Adaptive expertise clustering system and method

ABSTRACT

A computer-implemented adaptive expertise clustering system and method generates expertise cohorts based on inferences from behavioral information and applies the expertise cohorts in generating recommendations for delivery to users. The expertise clustering may be informed by the evaluation of the contents of computer-implemented objects. Behaviors associated with members of specific expertise cohorts after specific events may inform the recommendations. Recommendations may comprise, for example, other users or process steps. Explanations for the recommendations may be provided to recommendation recipients.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of U.S. Provisional PatentApplication No. 61/469,052, entitled “Methods and Systems of ExpertiseDiscovery,” filed Mar. 29, 2010, U.S. Provisional Patent Application No.61/496,025, entitled “Adaptive Learning Layer Systems and Methods,”filed Jun. 12, 2011, and U.S. Provisional Patent Application No.61/513,920, entitled “Serendipitous Recommendations System and Method,”filed Aug. 1, 2011, all of which are hereby incorporated by reference asif set forth herein in their entirety.

FIELD OF THE INVENTION

This invention relates to systems and methods for incorporating anadaptive layer of auto-learning capabilities within one or morecomputer-implemented systems.

BACKGROUND OF THE INVENTION

Existing computer-based applications independently and/or collectivelyoperating in organizations are often non-adaptive or inadequatelyadaptive. These applications are most typically based on underlyinghierarchical or other non-fuzzy network-based structures, and suchstructures offer limited capacity for automatic adaptation over time.The level of investment and commitment to non-adaptive systems oftenmakes it difficult to justify immediately and/or completely convertingto more adaptive systems. Thus there is a need for transformationalsystems and methods that can transform non-adaptive systems orinadequately adaptive systems to adaptive systems, including thetransformation of non-fuzzy structures to fuzzy network-based structuresthat have a greater capacity for ongoing adaptation.

Furthermore, existing computer-implemented recommender systems canprovide personalized recommendations based on learning from behavioralhistories. While personalized recommendations can clearly be beneficial,a common criticism of such personalization systems is that they inhibitbeneficial serendipity due to their bias toward recommending items thatare aligned with a relatively narrow set of inferred interest areas,thereby depriving the recommendation recipient of becoming aware ofpotentially personally valuable content outside these interest areas.Thus there is a need for a system and method that retains the advantagesof personalization while promoting a greater degree of beneficialserendipity.

SUMMARY OF THE INVENTION

In accordance with the embodiments described herein, a method and systemfor transforming non-adaptive systems or inadequately adaptive systemsinto adaptive systems is disclosed. The transformation may includegenerating adaptive contextualizations by converting one or moreoriginating computer-implemented structures into an integrated fuzzynetwork-based structure. Computer-implemented functions may performbeneficial knowledge and expertise discovery, as well as otherfunctions, against the adaptive contextualization. Methods and systemsfor generating personalized recommendations with an enhanced capacityfor beneficial serendipity may be applied to enhance personalizationfunctions.

Other features and embodiments will become apparent from the followingdescription, from the drawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an adaptive system, according to someembodiments;

FIGS. 2A, 2B, and 2C are block diagrams of the structural aspect, thecontent aspect, and the usage aspect of the adaptive system of FIG. 1,according to some embodiments;

FIG. 3 is a block diagram of a fuzzy content network-based system,according to some embodiments;

FIGS. 4A, 4B, and 4C are block diagrams of an object, a topic object,and a content object, according to some embodiments;

FIG. 5A is a block diagram of a fuzzy content network-based adaptivesystem, according to some embodiments;

FIG. 5B is a block diagram of the transformation of originating systemstructures to a fuzzy network-based adaptive system, according to someembodiments;

FIG. 5C is a block diagram of a contextualized recommendation sourcedfrom originating systems, according to some embodiments;

FIG. 6 is a block diagram of a computer-based system that enablesadaptive communications, according to some embodiments;

FIG. 7 is a diagram illustrating user communities and associatedrelationships, according to some embodiments;

FIG. 8 is a block diagram of usage behavior processing functions of thecomputer-based system of FIG. 6, according to some embodiments;

FIG. 9 is a flow diagram of an adaptive personality process, accordingto some embodiments;

FIG. 10 is a flow diagram of a self-aware personality process, accordingto some embodiments;

FIG. 11 is a diagram of exemplary data structures associated with theadaptive personality process and the self-aware personality process ofFIGS. 9 and 10, according to some embodiments;

FIG. 12 is a block diagram of major functions of an adaptive personalityand self-aware personality system, according to some embodiments; and

FIG. 13 is a diagram of various computing device topologies, accordingto some embodiments.

DETAILED DESCRIPTION

In the following description, numerous details are set forth to providean understanding of the present invention. However, it will beunderstood by those skilled in the art that the present invention may bepracticed without these details and that numerous variations ormodifications from the described embodiments may be possible.

A method and system for transforming one or more non-adaptive orinadequately adaptive systems to an adaptive system are disclosed. Insome embodiments, originating fuzzy or non-fuzzy network informationstructures are transformed to fuzzy network structures so as to enable agreater capacity for adaptation, while retaining a degree of contextualcorrespondence. The term “fuzzy network” as used herein is defined as acomputer-implemented plurality of nodes, with relationships among thenodes that have affinities that are by degree. The nodes of a fuzzynetwork may comprise any type of computer-implemented information. Incontrast, non-fuzzy networks, including hierarchies, comprise aplurality of nodes, with relationships among the nodes that are binary:that is, either the relationships between any two nodes exist or do notexist.

In some embodiments, knowledge discovery and expertise discoveryfunctions are applied to the original non-fuzzy network and/or thetransformed structure. In some embodiments, additional “learning layer”functions may be applied to the originating and/or transformedstructures to enable additional or enhanced adaptive features, includingapplying functions to enhance beneficial serendipity with regard topersonalized recommendations.

Adaptive System

In some embodiments, the present invention may apply the methods andsystems of an adaptive system as depicted by FIG. 1. FIG. 1 is ageneralized depiction of an adaptive system 100, according to someembodiments. The adaptive system 100 includes three aspects: astructural aspect 210, a usage aspect 220, and a content aspect 230. Oneor more users 200 interact with the adaptive system 100. An adaptiverecommendations function 240 may produce adaptive recommendations 250based upon the user interactions, and the recommendations may bedelivered to the user 200 or applied to the adaptive system 100.

As used herein, one or more users 200 may be a single user or multipleusers. As shown in FIG. 1, the one or more users 200 may receive theadaptive recommendations 250. Non-users 260 of the adaptive system 100may also receive adaptive recommendations 250 from the adaptive system100.

A user 200 may be a human entity, a computer system, or a secondadaptive system (distinct from the adaptive system 100) that interactswith, or otherwise uses the adaptive system. The one or more users 200may therefore include non-human “users” that interact with the adaptivesystem 100. In particular, one or more other adaptive systems may serveas virtual system “users.” Although not essential, these other adaptivesystems may operate in accordance with the architecture of the adaptivesystem 100. Thus, multiple adaptive systems may be mutual users of oneanother.

It should be understood that the structural aspect 210, the contentaspect 230, the usage aspect 220, and the recommendations function 240of the adaptive system 100, and elements of each, may be containedwithin one processor-based device, or distributed among multipleprocessor-based devices, and wherein one or more of the processor-baseddevices may be portable. Furthermore, in some embodiments one or morenon-adaptive systems may be transformed to one or more adaptive systems100 by means of operatively integrating the usage aspect 220 and therecommendations function 240 with the one or more non-adaptive systems.In some embodiments the structural aspect 210 of a non-adaptive systemmay be transformed to a fuzzy network-based structural aspect 210 toprovide a greater capacity for adaptation.

The term “computer system” or the term “system,” without furtherqualification, as used herein, will be understood to mean either anon-adaptive or an adaptive system. Likewise, the terms “systemstructure” or “system content,” as used herein, will be understood torefer to the structural aspect 210 and the content aspect 230,respectively, whether associated with a non-adaptive system or theadaptive system 100. The term “system structural subset” or “structuralsubset,” as used herein, will be understood to mean a portion or subsetof the elements of the structural aspect 210 of a system.

Structural Aspect

The structural aspect 210 of the adaptive system 100 is depicted in theblock diagram of FIG. 2A. The structural aspect 210 comprises acollection of system objects 212 that are part of the adaptive system100, as well as the relationships among the objects 214, if they exist.The relationships among objects 214 may be persistent across usersessions, or may be transient in nature. The objects 212 may include orreference items of content, such as text, graphics, audio, video,interactive content, or embody any other type or item ofcomputer-implemented information. The objects 212 may also includereferences, such as pointers, to content. Computer applications,executable code, or references to computer applications may also bestored as objects 212 in the adaptive system 100. The content of theobjects 212 is known herein as information 232. The information 232,though part of the object 214, is also considered part of the contentaspect 230, as depicted in FIG. 2B, and described below.

The objects 212 may be managed in a relational database, or may bemaintained in structures such as, but not limited to, flat files, linkedlists, inverted lists, hypertext networks, or object-oriented databases.The objects 212 may include meta-information 234 associated with theinformation 232 contained within, or referenced by the objects 212.

As an example, in some embodiments, the World-wide Web could beconsidered a structural aspect, wherein web pages constitute the objectsof the structural aspect and links between web pages constitute therelationships among the objects. Alternatively, or in addition, in someembodiments, the structural aspect could be composed of objectsassociated with an object-oriented programming language, and therelationships between the objects associated with the protocols andmethods associated with interaction and communication among the objectsin accordance with the object-oriented programming language.

The one or more users 200 of the adaptive system 100 may be explicitlyrepresented as objects 212 within the system 100, therefore becomingdirectly incorporated within the structural aspect 210. Therelationships among objects 214 may be arranged in a hierarchicalstructure, a relational structure (e.g. according to a relationaldatabase structure), or according to a network structure.

Content Aspect

The content aspect 230 of the adaptive system 100 is depicted in theblock diagram of FIG. 2B. The content aspect 230 comprises theinformation 232 contained in, or referenced by the objects 212 that arepart of the structural aspect 210. The content aspect 230 of the objects212 may include text, graphics, audio, video, and interactive forms ofcontent, such as applets, tutorials, courses, demonstrations, modules,or sections of executable code or computer programs. The one or moreusers 200 interact with the content aspect 230.

The content aspect 230 may be updated based on the usage aspect 220, aswell as associated metrics. To achieve this, the adaptive system 100 mayuse or access information from other systems. Such systems may include,but are not limited to, other computer systems, other networks, such asthe World Wide Web, multiple computers within an organization, otheradaptive systems, or other adaptive recombinant systems. In this manner,the content aspect 230 benefits from usage occurring in otherenvironments.

Usage Aspect

The usage aspect 220 of the adaptive system 100 is depicted in the blockdiagram of FIG. 2C, although it should be understood that the usageaspect 220 may also exist independently of adaptive system 100 in someembodiments. The usage aspect 220 denotes captured usage information202, further identified as usage behaviors 270, and usage behaviorpre-processing 204. The usage aspect 220 thus reflects the tracking,storing, categorization, and clustering of the use and associated usagebehaviors of the one or more users 200 interacting with, or beingmonitored by, the adaptive system 100.

The captured usage information 202, known also as system usage or systemuse 202, may include any user behavior 920 exhibited by the one or moreusers 200 while using the system. The adaptive system 100 may track andstore user key strokes and mouse clicks, for example, as well as thetime period in which these interactions occurred (e.g., timestamps), ascaptured usage information 202. From this captured usage information202, the adaptive system 100 identifies usage behaviors 270 of the oneor more users 200 (e.g., a web page access or email transmission).Finally, the usage aspect 220 includes usage-behavior pre-processing, inwhich usage behavior categories 249, usage behavior clusters 247, andusage behavioral patterns 248 are formulated for subsequent processingof the usage behaviors 270 by the adaptive system 100. Non-limitingexamples of the usage behaviors 270 that may be processed by theadaptive system 100, as well as usage behavior categories 249 designatedby the adaptive system 100, are listed in Table 1, and described in moredetail, below.

The usage behavior categories 249, usage behaviors clusters 247, andusage behavior patterns 248 may be interpreted with respect to a singleuser 200, or to multiple users 200; the multiple users may be describedherein as a community, an affinity group, or a user segment. These termsare used interchangeably herein. A community is a collection of one ormore users, and may include what is commonly referred to as a “communityof interest.” A sub-community is also a collection of one or more users,in which members of the sub-community include a portion of the users ina previously defined community. Communities, affinity groups, and usersegments are described in more detail, below.

Usage behavior categories 249 include types of usage behaviors 270, suchas accesses, referrals to other users, collaboration with other users,and so on. These categories and more are included in Table 1, below.Usage behavior clusters 247 are groupings of one or more usage behaviors270, either within a particular usage behavior category 249 or acrosstwo or more usage categories. The usage behavior pre-processing 204 mayalso determine new clusterings of user behaviors 270 in previouslyundefined usage behavior categories 249, across categories, or among newcommunities. Usage behavior patterns 248, also known as “usagebehavioral patterns” or “behavioral patterns,” are also groupings ofusage behaviors 270 across usage behavior categories 249. Usage behaviorpatterns 248 are generated from one or more filtered clusters ofcaptured usage information 202.

The usage behavior patterns 248 may also capture and organize capturedusage information 202 to retain temporal information associated withusage behaviors 270. Such temporal information may include the durationor timing of the usage behaviors 270, such as those associated withreading or writing of written or graphical material, oralcommunications, including listening and talking, and/or monitoredbehaviors such as physiological responses, physical location, andenvironmental conditions local to the user 200. The usage behavioralpatterns 248 may include segmentations and categorizations of usagebehaviors 270 corresponding to a single user of the one or more users200 or according to multiple users 200 (e.g., communities or affinitygroups). The communities or affinity groups may be previouslyestablished, or may be generated during usage behavior pre-processing204 based on inferred usage behavior affinities or clustering. Usagebehaviors 270 may also be derived from the use or explicit preferences252 associated with other adaptive or non-adaptive systems.

Adaptive Recommendations

As shown in FIG. 1, the adaptive system 100 generates adaptiverecommendations 250 using the adaptive recommendations function 240. Theadaptive recommendations 250, or suggestions, enable users to moreeffectively use and/or navigate the adaptive system 100.

The adaptive recommendations 250 are presented as structural subsets ofthe structural aspect 210, which may comprise an item of content,multiple items of content, a representation of one or more users, and/ora user activity or stream of activities. The recommended content oractivities may include information generated automatically by aprocessor-based system or device, such as, for example, by a processcontrol device. A recommendation may comprise a spatial or temporalsequence of objects. The adaptive recommendations 250 may be in thecontext of a currently conducted activity of the system 100, a currentposition while navigating the structural aspect 210, a currentlyaccessed object 212 or information 232, or a communication with anotheruser 200 or another system. The adaptive recommendations 250 may also bein the context of a historical path of executed system activities,accessed objects 212 or information 232, or communications during aspecific user session or across user sessions. The adaptiverecommendations 250 may be without context of a current activity,currently accessed object 212, current session path, or historicalsession paths. Adaptive recommendations 250 may also be generated inresponse to direct user requests or queries, including search requests.Such user requests may be in the context of a current system navigation,access or activity, or may be outside of any such context and therecommended content sourced from one or more systems. The adaptiverecommendations 250 may comprise advertising or sponsored content. Theadaptive recommendations 250 may be delivered through anycomputer-implemented means, including, but not limited to delivery modesin which the recommendation recipient 200, 260 can read and/or listen tothe recommendation 250.

Fuzzy Content Network

In some embodiments, the structural aspect 210 of the adaptive system100, comprises a specific type of fuzzy network, a fuzzy contentnetwork. A fuzzy content network 700 is depicted in FIG. 3. The fuzzycontent network 700 may include multiple content sub-networks, asillustrated by the content sub-networks 700 a, 700 b, and 700 c, andfuzzy content network 700 includes “content,” “data,” or “information,”packaged in objects 710. Details about how the object works internallymay be hidden. In FIG. 4A, for example, the object 710 includesmeta-information 712 and information 714. The object 710 thusencapsulates information 714.

Another benefit to organizing information as objects is known asinheritance. The encapsulation of FIG. 4A, for example, may formdiscrete object classes, with particular characteristics ascribed toeach object class. A newly defined object class may inherit some of thecharacteristics of a parent class. Both encapsulation and inheritanceenable a rich set of relationships between objects that may beeffectively managed as the number of individual objects and associatedobject classes grows.

In the content network 700, the objects 710 may be either topic objects710 t or content objects 710 c, as depicted in FIGS. 4B and 4C,respectively. Topic objects 710 t are encapsulations that containmeta-information 712 t and relationships to other objects (not shown),but do not contain an embedded pointer to reference associatedinformation. The topic object 710 t thus essentially operates as a“label” to a class of information. The topic object 710 therefore justrefers to “itself” and the network of relationships it has with otherobjects 710. People may be represented as topic objects or contentobjects in accordance with some embodiments.

Content objects 710 c, as shown in FIG. 4C, are encapsulations thatoptionally contain meta-information 36 c and relationships to otherobjects 710 (not shown). Additionally, content objects 710 c may includeeither an embedded pointer to information or the information 714 itself(hereinafter, “information 714”).

The referenced information 714 may include files, text, documents,articles, images, audio, video, multi-media, software applications andelectronic or magnetic media or signals. Where the content object 714 csupplies a pointer to information, the pointer may be a memory address.Where the content network 700 encapsulates information on the Internet,the pointer may be a Uniform Resource Locator (URL).

The meta-information 712 supplies a summary or abstract of the object710. So, for example, the meta-information 712 t for the topic object710 t may include a high-level description of the topic being managed.Examples of meta-information 712 t include a title, a sub-title, one ormore descriptions of the topic provided at different levels of detail,the publisher of the topic meta-information, the date the topic object710 t was created, and subjective attributes such as the quality, andattributes based on user feedback associated with the referencedinformation. Meta-information may also include a pointer to referencedinformation, such as a uniform resource locator (URL), in oneembodiment.

The meta-information 712 c for the content object 710 c may includerelevant keywords associated with the information 714, a summary of theinformation 714, and so on. The meta-information 712 c may supply a“first look” at the objects 710 c. The meta-information 712 c mayinclude a title, a sub-title, a description of the information 714, theauthor of the information 714, the publisher of the information 714, thepublisher of the meta-information 712 c, and the date the content object710 c was created, as examples. As with the topic object 710 t,meta-information for the content object 710 c may also include apointer.

In FIG. 3, the content sub-network 700 a is expanded, such that bothcontent objects 710 c and topic objects 710 t are visible. The variousobjects 34 of the content network 700 are interrelated by degrees usingrelationships 716 (unidirectional and bidirectional arrows) andrelationship indicators 718 (values). Each object 710 may be related toany other object 710, and may be related by a relationship indicator718, as shown. Thus, while information 714 is encapsulated in theobjects 710, the information 714 is also interrelated to otherinformation 714 by a degree manifested by the relationship indicators718.

The relationship indicator 718 is a type of affinity comprising a valueassociated with a relationship 716, the value typically comprising anumerical indicator of the relationship between objects 710. Thus, forexample, the relationship indicator 718 may be normalized to between 0and 1, inclusive, where 0 indicates no relationship, and 1 indicates asubset or maximum relationship. Or, the relationship indicators 718 maybe expressed using subjective descriptors that depict the “quality” ofthe relationship. For example, subjective descriptors “high,” “medium,”and “low” may indicate a relationship between two objects 710.

The relationship 716 between objects 710 may be bi-directional, asindicated by the double-pointing arrows. Each double-pointing arrowincludes two relationship indicators 718, one for each “direction” ofthe relationships between the objects 710.

As FIG. 3 indicates, the relationships 716 between any two objects 710need not be symmetrical. That is, topic object 710 t 1 has arelationship of “0.3” with content object 710 c 2, while content object710 c 2 has a relationship of “0.5” with topic object 710 t 1.Furthermore, the relationships 716 need not be bi-directional—they maybe in one direction only. This could be designated by a directed arrow,or by simply setting one relationship indicator 718 of a bi-directionalarrow to “0,” the null relationship value.

The content networks 700A, 700B, 700C may be related to one anotherusing relationships of multiple types and associated relationshipindicators 718. For example, in FIG. 3, content sub-network 700 a isrelated to content sub-network 700 b and content sub-network 700 c,using relationships of multiple types and associated relationshipindicators 718. Likewise, content sub-network 700 b is related tocontent sub-network 700 a and content sub-network 700 c usingrelationships of multiple types and associated relationship indicators718.

Individual content and topic objects 710 within a selected contentsub-network 700 a may be related to individual content and topic objects710 in another content sub-network 700 b. Further, multiple sets ofrelationships of multiple types and associated relationship indicators718 may be defined between two objects 710.

For example, a first set of relationships 716 and associatedrelationship indicators 718 may be used for a first purpose or beavailable to a first set of users while a second set of relationships716 and associated relationship indicators 718 may be used for a secondpurpose or available to a second set of users. For example, in FIG. 3,topic object 710 t 1 is bi-directionally related to topic object 710 t2, not once, but twice, as indicated by the two double arrows. Anindefinite number of relationships 716 and associated relationshipindicators 718 may therefore exist between any two objects 710 in thefuzzy content network 700. The multiple relationships 716 may correspondto distinct relationship types. For example, a relationship type mightbe the degree an object 710 supports the thesis of a second object 710,while another relationship type might be the degree an object 710disconfirms the thesis of a second object 710. The content network 700may thus be customized for various purposes and accessible to differentuser groups in distinct ways simultaneously.

The relationships among objects 710 in the content network 700, as wellas the relationships between content networks 700 a and 700 b, may bemodeled after fuzzy set theory. Each object 710, for example, may beconsidered a fuzzy set with respect to all other objects 710, which arealso considered fuzzy sets. The relationships among objects 710 are thedegrees to which each object 710 belongs to the fuzzy set represented byany other object 710. Although not essential, every object 710 in thecontent network 700 may conceivably have a relationship with every otherobject 710.

The topic objects 710 t encompass, and are labels for, very broad fuzzysets of the content network 700. The topic objects 710 t thus may belabels for the fuzzy set, and the fuzzy set may include relationships toother topic objects 710 t as well as related content objects 710 c.Content objects 710 c, in contrast, typically refer to a narrower domainof information in the content network 700.

The adaptive system 100 of FIG. 1 may operate in association with afuzzy content network environment, such as the one depicted in FIG. 3.In FIG. 5A, an adaptive system 100D includes a structural aspect 210Dthat is a fuzzy content network. Thus, adaptive recommendations 250generated by the adaptive system 100D are also structural subsets thatmay themselves comprise fuzzy content networks.

In some embodiments a computer-implemented fuzzy network or fuzzycontent network 700 may be represented in the form of vectors ormatrices in a computer-implemented system. For example, the relationshipindicators 718 or affinities among topics may be represented astopic-to-topic affinity vectors (“TTAV”). The relationship indicators718 or affinities among content objects may be represented ascontent-to-content affinity vectors (“CCAV”). The relationshipindicators 718 or affinities among content and topic objects may berepresented as content-to-topic affinity vectors (“CTAV”).

Further, affinity vectors between a user 200 and objects of a fuzzynetwork or fuzzy content network 700 may be generated. For example, amember (i.e., user)-to-topic affinity vector (“MTAV”) may be generatedin accordance with some embodiments (and an exemplary process forgenerating an MTAV is provided elsewhere herein). In some embodiments anaffinity vector (“MMAV”) between a specific user and other users 200 maybe generated derivatively from MTAVs and/or other affinity vectors (andan exemplary process for generating an MMAV is provided elsewhereherein). In some embodiments a member-topic expertise vector (MTEV) isgenerated, which is defined as a vector of inferred member or user 200expertise values corresponding to each topic.

In some embodiments a multi-dimensional mathematical construct or spacemay be generated based on one or more of the affinity vectors. By way ofa non-limiting example, topics may represent each dimension of amulti-dimensional space. Calculations of distances between objectsand/or users in the multi-dimensional space, and clusters among objectsand/or users, may be determined by applying mathematical algorithms tothe multi-dimensional space and its elements. These calculations may beused by the adaptive system 100 in generating recommendations and/or inclustering elements of the space.

In some embodiments one or more topics 710 t and/or relationshipindicators 718 may be generated automatically by evaluating candidateclusters of content objects 710 c based on behavioral information 920and/or the matching of information within the content objects 710 c,wherein the matching is performed through probabilistic, statistical,and/or neural network techniques.

Transforming Non-Fuzzy Network Structures to Fuzzy Network Structures

In some embodiments, systems that include organizing structures ortaxonomies other than non-fuzzy networks may be beneficially transformedor converted to a fuzzy network to enable a greater capacity foradaptation, while retaining contextual correspondences to theoriginating systems. Such a transformation is called a “structuraltransformation” herein. The resulting fuzzy taxonomy and adaptivecontextualization may be applied to enhance user navigationalexperiences. The transformation may be performed in initializing thefuzzy network only, or the transformation may be performed on a periodicor continuing basis. In some embodiments the fuzzy network may exist inparallel with the originating structure or structures. In otherembodiments the fuzzy network may replace the originating non-fuzzynetwork structure. In some embodiments the fuzzy network structure towhich the non-fuzzy structure is transformed comprises a fuzzy contentnetwork 700. Examples of originating non-fuzzy network system structuresinclude flat files, hierarchical structures, relational structures,virtual views, tagging structures, and network structures in which therelationships between objects or items are not by degree. Structuresemployed by social networking, collaborative systems, and micro-bloggingsystems may be transformed to a fuzzy network, including originatingstructures that comprise a stream of activities, as well as structuresin which people have symmetric relationships (e.g., “friends,”colleagues, or acquaintances) or asymmetric relationships (e.g.,“followers” or “fans”).

In some embodiments, the transformation process described herein mayalso or alternatively be applied to transform a first fuzzy network to asecond fuzzy network, whereby the second fuzzy network includesadditional or alternative relationships among objects. This may be thecase, for example, as when additional behavioral information is used togenerate relationships in the second fuzzy network that have not beenapplied, or have been applied differently, in the first fuzzy network.

The process of transforming a non-fuzzy network structure to a fuzzystructure may include mappings between elements of the non-fuzzy networkstructure and the fuzzy network structure, as well as rules forestablishing and adjusting elements of the fuzzy network structure. Theelements of the fuzzy network structure that is transformed includeobjects and relationships among the objects. The mappings and rules arecollectively called a “transformational protocol” herein. Thecomputer-implemented function or functions that are invoked to performthe transformational protocol may apply user behavioral information 920that includes, but is not limited to, one or more behaviorscorresponding to the usage behavioral categories listed in Table 1herein.

An exemplary structural transformation and associated transformationalprotocol is illustrated by FIG. 5B, which depicts a first originatingsystem 620 and a second originating system 660 being transformed bymeans of a transformation function 610 into an adaptive system 100D. Itshould be understood that while FIG. 5B depicts two originating systemsbeing transformed, a single originating system or more than twooriginating systems may be transformed.

Originating system A 620 comprises a folder structure hierarchy 630 andone or more views 640. These types of organizing structures may besimilar to information organizing structures that are available, forexample, in a Microsoft®SharePoint® system. Such organizing structuresmay include virtual views and/or hierarchical structures, comprisingviews and/or folders, which may be aligned with super-structures such aslibraries and sub-sites, with each view or folder potentially containingone or more files of content 633. Views 640 are contrasted with folders630 in that views allow a specific file 641 to be shared or commonlyincluded across multiple views, whereas a specific file 633 cantypically be allocated only to a single folder 632.

As illustrated in originating system B 660, another type of non-fuzzyorganizing structure that may be transformed in some embodiments is asubject tagging structure in which files of content 655, or mostgenerally, objects 212, are tagged with one or more words or phrasescorresponding to subjects 652 or topics. These subjects 652 may beselected by a user from an existing list of subject tags, or they may beentered directly by a user. In some embodiments the subject tags maycorrespond to a pre-defined structure, such as a hierarchy 650, in whicha first subject tag 652 may represent a parent subject and a secondsubject 654 may represent a child of the parent subject. In other cases,the subject tags 680 may not have an explicit hierarchical structure. Insome originating systems every content item or object 655 may berequired to have at least one subject tag; in other originating systemssome objects may be associated with one or more tags, but others maynot. It should be understood that the distribution and combinations oforiginating structures across one or more originating systems may bedifferent than those depicted in FIG. 5B.

In some embodiments, a transformation protocol is applied by thetransformation function 610 to transform structures of one or moreoriginating systems comprising views 640, folders 632, or subject tags652,680, as well as combinations thereof. Each of these types ofstructures can contribute beneficially complementary information ingenerating a fuzzy network structure. Although the transformationfunction 610 is depicted outside the adaptive system 100D in FIG. 5B, insome embodiments the transformation function resides inside the adaptivesystem 100D. The transformation function 610 accesses 612,614structural, content, and, in some cases, behavioral information (notexplicitly shown in the originating systems of FIG. 5B), from the one ormore or originating systems 620,660. The transformation function usesthis information from the originating systems to generate a fuzzynetwork structural aspect 210D, and may provide 618 usage behaviorinformation from the originating systems to the usage aspect 220.

In accordance with some embodiments, non-limiting example cases ofstructural transformations are now described. The first conversion caseto be described is the process for transforming two or more views 640 toa fuzzy content network 700. In the first step, the originating views640 are mapped 616 to topics 710 t of the fuzzy content network, andoriginating files are mapped 616 to content objects 710 c. This mappingmay include transferring meta-data 712 associated with the originatingviews 640 and files 641 to the corresponding objects 710 in the fuzzycontent network 700. The transferred or referenced meta-data mayinclude, but is not limited to, creator and create date information,owner, author and publisher information, and user ratings and feedback.Such behavioral based information may be transferred 618 to the usageaspect 220 of the adaptive system 100D. In the second step, relationshipindicators 718 are created among the topics 710 t (that are convertedfrom views 640) in the fuzzy content network 700.

In some embodiments, a metric based on the intersection divided by theunion of files 641 contained in two views of the originating structureis used to generate an affinity 718 between the two corresponding topics710 t in the fuzzy network. Accordingly, in some embodiments thepercentage of common files is calculated as the number of common filesdivided by the sum of the unique files in the two views. For example ifthere are 4 files in View Y and 4 files in View X and 2 of the files arein both View X and View Y, then the percentage of common files is2/6=33%. In some embodiments, the percentage-of-common-files metric maybe adjusted based on the comparison of information contained in thecommon and/or uncommon files in the two views. Behavioral information,including, but not limited to the behaviors of Table 1, may be used bythe transformation function 610 to adjust the affinity 718 between thetwo corresponding topics 710 t.

An exemplary establishment of bi-directional relationship indicators 718between topics corresponding two views, Y and X, is illustrated by thefollowing pseudo code:

If View Y and View X have > 10% common files then the relationshipindicators 718 between corresponding topics 710t are set at: X-to-Y=0.4and Y-to-X=0.4; else If View Y and View X have > 25% common files thenthe relationship indicators 718 between corresponding topics 710t areset at: X-to-Y=0.6 and Y-to-X=0.6; else If View Y and View X have > 50%common files then the relationship indicators 718 between correspondingtopics 710t are set at: X-to-Y=0.8 and Y-to-X=0.8; else If View Y andView X have > 75% common files then the relationship indicators 718between corresponding topics 710t are set at: X-to-Y=1.0 and Y-to-X=1.0

It should be understood that in this example, and other examples hereinof the setting or adjusting of affinities and relationship indicators718, that the relationships indicators 718 may be determined bycontinuous functions rather than as particular discrete settings asillustrated by the “if-then” rules in the examples. Furthermore, ifdiscrete settings or adjustments are used, they may be finer orcoarser-grained than the examples described herein.

In some embodiments, the relationship indicators 718 between contentobjects 700 c (corresponding to originating files 641) and topics 710 t(corresponding to originating views 640) may be set to a specifiedaffinity (e.g., 0.95) if the originating file 641 is contained withinthe originating view 640. In some embodiments, this affinity may beadjusted based on a comparison or matching of information in the filecompared to information compared to other files contained in the view.Behavioral information, including, but not limited to the behaviors ofTable 1, may be used by the affinity generation function to adjust theaffinity 718 between the content object 700 c and the topic 710 t.

In some embodiments content object-to-content object relationshipindicators 718 are based on frequencies with which two correspondingfiles or items of content 641 are both included within views 640 in theoriginating structure 620. For example, following is a non-limitingexample of such a frequency-based method to determine affinities 718between two content objects 710 c.

Let:

-   -   V(x)=number of views containing a content item x    -   V(x,y)=number of views containing a content item x and a content        item y    -   % V(x)=percentage of all views containing a content item        x=V(x)/total number of views

Then, in some embodiments, the expected percentage, actual percentage,and ratio of actual to expected percentage, of view coincidences of xand y are calculated as follows:Expected %V(x,y)=%V(x)*%V(y)Actual %V(x,y)=V(x,y)/total number of viewsActual/Expected Coincidences Ratio(x,y)=Actual %V(x,y)/Expected %V(x,y)

The Actual/Expected Coincidences Ratio (“AECR”) metric ranges from 0 toinfinity. An AECR>1 is indicative of the two content items having agreater than random affinity, and the higher the AECR, the greater theinferred affinity. An exemplary setting of reciprocal relationshipindicators 718 between content object x and content object y 710 c bythe transformation function 610 is as follows:

If AECR(x,y)>1 then the relationship indicator is set to 0.2; else

If AECR(x,y)>2 then the relationship indicator is set to 0.4; else

If AECR(x,y)>3 then the relationship indicator is set to 0.6; else

If AECR(x,y)>6 then the relationship indicator is set to 0.8; else

If AECR(x,y)>10 then the relationship indicator is set to 1.0

In some embodiments, adjustments may be made to the content objectobject-to-content object relationship indicators 718 by taking intoaccount additional information about the originating files. For example,if two files have the same creator or owner, it may be suggestive of astronger than average affinity between the two files, everything beingequal. So as a non-limiting example, a rule of the type, “if File Y andFile X have the same creator, and the relationship indicator 718 betweenthem is <0.8, then increase the relationship indicator 718 by 0.2,” maybe applied during the transformation process.

In some embodiments, timing considerations may also influence theassigned relationship indicators 718. The closer the creation dates oftwo files, the stronger may be their inferred affinity, everything elsebeing equal. So in some embodiments a rule of the type, “if thedifference in create date between File Y and File X is greater than acertain amount of time, and the relationship indicator 718 between themis >0.2, then decrease the relationship indicator 718 by 0.2,” may beapplied during the conversion process.

In some embodiments folder structures 632 may be transformed to a fuzzycontent network 700, and meta-data 712 associated with the originatingfolders 632 and files 633 may be included in the transformation. In someembodiments, the first step is to create relationship indicators 718among topics 710 t in the fuzzy content network 700, such that thetopics 710 t correspond to folders 632,634 (and/or other superstructuressuch as sub-sites, if desired). In some embodiments, the basictransformational protocol that is applied is based upon the topology ofthe structure. For example, an exemplary topology-based assumption isthat topics (converted from folders in the originating structure) thatare closer to one another within a hierarchy should be assigned strongerrelationships in the fuzzy content network 700, everything else beingequal. The closest relationship within a hierarchy is typically theparent-child relationship. Reciprocal relationships indicators 718between topics 710 t in the transformed structure 210D may notnecessarily be symmetric. Following is exemplary pseudo code forparent-child conversions by the transformation function 610 ofhierarchical structures 630 according to some embodiments:

If Folder Y is one level below Folder X, then relationship indicators718 between corresponding topics 710t are set at: X-to-Y=0.8 andY-to-X=1 If Folder Y is two levels below Folder X, then relationshipindicators 718 between corresponding topics 710t are set at: X-to-Y=0.6and Y-to-X=0.8 If Folder Y is three levels below Folder X, thenrelationship indicators 718 between corresponding topics 710t are setat: X-to-Y=0.4 and Y-to-X=0.6 If Folder Y is four levels below Folder X,then relationship indicators 718 between corresponding topics 710t areset at: X-to-Y=0.2 and Y-to-X=0.4 If Folder Y is five or more levelsbelow Folder X, then relationship indicators 718 between correspondingtopics 710t are set at: X-to-Y=0 and Y-to-X=0 (i.e., do not assign arelationship indicator)

Next, in some embodiments, topics 710 t corresponding to sibling/cousinfolders may be assigned relationship indicators 718. Following isexemplary pseudo code in accordance with some embodiments:

If Folder Y and Folder X are both one level below Folder Z, thenrelationship indicators 718 between corresponding topics 710t are setat: X-to-Y=0.8 and Y-to-X=0.8 If Folder Y and Folder X are both twolevels below Folder Z, then relationship indicators 718 betweencorresponding topics 710t are set at: X-to-Y=0.2 and Y-to-X=0.2

Relationship indicators between other object relatives within thehierarchy such as second cousins, third cousins, and so on, can begenerated in a similar manner. In some embodiments, timingconsiderations may be applied to adjust the relationship indicators 718that are determined from the topology of the originating systemstructure. For example, a rule of the type such as, “If the differencein the create date between Folder Y and Folder X is greater than acertain amount of time, and the relationship indicator 718 is >0.2, thendecrease the relationship indicator 718 by 0.2,” may be applied.

The next step, in some embodiments, is to assign the contentobject-to-topic relationship indicators 718, starting with folderhierarchy parent-child transformations as exemplified by the followingpseudo code:

If File Y is contained in Folder X, then relationship indicators 718between the corresponding objects are set at: X-to-Y=1.0 and Y-to-X=1.0If File Y is one level below Folder X, then relationship indicators 718between the corresponding objects are set at: X-to-Y=0.8 and Y-to-X=0.8If File Y is two levels below Folder X, then relationship indicators 718between the corresponding objects are set at: X-to-Y=0.6 and Y-to-X=0.6If File Y is three levels below Folder X, then relationship indicators718 between the corresponding objects are set at: X-to-Y=0.4 andY-to-X=0.4 If File Y is four or more levels below Folder X, thenrelationship indicators 718 between the corresponding objects are setat: X-to-Y=0.2 and Y-to-X=0.2

In some embodiments, additional considerations such as timing may beapplied to adjust these relationship indicators. For example, a rulesuch as, “If the difference in the create date between File Y and FolderX is greater than a certain amount of time, and the relationshipindicator 718 between the corresponding objects is >0.2, then decreasethe relationship indicator 718 by 0.2,” may be applied.

Next, in some embodiments, the content object-to-content objectrelationship indicators 718 may be established for sibling and cousinfolders (and similarly for more distant relatives) as exemplified by thefollowing pseudo code:

If File Y and File X are both in Folder Z and have the same creator,then relationship indicators between corresponding content objects areset at: X-to-Y=0.8 and Y-to-X=0.8 If File Y and File X are both inFolder Z and have a different creator, then relationship indicatorsbetween corresponding content objects are set at: X-to-Y=0.6 andY-to-X=0.6 If File Y and File X are in different folders but in the samesub-site, then relationship indicators between corresponding contentobjects are set at: X-to-Y=0.4 and Y-to-X=0.4

In some embodiments, adjustment factors such as timing may be applied tothese topological-based relationship indicators 718. An exemplary ruleis, “If the difference in the create date between File Y and File X isgreater than a certain amount of time, and the relationship indicators718 between them are >0.2, then decrease the relationship indicators 718by 0.2.”

In originating environments with both view 640 and folder 630structures, in some embodiments the previous exemplary conversionprocesses for views-only and folders-only environments may be applied,with some additional adjustments to handle the cases of relationshipsbetween views and folders, and for the refinement of otherobject-to-object relationships.

In some embodiments, for topic-to-topic relationships, the view-to-viewrelationship logic is extended to handle this mixed case as illustratedby the following exemplary pseudo code:

If View Y and View or Folder X have > 10% common files then therelationship indicators 718 between corresponding topics 710t are setat: X-to-Y=0.4 and Y-to-X=0.4; else If View Y and View or Folder Xhave > 25% common files then the relationship indicators 718 betweencorresponding topics 710t are set at: X-to-Y=0.6 and Y-to-X=0.6; else IfView Y and View or Folder X have > 50% common files then therelationship indicators 718 between corresponding topics 710t are setat: X-to-Y=0.8 and Y-to-X=0.8; else If View Y and View or Folder Xhave > 75% common files then the relationship indicators 718 betweencorresponding topics 710t are set at: X-to-Y=1.0 and Y-to-X=1.0

In some embodiments, in generating content object-to-content objectrelationship indicators 718, the view-only case is extended to alsoinclude the case in which two files are contained in the same folder 632and also in one or more views 640. Following is exemplary pseudo codefor this case:

If content objects x and y are in the same folder and AECR(x,y) < 1 thenset relationship indicator 718 to 0.6; else If content objects x and yare in the same folder and AECR(x,y) > 1 then set relationship indicator718 to 0.8; else If content objects x and y are in the same folder andAECR(x,y) > 3 then set relationship indicator 718 to 0.95

In some embodiments, additional considerations such as the creator of apair of files or the difference in creation data of the pair of filesmay be applied to adjust these relationship indicators. For example, acreator-based rule such as, “If File Y and File X have the same creator,and the relationship indicator between them is <0.8, then increase therelationship indicator by 0.2,” may be applied. An exemplary timing ruleis, “If the difference in the create date between File Y and File X isgreater than a certain amount of time, and the relationship indicatorbetween them is >0.2, then decrease the relationship indicator by 0.2.”

In some embodiments, content object-to-content object and/ortopic-to-topic relationship indicators 718 may be established oradjusted based on temporal clustering analysis. For example, files thatare accessed by a specific user, or a group of users, within aprescribed period of time may suggest a greater than average affinityamong the files everything else being equal. Common clusters of filesamong multiple users are even more indicative of a greater than averageaffinity among the files. The clustering analysis may furtherbeneficially take into account the overall frequency of, for example,accesses of the files. Where infrequently accessed files are foundtemporally clustered, the affinities among the files may be inferred tobe greater than average. The results of the access clustering analysismay provide the basis for the magnitude of relationship indicators 718among corresponding content objects 710 c. It should be understood thatwhile the term “accesses” has been used in describing examples of thisclustering analysis, temporal clustering analyses of one or more usersmay be conducted with regard to any of the, and combinations thereof,behaviors and corresponding behavioral categories of Table 1.

Other methods and factors may be applied to assign or adjust therelationship indicators 718 among topics 710 t and content objects 710 cthat have been converted from systems that have hierarchical 630 and/orview 640 structures. These methods include statistical comparison and/orpattern matching, semantic analysis, and or other mathematical and/ormachine learning techniques applied to the information within the files.In addition or alternatively, inferences used to assign or adjustrelationship indicators 718 may be made from available meta-data that isassociated with originating files, folders, and/or views. Availablemeta-data may include, but is not limited to, author, owner, publisherinformation, reviews and commentaries, taxonomies (whether explicitlyspecified or implicitly deduced by a system), and tags or otherdescriptive information.

As one example, in some embodiments tags 652,680 generated or selectedby a user (a “reference behavior” in accordance with Table 1) associatedwith content objects 710 c may be used to determine affinities amongcontent objects 710 c and/or topics 710 t. For example, content objectswith a higher than average or expected proportion of common tags may beconsidered to have a higher than average affinity, everything else beingequal. This calculation may be adjusted basis the overall frequency ofthe population of tags, such that the commonality of less frequentlyused tags is given more weight in calculating affinities than morefrequently used tags.

In some environments content tags may correspond to pre-determinedsubjects or topical areas. These subjects may be organized in ataxonomy, and the structure of the taxonomy may be hierarchical 650, asdepicted within originating system B 660 of FIG. 5B.

In accordance with some embodiments, following is an exemplarytransformational protocol applied by the transformation function 610 forconverting such taxonomies to a fuzzy network structure 210D. In thisnon-limiting example it is assumed the taxonomy of subjects ishierarchical and each item of content is associated with one or moretags that correspond to one or more subjects.

First, similar to the approach described in transforming views,topic-to-topic affinities can be determined basis a metric derived fromthe intersection divided by union of content between a pair of subjects.For example, this metric may be basis the proportion of common contentbetween two subjects, which according to some embodiments, is defined asthe number of common content items divided by the total number of uniquecontent items included in the two subjects. So, for example, if SubjectY contains content items (C1, C2, C4) and Subject X contains contentitems (C1, C2, C3, C5), then the percentage of common content=2/5=40%.

In some embodiments, this percentage can then be adjusted by a scalingfactor that is proportional to the total number of subjects, since ifthere are only a few subjects, then having a high percentage of commoncontent between a given subject pair is less revealing about the actualaffinities between the pair of subjects than if there is a largerpopulation of subjects.

An exemplary scaling formula that can be applied that takes into accountthe size of subject population is:Subject Scaling Factor=1−exp(constant*number of subjects).

For example, if the constant equals −0.05, this factor will range from 0when there are no subjects to 1 as the number of subjects goes toinfinity, and will be very close to 1 when there are around 100subjects.

An exemplary metric that can then be applied to set or adjust affinitiesbetween subjects is:Adjusted Common Content %=Subject Scaling Factor*% common content.

A non-limiting example of relationship indicator settings or adjustmentsusing the Adjusted Common Content % metric is as follows:

If Subject Y and Subject X have > 5% Adjusted Common Content % thenincrease the relationship indicators 718 of the corresponding topics710t by 0.2, but to no more than 1.0; else If Subject Y and Subject Xhave > 10% Adjusted Common Content % then increase the relationshipindicators 718 of the corresponding topics 710t by 0.4, but to no morethan 1.0; else If Subject Y and Subject X have > 25% Adjusted CommonContent % then increase the relationship indicators 718 of thecorresponding topics 710t by 0.6, but to no more than 1.0; else IfSubject Y and Subject X have > 50% Adjusted Common Content % thenincrease the relationship indicators 718 of the corresponding topics710t by 0.8, but to no more than 1.0.

In some embodiments, to generate content-to-content relationships fromthese types of originating subject taxonomy structures, the first stepis to map the relationships between content and subjects of theoriginating subject taxonomy as illustrated in the example of Table A.

TABLE A Content Item Associated Subjects C1 S1, S2 C2 S1, S3 C3 S1, S2,S5 C4 S2, S3 C5 S1, S4 C6 S1, S2, S3

Although a simple percentage of common subjects may be applied toestablish or adjust affinities among content items, better results willgenerally be achieved by generating a metric that has properties thatinclude the following characteristics:

-   -   a. Everything else being equal, the higher the proportion of        common subjects between two items of content, the higher the        affinity between the items of content    -   b. Everything else being equal, the more infrequently used are        the common subjects associated with two items of content, the        higher the affinity between the two items (so in the example        above, subject S1 does not convey as much information about        affinities because it is so frequently applied, while subject S5        would convey more information because it is less frequently        applied)    -   c. Everything else being equal, the more infrequently used are        the uncommon subjects between two items of content, the lower        the affinity between the items (so in the example above, S5 is        less frequently applied to the population of content items than        is S3, so the affinity between C1 and C3 should be lower than        between C1 and C5)

In some embodiments, a method to generate such a metric includes a firststep of determining the frequency and relative frequency of the subjectsacross all items of content that are addressed by the originatingsubject taxonomy. Using the example from Table A, we determine thefrequency and relative frequency results of Table B.

TABLE B Subject Frequency Relative Frequency (RF) S1 5 5/14 S2 4 4/14 S33 3/14 S4 1 1/14 S5 1 1/14 Total 14 1

In some embodiments, the next step is generating a metric, RFU/RFC, thatis applied to determine the strength of affinity between two contentitems, where:

RFU=Product of Relative Frequencies of Uncommon Subjects

RFC=Product of Relative Frequencies of Common Subjects

and where RFU=1 if there are no uncommon subjects

and where RFU/RFC=0 if there are no common subjects

The metric RFU/RFC, which can be called the Subject Frequency Ratio(SFR), ranges from 0 to infinity, with higher levels of SFR beingindicative of higher affinities between the two content items. Anon-limiting example of the setting of affinities between content itemsusing SFR is as follows:

If SFR(Content Y, Content X) > 0.2 then the relationship indicator 718between the corresponding content objects 710c = 0.2; else IfSFR(Content Y, Content X) > 0.5 then the relationship indicator 718between the corresponding content objects 710c = 0.4; else IfSFR(Content Y, Content X) > 1.0 then the relationship indicator 718between the corresponding content objects 710c = 0.6; else IfSFR(Content Y, Content X) > 6.0 then the relationship indicator 718between the corresponding content objects 710c = 0.8; else IfSFR(Content Y, Content X) > 30.0 then the relationship indicator 718between the corresponding content objects 710c = 1.0

In some embodiments, functions that generate content-to-topicrelationships from these types of originating subject taxonomystructures may employ a variation of the technique that was described togenerate the content-to-content affinities from these types ofstructures. For example, the generation of a metric with the followingcharacteristics may be desirable:

-   -   a. Everything else being equal, an item of content associated        with an infrequently used subject has a higher affinity to that        subject than it would to a more frequently used subject    -   b. Everything else being equal, the fewer the subjects an item        of content is associated with, the higher the affinity to any        given subject (if there is only one directly associated subject,        that is analogous to the folder case, in which an item of        content can be within only one folder). And other infrequently        used subjects associated with a content item dilute the affinity        with a given subject to a greater degree than other more        frequently used subjects would.

In some embodiments, a metric, RFO/RFT, having these characteristics, isgenerated and is used in determining the strength of affinity between acontent item (Cx) item and a target subject (St). RFO and RFT aredefined as:

-   -   RFT=Relative Frequency of the Target Subject    -   RFO=Product of Relative Frequencies of Other Subjects Associated        with Cx    -   and where RFO=1 if there are no other subjects than the target        subject associated with Cx

The metric RFO/RFT, which can be called the Content-Subject FrequencyRatio (CSFR), ranges from 0 to infinity, with higher levels beingindicative of a higher affinity between a content item and a particularsubject. A non-limiting example of using the CSFR to set the affinitiesbetween corresponding content objects 710 c and topic objects 710 t isas follows:

If CSFR(Content X, Topic Y) > 0.1 then the relationship indicator 718between the corresponding content object and topic object = 0.2; else IfCSFR(Content X, Topic Y) > 0.3 then the relationship indicator 718between the corresponding content object and topic object = 0.4; else IfCSFR(Content X, Topic Y) > 0.6 then the relationship indicator 718between the corresponding content object and topic object = 0.6; else IfCSFR(Content X, Topic Y) > 1.0 then the relationship indicator 718between the corresponding content object and topic object = 0.8; else IfCSFR(Content X, Topic Y) > 5.0 then the relationship indicator 718between the corresponding content object and topic object = 1.0

Integration of Multiple Originating Systems

In some embodiments, multiple originating systems and/or structuresassociated with one or more computer-implemented systems may betransformed into an integrated fuzzy network. This approach beneficiallycreates an underlying integrated contextualization of the multiplesystems and originating structures, which can enhance user navigation,including providing for content and expertise discovery. Usage behaviorand topological synergies between two originating systems can enable abetter contextualization than with one originating system and associatedoriginating structure alone.

In some embodiments a function that integrates recommendations sourcedfrom multiple systems based on the contextualization of an integratedfuzzy network may be invoked by a user or administrator. In someembodiments the user or administrator may be able to select andde-select the originating systems from which recommended content orpeople are sourced. This selection interface may be available throughone of the originating systems, multiple of the originating systems,and/or through a separate interface to the fuzzy network-basedcontextualization of adaptive system 100D.

In some embodiments, when a user has selected that he wants arecommendation of content sourced from a first originating system 620while interacting with, or navigating within, a second originatingsystem's 660 interface, the integrated contextualization ispreferentially required to understand the appropriate topicalneighborhood within the first originating system 620 to serve as a basisfor a recommendation and/or a contextual scope for the recommendation.In other words, a simulation of the user navigating the firstoriginating system is performed while the user is actually within thesecond originating system's environment and navigational context.

To perform this contextual simulation, in accordance with someembodiments, a relation between a user-conducted activity in the secondoriginating system 660, such as contributing an item of content orposting an activity, is made with respect to an object 641 in the firstsystem 620. In some embodiments, subjects 654 in the second system 660may be associated with content 641 in the first system through thesaving of an object in the first system while the user interacts withthe second system 660. For example, an attachment to a post in thesecond system 660 may be saved in the first system 620.

In the following non-limiting example of this integration, it is assumedoriginating system A 620 has a folder-based structure and originatingsystem B 660 has a subject taxonomy structure. It should be understood,however, that different structures may be distributed among two or moreoriginating systems than is assumed in this specific example. Table A1represents an exemplary mapping of content and subjects in originatingsystem B:

TABLE A1 Corresponding Subjects or Originating System B Subject TagsApplied in Content Originating system B C1 S1, S2 C2 S1, S3 C3 S1, S2,S5 C4 S2, S3 C5 S1, S4 C6 S1, S2, S3

Then, as a non-limiting example, it is assumed in this example that theone or more items of content 655 originating from system 2 660 is storedin folders 634 of system 1 620. It follows that there may be one or moreinstances of content items associated with each folder. The folders 634can then be mapped to subjects 654 as shown in the exemplary mapping ofTable C.

TABLE C System 1 Folder Instances Associated System 2 Subjects F1instance 1 (C1) S1, S2 F1 instance 2 (C2) S1, S3 F2 instance 1 (C3) S1,S2, S5 F3 instance 1 (C4) S2, S3 F4 instance 1 (C5) S1, S4

The occurrences of subjects can be summed across folder instances foreach folder as illustrated in Table D.

TABLE D Folder S1 S2 S3 S4 S5 F1 2 1 1 0 0 F2 1 1 0 0 1 F3 0 1 1 0 0 F41 0 0 1 0 Etc. Total

In some embodiments, these types of mappings can be applied by a methodto determine a simulated navigation context within system 1 620 whilethe user is interacting with system 2 660. For example, in the caseconsidered here, an appropriate context in system 1 620 can bedetermined when one or more subjects are specified in system 2 660.

For example, a metric, the Frequency Weighted Subject Occurrences(FWSO), can be defined as the sum across all of the specified subjectsof the number of occurrences of each subject*(1/relative frequency ofeach subject), for a given folder. For example, from the data of tablesB and D, for the specified subjects of S1 and S3, the FWSO of folder F1is:FWSO(F1;S1,S3)=(2*1/(5/14))+(1*1/(3/14))

If there exist no folders in which FWSO>0 for the specified subjects,then there may not be sufficient context to generate in-contextrecommendation from content items sourced from originating system A.Otherwise, sufficient context is available for in-contextrecommendations. A similar approach to calculating FWSOs, but withrespect to view-based structures rather than folder-based structures, ormixed folder and view-based structures, and be applied in accordancewith some embodiments.

Following are some exemplary methods for generating in-contextrecommendations from system A 620 given specified subjects of system B660. In some embodiments, in generating a system A expertise (people)recommendation based on a system B content contribution associated witha specified set of subjects, the system A folder taken as the contextualbasis is the folder with the maximum FWSO for the specified subjects. Ifthere is a tie, it can be broken, for example, by selecting among thetied folders the one with the user's highest MTAV value.

For knowledge discovery (content) recommendations, it is preferred toselect or otherwise indicate a specific content item in system A to bethe contextual basis for the in-context recommendation sourced fromsystem A. In some embodiments, this can be achieved by selecting thesystem A content item with the highest Subject Frequency Ratio (SFR)calculated with respect to the specified subjects. In other words, theSFR is calculated basis the subjects of each content item of system Aand the specified subjects. If there is a resulting tie, among otherpossibilities, the content item among the tied candidate content itemswithin a folder with the highest FWSO can be selected. If there is stillmore than one candidate content item, among other possibilities, themost popular can be selected.

In addition to delivering cross-contextualization of multipleoriginating systems, the mappings between two originating systems mayenable the adjusting of affinities 718 of the fuzzy network resultingfrom the transformation by the transformation function 610 of a firstoriginating system 620 basis information accessed from a secondoriginating system 660.

In some embodiments the data of Table D is applied to adjust affinities718 between topics 710 t that correspond to folders 630 in theoriginating system 620. For example, metrics of similarity may beapplied for each pair of folders against subject data of the typeillustrated in Table D. The folder similarity metric may be calculatedusing a cosine similarity formula, correlation coefficient formula, orany other suitable formula for comparing the similarity of two vectors.The following non-limiting pseudo code example illustrates the use of acorrelation coefficient to adjust the topic-to-topic affinities 718 thatcorrespond to originating folders

If correlation coefficient (Fx,Fy) > 0.75, then the correspondingtopic-to- topic relationship indicator = max(0.2, existing level); elseIf correlation coefficient (Fx,Fy) > 0.80, then the correspondingtopic-to- topic relationship indicator = max(0.4, existing level); elseIf correlation coefficient (Fx,Fy) > 0.85, then the correspondingtopic-to- topic relationship indicator = max(0.6, existing level); elseIf correlation coefficient (Fx,Fy) > 0.90, then the correspondingtopic-to- topic relationship indicator = max(0.8, existing level); elseIf correlation coefficient (Fx,Fy) > 0.95, then the correspondingtopic-to- topic relationship indicator = max(1.0, existing level)

In some embodiments, the SFR can be calculated for content itemsoriginating from originating system A 620 basis subjects or subject tagsapplied in originating system B 660, which can then be used to adjustthe affinities 718 of between content items accordingly. In someembodiments, the SFR adjustments over-ride previous contentobject-to-content object affinities per the following exemplary pseudocode:

If SFR(Content Y, Content X) > 0.2 then the content-to-contentrelationship indicator = 0.2; else If SFR(Content Y, Content X) > 0.5then the content-to-content relationship indicator = 0.4; else IfSFR(Content Y, Content X) > 1.0 then the content-to-content relationshipindicator = 0.6; else If SFR(Content Y, Content X) > 6.0 then thecontent-to-content relationship indicator = 0.8; else If SFR(Content Y,Content X) > 30.0 then the content-to-content relationship indicator =1.0

In some embodiments, content-to-topic affinities in a fuzzy networkgenerated from structures within a first system 620 are adjusted basisinformation originating in a second system 660. As one non-limitingexample, a vector of CSFRs is generated by calculating for the targetcontent item a CFSR with respect to each of the content item'sassociated subjects (and the CFSR value is set to zero for all othersubjects that are not associate with the content item). Then asimilarity metric is generated between this vector of CSFRs of thetarget content and the vector of subject occurrences (Table D) for thetarget folder. The similarity metric may be calculated, for example, byusing a cosine similarity formula, correlation coefficient formula, orany other suitable formula for comparing the similarity of two vectors.Exemplary pseudo code for adjusting the three affinities between atarget content item (Cx) and a folder (Fy) is as follows:

If correlation coefficient (Cx,Fy) > 0.75, then content-topicrelationship indicator = max(0.2, existing level); else If correlationcoefficient (Cx,Fy) > 0.80, then content-topic relationship indicator =max(0.4, existing level); else If correlation coefficient (Cx,Fy) >0.85, then content-topic relationship indicator = max(0.6, existinglevel); else If correlation coefficient (Cx,Fy) > 0.90, thencontent-topic relationship indicator = max(0.8, existing level); else Ifcorrelation coefficient (Cx,Fy) > 0.95, then content-topic relationshipindicator = max(1.0, existing level)

For integrated contextualizations of multiple originating structures,candidate recommendations may be generated from multiple source systemstructures. In some embodiments, a candidate recommendation scoreharmonization function enables direct comparisons of the scoresassociated with candidate recommended items from multiple sourcesystems. The top scored candidate items are then selected for deliveryto the recommendation recipient regardless of the system source of thecandidate items.

In some embodiments the originating systems or structures to betransformed may not have structural constructs that enable a one-to-onecorrespondence with topics 710 t in the transformed structure. In suchcases, one or more topics 710 t and/or relationship indicators 718 maybe generated automatically by evaluating candidate clusters of contentobjects 710 c based on behavioral information 920 and/or statisticalpattern matching of information within the content objects 710 c. Insome cases, this clustering may be based on automatic inferencesinformed by hashtags or other organizing indicia embedded within thecontent objects 710 c.

In some embodiments various system functions and interfaces (e.g.,SharePoint web parts) may be applied that provide selectivefunctionalities of adaptive system 100,100D. These functionalities inconjunction with the structural aspect 210,210D may be collectivelycalled a “learning layer” in some embodiments. The computer-implementedfunctions, knowledge discovery and expertise discovery, refer tospecific learning layer functions that generate content recommendationsand people recommendations, respectively. In some embodiments the fuzzycontent network 700 may be hidden from the user 200; in otherembodiments it may be transparent to the users 200. Other functions maybe included in the learning layer such as enabling visualizations ofaffinities among topics, content, and users, functions to directlyinteract with the fuzzy content network 700, administrative functions tofacilitate installation and tuning of other learning layer functions,and functions that serve to capture additional behavioral informationthat would not be otherwise captured in accordance with, but not limitedto, the behaviors and behavioral categories of Table 1.

FIG. 5C further illustrates the contextual transformation of originatingsystems into a fuzzy network-based learning layer, and thecontextualization of recommendations that are delivered to a user as theuser navigates an originating system, in accordance with someembodiments. For example, assuming a user 200 is currently navigatingat, or accessing, an object 655 of a first originating system 660, acontextually equivalent object 655D is identified in the transformedstructural aspect 210D of the adaptive learning layer 100D, which servesas the contextual basis within the learning layer 100D for arecommendation 255 that is generated and delivered to a user 200,wherein the recommendation comprises an object 656 in the learning layer100D that is related to, or is within the contextual neighborhood of,the learning layer's 100D contextually equivalent object 655D of thenavigated object 655.

In some embodiments the object 655 at which the user 200 is currentlynavigating may be related to another object 655C in the secondoriginating system basis an explicit relationship or correspondenceestablished by a user 200. For example, the second object 655C may be anattachment object to the first object 655, and the attachment object655C may not necessarily be stored in the originating system 660 beingnavigated. In some embodiments the contextual correspondence between thetwo objects 655,655C may be established through automated means such asthrough the comparison of the contents of objects rather than throughexplicit user establishment of the correspondence.

The contextually equivalent object 655D in the learning layer 100D tothe navigated object 655 in the first originating system 660 maycorrespond indirectly to the navigated object 655 by way of the relatedobject 655C in the second originating system, in accordance with someembodiments.

In some embodiments a user 200 may select one or more originatingsystems to be the source of objects recommended 255 by the learninglayer 100D. So, for example, if the user chose to have recommendationsof objects sourced only from the second system 620 while navigating thefirst system 660, then the contextually corresponding object 655C wouldbe used as the contextual basis 655D in the learning layer 100D, andrecommended objects 656 would be limited to only those originating inthe second system.

In such selectable recommendation sourcing embodiments, the candidaterecommendation score harmonization function may be applied to enabledirect comparisons of the scores associated with candidate recommendeditems from the multiple source systems selected by the user or anadministrator. The top scored candidate objects are then selected fordelivery 255 to the recommendation recipient 200 regardless of thesystem source of the candidate objects, given that the system sourceshave been selected by the user or administrator.

In some embodiments, standardized tags may be applied to the topicswithin, or sourced from, one or more originating systems 620,660 so asto create a standardized member-topic affinity vector (MTAV) for aspecific user 200, and that can be standardized across multiple users200, based on the tags. The adaptive system 100,100D generates astandardized MTAV derivatively from each originating MTAV from the tagsthat are mapped to topics of the originating MTAV. In some embodimentsnot every originating topic has a standardized tag applied—in this case,the function that generates the standardized MTAV may ignore theoriginating topic without a standardized tag. Since in some cases thenumber of different topics may exceed the number of applicablestandardized tags, some topics may have the same standardized tag. Inthese cases, the standardized MTAV generation function will create acomposite standardized MTAV value based on the multiple affinity valuesof the originating MTAVs. The standardized MTAV will be of a dimensionequal to the number of standardized tags.

To summarize an exemplary process, the folders 632, views 640, and/orsubjects 652 of one or more originating systems 620,660 havestandardized tags applied. The folders 632, views 640, and/or subjects652 of the one or more originating systems 620,660 are transformed totopics 710 t and behavioral information from the one or more originatingsystems 620,660 are used to generate originating system-specific MTAVs.The standardized tags associated with the folders 632, views 640, and/orsubjects 652 of the one or more originating systems 620,660 are thenused to create a standardized, composite MTAV that is a vector ofaffinity values corresponding to each of the standardized tags.

The standardized MTAV can be beneficially used to harmonize the encodingof interests, preferences, and most generally learning, from the one ormore originating systems 620,660 and/or one or more adaptive systems100,100D. By establishing a direct correspondence between originatingMTAVs, this approach of generating a standardized MTAV has the benefitof enabling portability of a user's interests from one system toanother, enabling the integration of the user's interests from multipleoriginating systems, and enabling consistent comparisons of interestprofiles across users. These standardized, portable MTAVs can then beused to generate member-to-member affinity vectors (MMAVs) that areindicative of interest similarities among users across differentoriginating systems—even if the users are not all users of exactly thesame originating systems.

Similar to the process described for MTAVs, in some embodiments,standardized tags can be applied to member-topic expertise vectors(MTEVs). Rather than interest portability across different originatingsystems, expertise portability across different originating systems isenabled by standardized MTEVs.

In some embodiments, the standardized tags are applied by humans, inother embodiments the tags may be generated and/or applied by automatedmeans—for example, through the evaluation of the contents of theassociated topics and related content.

User Behavior and Usage Framework

FIG. 6 depicts a usage framework 1000 for performing preference and/orintention inferencing of tracked or monitored usage behaviors 920 by oneor more computer-based systems 925. The one or more computer-basedsystems 925 may comprise an adaptive system 100. The usage framework1000 summarizes the manner in which usage patterns are managed withinthe one or more computer-based systems 925. Usage behavioral patternsassociated with an entire community, affinity group, or segment of users1002 are captured by the one or more computer-based systems 925. Inanother case, usage patterns specific to an individual are captured bythe one or more computer-based systems 925. Various sub-communities ofusage associated with users may also be defined, as for example“sub-community A” usage patterns 1006, “sub-community B” usage patterns1008, and “sub-community C” usage patterns 1010.

Memberships in the communities are not necessarily mutually exclusive,as depicted by the overlaps of the sub-community A usage patterns 1006,sub-community B usage patterns 1008, and sub-community C usage patterns1010 (as well as and the individual usage patterns 1004) in the usageframework 1000. Recall that a community may include a single user ormultiple users. Sub-communities may likewise include one or more users.Thus, the individual usage patterns 1004 in FIG. 6 may also be describedas representing the usage patterns of a community or a sub-community.For the one or more computer-based systems 925, usage behavior patternsmay be segmented among communities and individuals so as to effectivelyenable adaptive communications 250 c delivery for each sub-community orindividual.

The communities identified by the one or more computer-based systems 925may be determined through self-selection, through explicit designationby other users or external administrators (e.g., designation of certainusers as “experts”), or through automatic determination by the one ormore computer-based systems 925. The communities themselves may haverelationships between each other, of multiple types and values. Inaddition, a community may be composed not of human users, or solely ofhuman users, but instead may include one or more other computer-basedsystems, which may have reason to interact with the one or morecomputer-based systems 925. Or, such computer-based systems may providean input into the one or more computer-based systems 925, such as bybeing the output from a search engine. The interacting computer-basedsystem may be another instance of the one or more computer-based systems925.

The usage behaviors 920 included in Table 1 may be categorized by theone or more computer-based systems 925 according to the usage framework1000 of FIG. 6. For example, categories of usage behavior may becaptured and categorized according to the entire community usagepatterns 1002, sub-community usage patterns 1006, and individual usagepatterns 1004. The corresponding usage behavior information may be usedto infer preferences and/or intentions and interests at each of the userlevels.

Multiple usage behavior categories shown in Table 1 may be used by theone or more computer-based systems 925 to make reliable inferences ofthe preferences and/or intentions and/or intentions of a user withregard to elements, objects, or items of content associated with the oneor more computer-based systems 925. There are likely to be differentpreference inferencing results for different users.

As shown in FIG. 6, the one or more computer-based systems 925 deliversadaptive communications to the user 200. These adaptive communications250 c may include adaptive recommendations 250 and/or associatedexplanations for the recommendations, or may be other types ofcommunications to the user 200, including advertising. In someembodiments the adaptive communications 250 c comprise one or morephrases, where phrases comprise one or more words. The adaptivecommunications 250 c may be delivered to the user 200 in a written form,an audio form, or a combination of these forms.

By introducing different or additional behavioral characteristics, suchas the duration of access of, or monitored or inferred attention toward,an item of content a more adaptive communication 250 c is enabled. Forexample, duration of access or attention will generally be much lesscorrelated with navigational proximity than access sequences will be,and therefore provide a better indicator of true user preferences and/orintentions and/or intentions. Therefore, combining access sequences andaccess duration will generally provide better inferences and associatedsystem structural updates than using either usage behavior alone.Effectively utilizing additional usage behaviors as described above willgenerally enable increasingly effective system structural updating. Inaddition, the one or more computer-based systems 925 may employ useraffinity groups to enable even more effective system structural updatingthan are available merely by applying either individual (personal) usagebehaviors or entire community usage behaviors.

Furthermore, relying on only one or a limited set of usage behavioralcues and signals may more easily enable potential “spoofing” or “gaming”of the one or more computer-based systems 925. “Spoofing” or “gaming”the one or more computer-based systems 925 refers to conductingconsciously insincere or otherwise intentional usage behaviors 920, soas to influence the costs of advertisements 910 of the one or morecomputer-based systems 925. Utilizing broader sets of system usagebehavioral cues and signals may lessen the effects of spoofing orgaming. One or more algorithms may be employed by the one or morecomputer-based systems 925 to detect such contrived usage behaviors, andwhen detected, such behaviors may be compensated for by the preferenceand interest inferencing algorithms of the one or more computer-basedsystems 925.

In some embodiments, the one or more computer-based systems 925 mayprovide users 200 with a means to limit the tracking, storing, orapplication of their usage behaviors 920. A variety of limitationvariables may be selected by the user 200. For example, a user 200 maybe able to limit usage behavior tracking, storing, or application byusage behavior category described in Table 1. Alternatively, or inaddition, the selected limitation may be specified to apply only toparticular user communities or individual users 200. For example, a user200 may restrict the application of the full set of her usage behaviors920 to preference or interest inferences by one or more computer-basedsystems 925 for application to only herself, and make a subset ofprocess behaviors 920 available for application to users only within herworkgroup, but allow none of her process usage behaviors to be appliedby the one or more computer-based systems 925 in making inferences ofpreferences and/or intentions and/or intentions or interests for otherusers.

User Communities

As described above, a user associated with one or more systems 925 maybe a member of one or more communities of interest, or affinity groups,with a potentially varying degree of affinity associated with therespective communities. These affinities may change over time asinterests of the user 200 and communities evolve over time. Theaffinities or relationships among users and communities may becategorized into specific types. An identified user 200 may beconsidered a member of a special sub-community containing only onemember, the member being the identified user. A user can therefore bethought of as just a specific case of the more general notion of user oruser segments, communities, or affinity groups.

FIG. 7 illustrates the affinities among user communities and how theseaffinities may automatically or semi-automatically be updated by the oneor more computer-based systems 925 based on user preferences and/orintentions which are derived from user behaviors 920. An entirecommunity 1050 is depicted in FIG. 7. The community may extend acrossorganizational, functional, or process boundaries. The entire community1050 includes sub-community A 1064, sub-community B 1062, sub-communityC 1069, sub-community D 1065, and sub-community E 1070. A user 1063 whois not part of the entire community 1050 is also featured in FIG. 7.

Sub-community B 1062 is a community that has many relationships oraffinities to other communities. These relationships may be of differenttypes and differing degrees of relevance or affinity. For example, afirst relationship 1066 between sub-community B 1062 and sub-community D1065 may be of one type, and a second relationship 1067 may be of asecond type. (In FIG. 7, the first relationship 1066 is depicted using adouble-pointing arrow, while the second relationship 1067 is depictedusing a unidirectional arrow.)

The relationships 1066 and 1067 may be directionally distinct, and mayhave an indicator of relationship or affinity associated with eachdistinct direction of affinity or relationship. For example, the firstrelationship 1066 has a numerical value 1068, or relationship value, of“0.8.” The relationship value 1068 thus describes the first relationship1066 between sub-community B 1062 and sub-community D 1065 as having avalue of 0.8.

The relationship value may be scaled as in FIG. 7 (e.g., between 0 and1), or may be scaled according to another interval. The relationshipvalues may also be bounded or unbounded, or they may be symbolicallyrepresented (e.g., high, medium, low).

The user 1063, which could be considered a user community including asingle member, may also have a number of relationships to othercommunities, where these relationships are of different types,directions and relevance. From the perspective of the user 1063, theserelationship types may take many different forms. Some relationships maybe automatically formed by the one or more computer-based systems 925,for example, based on explicit or inferred interests, geographiclocation, or similar traffic/usage patterns. Thus, for example theentire community 1050 may include users in a particular city. Somerelationships may be context-relative. For example, a community to whichthe user 1063 has a relationship could be associated with a certainprocess, and another community could be related to another process.Thus, sub-community E 1070 may be the users associated with a productdevelopment business to which the user 1063 has a relationship 1071;sub-community B 1062 may be the members of a cross-business innovationprocess to which the user 1063 has a relationship 1073; sub-community D1065 may be experts in a specific domain of product development to whichthe user 1063 has a relationship 1072. The generation of new communitieswhich include the user 1063 may be based on the inferred interests ofthe user 1063 or other users within the entire community 1050.

Membership of communities may overlap, as indicated by sub-communities A1064 and C 1069. The overlap may result when one community is wholly asubset of another community, such as between the entire community 1050and sub-community B 1062. More generally, a community overlap will occurwhenever two or more communities contain at least one user or user incommon. Such community subsets may be formed automatically by the one ormore systems 925, based on preference inferencing from user behaviors920. For example, a subset of a community may be formed based on aninference of increased interest or demand of particular content orexpertise of an associated community. The one or more computer-basedsystems 925 are also capable of inferring that a new community isappropriate. The one or more computer-based systems 925 will thus createthe new community automatically.

For each user, whether residing within, say, sub-community A 1064, orresiding outside the community 1050, such as the user 1063, therelationships (such as arrows 1066 or 1067), affinities, or“relationship values” (such as numerical indicator 1068), and directions(of arrows) are unique. Accordingly, some relationships (and specifictypes of relationships) between communities may be unique to each user.Other relationships, affinities, values, and directions may have moregeneral aspects or references that are shared among many users, or amongall users of the one or more computer-based systems 925. A distinct andunique mapping of relationships between users, such as is illustrated inFIG. 7, could thus be produced for each user by the one or morecomputer-based systems 925.

The one or more computer-based systems 925 may automatically generatecommunities, or affinity groups, based on user behaviors 920 andassociated preference inferences. In addition, communities may beidentified by users, such as administrators of the process orsub-process instance 930. Thus, the one or more computer-based systems925 utilizes automatically generated and manually generated communities.

The communities, affinity groups, or user segments aid the one or morecomputer-based systems 925 in matching interests optimally, developinglearning groups, prototyping process designs before adaptation, and manyother uses. For example, some users that use or interact with the one ormore computer-based systems 925 may receive a preview of a newadaptation of a process for testing and fine-tuning, prior to otherusers receiving this change.

The users or communities may be explicitly represented as elements orobjects within the one or more computer-based systems 925.

Preference and/or Intention Inferences

The usage behavior information and inferences function 220 of the one ormore computer-based systems 925 is depicted in the block diagram of FIG.8. In embodiments where computer-based systems 925 is an adaptive system100, then usage behavior information and inferences function 220 isequivalent to the usage aspect 220 of FIG. 1. The usage behaviorinformation and inferences function 220 denotes captured usageinformation 202, further identified as usage behaviors 270, and usagebehavior pre-processing 204. The usage behavior information andinferences function 220 thus reflects the tracking, storing,classification, categorization, and clustering of the use and associatedusage behaviors 920 of the one or more users or users 200 interactingwith the one or more computer-based systems 925.

The captured usage information 202, known also as system usage or systemuse 202, includes any interaction by the one or more users or users 200with the system, or monitored behavior by the one or more users 200. Theone or more computer-based systems 925 may track and store user keystrokes and mouse clicks or other device controller information, forexample, as well as the time period in which these interactions occurred(e.g., timestamps), as captured usage information 202. From thiscaptured usage information 202, the one or more computer-based systems925 identifies usage behaviors 270 of the one or more users 200 (e.g.,web page access or physical location changes of the user). Finally, theusage behavior information and inferences function 220 includesusage-behavior pre-processing, in which usage behavior categories 246,usage behavior clusters 247, and usage behavioral patterns 248 areformulated for subsequent processing of the usage behaviors 270 by theone or more computer-based systems 925. Some usage behaviors 270identified by the one or more computer-based systems 925, as well asusage behavior categories 246 designated by the one or morecomputer-based systems 925, are listed in Table 1, and are described inmore detail below.

The usage behavior categories 246, usage behaviors clusters 247, andusage behavior patterns 248 may be interpreted with respect to a singleuser 200, or to multiple users 200, in which the multiple users may bedescribed herein as a community, an affinity group, or a user segment.These terms are used interchangeably herein. A community is a collectionof one or more users, and may include what is commonly referred to as a“community of interest.” A sub-community is also a collection of one ormore users, in which members of the sub-community include a portion ofthe users in a previously defined community. Communities, affinitygroups, and user segments are described in more detail, below.

Usage behavior categories 246 include types of usage behaviors 270, suchas accesses, referrals to other users, collaboration with other users,and so on. These categories and more are included in Table 1. Usagebehavior clusters 247 are groupings of one or more usage behaviors 270,either within a particular usage behavior category 246 or across two ormore usage categories. The usage behavior pre-processing 204 may alsodetermine new “clusterings” of user behaviors 270 in previouslyundefined usage behavior categories 246, across categories, or among newcommunities. Usage behavior patterns 248, also known as “usagebehavioral patterns” or “behavioral patterns,” are also groupings ofusage behaviors 270 across usage behavior categories 246. Usage behaviorpatterns 248 are generated from one or more filtered clusters ofcaptured usage information 202.

The usage behavior patterns 248 may also capture and organize capturedusage information 202 to retain temporal information associated withusage behaviors 270. Such temporal information may include the durationor timing of the usage behaviors 270, such as those associated withreading or writing of written or graphical material, oralcommunications, including listening and talking, or physical location ofthe user 200, potentially including environmental aspects of thephysical location(s). The usage behavioral patterns 248 may includesegmentations and categorizations of usage behaviors 270 correspondingto a single user of the one or more users 200 or according to multipleusers 200 (e.g., communities or affinity groups). The communities oraffinity groups may be previously established, or may be generatedduring usage behavior pre-processing 204 based on inferred usagebehavior affinities or clustering.

User Behavior Categories

In Table 1, a variety of different user behaviors 920 are identifiedthat may be assessed by the one or more computer-based systems 925 andcategorized. The usage behaviors 920 may be associated with the entirecommunity of users, one or more sub-communities, or with individualusers of the one of more computer-based applications 925.

TABLE 1 Usage behavior categories and usage behaviors usage behaviorcategory usage behavior examples navigation and access activity, contentand computer application accesses, including buying/selling paths ofaccesses or click streams execution of searches and/or search historysubscription and personal or community subscriptions to, orself-profiling following of, topical areas interest and preferenceself-profiling following other users filters affiliation self-profiling(e.g., job function) collaborative referral to others discussion forumactivity direct communications (voice call, messaging) contentcontributions or structural alterations linking to another userreference personal or community storage and tagging personal orcommunity organizing of stored or tagged information direct feedbackuser ratings of activities, content, computer applications and automaticrecommendations user comments physiological direction of gaze responsesbrain patterns blood pressure heart rate voice modulation facialexpression kinetic expression of limbs such as tension, posture ormovement expression of other users in the group environmental currentlocation conditions and location over time location relative location tousers/object references current time current weather condition

A first category of process usage behaviors 920 is known as systemnavigation and access behaviors. System navigation and access behaviorsinclude usage behaviors 920 such as accesses to, and interactions withcomputer-based applications and content such as documents, Web pages,images, videos, TV channels, audio, radio channels, multi-media,interactive content, interactive computer applications and games,e-commerce applications, or any other type of information item or system“object.” These process usage behaviors may be conducted through use ofa keyboard, a mouse, oral commands, or using any other input device.Usage behaviors 920 in the system navigation and access behaviorscategory may include, but are not limited to, the viewing, scrollingthrough, or reading of displayed information, typing writteninformation, interacting with online objects orally, or combinations ofthese forms of interactions with computer-based applications. Thiscategory includes the explicit searching for information, using, forexample, a search engine. The search term may be in the form of a wordor phrase to be matched against documents, pictures, web-pages, or anyother form of on-line content. Alternatively, the search term may beposed as a question by the user.

System navigation and access behaviors may also include executingtransactions, including commercial transactions, such as the buying orselling of merchandise, services, or financial instruments. Systemnavigation and access behaviors may include not only individual accessesand interactions, but the capture and categorization of sequences ofinformation or system object accesses and interactions over time.

A second category of usage behaviors 920 is known as subscription andself-profiling behaviors. Subscriptions may be associated with specifictopical areas or other elements of the one or more computer-basedsystems 925, or may be associated with any other subset of the one ormore computer-based systems 925. “Following” is another term that may beused for a subscription behavior—i.e., following a topic is synonymouswith subscribing to a topic. Subscriptions or following behaviors mayalso be with regard to other users—the subscriber or follower receivesactivity streams of the subscribed to or followed user. A user'sfollowing behavior is distinguished from a linking behavior with regardto another user in that a following relationship is asymmetric, while alinking (e.g., “friending”) relationship is typically symmetric (andhence linking is considered in the collaborative behavior categoryherein). Subscriptions may thus indicate the intensity of interest withregard to elements of the one or more computer-based systems 925. Thedelivery of information to fulfill subscriptions may occur online, suchas through activity streams, electronic mail (email), on-linenewsletters, XML or RSS feeds, etc., or through physical delivery ofmedia.

Self-profiling refers to other direct, persistent (unless explicitlychanged by the user) indications explicitly designated by the one ormore users regarding their preferences and/or intentions and interests,or other meaningful attributes. A user 200 may explicitly identifyinterests or affiliations, such as job function, profession, ororganization, and preferences and/or intentions, such as representativeskill level (e.g., novice, business user, advanced). Self-profilingenables the one or more computer-based systems 925 to infer explicitpreferences and/or intentions of the user. For example, a self-profilemay contain information on skill levels or relative proficiency in asubject area, organizational affiliation, or a position held in anorganization. A user 200 that is in the role, or potential role, of asupplier or customer may provide relevant context for effective adaptivee-commerce applications through self-profiling. For example, a potentialsupplier may include information on products or services offered in hisor her profile. Self-profiling information may be used to inferpreferences and/or intentions and interests with regard to system useand associated topical areas, and with regard to degree of affinity withother user community subsets. A user may identify preferred methods ofinformation receipt or learning style, such as visual or audio, as wellas relative interest levels in other communities.

A third category of usage behaviors 920 is known as collaborativebehaviors. Collaborative behaviors are interactions among the one ormore users. Collaborative behaviors may thus provide information onareas of interest and intensity of interest. Interactions includingonline referrals of elements or subsets of the one or morecomputer-based systems 925, such as through email, whether to otherusers or to non-users, are types of collaborative behaviors obtained bythe one or more computer-based systems 925.

Other examples of collaborative behaviors include, but are not limitedto, online discussion forum activity, contributions of content or othertypes of objects to the one or more computer-based systems 925, postinginformation that is received by subscribers, categorizing subscribers soas to selectively broadcast information to subscribers, linking toanother user, or any other alterations of the elements, objects orrelationships among the elements and objects of one or morecomputer-based systems 925. Collaborative behaviors may also includegeneral user-to-user communications, whether synchronous orasynchronous, such as email, instant messaging, interactive audiocommunications, and discussion forums, as well as other user-to-usercommunications that can be tracked by the one or more computer-basedsystems 925.

A fourth category of process usage behaviors 920 is known as referencebehaviors. Reference behaviors refer to the marking, designating, savingor tagging of specific elements or objects of the one or morecomputer-based systems 925 for reference, recollection or retrieval at asubsequent time. An indicator such as “like” is a reference behaviorwhen used as a tag for later retrieval of associated information.Tagging may include creating one or more symbolic expressions, such as aword or words (e.g., a hashtag), associated with the correspondingelements or objects of the one or more computer-based systems 925 forthe purpose of classifying the elements or objects. The saved or taggedelements or objects may be organized in a manner customizable by users.The referenced elements or objects, as well as the manner in which theyare organized by the one or more users, may provide information oninferred interests of the one or more users and the associated intensityof the interests.

A fifth category of process usage behaviors 920 is known as directfeedback behaviors. Direct feedback behaviors include ratings or otherindications of perceived quality by individuals of specific elements orobjects of the one or more computer-based systems 925, or the attributesassociated with the corresponding elements or objects. The directfeedback behaviors may therefore reveal the explicit preferences and/orintentions of the user. In the one or more computer-based systems 925,the recommendations 250 may be rated by users 200. This enables adirect, adaptive feedback loop, based on explicit preferences and/orintentions specified by the user. Direct feedback also includesuser-written comments and narratives associated with elements or objectsof the computer-based system 925.

A sixth category of process usage behaviors is known as physiologicalresponses. These responses or behaviors are associated with the focus ofattention of users and/or the intensity of the intention, or any otheraspects of the physiological responses of one or more users 200. Forexample, the direction of the visual gaze of one or more users may bedetermined. This behavior can inform inferences associated withpreferences and/or intentions or interests even when no physicalinteraction with the one or more computer-based systems 925 isoccurring. Even more direct assessment of the level of attention may beconducted through access to the brain patterns or signals associatedwith the one or more users. Such patterns of brain functions duringparticipation in a process can inform inferences on the preferencesand/or intentions or interests of users, and the intensity of thepreferences and/or intentions or interests. The brain patterns assessedmay include MRI images, brain wave patterns, relative oxygen use, orrelative blood flow by one or more regions of the brain.

Physiological responses may include any other type of physiologicalresponse of a user 200 that may be relevant for making preference orinterest inferences, independently, or collectively with the other usagebehavior categories. Other physiological responses may include, but arenot limited to, utterances, vocal range, intensity and tempo, gestures,movements, or body position. Attention behaviors may also include otherphysiological responses such as breathing rate, heart rate, bloodpressure, or galvanic response.

A seventh category of process usage behaviors is known as environmentalconditions and physical location behaviors. Physical location behaviorsidentify physical location and mobility behaviors of users. The locationof a user may be inferred from, for example, information associated witha Global Positioning System or any other positionally or locationallyaware system or device, or may be inferred directly from locationinformation input by a user (e.g., inputting a zip code or streetaddress, or through an indication of location on a computer-implementedmap), or otherwise acquired by the computer-based systems 925. Thephysical location of physical objects referenced by elements or objectsof one or more computer-based systems 925 may be stored for futurereference. Proximity of a user to a second user, or to physical objectsreferenced by elements or objects of the computer-based application, maybe inferred. The length of time, or duration, at which one or more usersreside in a particular location may be used to infer intensity ofinterests associated with the particular location, or associated withobjects that have a relationship to the physical location. Derivativemobility inferences may be made from location and time data, such as thedirection of the user, the speed between locations or the current speed,the likely mode of transportation used, and the like. These derivativemobility inferences may be made in conjunction with geographiccontextual information or systems, such as through interaction withdigital maps or map-based computer systems. Environmental conditions mayinclude the time of day, the weather, temperature, the configuration ofelements or objects in the surrounding physical space, lighting levels,sound levels, and any other condition of the environment around the oneor more users 200.

In addition to the usage behavior categories depicted in Table 1, usagebehaviors may be categorized over time and across user behavioralcategories. Temporal patterns may be associated with each of the usagebehavioral categories. Temporal patterns associated with each of thecategories may be tracked and stored by the one or more computer-basedsystems 925. The temporal patterns may include historical patterns,including how recently an element, object or item of content associatedwith one or more computer-based systems 925. For example, more recentbehaviors may be inferred to indicate more intense current interest thanless recent behaviors.

Another temporal pattern that may be tracked and contribute topreference inferences that are derived, is the duration associated withthe access or interaction with, or inferred attention toward, theelements, objects or items of content of the one or more computer-basedsystems 925, or the user's physical proximity to physical objectsreferenced by system objects of the one or more computer-based systems925, or the user's physical proximity to other users. For example,longer durations may generally be inferred to indicate greater interestthan short durations. In addition, trends over time of the behaviorpatterns may be captured to enable more effective inference of interestsand relevancy. Since delivered recommendations may include one or moreelements, objects or items of content of the one or more computer-basedsystems 925, the usage pattern types and preference inferencing may alsoapply to interactions of the one or more users with the deliveredrecommendations 250 themselves, including accesses of, or interactionswith, explanatory information regarding the logic or rationale that theone more computer-based systems 925 used in deciding to deliver therecommendation to the user.

Adaptive Communications Generation

In some embodiments, adaptive communications 250 c or recommendations250 may be generated for the one or more users 200 through theapplication of affinity vectors.

For example, in some embodiments, Member-Topic Affinity Vectors (MTAVs)may be generated to support effective recommendations, wherein for auser or registered member 200 of the one or more computer-based systems925 a vector is established that indicates the relative affinity (whichmay be normalized to the [0,1] continuum) the member has for one or moreobject sub-networks the member has access to. For computer-based systems925 comprising a fuzzy content network-based structural aspect, themember affinity values of the MTAV may be in respect to topic networks.

So in general, for each registered member, e.g., member M, ahypothetical MTAV could be of a form as follows:

MTAV for Member M

Topic 1 Topic 2 Topic 3 Topic 4 . . . Topic N 0.35 0.89 0.23 0.08 . . .0.14

The MTAV will therefore reflect the relative interests of a user withregard to all N of the accessible topics. This type of vector can beapplied in two major ways:

-   -   A. To serve as a basis for generating adaptive communications        250 c or recommendations 250 to the user 200    -   B. To serve as a basis for comparing the interests with one        member 200 with another member 200, and to therefore determine        how similar the two members are

In some embodiments, an expertise vector (MTEV) may be used as a basisfor generating recommendations of people with appropriately inferredlevels of expertise, rather than, or in addition to, using an MTAV as inthe exemplary examples herein. That is, the values of an MTEV correspondto inferred levels of expertise, rather than inferred levels ofinterests as in the case of an MTAV.

To generate a MTAV or MTEV, any of the behaviors of Table 1 may beutilized. For example, in some embodiments the following examplebehavioral information may be used in generating an MTAV:

-   -   1) The topics the member has subscribed to received updates    -   2) The topics the member has accessed directly    -   3) The accesses the member has made to objects that are related        to each topic    -   4) The saves or tags the member has made of objects that are        related to each topic

This behavioral information is listed above in a generally reverse orderof importance from the standpoint of inferring member interests; thatis, access information gathered over a significant number of accesses orover a significant period of time will generally provide betterinformation than subscription information, and save information istypically more informative of interests than just accesses.

The following fuzzy network structural information may also be used togenerate MTAV values:

-   -   5) The relevancies of each content object to each topic    -   6) The number of content objects related to each topic

Personal topics that are not shared with other users 200 may be includedin MTAV calculations. Personal topics that have not been made publiclyavailable cannot be subscribed to by all other members, and so could inthis regard be unfairly penalized versus public topics. Therefore forthe member who created the personal topic and co-owners of that personaltopic, in some embodiments the subscription vector to may be set to“True,” i.e. 1. There may exist personal topics that are created by amember 200 and that have never been seen or contributed to by any othermember. This may not otherwise affect the recommendations 250 since theobjects within that personal topic may be accessible by other members,and any other relationships these objects have to other topics will becounted toward accesses of these other topics.

In some embodiments the first step of the MTAV calculation is to useinformation 1-4 above to generate the following table or set of vectorsfor the member, as depicted in the following hypothetical example:

TABLE 2 Member 1 Behaviors Topic 1 Topic 2 Topic 3 Topic 4 . . . Topic NSubscriptions 1 1 0 0 . . . 1 Topic Accesses 14 3 57 0 . . . 8 WeightedAccesses 112 55 23 6 . . . 43 Weighted Saves 6 8 4 0 . . . 2

The Subscriptions vector of Table 2 contains either a 1 if the memberhas subscribed to a topic or is the owner/co-owner of a personal topicor a 0 if the member has not subscribed to the topic. The Topic Accessesvector contains the number of accesses to that topic's explore page bythe member to a topic over a period of time, for example, the preceding12 months.

The Weighted Accesses vector of Table 1 contains the number of themember's (Member 1) accesses over a specified period of time of eachobject multiplied by the relevancies to each topic summed across allaccessed objects. (So for example, if Object 1 has been accessed 10times in the last 12 months by Member 1 and it is related to Topic 1 by0.8, and Object 2 has been accessed 4 times in the last 12 months byMember 1 and is related to Topic 1 at relevancy level 0.3, and these arethe only objects accessed by Member 1 that are related to Topic 1, thenTopic 1 would contain the value 10*0.8+4*0.3=9.2).

The Weighted Saves vector of Table 1 works the same way as the WeightedAccesses vector, except that it is based on Member 1's object save datainstead of access data.

In some embodiments, topic object saves are counted in addition tocontent object saves. Since a member saving a topic typically is abetter indicator of the member's interest in the topic than just savingan object related to the said topic, it may be appropriate to give more“credit” for topic saves than just content object saves. For example,when a user saves a topic object, the following process may be applied:

If the Subscriptions vector indicator is not already set to “1” for thistopic in Table 1, it is set to “1”. (The advantage of this is that evenif the topic has been saved before 12 months ago, the user will still atleast get subscription “credit” for the topic save even if they don'tget credit for the next two calculations).

In exactly the same way as a saved content object, a credit is appliedin the Weighted Accesses vector of Table 2 based on the relevancies ofother topics to the saved topic. A special “bonus” weighting in theWeighted Accesses vector of Table 2 may be applied with respect to thetopic itself using the weighting of “10”—which means a topic save isworth at least as much as 10 saves of content that are highly related tothat topic.

The next step is to make appropriate adjustments to Table 1. Forexample, it may be desirable to scale the Weighted Accesses and WeightedSaves vectors by the number of objects that is related to each topic.The result is the number of accesses or saves per object per topic. Thismay be a better indicator of intensity of interest because it is notbiased against topics with few related objects. However, per objectaccesses/saves alone could give misleading results when there are veryfew accesses or saves. So as a compromise, the formula that is appliedto each topic, e.g., Topic N, may be a variation of the following insome embodiments:((Weighted Accesses for Topic N)/(Objects related to Topic N))*SquareRoot(Weighted Accesses for Topic N)This formula emphasizes per object accesses, but tempers this with asquare root factor associated with the absolute level of accesses by themember. The result is a table, Table 2A, of the form:

TABLE 2A Member 1 Behaviors Topic 1 Topic 2 Topic 3 Topic 4 . . . TopicN Subscriptions 1 1 0 0 . . . 1 Topic Accesses 14 3 57 0 . . . 8Weighted Accesses 9.1 12 3.2 0.6 . . . 2.3 Weighted Saves 0.9 1.3 1.1 0. . . 0.03

In some embodiments, the next step is to transform Table 2A into a MTAV.In some embodiments, indexing factors, such as the following may beapplied:

Topic Affinity Indexing Factors Weight Subscribe Indexing Factor 10Topic Indexing Factor 20 Accesses Indexing Factor 30 Save IndexingFactor 40

These factors have the effect of ensuring normalized MTAV values ranges(e.g. 0-1 or 0-100) and they enable more emphasis on behaviors that arelikely to provide relatively better information on member interests. Insome embodiments, the calculations for each vector of Table 1A aretransformed into corresponding Table 2 vectors as follows:

-   -   1. Table 3 Indexed Subscriptions for a topic by Member 1=Table        2A Subscriptions for a topic*Subscribe Indexing Factor    -   2. Table 3 Indexed Direct Topic Accesses by Member 1=Table 2A        Topic Accesses*Topic Indexing Factor    -   3. Table 3 Indexed Accesses for a topic by Member 1=((Table 2A        Weighted Accesses for a topic by Member 1)/(Max(Weighted        Accesses of all Topics by Member 1)))*Accesses Indexing Factor    -   4. Table 3 Indexed Saves for a topic by Member 1=((Table 2A        Weighted Saves for a topic by Member 1)/(Max(Weighted Saves of        all Topics by Member 1)))*Saves Indexing Factor        The sum of these Table 3 vectors results in the MTAV for the        associated member 200 as shown in the hypothetical example of        Table 3 below:

TABLE 3 Member 1 Indexed Behaviors Topic 1 Topic 2 Topic 3 Topic 4 . . .Topic N Subscriptions 0 10 10 10 . . . 10 Topic Accesses 5 1 20 0 . . .8 Weighted Accesses 11 1 30 12 . . . 6 Weighted Saves 0 10 40 1 . . . 2Member 1 MTAV 16 22 100 23 . . . 26

In some embodiments, member-to-member affinities can be derived bycomparing the MTAVs of a first member 200 and a second member 200.Statistical operators such as correlation coefficients may be applied toderive a sense of the distance between members in n-dimensional topicaffinity space, where there are N topics. Since different users may haveaccess to different topics, the statistical correlation for a pair ofmembers is preferentially applied against MTAV subsets that contain onlythe topics that both members have access to. In this way, amember-to-member affinity vector (MMAV) can be generated for each memberor user 200, and the most similar members, the least similar members,etc., can be identified for each member 200. In some embodiments, amember-to-member expertise vector (MMEV) may be analogously generated bycomparing the MTEVs of a pair of users 200 and applying correlationmethods.

With the MTAVs, MMAVs, and Most Similar Member information available, aset of candidate objects to be recommended can be generated inaccordance with some embodiments. These candidate recommendations may,in a later processing step, be ranked, and the highest ranked tocandidate recommendations will be delivered to the recommendationrecipient 200,260. Recall that recommendations 250 may be in-context ofnavigating the system 925 or out-of-context of navigating the system925.

Following are more details on an exemplary set of steps related togenerating out-of-context recommendations. At each step, the candidateobjects may be assessed against rejection criteria (for example, therecommendation recipient having already recently received the candidateobject may be a cause for immediate rejection) and against a maximumnumber of candidate objects to be considered.

-   -   1. Determine if there are objects that have been related to        objects at a sufficient level of relatedness that have been        “saved” by the recommendation recipient since the time the        recommendation recipient saved the object. This may be a good        choice for a first selection step because it would be expected        that such objects would be highly relevant to the recommendation        recipient.    -   2. Determine if the Most Similar Members to the recommendation        recipient have “saved” (related) objects in the last 12 months        to the recommendation recipient's highest affinity topics.    -   3. Determine if the Most Similar Members to the recommendation        recipient have rated objects at a level greater than some        threshold over some time period, that are related to the        recommendation recipient's highest affinity topics.    -   4. Determine the most frequently accessed objects by the Most        Similar Members over some period of time that are related to the        recommendation recipient's highest affinity topics.    -   5. Determine the highest influence objects that are related to        the recommendation recipient's highest affinity topics.

A variation of the out-of-context recommendation process may be appliedfor in-context recommendations, where the process places more emphasisof the “closeness” of the objects to the object being viewed ingenerating candidate recommendation objects.

For both out-of-context and in-context recommendations, a rankingprocess may be applied to the set of candidate objects, according tosome embodiments. The following is an exemplary set of input informationthat may be used to calculate rankings.

-   -   1. Editor Rating: If there is no editor rating for the object,        this value is set to a default    -   2. Community Rating (If there is no community rating for the        object, this value can be set to a default)    -   3. Popularity: Indexed popularity (e.g., number of views) of the        object.    -   4. Change in Popularity: Difference in indexed popularity        between current popularity of the object and the object's        popularity some time ago    -   5. Influence: Indexed influence of the object, where the        influence of an object is calculated recursively based on the        influence of other objects related to the said object, weighted        by the degree of relationship to the said object, and where the        initial setting of influence of an object is defined as its        popularity.    -   6. Author's Influence: Indexed influence of the highest        influence author (based on the sum of the influences of the        author's content) of the content referenced by the object    -   7. Publish Date: Date of publication of the object    -   8. Selection Sequence Type: An indicator the sequence step in        which the candidate object was selected    -   9. Object Affinity to MTAV: The indexed vector product of the        Object-Topic Affinity Vector (OTAV) and the MTAV. The values of        the OTAV are just the relevancies between the object and each        topic.

A ranking is then developed based on applying a mathematical function tosome or all or input items listed directly above, and/or other inputsnot listed above. In some embodiments, user or administrator-adjustableweighting or tuning factors may be applied to the raw input values totune the object ranking appropriately. These recommendation preferencesettings may be established directly by the user, and remain persistentacross sessions until updated by the user, in some embodiments.

Some non-limiting examples of weighting factors that can be applieddynamically by a user or administrator are as follows:

-   -   1. Change in Popularity (What's Hot” factor)    -   2. Recency Factor    -   3. Object Affinity to MTAV        These weighting factors could take any value (but might be        typically in the 0-5 range) and could be applied to associated        ranking categories to give the category disproportionate        weightings versus other categories. They can provide control        over how important, for example, change in popularity, freshness        of content, and an object's affinity with the member's MTAV are        in ranking the candidate objects.

The values of the weighting factors are combined with the raw inputinformation associated with an object to generate a rating score foreach candidate object. The objects can then be ranked by their scores,and the highest scoring set of X objects, where X is a defined maximumnumber of recommended objects, can be selected for deliver to arecommendation recipient 200,260. In some embodiments, scoringthresholds may be set and used in addition to just relative ranking ofthe candidate objects. The scores of the one or more recommended objectsmay also be used by the computer-based system 925 to provide to therecommendation recipient a sense of confidence in the recommendation.Higher scores would warrant more confidence in the recommendation of anobject than would lower scores.

In some embodiments other types of recommendation tuning factors may beapplied by a user 200 or administrator. For example, the scope of asocial network, such as degrees of separation, may be adjusted so as toinfluence the recommendations 250, and/or relationship types orcategories of social relationships may be selected to tunerecommendations 250.

In some embodiments the scope of geography or distance from a currentlocation, including, but not limited to, the expected time to travelfrom the existing location to one or more other locations, may be tunedor adjusted so as to influence recommendations 250. The expected time totravel may be a function of the actual or inferred mode oftransportation of the recommendation recipient, road conditions, trafficconditions, and/or environmental conditions such as the weather. Thespecification of scope of geography, distance, and/or time-to-travel maybe via an automated monitoring or inference of the recommendationrecipient's current location, or may be via an explicit indication oflocation by the recommendation recipient through entering a locationdesignation such as a zip code, or by indicating a location on agraphical representation of geography, for example, by indicationlocation on a computer-implemented map display.

Other tuning factors that may be applied to influence recommendations250 include the ability for the recommendation recipient to select arecommendation recipient mood or similar type of “state of mind”self-assessment that influences the generation of a recommendation. Forexample, a recommendation recipient might indicate the current state ofmind is “busy,” and less frequent and more focused recommendations 250could be generated as a consequence.

In some embodiments, another type of tuning that may be applied by auser or administrator relates to the degree to which the capacity forenhanced serendipity is incorporated within the recommendationgenerating function 240 of the adaptive system 100.

In some embodiments a serendipity function comprises an interest anomalyfunction that identifies contrasting affinities between a first user'sMTAV and a second user's MTAV. Situations in which the first user's MTAVand the second user's MTAV have contrasting values associated with oneor more topical areas, but wherein the two MTAVs otherwise have a higherthan typical level similarity (as determined a vector similarityfunction such as, but not limited to, cosine similarity or correlationcoefficient functions), present the opportunity for preferentiallyrecommending objects 212 with a relatively high affinity to the topicalareas associated with the contrasting MTAV affinities. Morespecifically, for two users 200 that have a relatively high level ofsimilarity based on a comparison of their entire MTAVs, if the affinityvalues of the first user's MTAV corresponding to one or more topicalareas is relatively high, and the affinity values of the second user'sMTAV corresponding to the one or more topical areas is relatively low,then one or more objects 212 with relatively high OTAV values associatedwith the one or more topical areas may be preferentially recommended tothe second user.

In some embodiments, the amount and/or quality of usage behavioralinformation on which the respective MTAV affinity values of the twousers is based may additionally influence the generated recommendation250. Specifically, in the above example, if the affinity values of thesecond user's MTAV corresponding to the one or more topical areas arerelatively low and there is relatively little behavioral information onwhich said affinity values are based, then there is even greatermotivation to recommend one or more objects 212 with relatively highOTAV values associated with the one or more topical areas to the seconduser. This is because there is incrementally greater value in learningmore about the user's interest than if the low affinities were based oninferences from a larger body of behavioral information, as well asthere being a less likelihood of providing a recommendation 250 that istruly not of interest to the user.

In some embodiments, then, a general method of generating beneficiallyserendipitous recommendations combines the contrasting of topicalaffinities among users 200 and the relative confidence levels in thetopical contrasting affinities. This approach provides a “direction” forgenerating recommendations that are further from inferred interests thatwould otherwise be generated. Besides direction, a serendipity functionmay also include a “distance” factor and a probability factor. That is,according to some embodiments generating serendipity can be thought ofas exploring other areas of a multi-dimensional interest landscape,where the best inference based on historical behavioral information is a(local) maximum on the landscape. The serendipity function can bethought of as performing a “jump” on the interest landscape, where thejump is in a specified direction, for a specified distance, andperformed with a specified frequency or probability. One or more ofthese serendipity distance, direction, and probability parameters may betunable by a user 200 or administrator in accordance with someembodiments.

The serendipity distance may be generated in accordance with amathematical function. In some embodiments, the distance and/orprobability factors may be generated in accordance with a power lawdistribution—as a non-limiting example, the distance and/or probabilityfactors may be in accordance with a Levy Walk function.

It should be understood that other recommendation tuning controls may beprovided that are not explicitly described herein.

Knowledge and Expertise Discovery

Recall that knowledge discovery and expertise discovery refer tolearning layer functions that generate content recommendations andpeople recommendations 250, respectively.

For expertise discovery, there are at least two categories of peoplethat may be of interest to other people within a user community:

-   -   1. People who have similar interest or expertise profiles to the        recommendation recipient, which may be calculated, for example,        in accordance with MMAVs and MMEVs.    -   2. People who are likely to have the most, or complementary        levels of, expertise in specified topical areas

Expertise discovery functions deliver recommendations 250 within anavigational context of the recommendation recipient 200, or without anavigational context. In some embodiments, a person or persons may berecommended consistent with the “navigational neighborhood,” which maybe in accordance with a topical neighborhood that the recommendationrecipient 200 is currently navigating. The term “navigating” as usedherein should be understood to most generally mean the movement of theuser's 200 attention from one object 212 to another object 212 whileinteracting with, or being monitored by, a computer-implemented userinterface (wherein the user interface may be visual, audio and/orkinesthetic-based). Entering a search term, for example, is an act ofnavigating, as is browsing or scrolling through an activity stream ornews feed through use of a mouse, keyboard, and/or gesture detectionsensor.

In some embodiments expertise may be determined through a combination ofassessing the topical neighborhood in conjunction with behavioralinformation 920. The behavioral information that may be appliedincludes, but is not limited to, the behaviors and behavior categoriesin accordance with Table 1. As a non-limiting example, an expertisescore may be generated from the following information in someembodiments:

-   -   1. The scope of the topical neighborhood, as described herein    -   2. The topics created by each user within the topical        neighborhood    -   3. The amount of content each user contributed in the topical        neighborhood    -   4. The popularity (which may be derived from accesses and/or        other behaviors) of the content    -   5. The ratings of the content

In some embodiments this information may be applied to generateexpertise rankings as illustrated in the following non-limiting example:

-   -   1. For each user X, sum the number of topics created by user X        in the topical neighborhood, and then normalize across all        users. Call this the T-Score of the user    -   2. For each user X, and for each content item created in a given        time period by user X in the topical neighborhood: multiply the        number of accesses (popularity) over the time period of each        content item by the average rating of the content item (if there        is no rating, set the rating to an average level). Then sum over        all content items created by the user and normalize across all        users. Call this the “C-Score” of the user.    -   3. For each user X, and for each content item modified at least        once during the time period by user X in the topical        neighborhood: multiply the number of accesses (popularity) over        the time period of each content item by the average rating of        the content item (if there is no rating, set the rating to an        average level). Then sum over all content items modified by the        user and normalize across all users. Call this “M-Score” of the        user.    -   4. Total Expertise Score of a User=Scaling        Factor1*T-Score+Scaling Factor2*C-Score+Scaling Factor3*M-Score    -   5. Find the top Total Expertise Scores and display a        recommendation of one or more users ranked by total expertise        score.

In some embodiments, user-controlled tuning or preference controls maybe provided. For example, an expertise tuning control may be appliedthat determines the scope of the navigational neighborhood of thenetwork of content that will be used in calculating the total expertisescores. The tuning controls may range, for example, from a value V of 1(broadest scope) to 5 (narrowest scope).

In some embodiments, the topical neighborhood of the currently navigatedtopic T may then defined as encompassing all content items with arelationship indicator R 718 to topic T 710 t such that R>V−1. So ifV=5, then the topical neighborhood includes just the content that has arelationship of >4 to the topic T, and so on. Expertise tuning may beeffected through a function that enables expertise breadth to beselected from a range corresponding to alternative levels of V, in someembodiments.

In some embodiments, other tuning controls may be used to adjustexpertise discovery recommendations 250 with regard to depth ofexpertise, in addition to, or instead of, breadth of expertise. Forexample, for a given navigational neighborhood, a user 200 oradministrator may be able to adjust the required thresholds of inferredexpertise for a recommendation 250 to be delivered to the recommendationrecipient 200. Tuning of recommendations 250 may also be applied againsta temporal dimension, so as to, for example, account for and/orvisualize the accretion of new expertise over time, and/or, for example,to distinguish long-term experts in a topical area from those with morerecently acquired expertise.

In some embodiments, the expertise discovery function may generaterecommendations 250 that are not directly based on navigational context.For example, the expertise discovery function may infer levels ofexpertise associated with a plurality of topical neighborhoods, andevaluate the levels of expertise for the topical neighborhoods bymatching an MTAV or MTEV, or other more explicit indicator of topicalexpertise demand associated with the recommendation recipient 200 and aplurality of MTEVs of other users. Positive correlations between theexpertise recommendation recipient's MTAV or topical expertise demandindicators and an MTEV, or negative correlations between the expertiserecommendation recipient's MTEV and another MTEV, are factors that mayinfluence the generation of expertise recommendations. In someembodiments, the MMAV or an expertise matching equivalent such as anMMEV of the recommendation recipient 200 may be applied by the expertisediscovery function in evaluating other users 200 to recommend.

In some embodiments recommendation recipients 200 may select a level ofexpertise desired, and the expertise discovery function evaluatesexpertise levels in specific topical neighborhoods for matches to thedesired expertise level. The recommendation recipient 200 may set theexpertise discovery function to infer his level of expertise in atopical neighborhood and to evaluate others users for a similar level ofexpertise. The inference of expertise may be performed based, at leastin part, by comparing the values of the recommendation recipient's MTEVwith the associated topics in the specified topical neighborhood.

In some embodiments expertise may be inferred from the pattern matchingof information within content. For example, if a first user 200 employswords, phrases, or terminology that has similarities to a second user200 who is inferred by the system to have a high level expertise, theneverything else being equal, the system 100 may infer the first user tohave a higher than level of expertise. In some embodiments vocabulariesthat map to specific areas and/or levels of expertise may be accessed orgenerated by the system 100 and compared to content contributed by users200 in evaluating the level of expertise of the users.

Recall that the MTEV can be generated from behavioral information,including but not limited to the behaviors 920 and behavioral categoriesdescribed in Table 1, similarly to the MTAV, except expertise isinferred rather than interests and preferences. As just one example ofthe difference in inferring an expertise value associated with a topicrather than an interest value, clicking or otherwise accessing an object212 may be indicative of a interest in the associated topic or topics,but not very informative about expertise with regard to the associatedtopic or topics. On the other hand, behaviors such as creating objects,writing reviews for objects, receiving high ratings from other userswith regard to created objects, creating topics themselves, and so on,are more informative of expertise levels with regard to the associatedtopic or topics.

Inferences of levels of expertise can be informed by collaborativebehaviors with regard to other users 200 who are inferred to have givenlevels of expertise. In some embodiments users 200 are automaticallyclustered or segmented into levels of inferred expertise. Often, levelsof expertise cluster—that is, people with similar levels of expertisepreferentially collaborate, a tendency which can be beneficially used bythe expertise inferencing function. A recursive method may be appliedthat establishes an initial expertise clustering or segmentation, whichin conjunction with collaborative and other behaviors, enablesinferences of expertise of these and other users not already clustered,which then, in turn, enables adjustments to the expertise clusters, andso on.

Inferences of expertise that are embodied within an MTEV may be informedby the contents of objects associated with a user 200, in accordancewith some embodiments. For example, the use, and/or frequency of use, ofcertain words or phrases may serve as a cue for level of expertise. Moretechnical or domains-specific language, as informed by, for example, aword or phrase frequency table, would be indicative of level ofexpertise in a field. Other expertise cues include punctuation—questionmarks, everything else being equal, are more likely to be indicative ofless expertise.

In some embodiments, when a recommendation of expertise in topicalneighborhoods or for one or more specific topics is required, theselected topics are compared to user MTEVs to determine the bestexpertise match to the selected topics. For example, a specific projectmay require expertise in certain topical areas. These selected topicalareas are then compared to MTEVs to determine the users with be mostappropriate level of expertise for the project.

In some embodiments, the selected topics for which expertise is desiredmay be weighted, and the weighted vector of selected topics is comparedto the corresponding topical expertise values in user MTEVs—positivecorrelations between the weighted vector of selected topics and theMTEVs of other users are preferentially identified. Mathematicalfunctions are applied to determine the best expertise fit in theweighted selected topic case or the un-weighted selected topic case.

In some embodiments, the behaviors of users within one or more expertisesegments or clusters are assessed over a period of time after an eventassociated with one or more topical areas. The event, embodied as anobject 212, could, for example correspond to a condition identified byanother user or be identified and communicated by a device. Thepost-event behaviors assessed for expertise cohorts may then form thebasis for recommended content, people, and/or process steps to bedelivered to users 200 when the same or similar event occurs in thefuture. These event-specific recommendations 250 may be tempered by anassessment of the recommendation recipient's MMEV such that ifrelatively high levels of expertise are inferred relative to the eventor related topics, then “best practice” process step recommendations 250derived from the post-event behaviors associated with the highestexpertise cohort may be recommended. If relatively lower levels ofexpertise are inferred relative to the event or related topics, thenprocess step recommendations 250 derived with the highest expertisecohort may be supplemented with, for example, additional educational orverification steps.

Recommendation Explanation Generation

In addition to delivering a recommendation 250 of an object 212, thecomputer-based application 925 may deliver a corresponding explanation250 c of why the object was recommended. This can be very valuable tothe recommendation recipient 200 because it may give the recipient abetter sense of whether to bother to read or listen to the recommendedcontent (or in the case of a recommendation of another user 200 whetherto, for example, contact them), prior to committing significant amountof time. For recommendations 250 that comprise advertising content, theexplanation may enhance the persuasiveness of the ad.

The explanations 250 c may be delivered through any computer-implementedmeans, including, but not limited to delivery modes in which therecommendation recipient can read and/or listen to the recommendation.

In some embodiments, variations of the ranking factors previouslydescribed may be applied in triggering explanatory phrases. For example,the following table illustrates how the ranking information can beapplied to determine both positive and negative factors that can beincorporated within the recommendation explanations. Note that theRanking Value Range is the indexed attribute values before multiplyingby special scaling factors, Ranking Category Weighting Factors, such asthe “What's Hot” factor, etc.

TABLE 2E 2 4 5 1 Ranking 3 1^(st) 2^(nd) 6 Ranking Value RangeTransformed Positive Positive Negative Category (RVR) Range ThresholdThreshold Threshold Editor Rating 0-100 RVR 60 80 20 Community Rating*0-100 RVR 70 80 20 Popularity 0-100 RVR 70 80 10 Change in Popularity−100-100    RVR 30 50 −30 Object Influence 0-100 RVR 50 70 5 Author'sInfluence 0-100 RVR 70 80 .01 Publish Date −Infinity-0 100-RVR 80 90 35Object Affinity to 0-100 RVR 50 70 20 MTAV

An exemplary process that can be applied to generate explanations basedon positive and negative thresholds listed in 2E is as follows:

Step 1: First Positive Ranking Category—subtract the 1^(st) PositiveThreshold column from the Transformed Range column and find the maximumnumber of the resulting vector (may be negative). The associated RankingCategory will be highlighted in the recommendation explanation.

Step 2: Second Positive Ranking Category—subtract the 2^(nd) PositiveThreshold column from the Transformed Range column and find the maximumnumber of the resulting vector. If the maximum number is non-negative,and it is not the ranking category already selected, then include thissecond ranking category in the recommendation explanation.

Step 3: First Negative Ranking Category—subtract the Negative Thresholdcolumn from the Transformed Range column and find the minimum number ofthe resulting vector. If the minimum number is non-positive this rankingcategory will be included in the recommendation explanation as a caveat,otherwise there will be no caveats.

Although two positive and one negative thresholds are illustrated inthis example, an unlimited number of positive and negative thresholdsmay be applied as required for best results.

In some embodiments explanations 250 c are assembled from componentphrases and delivered based on a syntax template or function. Followingis an example syntax that guides the assembly of an in-contextrecommendation explanation. In the syntactical structure below phraseswithin { } are optional depending on the associated logic andcalculations, and “+” means concatenating the text strings. Otherdetailed syntactical logic such as handling capitalization is not shownin this simple illustrative example.

$\{ \lbrack {{Awareness}\mspace{14mu}{Phrase}\mspace{14mu}( {{if}\mspace{14mu}{any}} )} \rbrack \} + \begin{Bmatrix}{\lbrack {{Sequence}\mspace{14mu}{Number}\mspace{14mu}{Phrase}\mspace{14mu}( {{if}\mspace{14mu}{any}} )} \rbrack +} \\\lbrack {{Positive}\mspace{14mu}{Conjuction}} \rbrack\end{Bmatrix} + \begin{bmatrix}{1^{st}\mspace{14mu}{Positive}\mspace{14mu}{Ranking}} \\{{Category}\mspace{14mu}{Phrase}}\end{bmatrix} + \begin{Bmatrix}{\lbrack {{Positive}\mspace{14mu}{Conjuction}} \rbrack +} \\\lbrack {2^{nd}\mspace{14mu}{Positive}\mspace{14mu}{Ranking}\mspace{14mu}{Category}\mspace{14mu}{Phrase}\mspace{14mu}( {{if}\mspace{14mu}{any}} )} \rbrack\end{Bmatrix} + \begin{Bmatrix}{\lbrack {{Negative}\mspace{14mu}{Conjunction}} \rbrack +} \\\lbrack {{Negative}\mspace{14mu}{Ranking}\mspace{14mu}{Category}\mspace{14mu}{Phrase}\mspace{14mu}( {{if}\mspace{14mu}{any}} )} \rbrack\end{Bmatrix} + \{ \lbrack {{Suggestion}\mspace{14mu}{Phrase}\mspace{14mu}( {{if}\mspace{14mu}{any}} )} \rbrack \}$

The following section provides some examples of phrase tables or arraysthat may be used as a basis for selecting appropriate phrases for arecommendation explanation syntax. Note that in the following tables,when there are multiple phrase choices, they are selectedprobabilistically. “NULL” means that a blank phrase will be applied. [ ]indicates that this text string is a variable that can take differentvalues.

System Awareness Phrases

Trigger Condition Phrase Apply these phrase 1) I noticed thatalternatives if any of 2) I am aware that the 4 Sequence 3) I realizedthat Numbers was triggered 4) NULLOut-of-Context Sequence Number Phrases

Trigger Condition Phrase Sequence 1 1) other members have related [thisobject] to [saved object name], which you have saved, Sequence 2 1)members with similar interests to you have saved [this object] Sequence3 1) members with similar interests as you have rated [this object]highly 2) Members that have similarities with you have found [thisobject] very useful Sequence 4 1) [this object] is popular with membersthat have similar interests to yours 2) Members that are similar to youhave often accessed [this object] Note: [this object] = “this‘content-type’” (e.g., “this book”) or “it” depending on if the phrase“this ‘content-type’” has already been used once in the explanation.Positive Ranking Category Phrases

Trigger Category Phrase Editor Rating 1) [it] is rated highly by theeditor Community Rating* 1) [it] is rated highly by other membersPopularity** 1) [it] is very popular Change in Popularity 1) [it] hasbeen rapidly increasing in popularity Object Influence 1) [it] is[quite] influential Author's Influence 1) the author is [quite]influential 2) [author name] is a very influential author PublishDate 1) it is recently published Object Affinity to 1) [it] is stronglyaligned with your interests MTAV (1) 2) [it] is related to topics suchas [topic name] that you find interesting 3) [it] is related to topicsin which you have an interest 4) I know you have an interest in [topicname] 5) I am aware you have an interest in [topic name] 6) I have seenthat you are interested in [topic name] Object Affinity to 7) I havenoticed that you have a good deal of MTAV (2) interest in [topic name]Positive Conjunctions

Phrase 1) andNegative Ranking Category Phrases

Trigger Category Phrase Editor Rating 1) it is not highly rated by theeditor Community Rating 1) it is not highly rated by other membersPopularity 1) it is not highly popular Change in Popularity 1) it hasbeen recently decreasing in popularity Object Influence 1) it is notvery influential Author's Influence 1) the author is not veryinfluential 2) [author name] is not a very influential author PublishDate 1) it was published some time ago 2) it was published in [PublishYear] Object Affinity to 1) it may be outside your normal area of MTAVinterest 2) I'm not sure it is aligned with your usual interest areasNegative Conjunctions

Phrase 1) , although 2) , however 3) , butSuggestion Phrases (Use Only if No Caveats in Explanation)

Phrase 1) , so I think you will find it relevant 2) , so I think youmight find it interesting 3) , so you might want to take a look at it 4), so it will probably be of interest to you 5) , so it occurred to methat you would find it of interest 6) , so I expect that you will findit thought provoking 7) NULL

The above phrase array examples are simplified examples to illustratethe approach. In practice, multiple syntax templates, accessingdifferent phrase arrays, with each phrase array many different phrasesand phrase variations are required to give the feel of human-likeexplanations. These example phrase arrays are oriented towardrecommendations based on recommendation recipient interests as encodedin MTAVs; for recommendations related to the expertise of other users asencoded, for example, in MTEVs, explanation syntactical rules and phrasearrays tailored for that type of recommendation are applied.

As mentioned above, a sense of confidence of the recommendation to therecommendation recipient can also be communicated within therecommendation explanation. The score level may contribute to theconfidence level, but some other general factors may be applied,including the amount of usage history available for the recommendationrecipient on which to base preference inferences and/or the inferredsimilarity of the user with one or more other users for which there is abasis for more confident inferences of interests or preferences. Thecommunication of a sense of confidence in the recommendation can beapplied to recommendations with regard to expertise, as well asinterest-based recommendations. The degree of serendipity incorporatedby the serendipity function may be communicated 250 c to the user, andmay influence the communication and related syntax and/or phrasesapplied in the communication 250 c, as well as affect the communicationof the degree of confidence in a recommendation.

Recommendation explanations are one type of behavioral-basedcommunications 250 c that the one or more computer-based applications925 may deliver to users 200. Other types of adaptive communications 250c may be delivered to a user 200 without necessarily being inconjunction with the recommendation of an object or item of content. Forexample, a general update of the activities of other users 200 and/orother trends or activities related to people or content may becommunicated.

Adaptive communications 250 c may also include contextual information inaccordance with some embodiments. For example, contextual informationmay be provided to assist a user 200 in navigating the structural aspect210,210D of an adaptive system 100,100D. Contextual information mayadditionally or alternatively include information related to thestructure of originating systems 620,660 that have been transformed intoa fuzzy network-based structural aspect 210D.

One example of contextual information that may be communicated to theuser 200 is the scope of the navigational neighborhood associated withthe structural aspect 210D of an adaptive system 100D and/or thestructure of one or more originating systems 620,660.

Another example of contextual information within an adaptivecommunication 250 c relates to the cross-contextualization between atransformed structure 210D and the structure of an originating system620,660. For example the adaptive communication 250 c may include anindication to the user 200 that is navigating within a specific positionwithin the structural aspect 210D of an adaptive system 100D theequivalent navigational position within one or more originating systems620,660. The specific navigational position in the adaptive system 100Don which cross-contextualization is based can be a topic or a specificitem of content, for example.

The adaptive communications 250 c may include references to hierarchicalstructures—for example, it may be communicated to the user that a topicis the parent of, or sibling to, another topic. Or for a fuzzynetwork-based structure, the strength of the relationships among topicsand content may be communicated.

Adaptive communications 250 c may also comprise one or more phrases thatcommunicate an awareness of behavioral changes in the user 200 overtime, and inferences thereof. These behavioral changes may be derived,at least in part, from an evaluation of changes in the user's MTAVand/or MTEV affinity values over time. In some cases, these behavioralpatterns may be quite subtle and may otherwise go unnoticed by the user200 if not pointed out by the computer-based system 925. Furthermore,the one or more computer-based systems may infer changes in interests orpreferences, or expertise, of the user 200 based on changes in theuser's behaviors over time. The communications 250 c of these inferencesmay therefore provide the user 200 with useful insights into changes inhis interest, preferences, tastes, and over time. This same approach canalso be applied by the one or more computer-based systems to deliverinsights into the inferred changes in interests, preferences, tastesand/or expertise associated with any user 200 to another user 200. Theseinsights, packaged in an engaging communications 250 c, can simulatewhat is sometimes referred to as “a theory of mind” in psychology.

The adaptive communications 250 c in general may apply a syntacticalstructure and associated probabilistic phrase arrays to generate theadaptive communications in a manner similar to the approach describedabove to generate explanations for recommendations. The phrasetendencies of the adaptive communications 250 c over a number ofgenerated communications can be said to constitute a “personality”associated with the one or more computer-based applications 925. Thenext section describes how in some embodiments of the personality canevolve and adapt over time, based at least in part, on the behaviors ofthe communication recipients 200.

Adaptive Personalities

FIG. 9 is a flow diagram of the computer-based adaptive personalityprocess 1000 in accordance with some embodiments of the presentinvention. A user request for a communication 1010 initiates a function1020 that determines the syntactical structure of the communication 250c to the user 200. The communication 250 c to user 200 may be anadaptive recommendation 250, an explanation associated with arecommendation, or any other type of communication to the user. Thecommunication 250 c may be, for example, in a written and/or anaudio-based format.

In accordance with the syntactical structure that is determined 1020 forthe communication, one or more phrases are probabilistically selected1030 based on frequency distributions 3030 associated with an ensembleof phrases to generate 1040 a communication 930 to the user.

User behaviors 920, which may include those described by Table 1 herein,are then evaluated 1050 after receipt of the user communication. Based,at least in part, on these evaluations 1050, the frequency distributions3030 of one or more phrases that may be selected 1030 for future usercommunications are then updated 1060. For example, if the usercommunication 250 c is an the explanation associated with an adaptiverecommendation 250, and it is determined that the recommendationrecipient reads the corresponding recommended item of content, then therelative frequency of selection of the one or more phrases comprisingthe explanation of the adaptive recommendation 250 might bepreferentially increased versus other phrases that we not included inthe user communication. Alternatively, if the communication 250 celicited one or more behaviors 920 from the communication recipient 200that were indicative of indifference or a less than positive reaction,then the relative frequency of selection of the one or more phrasescomprising the communication might be preferentially decreased versusother phrases that we not included in the user communication.

In FIG. 11, an illustrative data structure 3000 supporting the adaptivepersonality process 1000 according to some embodiments is shown. Thedata structure may include a designator for a specific phrase array3010. A phrase array may correspond to a specific unit of the syntax ofan overall user communication. Each phrase array may contain one or morephrases 3040, indicated by a specific phrase ID 3020. Associated witheach phrase 3040 is a selection frequency distribution indicator 3030.In the illustrative data structure 3000 this selection frequencydistribution of phrases 3040 in a phrase array 3010 is based on therelative magnitude of the value of the frequency distribution indicator.In other embodiments, other ways to provide selection frequencydistributions may be applied. For example, phrases 3040 may be selectedper a uniform distribution across phrase instances in a phrase array3010, and duplication of phrase instances may be used to as a means toadjust selection frequencies.

Communication of Self-Awareness

FIG. 10 is a flow diagram of the computer-based adaptive self-awarenesscommunication process 2000 in accordance with some embodiments of thepresent invention. The process 2000 begins with an evaluation 2010 ofphrase frequency distribution 3030 changes over time. Then theappropriate syntactical structure of the communication 250 c ofself-awareness is determined 2020. One or more phrases 3040 that embodya sense of self-awareness are then selected in accordance with thesyntactical structure requirements and changes in phrase frequencydistributions over time.

Returning to FIG. 11, in some embodiments, phrase attributes that areassociated with specific phrases may be used as a basis for self-awarephrase selection. Two example phrase attributes 3050, 3060 whose valuesare associated with specific phrases 3040 are shown. An unlimited numberof attributes could be used as to provide as nuanced a level ofself-awareness as desired.

When changes in phrase frequency distributions 3030 are evaluated 2010,the corresponding attributes 3050, 3060 are also evaluated. Theseattributes map to attributes 4050, 4060 that are associated withself-aware phrases 4040 in self-aware phrase data structure 4000. Forexample, if phrases 3040 that have the attribute value “humorous” havebeen increasing in frequency, then self-aware phrases that reference“humorous” may be appropriate to include in generating 2040 acommunication of self-awareness 250 c to a user 200. As is the case ofany other communication 250 c, the behaviors 920 of the recipient 200 ofthe communication may be evaluated 2050, and the self-aware phrasefrequency distributions 4030 of the self-aware phrases 4040 may beupdated 2060 accordingly. This recursive evaluation and updating ofphrase frequency distributions can be applied without limit.

FIG. 12 depicts the major functions associated with a computer basedsystem 925 that exhibits an adaptive personality, and optionally, aself-aware personality. Recall that in some embodiments, thecomputer-based system 925 comprises an adaptive system 100.

A request 6000 for a communication to a user 200 is made. The request6000 may be a direct request from a user 200, or the request may be madeby another function of the computer-based system 925. In someembodiments the request 6000 for a communication to the user may beinitiated by a function that generates 240 an adaptive recommendation. Acommunication to the user is then generated 7000. This generation isperformed by first determining the appropriate syntactical rules orstructure 7500 for the communication. In some embodiments, the syntaxrules 7500 are of an “If some condition, Then apply a specific phrasearray 3010” structure. Once the appropriate syntax is established andassociated phrase arrays 3010 are determined, specific phrases areprobabilistically retrieved from the phrase array function 5000 based onselection frequency distributions associated with the correspondingphrase arrays. The communication 250 c is then assembled and deliveredto a user 200.

User behaviors 920 of the communication recipient 200 are then monitored8000. Based on inferences from these behaviors 920, the phrase arrayfrequency distributions of the phrase array function 5000 are updated9000 appropriately.

Computing Infrastructure

FIG. 13 depicts various processor-based computer hardware and networktopologies on which the one or more computer-based applications 925, andby extension, adaptive system 100, may operate.

Servers 950, 952, and 954 are shown, perhaps residing at differentphysical locations, and potentially belonging to different organizationsor individuals. A standard PC workstation 956 is connected to the serverin a contemporary fashion, potentially through the Internet. It shouldbe understood that the workstation 956 can represent any processor-baseddevice, mobile or fixed, including a set-top box. In this instance, theone or more computer-based applications 925, in part or as a whole, mayreside on the server 950, but may be accessed by the workstation 956. Aterminal or display-only device 958 and a workstation setup 960 are alsoshown. The PC workstation 956 or servers 950 may embody, or be connectedto, a portable processor-based device (not shown), such as a mobiletelephony device, which may be a mobile phone or a personal digitalassistant (PDA). The mobile telephony device or PDA may, in turn, beconnected to another wireless device such as a telephone or a GPSreceiver. As just one non-limiting example, the mobile device may be agesture-sensitive “smart phone,” wherein gestures or other physiologicalresponses are monitored through a touch screen and/or through a camera,or other sensor apparatus. The sensor apparatus may include devices formonitoring brain patterns and the sensor apparatus may operate within ahuman body, in accordance with some embodiments. The mobile device mayinclude hardware and/or software that enable it to be location-aware,and may embody a camera and/or sensors that enable the monitoring ofenvironmental conditions such as weather, temperature, lighting levels,moisture levels, sound levels, and so on.

FIG. 13 also features a network of wireless or other portable devices962. The one or more computer-based applications 925 may reside, in partor as a whole, on all of the devices 962, periodically or continuouslycommunicating with the central server 952, as required. A workstation964 connected in a peer-to-peer fashion with a plurality of othercomputers is also shown. In this computing topology, the one or morecomputer-based applications 925, as a whole or in part, may reside oneach of the peer computers 964.

Computing system 966 represents a PC or other computing system, whichconnects through a gateway or other host in order to access the server952 on which the one or more computer-based applications 925, in part oras a whole, reside. An appliance 968 includes software “hardwired” intoa physical device, or may utilize software running on another systemthat does not itself host the one or more computer-based applications925, such as in the case a gaming console or personal video recorder.The appliance 968 is able to access a computing system that hosts aninstance of one of the relevant systems, such as the server 952, and isable to interact with the instance of the system.

The processor-based systems on which the one or more computer-basedapplications 925 operate may include hardware and/or software such ascameras that enable monitoring of physiological responses such asgestures, body movement, gaze, heartbeat, brain waves, and so on. Theprocessor-based systems may include sensors that enable sensing ofenvironmental conditions such as weather conditions, lighting levels,physical objects in the vicinity, and so on.

While the present invention has been described with respect to a limitednumber of embodiments, those skilled in the art will appreciate numerousmodifications and variations therefrom. It is intended that the appendedclaims cover all such modifications and variations as fall within thescope of this present invention.

What is claimed is:
 1. A computer-implemented method, comprising:contributing a plurality of behaviors to an expertise clusteringfunction executed on a processor-based device, wherein the expertiseclustering function assigns a user to an expertise cohort based, atleast in part, on an inference from the plurality of behaviors; andreceiving a recommendation generated by a computer-implementedrecommender function, wherein the recommender function generates therecommendation in accordance with the expertise cohort.
 2. The method ofclaim 1, further comprising: contributing the plurality of behaviors tothe expertise clustering function, wherein the expertise clusteringfunction assigns the user to the expertise cohort based, at least inpart, on an evaluation of the contents of a plurality of objects.
 3. Themethod of claim 1, further comprising: receiving the recommendation,wherein the recommendation comprises a person.
 4. The method of claim 1,further comprising: receiving the recommendation, wherein therecommendation comprises a process step.
 5. The method of claim 1,further comprising: receiving the recommendation, wherein therecommendation is generated in accordance with a recommendationpreference control setting.
 6. The method of claim 1, furthercomprising: receiving the recommendation, wherein the recommendation isgenerated in accordance with a specified topical neighborhood.
 7. Themethod of claim 1, further comprising: receiving from acomputer-implemented explanatory function an explanation comprising areason for the recommendation.
 8. A computer-implemented system,comprising: an expertise clustering function executed on aprocessor-based computing device, wherein the expertise clusteringfunction assigns a user to an expertise cohort based, at least in part,on an inference from a plurality of behaviors; and acomputer-implemented recommender function, wherein the recommenderfunction generates a recommendation for delivery to the user inaccordance with the expertise cohort.
 9. The system of claim 8, furthercomprising: the expertise clustering function, wherein the expertiseclustering function assigns the user to the expertise cohort based, atleast in part, on an evaluation of the contents of a plurality ofobjects.
 10. The system of claim 8, further comprising: therecommendation, wherein the recommendation comprises a person.
 11. Thesystem of claim 8, further comprising: the recommendation, wherein therecommendation comprises a process step.
 12. The system of claim 8,further comprising: the computer-implemented recommender function,wherein the recommender function generates the recommendation inaccordance with a recommendation preference control setting.
 13. Thesystem of claim 8, further comprising: the computer-implementedrecommender function, wherein the recommender function generates therecommendation in accordance with a specified topical neighborhood. 14.The system of claim 8, further comprising: an explanatory function thatdelivers to the user an explanation comprising a reason for the deliveryof the recommendation.
 15. A computer-implemented system, comprising: acomputer-implemented function that clusters a plurality of users into aplurality of expertise cohorts based, at least in part, on an inferencefrom a first plurality of behaviors; a computer-implemented assessmentfunction that assesses a second plurality of behaviors associated withmembers of at least one of the expertise cohorts; and a recommenderfunction executed on a processor-based computing device that generates arecommendation based, at least in part, on the assessment of the secondplurality of behaviors.
 16. The system of claim 15, further comprising:the computer-implemented function that clusters users into the pluralityof expertise cohorts, wherein the clustering is based, at least in part,on an evaluation of the contents of a plurality of objects.
 17. Thesystem of claim 15, further comprising: the computer-implementedfunction that clusters users into the plurality of expertise cohorts,wherein the clustering is based, at least in part, on a specifiedtopical neighborhood.
 18. The system of claim 15, further comprising:the computer-implemented assessment function that assesses the secondplurality of behaviors associated with members of at least one of theexpertise cohorts, wherein the second plurality of behaviors occur aftera specific event.
 19. The system of claim 15, further comprising: thecomputer-implemented recommender function that generates therecommendation, wherein the recommendation is based, at least in part,on the expertise cohort of which the recommendation recipient is amember.
 20. The system of claim 15 further comprising: thecomputer-implemented recommender function that generates therecommendation, wherein the recommendation comprises a process step.