F-1 Registration Statement No. 33-98858, dated November 1, 1995 (“Open Text Form F1”) produced at GOOGWRD-00873727GOOG-WRD00873878 Id. at GOOG-WRD-00873603. 404 Reference Disclosure 405 Reference Disclosure Id. at GOOG-WRD-00873633-35. Id. at GOOG-WRD-00873639. Id. at GOOG-WRD-00873640. 406 Reference Disclosure Id. at GOOG-WRD-00873641. Id. at GOOG-WRD-00873642-43. Id. at GOOG-WRD-00873650. 407 Reference Disclosure Id. at GOOG-WRD-00873675. Id. at GOOG-WRD-00873676. Id. at GOOG-WRD-00873677. Open Prospectus, dated January 23, 1996 (“Open Text Prospectus”) produced at OT03652-3758 Id. at OT03653. 408 Reference Disclosure 409 Reference Disclosure 410 Reference Disclosure Id. at OT03689-91. Id. at OT03695. 411 Reference Disclosure Id. at OT03696. Id. at OT03697. Id. at OT03698. Id. at OT03735. 412 Reference Disclosure Id. at OT03736. Id. at OT03737. 413

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?