Simulated network system and method for relating users of real-world e-commerce and other user network systems to information

ABSTRACT

Simulated network system and method for associating a real-world computer-based network user to a computerized simulated network for providing information to the real-world user. The information provided is based on similarity between a simulated user profile defined using one or more simulated user profile terms that use a first vocabulary and one or more characteristics of the real-world user that are also based on the first vocabulary.

RELATED APPLICATION DATA

This application is continuation application of U.S. patent applicationSer. No. 17/385,400, filed Jul. 26, 2021, entitled “Simulated NetworkSystem and Method for Relating Users of Real-World E-Commerce and OtherUser Network Systems to Information,” which is a continuationapplication of U.S. patent application Ser. No. 16/740,455, filed Jan.12, 2020, entitled “Simulated Network System and Method for RelatingUsers of Real-World E-Commerce and Other User Network Systems toInformation,” which is a continuation application of U.S. patentapplication Ser. No. 16/222,159, filed Dec. 17, 2018, entitled“Simulated Network System and Method for Relating Users of Real-WorldE-Commerce and Other User Network Systems to Information,” which is acontinuation application of U.S. patent application Ser. No. 15/167,715,filed May 27, 2016, entitled “Simulated Network System and Method HavingSimulated User Profiles And Item Profiles Based On The Same VocabularyFor Information Integration With Real World E-Commerce And Other UserNetwork Systems,” each of which is incorporated by reference herein inits entirety. This application also claims the benefit of priority ofU.S. Provisional Patent Application Ser. No. 62/166,806, filed on May27, 2015, and titled “Simulated Social Network System and Method,” whichis incorporated by reference herein in its entirety.

FIELD OF INVENTION

The present invention generally relates to the field of simulated usernetworks. In particular, the present invention is directed to asimulated user network system and method for relating users ofreal-world e-commerce and other user network systems to information.

BACKGROUND

Computerized social networks have a benefit that is derived from largesize. Larger sized networks, such as Facebook, have a significant numberof users making a significant number of interactions with other usersand content items on the network to provide the operators of the networkwith social data that can reasonably approach a point of meaningfulinformation that can then be utilized to present to its usersrecommendations, item listings, and other information based on how otherusers in the network have behaved. Smaller networks and e-commercesystems typically do not have the volume of users or user interactionsto effectively generate their own meaningful data. Additionally, thetopology, homophilous nature, and dimensionality of the structure of theusers and network may be insufficient for a desired social signal.Further, real users can provide additional problems, such as difficultyin building a critical mass, scaling problems with too many users, usersnot interacting with consistent regularity, too many similar users(which results in something like over-fitting in a machine learningapplication), and/or other problems.

SUMMARY OF THE DISCLOSURE

In one implementation, a method of associating a real-worldcomputer-based network user to a computerized simulated network isprovided. The method includes defining within a computerized simulatednetwork a plurality of simulated user profiles using a first set ofterms based on a first vocabulary, the first set of terms representingactivity of real-world users of a real-world computer-based network,each of the plurality of simulated user profiles having one or moresimulated user profile terms from the first set of terms; associating areal-world user of the real-world computer-based network with a firstprofile of the plurality of simulated user profiles based on asimilarity of one or more characteristics of the real-world user to theone or more simulated user profile terms for the first profile, the oneor more characteristics of the real-world user based on the firstvocabulary; and providing an item of information to the real-world userbased on the one or more simulated user profile terms.

In another implementation, a machine-readable hardware storage mediumincluding machine-executable instructions for performing a method ofassociating a real-world computer-based network user to a computerizedsimulated network is provided. The instructions include a set ofinstructions for defining within a computerized simulated network aplurality of simulated user profiles using a first set of terms based ona first vocabulary, the first set of terms representing activity ofreal-world users of a real-world computer-based network, each of theplurality of simulated user profiles having one or more simulated userprofile terms from the first set of terms; a set of instructions forassociating a real-world user of the real-world computer-based networkwith a first profile of the plurality of simulated user profiles basedon a similarity of one or more characteristics of the real-world user tothe one or more simulated user profile terms for the first profile, theone or more characteristics of the real-world user based on the firstvocabulary; and a set of instructions for providing an item ofinformation to the real-world user based on the one or more simulateduser profile terms.

BRIEF DESCRIPTION OF THE DRAWINGS

For the purpose of illustrating the invention, the drawings show aspectsof one or more embodiments of the invention. However, it should beunderstood that the present invention is not limited to the precisearrangements and instrumentalities shown in the drawings, wherein:

FIG. 1 illustrates a graphical representation of an exemplary set ofsimulated item profiles and a set of simulated user profiles;

FIG. 2 illustrates a graphical representation of another exemplary setof simulated item profiles and simulated user profiles;

FIG. 3 illustrates a graphical representation of an exemplary vocabularyhaving terms organized into n number of classifications;

FIG. 4 illustrates a graphical representation of another exemplaryvocabulary having terms organized into classifications;

FIG. 5 illustrates a graphical representation of yet another exemplaryvocabulary having terms organized into classifications;

FIG. 6 illustrates a graphical representation of a portion of anexemplary network topology;

FIG. 7 illustrates a graphical representation of a portion of oneimplementation of a simulated network;

FIG. 8 illustrates one exemplary implementation of a method ofgenerating and operating a simulated network;

FIG. 9 illustrates one exemplary implementation of a method ofassociating a simulated user profile with a node of a simulated network;

FIG. 10 illustrates one exemplary method for simulating a sharing of oneor more item profiles in a simulated network;

FIG. 11 illustrates another example implementation of a simulation ofsharing and spreading using a simulated network of the currentdisclosure;

FIG. 12 illustrates one exemplary method of determining item profiles toshare in a simulated sharing in a simulated network of the currentdisclosure;

FIG. 13 illustrates one exemplary method of determining item profiles tospread in a simulated spreading in a simulated network of the currentdisclosure;

FIG. 14 illustrates another exemplary method of determining itemprofiles to spread in a simulated spreading in a simulated network ofthe current disclosure;

FIG. 15 illustrates one exemplary method of integrating information froma simulated network of the current disclosure with a real-worlde-commerce or other user network system;

FIG. 16 illustrates one example diagrammatic representation of oneimplementation of a simulated network system;

FIG. 17 illustrates one exemplary implementation of a method ofgenerating a simulated listing of information related to sharing and/orspreading of items via a simulated network for presentation to areal-world computer-based e-commerce system or other real-world usernetwork system;

FIG. 18 illustrates one exemplary implementation of a display of anexample list of terms from top topics in a vocabulary of a simulatednetwork;

FIG. 19 illustrates another exemplary implementation of a display ofinformation from a simulated network; and

FIG. 20 illustrates yet another exemplary implementation of a display ofinformation from a simulated network.

DETAILED DESCRIPTION

The current disclosure provides systems and methods related to asimulated computer-based network. As used herein, the term simulatednetwork and the term simulated computer-based network include asimulated social network and other simulated networks that allow for theassigning of simulated user profiles to nodes of the network andsimulated sharing/spreading of item profiles from one node to another asdescribed herein. In one implementation, a simulated computer-basedsocial network includes simulated items and simulated users each havingcomputerized profiles that are based on a vocabulary of terms that areused to describe the simulated items.

Such a simulated network can provide one or more benefits to real-worldcomputer-based e-commerce systems, social networks, other networks,and/or users of such real-world systems. Examples of benefits that maybe achieved by exemplary implementations of a simulated network of thecurrent disclosure include, but are not limited to, providinginformation to a real-world system that mimics activity that may takeplace by real users on such system, providing a recommendation of anitem to a user of such a system (e.g., an item that might be ofpredicted interest to a user), provide a listing of items for viewingand/or consideration by a user of such a system, providing informationrelated to promoting one or more actions (e.g., within varied contexts,such as viewing an article or purchasing a product), providing a volumeof user activity information not available to a system having arelatively small amount of users, and any combinations thereof. Examplereal-world systems and networks include, but are not limited to, awebsite selling goods, an online service providing access to audioand/or visual content (e.g., an audio/visual streaming contentprovider), an electronic system providing recommendations to users abouta good or service, an online provider of publications (e.g., news,entertainment, etc.), a social network, and any combinations thereof.Such systems may deliver their information to and/or interact with theirreal-world users in a variety of ways. Example ways of communicatingwith real-world users include, but are not limited to, via the Internet,over another computerized network, via a computer application (e.g., amobile device “app”), and any combinations thereof.

Various items can be represented in a simulated network of the currentdisclosure. Example items include, but are not limited to a publication,an audio content item, a video content item, a photographic contentitem, a product for sale, a service for sale, and any combinationthereof. Examples of a publication include, but are not limited to, anews article, a political advocacy document, an academic journalpublication, a scientific study, an advertisement, and any combinationsthereof. In one exemplary aspect, an item simulated via a simulatednetwork of the current disclosure may represent a corresponding item ina real-world environment. In one such example, an item simulated via asimulated network of the current disclosure is an item available forsale on a real-world e-commerce system. In another such example, an itemsimulated via a simulated network of the current disclosure is anarticle published over the Internet by a real-world network system, suchas an Internet news agency.

Simulated items are represented in a simulated network using acomputer-based item profile having terms based on a vocabulary. Avocabulary includes terms and, optionally some level of structure (e.g.,a hierarchical structure) of such terms. The terms describe one or moreaspects of an item to be simulated. Example terms in a vocabularyinclude, but are not limited to, a classification, a sub-classification,a category, a sub-category, a topic, a sub-topic, an attribute, and anycombinations thereof. In one example, a term vocabulary includes one ormore classifications with each classification including one or moretopics and/or attributes. The word (classification, category, topic,attribute, etc.) utilized to describe a type of term may beinterchangeable and may not be necessary for describing the actual term.These words are used in part herein to assist with description ofvarious vocabularies. An item profile may include one or more termswithout regard to the word label for the type of term. For example, anitem profile may include one or more higher hierarchical terms (e.g., aclassification term, a category term), one or more lower hierarchicalterms (e.g., a sub-classification, a sub-category, a topic, anattribute), and any combination thereof. In one example of generating asimulated network, an item profile is assigned one or more terms from avocabulary. In another example of generating a simulated network, anitem profile is assigned one or more terms from terms selected from thegroup of a classification, a sub-classification, a category, asub-category, a topic, a sub-topic, an attribute, and any combinationsthereof. An item profile may include any number of terms. The number ofterms of an item profile can vary from simulated network to simulatednetwork and/or from user profile to user profile within a simulatednetwork. In one example, a number of terms of an item profile isdetermined randomly. In another example, a number of terms of an itemprofile is a predetermined number.

Simulated users are represented in a simulated network using acomputer-based simulated user profile that includes terms based on thesame vocabulary utilized to describe the simulated items in the samesimulated network. Terms for each simulated user profile in a set ofsimulated user profiles of a simulated network may be determined in avariety of ways. Example ways of determining terms for a simulated userprofile include, but are not limited to, a random assignment of one ormore terms to a profile, a probabilistic assignment of one or more termsto a profile (e.g., based on the relative probabilistic relationship ofthe terms in the item profiles), a statistically accurate assignment ofone or more terms to a profile, use of a weighting factor for one ormore terms in assigning terms to a profile, and any combinationsthereof. A simulated user profile may include any number of terms. Thenumber of terms of a simulated user profile can vary from simulatednetwork to simulated network and/or from user profile to user profilewithin a simulated network. In one example, a number of terms of asimulated user profile is determined randomly. In another example, anumber of terms of a simulated user profile is a predetermined number.Any number of simulated user profiles may be included in a simulatednetwork of the current disclosure. Exemplary factors to consider indetermining the number of simulated user profiles include, but are notlimited to, having a number of simulated users represented to adequatelymodel one or more desired outcomes of simulated sharing and/or spreadingof items represented via item profiles; having a number of simulatedusers capable of having terms consistent with the distributions of theterms in the item profiles of the simulated network, having a number ofsimulated users to span the desired topic space represented by thesimulated network, having a sufficient number of simulated users so thata desired average degree can be achieved while also achieving desiredoverall network structure (e.g. if a degree of 50 is desired (every nodeconnected to 50 neighbors) and a sufficient number of distinct clustersis desired, then many more than 50 nodes is required), having ssufficient number of simulated users so that an overall level ofshare/spread activity on the network is achieved while maintaining areasonable share/spread count per simulated user, having a sufficientnumber of simulated users so that a target percentage of simulated itemscan be shared one or more times on the network, and any combinationsthereof.

Various weighting factors can be utilized in weighting the probabilityof inclusion of a given term from a vocabulary in a simulated userprofile. Example weighting factors include, but are not limited to, arandomly generated factor, a factor of the popularity of a term withinthe vocabulary in the item profiles of the simulated network, a factorbased on the number of item profiles having the term relative to thetotal number of item profiles, a factor based on the number of itemprofiles having the term relative to other terms in the vocabulary, afactor based on the number of item profiles having the term relative toother terms in a grouping of terms in the vocabulary (e.g., in acategory containing the term), and any combinations thereof. An itemprofile and/or a simulated user profile may include data representing aweighting factor for one or more of the terms included in the profile.

Clustering of terms in a real-world environment (e.g., a real-worldsystem used to derive items for representation in a simulated network)may be utilized in determining which terms to associate with a simulateduser profile. For example, if two or more terms appear together in astatistically significant level of occurrence in real-world itemrepresented by the item profiles of a simulated network, the assignmentof the same two or more terms to the same simulated user profile mayoccur at an increased probability in defining simulated user profiles(e.g., at the same probability as existing in real-world items). Otherlevels of probabilistic weighting of the occurrence of clustering mayalso be used in associating terms with simulated user profiles.

FIG. 1 is a graphical representation of a set of simulated item profiles105 for n number of items 1, 2, 3, 4, . . . n and a set of simulateduser profiles 110 for n number of users 1, 2, 3, . . . n. The number ofitem profiles 105 and simulated user profiles 110 are not required to bethe same. FIG. 2 is a graphical representation of a set of simulateditem profiles 205 and simulated user profiles 210 that are similar toitem profiles 105 and user profiles 110 of FIG. 1 . Item profiles 205and user profiles 210 each include a set of terms based on a vocabulary215 that includes a set of terms 220 that are based on characteristicsof the items represented by the simulated user profiles 210.

FIG. 3 is a graphical representation of an exemplary vocabulary havingterms organized into n number of classifications shown as classification305, classification 310, and classification 315. Classification 305includes topics 1.1, 1.2, 1.3, . . . 1.n. Classification 310 includestopics 2.1, 2.2, 2.3, . . . 2.n. Classification 315 includes topics n.1,n.2, n.3, . . . n.n. The number of topics in each classification and thenumber of classifications are not required to be the same.

FIG. 4 is a graphical representation of another exemplary vocabularyhaving terms organized into classifications 405, 410, 415, 420, and 425.Classification 405 has a classification term value of “Geography:City”and includes topic term values of “London,” “Paris,” “Shanghai,” and“New York.” Classification 410 has a classification term value of“Geography:Country” and includes topic term values of “USA,” “Canada,”“China,” and “Russia.” Classification 415 has a classification termvalue of “Culture” and includes topic term values of “Food,”“Terrorism,” “Movies,” and “Art.” Classification 420 has aclassification term value of “Technology” and include topic term valuesof “Smartphone,” “Hover Board,” “Teleportation,” and “Cold Fusion.”Classification 425 has a classification term value of “Sports” andincludes topic term values of “Ice Hockey,” “Soccer,” “Football,” and“Baseball.” The illustration is shown with the use of ellipses toindicate that one or more additional classifications and one or moreadditional topics are included, but not shown, in the vocabulary. Termsfrom the vocabulary of the example shown in FIG. 4 may be utilized todefine item profiles and simulated user profiles of an exemplaryimplementation of a simulated network of the current disclosure. In oneexample, terms of the vocabulary of the example shown in FIG. 4 areutilized to describe a set of simulated items profiles of a simulatednetwork in which the item profiles represent real-world news articlesand are utilized to describe a set of simulated user profiles in thesimulated network. In one such example, the terms of the vocabularyassigned to an item profile are terms appearing in the correspondingreal-world article and the terms assigned to the simulated user profilesare determined using a value of relative occurrence of the terms acrossthe set of item profiles. For example, an item profile representing anews article about Chinese citizens playing soccer for a London-basedassociation soccer team may have terms “China,” “Sports,” “Soccer,” and“London.”

FIG. 5 is a graphical representation of yet another exemplary vocabularyhaving terms organized into classifications 505, 510, 515, 520, and 525.Classification 505 has a classification term value of “Shirts” andincludes topic term values of “Short-sleeved,” “Button down,” “t-shirt,”and “Dress Shirt.” Classification 510 has a classification term value of“Pants” and includes topic term values of “Cargo,” “Dress,” “Pleated,”and “Denim.” Classification 515 has a classification term value of“Color” and includes topic term values of “Blue,” “Brown,” “Black,” and“Green.” Classification 520 has a classification term value of “Size”and include topic term values of “Small,” “Medium,” “Large,” and“Petite.” Classification 525 has a classification term value of“Accessories” and includes topic term values of “Belts,” “Hats,”“Cologne,” and “Jewelry.” The illustration is shown with the use ofellipses to indicate that one or more additional classifications and oneor more additional topics are included, but not shown, in thevocabulary. Terms from the vocabulary of the example shown in FIG. 5 maybe utilized to define item profiles and simulated user profiles of anexemplary implementation of a simulated network of the currentdisclosure. In one example, terms of the vocabulary of the example shownin FIG. 5 are utilized to describe a set of simulated items profiles ofa simulated network in which the item profiles represent real-worldproducts for sale on an e-commerce system and are utilized to describe aset of simulated user profiles in the simulated network. In one suchexample, the terms of the vocabulary assigned to an item profile areterms describing a characteristic of a corresponding product in thereal-world e-commerce system. For example, a real-world product may be agreen, button-down shirt of size large and the corresponding itemprofile would include terms “green,” “shirt,” “button-down,” and“large.”

As discussed above, the prevalence of terms corresponding to real-worlditems may be utilized in associating those terms with item profiles andsimulated user profiles in a simulated network. The following shows anexemplary data coding of an example item profile of a simulated network:

{  id″: ″4613600″,  ″vectors″: {   ″terms″: {    ″avgreview″:0.8799999952316284,    ″cat_abcat0100000″: 0.5,    ″cat_abcat0101000″:0.5,    ″cat_abcat0101001″: 0.5,    ″cat_cat00000″: 0.5,    ″cls_MIDFPTV 32-45″: 0.5,    ″color_Black″: 0.5,    ″dpt_VIDEO″: 0.5,   ″mfg_Samsung″: 1,    ″sku_4613600″: 1,    ″subcls_MID 32\″ LCD″: 0.5,   ″t_720p″: 0.25,    ″t_black″: 0.25,    ″t_browser″: 0.25,   ″_class″: 0.25,    ″t_diag″: 0.25,    ″t_hdtv″: 0.25,    ″t_includ″:0.25,    ″t_led″: 0.25,    ″t_resolutionsmart″: 0.25,    ″t_samsung″:0.25,    ″t_smart″: 0.25,    ″_tv″: 0.25,    ″t_web″: 0.25,   ″type_HardGood″: 0.5   },

In this example shown above, the “id” of the particular item profile isgiven as 4613600. This item profile corresponds to a real-worldtelevision product from an e-commerce system. Terms associated with theitem profile are shown under the “terms” heading with the term valuesenclosed in quotations, such as “color_Black.” In many of the exampleterm values a descriptor is appended in the term value, such as the“color” before the “Black.” In this example, the “t” appended beforecertain terms, such as “black,” “browser,” “hdtv,” represents that theterm is a term that appears in a descriptive text of the product (e.g.,on the e-commerce system website, as an advertisement, etc.).Additionally, a predetermined numerical weighting factor is listed aftereach term. In this example, the terms from the item textual content arepredetermined to be weighted lower than terms related to the color ofthe item and the item manufacturer, “Samsung.” Various predeterminedweightings considerations can be utilized in order to provide differingdesired probabilities of similarity comparisons (described furtherbelow) between profiles (i.e., giving more desired weight to some termsover others).

The following shows another exemplary data coding of an example itemprofile of a simulated network:

{  ″id″: ″659252″,  ″vectors″: {   ″terms″: {    ″Earth/noun″:0.017241379246115685,    ″activity/noun″: 0.008620689623057842,   ″agree/verb″: 0.0021551724057644606,    ″be/verb″:0.006465517450124025,    ″carbon/noun″: 0.008620689623057842,   ″change/noun″: 0.008620689623057842,    ″climate/noun″:0.0258620698004961,    ″cloud/noun″: 0.0258620698004961,   ″cloudier/adjective″: 0.0008620689623057842,    ″co2/noun″:0.017241379246115685,    ″cooler/adjective″: 0.0008620689623057842,   ″dioxide/noun″: 0.008620689623057842,    ″disagree/verb″:0.0021551724057644606,    ″earth/noun″: 0.017241379246115685,   ″expect/verb″: 0.0021551724057644606,    ″extra/adjective″:0.0008620689623057842,    ″future/adjective″: 0.00008620689914096147,   ″future/noun″: 0.0008620689623057842,    ″gas/noun″:0.017241379246115685,    ″greenhouse/noun″: 0.008620689623057842,   ″have/verb″: 0.0021551724057644606,    ″human/adjective″:0.0008620689623057842,    ″indicate/verb″: 0.0021551724057644606,   ″level/noun″: 0.008620689623057842,    ″new/adjective″:0.0008620689623057842,    ″offset/verb″: 0.0021551724057644606,   ″other/adjective″: 0.0008620689623057842,    ″past/noun″:0.0008620689623057842,    ″planet/noun″: 0.008620689623057842,   ″point/noun″: 0.008620689623057842,    ″portion/noun″:0.008620689623057842,    ″predict/verb″: 0.0021551724057644606,   ″reflect/verb″: 0.0021551724057644606,    ″result/noun″:0.008620689623057842,    ″rise/verb″: 0.004310344811528921,   ″s_science″: 0.0071042319759726524,    ″scientist/noun″:0.008620689623057842,    ″sensitive/adjective″: 0.0017241379246115685,   ″space/noun″: 0.008620689623057842,    ″study/noun″:0.017241379246115685,    ″suggest/verb″: 0.004310344811528921,   ″sunlight/noun″: 0.008620689623057842,    ″temperature/noun″:0.008620689623057842,    ″warm/verb″: 0.004310344811528921,   ″warming/noun″: 0.008620689623057842   },

In this example shown immediately above, the “id” of the particular itemprofile is given as 659252. This item profile corresponds to areal-world publication from an Internet publication service. Termsassociated with the item profile are shown under the “terms” headingwith the term values enclosed in quotations, such as “cooler/adjective.”The terms in this example represent words appearing in the Internetpublication. In implementations of an item profile having termscorresponding to words appearing in a publication or other textual itemit is not necessary that the item profile have a term to correspond withevery word in the publication. In certain examples, occurrencethresholds can be utilized to limit terms to those corresponding towords that occur a predetermined desired minimum number of times in thearticle, a predetermined desired minimum percentage of occurrencerelative to other words in the article, and/or some other desiredoccurrence relationship. In the example item profile 659252 shown above,a category term is included having the value “s_science,” where the “s”is appended to indicate a category level term. Also, in this example,terms are appended with an indication of the part of speech for thecorresponding word. Such an appending is an option that may providevalue in distinguishing differing usage of the same word. Further inthis example, the terms are followed by a weighting factor thatindicates the relative occurrence of the corresponding word in relationto other words in the publication. While the examples above of differentcodings for profiles show particular exemplary ways to organize termswithin a profile, an item profile and/or a simulated user profile mayutilize any structure, programming language, or other design choiceconsistent with delivering one or more of the characteristics andfunctionalities described herein.

Simulated user profiles are associated with a node of a computer-basedsimulated network (e.g., one simulated user profile per each node).Various network topologies are known and can be created with any numberof nodes with varying degrees of interrelationship between nodes bythose of ordinary skill in light of the teachings of the currentdisclosure. One exemplary aspect that may be considered in selecting thecharacteristics of a network topology is the degree to which thetopology allows for the sharing and spreading of items from one node ofthe network to another. In one example, a network topology is selectedand designed to have characteristics that will encourage sharing andspreading of items from one node of the network topology to another.Example network topologies for a simulated network include, but are notlimited to, a small world model, a Watts and Strogatz model, and anycombinations thereof.

FIG. 6 illustrates a graphical representation of a portion of anexemplary network topology 600. Network 600 includes a node 602connected to nodes 612, 614, 616, and 618. Node 614 is further connectedto nodes 622, 624, 626, and 632. Node 618 is further connected to nodes634 and 644, and is also connected to node 632. Node 616 is connected tonode 642 and is also connected to node 644. Node 612 is furtherconnected to nodes 652 and 654. Node 644 is further connected to nodes662, 664, and 666. Each of nodes 622, 624, 626, 632, 634, 642, 652, 654,662, 664, and 666 are further connected to other nodes not shown. Eachof the nodes of network 600 has neighboring nodes to which it isdirectly connected. For example, node 614 has neighboring nodes 602,618, 622, 624, and 626. It is contemplated that exemplaryimplementations of a simulated network can have nodes with any number ofneighbors (e.g., 100+ neighbors each). As will be described furtherbelow, simulated user profiles are associated with the nodes of asimulated network and simulated item represented by item profiles areshared and/or spread from node to node. A node will share/spread an itemto one or more of its neighbors (or in certain implementations, to allof its neighbors). For example, node 614 will share and/or spread anitem to nodes 602, 618, 622, 624, and 626. Network 600 is shown in atwo-dimensional fashion. Many known network topologies may be understoodas multi-dimensional.

FIG. 7 illustrates a graphical representation of a portion of oneimplementation of a simulated network 700. The graphical representationshows nodes 702, 714, 718, 722, 724, 726, and 732. In one implementationaspect of a simulated network as described herein, simulated userprofiles are associated with nodes of a simulated network based on thesimilarity of terms in simulated user profiles positioned proximate eachother. In one example, the similarity of a simulated user profile at anode to simulated user profiles positioned at neighboring nodes isutilized to determine locations of simulated user profiles in asimulated network. In another example, the similarity of simulated userprofiles at a node to simulated user profiles positioned at neighboringnodes and one or more other nodes proximate the node under considerationto determine locations of simulated user profiles in a simulatednetwork.

A variety of known similarity comparison techniques are known, any ofwhich may be used in determining a level of similarity between profiles(e.g., between one or more simulated user profiles and/or one or moreitem profiles. Examples of similarity comparison techniques include, butare not limited to, a cosine similarity, a vector distance technique, adistance between multi-dimensional points, and any combinations thereof.In one example, a cosine similarity technique is utilized to determine alevel of similarity of terms of a simulated user profile to anothersimulated user profile in a simulated network. In another example, acosine similarity technique is utilized to determine a level ofsimilarity of terms of a simulated user profile to an item profile in asimulated network.

In one example of associating simulated user profiles with nodes of asimulated network, simulated user profiles are associated with nodes ofa simulated network and determining if the overall similarity levelacross the simulated network meets a desired level. One exemplary aspectthat may possibly be considered in determining overall similarity levelof the placement of simulated user profiles is a level of designencouragement towards a desired level of item sharing between nodes. Ifthe initial placement of simulated user profiles is not to a desiredlevel in this example, one or more of the associated simulated userprofiles is swapped to have an association with another node and a newoverall similarity level is determined. The swapping of one or moresimulated user profiles can be repeated until (a) a predeterminedoverall level of similarity is achieved and/or (b) there issubstantially no change in overall similarity level for a predetermined(e.g., 1, 2, 3, etc.) number of swapping cycles.

In one example of associating simulated user profiles with nodes of asimulated network, a homophily score for the simulated network can beutilized to determine a desired level of homophily of the simulatednetwork. In such an example, simulated user profiles are associated withnodes of a simulated network and determining a homophily score for thesimulated network. Techniques for determining the homophily of a networkare known. Examples of criteria that can be utilized in a homophilydetermination include, but are not limited to, a cosine similarity, avector distance technique, a distance between multi-dimensional points,a sum of all similarity scores between all connected nodes in thesimulated network, and any combinations thereof. A homophily score mayutilize similarities between terms of a simulated user profileassociated with one node and terms of a simulated user profileassociated with another node proximate to the first. In one example, ahomophily score for a simulated network is derived from a sum of allsimilarity scores between all connected nodes in the simulated network.If the initial placement of simulated user profiles is not to a desiredlevel of optimum homophily, one or more of the associated simulated userprofiles is swapped to have an association with another node and a newhomophily score is determined. The swapping of one or more simulateduser profiles can be repeated until (a) a predetermined homophily scoreis achieved and/or (b) there is substantially no change in homophilyscore for a predetermined (e.g., 1, 2, 3, etc.) number of swappingcycles.

Referring again to FIG. 7 , a simulated user profile 752 is associatedwith node 702, a simulated user profile 754 is associated with node 714,a simulated user profile 756 is associated with node 718, a simulateduser profile 758 is associated with node 722, a simulated user profile760 is associated with node 724, a simulated user profile 762 isassociated with node 726, and a simulated user profile is associatedwith node 732.

Example ways of associating a simulated user profile with a node of asimulated network include, but are not limited to, including anidentifying link of a node in a simulated user profile, including anidentifying link of a simulated user profile in the instructionsdefining a node, assigning a simulated user profile to a node in thedefinitions and/or other computer-implementable instructions describinga simulated network, another mechanism of associating two data objects,and any combinations thereof.

With a simulated network having simulated user profiles associated withnodes, one or more items represented by item profiles in a simulatednetwork can be shared and/or spread from one node (e.g., one simulateduser profile) to one or more other nodes (e.g., one or more othersimulated user profiles). The similarity of a simulated user profile toan item profile under consideration for possible sharing and/orspreading is utilized in simulating shares and/or spreads of that itemprofile.

FIG. 8 illustrates one exemplary implementation of a method 800 ofgenerating and operating a simulated network. At step 805, a set of itemprofiles for the simulated network is defined using terms from avocabulary. The vocabulary includes terms describing one or morecharacteristics and/or associated information for the items beingrepresented by the set of item profiles. At step 810, a simulated userprofile is defined for each user of a set of simulated users. Thesimulated user profile utilizes terms from the same vocabulary utilizedin defining the item profiles. Implementation details, features,functionalities, and other characteristics of item profiles andsimulated user profiles are discussed elsewhere herein and areapplicable to this implementation and other examples and implementationherein where appropriate and where not stated otherwise.

At step 815, each simulated user profile is associated with a node of acomputerized simulated network utilizing the similarity of the simulateduser profile to other simulated user profiles being associated withnodes proximate the position of the node under consideration.Implementation details, features, functionalities, and othercharacteristics of associating simulated user profiles with nodes arediscussed elsewhere herein and are applicable to this implementation andother implementation herein where appropriate and where not statedotherwise. FIG. 9 illustrates one exemplary implementation of a method900 of associating a simulated user profile with a node of a simulatednetwork. At step 905, each simulated user profile is associated with anode of a simulated network. At step 910, if the initial placement ofsimulated user profiles is not to a desired level of homophily, one ormore of the associated simulated user profiles is swapped to have anassociation with another node and a new homophily score is determined atstep 915. At step 920, the swapping of one or more simulated userprofiles can be repeated until (a) a predetermined homophily score isachieved and/or (b) there is substantially no change in homophily scorefor a predetermined (e.g., 1, 2, 3, etc.) number of swapping cycles.

Referring again to FIG. 8 , at step 820, the sharing of one or more itemprofiles is simulated based on a similarity of the terms of thesimulated user profile associated with a given node (e.g., a “sharingnode”) to the terms of an item profile that is under consideration forpossible sharing. A simulated sharing is a simulated introduction of anitem profile to a portion of nodes of a simulated network. In oneexample, a simulated sharing includes sharing an item profile from onesimulated user profile to the neighboring simulated user profiles in thesimulated network. A simulated spreading (as discussed further below) isa simulated re-sharing by a simulated user profile of an item profilethat had previously been shared and/or spread by one or more neighboringsimulated user profiles. In one example, a simulated spreading includesa simulated user profile at a first node introducing an item profileshared in one of a predetermined number of prior cycles of simulation bya predetermined number of neighboring simulated user profiles to all ofthe other neighboring simulated user profiles of the first node. Asimulated sharing and/or a simulated spreading may represent an actionincluding, but not limited to, a tweet of an item, a sharing of an item,a liking of an item, and expression of an opinion of an item, arecommendation of an item, and any combinations thereof. Such an actionmay correspond to a similar action in a real-world network system and/ore-commerce system.

Simulating sharing may include a decision to not share one or more itemprofiles. Examples of not sharing an item profile include, but are notlimited to, not sharing a given item profile, to not share a given itemprofile from a given simulated user profile, not sharing any itemprofiles from a given simulated user profile, and any combinationsthereof. A decision of whether to share or which item profiles to sharemay include a variety of factors, including the similarity between thesimulated user profile and the item profile. Example other factors forconsideration in sharing an item profile include, but are not limitedto, use of an external rank score for an item profile, use of a timedelay factor or aging characteristic associated with an item profile,chance, and any combinations thereof.

An external rank score is a relative ranking of the all or a subset ofthe item profiles in a simulated network based on some external (i.e.,outside the simulated network) factor. Example rank score factorsinclude, but are not limited to, a number of times a real-world itemcorresponding to an item profile has been liked and/or commented upon byreal-world users, a number of times a real-world item corresponding toan item profile has been purchased and/or viewed by real-world users, asales ranking, a number of times a real-world item corresponding to anitem profile has been downloaded by real-world users, a number of timesa real-world item corresponding to an item profile has been connected toanother item, and any combinations thereof. For example, 100 newsarticles each represented by item profiles in a simulated network mayhave corresponding data of how many times they were “liked” by users ina real-world online news service. This data can be utilized to create arelative ranking of the 100 news articles based on this specific rank tocreate ranks scores for each news article. In one example, news articleswith higher rank scores may be treated with a higher probability fordetermining if an article (and/or which article) will be shared by asimulated user profile. Other types of items can similarly utilize arank score.

A time delay factor (also referred to as an aging characteristic) is anadjustment to a sharing determination and/or a spreading determinationbased on the age of an item represented in an item profile of asimulated network. For example, item profiles can be each assigned atime delay factor that corresponds to a time since the item profile hadbeen introduced in the simulated network (e.g., a time since previouslyshared or spread by another simulated user profile). In one suchexample, item profiles are organized into time groups (also referred toas time window) based on the time since sharing and/or spreading. In oneexample of time groupings, item profiles can be organized into groupsthat are within 1 hour old, between 1 hour and 2 hours old, between 2hours and 4 hours old, between 4 hours and 12 hours old, and between 12hours and 24 hours old. Time groupings do not require exclusivity ofboundaries (i.e., the time groupings can overlap). In another example oftime groupings, item profiles can be organized into groups that arewithin 1 hour old, between 0 hour and 2 hours old, between 0 hours and 4hours old, between 0 hours and 12 hours old, and between 0 hours and 24hours old. A time delay factor may include a probability characteristicfor each time group. In one example, such a probability characteristicmay be based on a randomly generated number and/or a number based on arelative probability consideration related to the time groupings. In onesuch example (e.g., the example above of 1, 2, 4, 12, and 24 hourgroupings), time windows in a series may have a probabilitycharacteristic of 0.03, 0.04, 0.06, 0.04, and 0.02, respectively. Oneexemplary usage of a time delay factor can be to determine if anysharing or spreading will occur for a given time window for a givensimulated user profile. In one such example, a randomly generated numberis compared to the probability characteristic of a time delay factor foreach time window to determine if any item profiles will be shared by thesimulated user profile from that time window (e.g., if the random numbergenerated is less than the probability characteristic there would be asharing and/or spreading consideration).

For a simulated network having item profiles representing items from ane-commerce system, a time delay factor may be supplemented and/orreplaced by a sales rank factor. A sales rank factor is a characteristicrelated to a relative ranking of an item with respect to other itemsbased on volume of sales of the item in a real-world or simulatednetwork or user system. For example, item profiles can be assigned asales rank factor that represents a sales volume data and/or a relativeranking of an item amongst other items based on sales volume. Itemprofiles may then be grouped based on subsets of sales rank into salesrank windows. In one example, item profiles can be organized into salesrank windows such as those within the first 5,000 items in ranking,those from the 5,000 rank to the 10,000 rank, those from the 10,0000rank to the 25,000 rank, etc. Sales rank windows may include overlap. Inanother example, item profiles can be organized into sales rank windowssuch as those within the first 5,000 items in ranking, those within thefirst 10,000 rank, those within the first 25,000 rank, etc. Inimplementation described herein where item profiles are described asbeing separated into groups by time windows, it is contemplated that theitem profiles may also be grouped based on a sales rank window.

A simulation of sharing may include any number of cycles of sharing. Acycle of sharing may include looking at sharing from each simulated userprofile in a simulated network and/or looking at sharing each itemprofile in a simulated network.

FIG. 10 illustrates one exemplary method 1000 for simulating a sharingof one or more item profiles in a simulated network. At step 1005, foreach simulated user profile, it is determined if that simulated userprofile (positioned at a given node of the simulated network) will shareor spread any item profile in a current cycle of simulation. For anygiven simulated user profile, a decision may be made to not share inthat cycle. Example ways to determine if a simulated user profile willeven consider to share in a cycle include, but are not limited to, arandom determination to share or not to share, and any combinationsthereof. In one example, a randomly generated number is created for eachsimulated user profile in a given cycle (e.g., a number between 0 and 1,such as for a simulated network using cosine similarity to makesimilarity determinations). In that example, the randomly generatednumber is compared to a predetermined threshold. Example ways ofdetermining a threshold for a share/no share determination include, butare not limited to, a randomly generated threshold value, a thresholdvalue determined by a relative probability of users sharing (e.g.,related to total number of simulated user profiles and/or related tototal number of item profiles eligible for sharing), and anycombinations thereof.

At step 1010, for simulated user profiles that will be considered forsharing (i.e., a yes decision was made at step 1005, step 1005 wasomitted and all simulated user profiles are considered for sharing,etc.), determine if similarity of simulated user profile to one or moreitem profiles meets a predetermined threshold or sharing requirement.Example ways to set a threshold or sharing requirement include, but arenot limited to, using a randomly generated threshold criteria, using acriteria based on probabilities associated with item profiles underconsideration, using a criteria based on a weighting factor associatedwith item profiles under consideration, and any combinations thereof. Inone example, a randomly generated threshold criteria is determined for agiven sharing comparison (e.g., a number from 0 to 1 in a cosinesimilarity determination). That criteria can be compared to thesimilarity of each item profile under consideration to the simulateduser profile to determine if any of the item profiles match thecriteria. In one such example, each item profile's relative similarityto the simulated user profile is determined (e.g., via totaling all ofthe similarity values for each item profile and dividing each by thetotal) and matched against the criteria.

At step 1015, if there is a meeting of the threshold and/or sharerequirement (e.g., a criteria value of 0.6 matching an item profilehaving a relative similarity value of 0.6), the matching item profile isshared by the simulated user profile to neighboring nodes. At step 1020,steps 1005, 1010, and 1015 are repeated for one or more additionalsimulated user profiles in the simulated network. In one example, therepeating is done for all simulated user profiles. In another example,the repeating is performed on a subset of all simulated user profiles.

Any number of item profiles can be considered for possible sharing by agiven simulated user profile. In one example, all of the available itemprofiles in a simulated network are considered for possible sharing by asimulated user profile. In another example, a subset of all of theavailable item profiles in a simulated network are considered forpossible sharing by a simulated user profile. In one such example, afirst subset of item profiles is determined based on a predeterminednumber of the top ranked item profiles in a ranking order based onsimilarity between the simulated user profile and each item profile. Inthis same example, the first subset is further reduced by determiningthe item profiles that meet a predetermined level of similarity with thesimulated user profile. This additional filtering ensures that there isa minimum desired level of similarity that may not be obtained only fromtaking the top number of ranked items (e.g., the distribution of highsimilarity values being small within the ranking). When a simulatedsharing utilizes multiple time groups for item profiles, a reduction toa first subset and/or to a further filtered subset of the first subsetmay be performed on each time group. In one example of reducing thenumber of item profiles for consideration, 10,000 example item profilesin a simulated network (or in a time window) are reduced to 1,000 bytaking the top 1,000 items from a ranking order based on similarity tothe corresponding simulated user profile, and the 1,000 items arefurther reduced to 130 items by comparing the similarity of each itemprofile to the simulated user profile to select those item profilesmeeting a predetermined minimum level of similarity.

Referring again to FIG. 8 , at step 825, the spreading of one or moreitem profiles is simulated based on a similarity of the terms of thesimulated user profile associated with a given node (e.g., the same“sharing node”) to the terms of an item profile that was previouslyshared or spread by neighboring nodes within a predetermined number ofprior cycles of simulation.

As with simulating sharing, simulating spreading may include a decisionto not spread one or more item profiles. A decision of whether toconsider the simulated user profile for spreading or which item profilesto spread may include a variety of factors, including the similaritybetween the simulated user profile and the item profile. Example otherfactors for consideration in spreading an item profile include, but arenot limited to, use of an external rank score for an item profile, useof a time delay factor or aging characteristic associated with an itemprofile, average similarity of the simulated user profile underconsideration for spreading to all of the neighboring simulated userprofiles that had previously shared or spread the item profile, thenumber of neighboring simulated user profiles that had previously sharedor spread the item profile, a random determination to consider spreadingor not to spread, and any combinations thereof.

In one example, for a given simulated user profile, a determination toconsider spreading or not to spread any item profiles by that simulateduser profile in a given cycle can occur at the same time as the decisionto consider sharing or not to share any item profiles by that samesimulated user profile. In another example, a separate determination forwhether or not to consider the simulated user profile for spreading mayoccur at a separate time.

FIG. 11 illustrates another example implementation of a simulation ofsharing and spreading using a simulated network of the currentdisclosure. Implementation details, features, functionalities, and othercharacteristics of item profiles, simulated user profiles, simulatedsharing, simulated spreading, and other elements are discussed elsewhereherein and are applicable to this implementation and other examples andimplementations herein where appropriate and where not stated otherwise.

At step 1105, upon an initial cycle of simulation of sharing and/orspreading, the method proceeds to step 1110. For subsequent cycles, aswill be discussed further below, a determination is made at step 1105 ifthere are remaining cycles to the simulation. If the determination isyes, the method proceeds to step 1110. If the determination is no, themethod ends.

At step 1110, for each simulated user profile of the simulated network(e.g., as associated with nodes as discussed above), a determination ismade at step 1115 of whether or not the simulated user profile willconsider possibly sharing and/or spreading one or more item profilesfrom that simulated user to neighboring simulated users. In one example,an implementation of a simulated network is configured to alwaysconsider sharing and/or spreading at step 1115 such that this step isessentially a non-action step. In another example, an implementation ofa simulated network includes an active step of determining if eachsimulated user profile will continue with a consideration of whether ornot to spread and/or share at step 1115. In one example of determining,a random number is generated and compared against one or morepredetermined values for step 1115. In one such example, a number from 0to 1 is randomly generated and compared against a predetermined value(e.g., a probability value, such as one based on a relative probabilityof item profiles to be selected and/or a relative probability related tothe number of simulated user profiles). For example, a random number isgenerated (e.g., 0.02) and compared against a predetermined value of1/300. If the randomly generated number is below (in this example) thepredetermined value, the decision to proceed to consider possiblesharing and/or spreading is positive. Other examples of techniques fordetermining are discussed above.

If a determination at step 1115 is no, the method proceeds to step 1120.At step 1120, if additional simulated user profiles exist in thesimulated network to run through the current cycle of simulation, themethod proceeds back to step 1110. If no further simulated user profilesneed to be considered in the current cycle, the method proceeds back tostep 1105. If a determination at step 1115 is yes, the method proceedsto step 1125.

Steps 1125, 1130, and 1140 are optional steps utilized in a simulationof sharing and/or spreading in which item profiles are organized intotime windows. If no such organization is configured, the method canproceed to step 1135. If time window configuration exists for thesimulation, at step 1125, for each item profile time window a furtheroptional step 1130 of a threshold determination whether to consider thetime window for possible sharing by the simulated user profile is made.In one example of threshold determination for each time window, a randomnumber is generated and compared against a predetermined value to decideif the simulated user profile will consider any item profiles from thattime window. Examples of such determination are discussed above. If thedetermination is positive (e.g., the randomly selected number meets therequirement of the predetermined number, such as by being greater thanor less than the predetermined number as is appropriate in the givencase), the method proceeds to step 1135. If the result is negative, themethod proceeds to step 1140 where a determination is made if there areany additional time windows to be considered in the current cycle forthe current simulated user profile. If so, the method proceeds back tostep 1125. If not, the method proceeds to step 1155, which will bediscussed further below.

At step 1135, the terms of the simulated user profile are compared tothe terms of item profiles available for consideration. If using a timewindow configuration, the item profiles available for considerationwould be those in the current time window under consideration. Exampleadditional reductions in the number of item profiles to be consideredare discussed above. At step 1145, if the comparison of similarity meetsa predetermined level of similarity, the process proceeds to step 1150and the one or more item profiles that met the similarity standard areshared to neighboring simulated user profiles. The process proceeds tostep 1140. Example ways of determining a predetermined level ofsimilarity are discussed above. Another exemplary implementation isdiscussed below with respect to FIG. 12 . If no item profiles match thesimilarity requirements at step 1145, the process proceeds to step 1140.Again, at step 1140, if the simulation is configured with time windowsand additional time windows exist for consideration in the currentcycle, the simulation proceeds to step 1125. At step 1140, if there areno additional time windows for consideration, the process proceeds tostep 1155. if the simulation is not configured with time windows, theprocess proceeds from either step 1145 or 1150 to step 1155.

At step 1155, each of the item profiles that had been previously sharedby a neighboring simulated user profile are compared for similarity tothe simulated user profile currently being considered. In an optionalvariation, only those item profiles that had been shared by apredetermined number of neighboring simulated user profiles and/or hadbeen shared within a predetermined number of prior cycles are consideredat step 1155 for similarity to the current simulated user profile. Anyitem profiles that meet predetermined requirements of similaritycomparison at step 1160 are spread to neighboring simulated userprofiles at step 1165 from the current simulated user profile. Then thesimulation proceeds to step 1120. If no item profiles meet predeterminedrequirements at step 1160, the simulation proceeds to step 1120.Examples of implementation details for determining if an item profilewill be spread are discussed above and also below with respect to FIG.13 .

FIG. 12 illustrates one exemplary method of determining item profiles toshare in a simulated sharing in a simulated network of the currentdisclosure. At step 1205, a predetermined number of top ranked itemprofiles that are ranked by similarity to a current simulated userprofile are selected as a subset to all item profiles. For example, thetop 300 ranked item profiles can be selected from such a ranking. Thisreduction may increase the likelihood of similarity between the itemprofiles and the simulated user profile. At step 1210, the subset ofitem profiles from step 1205 is further reduced by selecting the itemprofiles that have a similarity with the simulated user profile thatexceeds a predetermined similarity value threshold. At step 1215, arandomly generated value is compared to a relative similarity value foreach of the selected item profiles from step 1210, the similarity valuebased on the similarity of the corresponding item profile to the currentsimulated user profile. To determine the relative similarity value, thesimilarity values for all of the item profiles under consideration atstep 1215 are summed and each similarity value is divided by the sum. Atstep 1220, one or more item profiles that have a matching relativesimilarity value to the randomly generated value are shared toneighboring simulated user profiles. Matching values may be anypredetermined degree of matching that satisfies a desired level ofsharing for the simulated network. For example, a match may be an exactnumerical match, a statistically relevant match (e.g., within plus orminus boundaries), a substantial match (e.g., using significantfigures), or other type of predetermined match degree for the twonumbers.

FIG. 13 illustrates one exemplary method of determining item profiles tospread in a simulated spreading in a simulated network of the currentdisclosure. At step 1305 item profiles that had been shared within apredetermined number of prior cycles by neighbors to the currentsimulated user profile are considered. At step 1310, a low probabilityof spreading an item is assigned to item profiles shared by less than apredetermined number of neighbors. At step 1315, a relatively highprobability of spreading an item is assigned to item profiles shared bymore than the predetermined number of neighbors. At step 1320, theprobabilities from steps 1310 and 1315 are utilized to determine asubset of items eligible for spreading. At step 1325, the item profilesof the subset of item profiles are compared for similarity to thesimulated user profile. Optionally, the similarity comparison mayutilize a rank score for item profiles to weight one or more aspects ofan item profile in a similarity comparison. At step 1330, item profileswith a similarity comparison that meets a predetermined threshold arespread to neighboring simulated user profiles. In one example, thepredetermined threshold is a manually determined value. In anotherexample, the predetermined threshold is a randomly determined value.

FIG. 14 illustrates another exemplary method of determining itemprofiles to spread in a simulated spreading in a simulated network ofthe current disclosure. At step 1405, item profiles that had been sharedwithin a predetermined number of prior cycles by neighbors to thecurrent simulated user profile are considered. At step 1410, a number ofitems to spread is optionally determined (e.g., using a randomgeneration of a number and/or a probabilistic value). Optionally, thenumber of neighbors that shared a particular item profile can beutilized to remove from consideration any item profiles not meeting aminimum desired number of prior shares. At step 1415, a likelihood ofspreading value is determined utilizing (1) the average similarity ofthe current simulated user profile to profiles of neighboring users, (2)similarity of the current simulated user profile to the item profilesfor items shared or spread by neighbors within a predetermined number ofprior cycles, and optionally (3) an external rank value for the itemprofiles being considered. At step 1420, the likelihood of spreadingvalue is compared to a predetermined threshold value (e.g., a randomlygenerated value (e.g., from 0 to 1 for cosine similarity examples)) tosee if the likelihood of spreading value exceeds the predeterminedthreshold. If so, at step 1425, the item profiles that exceed thethreshold are spread to neighboring simulated user profiles. In oneexample, a likelihood of spreading value includes use of a logisticfunction defined by the equation:

var p=(f(score)*px*user2article)/(1+e{circumflex over( )}−1*(closeNeighbors−(3))),

-   -   wherein closeNeighbors is the number of neighbors who shared the        same item that have a similarity above a predetermined minimum        threshold; (3) is the threshold number of neighbor users for the        logistic curve; f(score) is some function of score that        increases likelihood of spreading according to overall score for        item profile (e.g., a rank score as described above); px is the        average similarity of neighbors who shared the item profile; and        user2article is the similarity value of the simulated user        profile to the item profile.

FIG. 15 illustrates one exemplary method 1500 of integrating informationfrom a simulated network of the current disclosure with a real-worlde-commerce or other user network system. At step 1505 a simulatednetwork is accessed. The simulated network has simulated user profilesand item profiles that have terms based on the same vocabulary. Thesimulated user profiles (and the corresponding simulated users) eachhave a history of simulated sharing of items based on the similarity ofthe simulated user profile and the item profiles. At step 1510, acomparison profile for a real-world user and/or a real-world item from areal-world user network system and/or e-commerce system is compared toone of more simulated user profiles of the simulated network. Thecomparison profile includes the terms selected from the same vocabularyof terms used for the simulated user profiles and the simulated itemprofiles. At step 1515, based on a similarity of the comparison profileto one or more simulated user profiles and the corresponding history forthose simulated user profiles, a list of items or other information isgenerated for presentation to the real-world user.

FIG. 16 illustrates one example diagrammatic representation of oneimplementation of a simulated network system 1600. Simulated networksystem 1600 includes a processing element 1605, a memory 1610, a displaygenerator 1615, a user input 1620, a communication networking element1625, and a power supply 1630. Processing element 1605 includescircuitry and/or machine-executable instructions (e.g., in the form offirmware stored within a memory element included with and/or associatedwith processing element 1605) for executing instructions for completingone or more tasks (e.g., tasks associated with one or more of theimplementations, methodologies, features, aspects, and/or examplesdescribed herein). Examples of a processing element include, but are notlimited to, a microprocessor, a microcontroller, one or more circuitelements capable of executing a machine-executable instruction, and anycombinations thereof.

Memory 1610 may be any device capable of storing data (e.g., datarepresenting a simulated user profile, a term vocabulary, an itemprofile, a comparison profile, one or more predetermined values (e.g., apredetermined threshold value), etc.), machine-executable instructions,and/or other information related to one or more of the implementations,methodologies, features, aspects, and/or examples described herein. Amemory, such as memory 1610, may include a machine-readable hardwarestorage medium. Examples of a memory include, but are not limited to, asolid state memory, a flash memory, a random access memory (e.g., astatic RAM “SRAM”, a dynamic RAM “DRAM”, etc.), a magnetic memory (e.g.,a hard disk, a tape, a floppy disk, etc.), an optical memory (e.g., acompact disc (CD), a digital video disc (DVD), a Blu-ray disc (BD); areadable, writeable, and/or re-writable disc, etc.), a read only memory(ROM), a programmable read-only memory (PROM), a field programmableread-only memory (FPROM), a one-time programmable non-volatile memory(OTP NVM), an erasable programmable read-only memory (EPROM), anelectrically erasable programmable read-only memory (EEPROM), and anycombinations thereof. Examples of a flash memory include, but are notlimited to, a memory card (e.g., a MultiMediaCard (MMC), a securedigital (SD), a compact flash (CF), etc.), a USB flash drive, anotherflash memory, and any combinations thereof.

A memory may be removable from device 1600. A memory, such as memory1610, may include and/or be associated with a memory access device. Forexample, a memory may include a medium for storage and an access deviceincluding one or more circuitry and/or other components for reading fromand/or writing to the medium. In one such example, a memory includes adisc drive for reading an optical disc. In another example, a computingdevice may include a port (e.g., a Universal Serial Bus (USB) port) foraccepting a memory component (e.g., a removable flash USB memorydevice).

A memory, such as memory 1610, may include any information storedthereon. Examples of information that may be stored via a memoryassociated with a computing device include, but are not limited to, asimulated user profile, a term vocabulary, an item profile, a comparisonprofile, one or more predetermined values (e.g., a predeterminedthreshold value), machine-executable instructions embodying any one ormore of the aspects and/or methodologies of the present disclosure(e.g., instructions for simulating sharing and/or spreading of a itemprofile, instructions for providing an information regarding one or moreitems to a real-world user, etc.), an operating system for a computingdevice, an application program a program module, program data, a basicinput/output system (BIOS) including basic routines that help totransfer information between

Display component 1620 is connected to processing element 1605 forproviding a display according to any one or more of the implementations,examples, aspects, etc. of the current disclosure (e.g., providing apresentation of information from a simulated network related to sharingand/or spreading of simulated items and to a real-world user or itemfrom a real-world e-commerce system and/or other user network system). Adisplay component 1615 may include a display element, a drivercircuitry, display adapter, a display generator, machine-executableinstructions stored in a memory for execution by a processing elementfor displaying still and/or moving images on a screen, and/or othercircuitry for generating one or more displayable images for display viaa display element. Example display elements are discussed above. In oneexample, a display element is integrated with device 1600 (e.g., abuilt-in LCD touch screen). In another example, a display element isassociated with device 1600 in a different fashion (e.g., an externalLCD panel connected via a display adapter of display component 1615).

User input 1620 is configured to allow a user to input one or morecommands, instructions, and/or other information to simulated networksystem 1600. For example, user input 1620 is connected to processingelement 1605 (and optionally to other components directly or indirectlyvia processing element 1605) to allow a user to interface with simulatednetwork system 1600. Examples of a user input include, but are notlimited to, a keyboard, a keypad, a screen displayable input (e.g., ascreen displayable keyboard), a button, a toggle, a microphone (e.g.,for receiving audio instructions), a pointing device, a joystick, agamepad, a cursor control device (e.g., a mouse), a touchpad, an opticalscanner, a video/image capture device (e.g., a camera), a touch screenof a display element, a pen device (e.g., a pen that interacts with atouch screen and/or a touchpad), and any combination thereof. It is alsocontemplated that one or more commands, data, and/or other informationmay be input to a computing device via a data transfer over a networkand/or via a memory device (e.g., a removable memory device). A userinput, such as user input 1620, may be connected to simulated networksystem 1600 via an external connector (e.g., an interface port).

Communication networking element 1625 includes circuitry and/ormachine-executable instructions (e.g., in the form of firmware storedwithin a memory element included with and/or associated with interfaceelement 1625) for communicating with one or more additional computingdevices and/or connecting an external device to simulated network system1600. An external interface/communication networking element, such aselement 1625, may include one or more external ports. In anotherexample, an external interface element includes an antenna element forassisting with wireless communication. Examples of an external interfaceelement include, but are not limited to, a network adapter, a SmallComputer System Interface (SCSI), an advanced technology attachmentinterface (ATA), a serial ATA interface (SATA), an Industry StandardArchitecture (ISA) interface, an extended ISA interface, a PeripheralComponent Interface (PCI), a Universal Serial Bus (USB), an IEEE 1394interface (FIREWIRE), and any combinations thereof. A network adapterincludes circuitry and/or machine-executable instructions configured toconnect a computing device, such as simulated network system 1600, to acommunication network.

A communication network is a way for connecting two or more computingdevices to each other for communicating information (e.g., data,machine-executable instructions, image files, video files, electronicmessages, etc.). Examples of a communication network include, but arenot limited to, a wide area network (e.g., the Internet, an enterprisenetwork), a local area network (e.g., a network associated with anoffice, a building, a campus or other relatively small geographicspace), a short distance network connection, a telephone network, a datanetwork associated with a telephone/voice provider (e.g., a mobilecommunications provider data and/or voice network), another datanetwork, a direct connection between two computing devices (e.g., apeer-to-peer connection), a proprietary service-provider network (e.g.,a cable provider network), a wired connection, a wireless connection(e.g., a Bluetooth connection, a Wireless Fidelity (Wi-Fi) connection(such as an IEEE 802.11 connection), a Worldwide Interoperability forMicrowave Access connection (WiMAX) (such as an IEEE 802.16 connection),a Global System for Mobile Communications connection (GSM), a PersonalCommunications Service (PCS) connection, a Code Division MultiplexAccess connection (CDMA), and any combinations thereof. A network mayemploy one or more wired, one or more wireless, and/or one or more othermodes of communication. A communication network may include any numberof communication network segment types and/or network segments.

Power supply 1630 is shown connected to other components of simulatednetwork system 1600 to provide power for operation of each component.Examples of a power supply include, but are not limited to, an internalpower supply, an external power supply, a battery, a fuel cell, aconnection to an alternating current power supply (e.g., a wall outlet,a power adapter, etc.), a connection to a direct current power supply(e.g., a wall outlet, a power adapter, etc.), and any combinationsthereof.

Components of device 1600 (processing element 1605, memory 1610, displaycomponent 1615, user input 1620, interface element 1625, power supply1630) are shown as single components. A computing device may includemultiple components of the same type. A function of any one componentmay be performed by any number of the same components and/or inconjunction with another component. For example, it is contemplated thatthe functionality of any two or more of processing element 1605, memory1610, display component 1615, user input 1620, interface element 1625,power supply 1630, and another component of a computing device orportion of simulated network system may be combined in an integratedcircuit. In one such example, a processor (e.g., processing element1605) may include a memory for storing one or more machine executableinstructions for performing one or more aspects and/or methodologies ofthe present disclosure. Functionality of any one or more components mayalso be distributed across multiple computing devices. Such distributionmay be in different geographic locations (e.g., connected via anetwork). Components of system 1600 are shown as internal components todevice 1600. A component of a simulated network system, such as system1600, may be associated with the system in a way other than by beinginternally connected.

Components of simulated network system 1600 are shown connected to othercomponents. Examples of ways to connect components of a system include,but are not limited to, a bus, a component connection interface, anothertype of connection, and/or any combinations thereof. Examples of a busand/or component connection interface include, but are not limited to, amemory bus, a memory controller, a peripheral bus, a local bus, aparallel bus, a serial bus, a SCSI interface, an ATA interface, an SATAinterface, an ISA interface, a PCI interface, a USB interface, aFIREWIRE interface, and any combinations thereof. Various busarchitectures are known. Select connections and components in device1600 are shown. For clarity, other connections and various otherwell-known components (e.g., an audio speaker, a printer, have beenomitted and may be included in a computing device. Additionally, asimulated network system may omit in certain implementations one or moreof the shown components. It is understood that simulated network system1600 may include components of a computing device. However, if so, it isnoted that the computer executable instructions and data associated withone or more of the implementations, methodologies, features, aspects,and/or examples described herein interact with the processing elementand memory in a way to create a specialized system for simulating anetwork as described herein and interfacing with a real-world e-commercesystem and/or other real-world user network system, such as a socialnetwork.

FIG. 16 shows simulated network system 1600 connected via communicationnetworking element 1625 and communication network 1635 to a real-worldsystem (e.g., an e-commerce system, a social network, other user networksystem, etc.) 1640. This connection, for example, can provideintegration of information from a simulated network on system 1600 withinformation from real-world system 1640. A user of real-world system1640 may connect to real-world system 1640 via a separate computingdevice, via an interface provided by system 1600, or via anotherconnection.

FIG. 17 illustrates one exemplary implementation of a method ofgenerating a simulated listing of information related to sharing and/orspreading of items via a simulated network for presentation to areal-world computer-based e-commerce system or other real-world usernetwork system. At step 1705, in a simulated network having simulateduser profiles and item profiles each defined by terms from a commonvocabulary of terms, each simulated user profile is associated with anode of a computerized simulated network using a similarity value/scoreof the simulated user profile to other simulated user profilespositioned in the simulated network to determine proximity of thesimulated user profile to the other simulated user profiles. Examplesand implementation detail variations are discussed above for associatinga user profile to a node. For example, details, concepts, aspects,features, characteristics, examples, and/or alternatives of acomponent/element discussed above with respect to an implementation,embodiment, and/or methodology (e.g., those discussed with respect tomethods of FIGS. 8 to 15 ), may be applicable to a like component and/ormethodology in another implementation, embodiment, and/or methodologydiscussed here with respect to FIG. 17 , even though for the sake ofbrevity it may be repeated.

At step 1710, a sharing of one or more item profiles is simulated basedon a similarity of terms of a simulated user profile with terms of acorresponding item profile. At step 1715, a spreading of one or moreitem profiles is simulated based on similarity of terms of a simulateduser profile to the terms of a corresponding item profile previouslyshared by one or more neighboring nodes within a predetermined number ofprior cycles. At step 1720, simulation of steps 1710 and 1715 isrepeated for a predetermined number of cycles. It is contemplated thatany number of cycles may be utilized. In one example, a predeterminednumber of cycles is large enough that the repeating of step 1720 iscontinuous until stopped by a user.

At step 1725 a historical record of information related to itemrepresented by item profiles shared and/or spread in the simulation isstored (e.g., in a memory of a simulated network). A historical recordcan be an ongoing record that is updated as additional simulations occurand/or are ongoing.

At step 1730, a comparison profile is received at the simulated networkfrom a real-world e-commerce system and/or another user network system.The comparison profile represents a real item or a real user associatedwith the real-world system and has terms based on one or more of itscharacteristics, the terms from the same vocabulary used for thesimulated user profile and simulated item profiles.

At step 1735, the comparison profile is associated with one or moresimulated user profiles of the simulated network. The association canoccur in a variety of ways. In one example, the comparison profile iscompared (e.g., via a processor of the simulated network) to existingsimulated user profiles to determine a set of simulated user profilesthat are matched by similarity (e.g., comparison of terms of thecomparison profile to the simulated user profiles) to a desired level ofsimilarity. In another example, a new simulated user profile can bemodeled after the comparison profile. The new simulated user profileand/or the comparison profile itself can then be associated with a nodeof the simulated network (e.g., with a proximity based on similarity ofthe new simulated user profile/comparison profile to other simulateduser profiles in the proximity of the node). For example, the degree ofsimilarity to other nodes can be controlled (e.g., optimized and/ormaximized) by proximity placement of a simulated user profile at aparticular node. The set of one or more simulated user profiles that isassociated with the comparison profile may be referred to as comparisonsimulated user profiles.

At step 1740, a list of information is generated related to items thatare shared and/or spread by the set of one or more comparison simulateduser profiles (e.g., using the corresponding historical record). Forexample, information about items shared and/or spread may have aconnection (e.g., theoretically based on the similarity comparisons madeto associate the comparison profile) to the real-world user or item.Example lists of information that can be generated and/or presented to areal world user include, but are not limited to, a recommendation of anitem (e.g., for purchase, viewing, or other interest of the user), adisplay of terms based on a level of similarity of terms to a comparisonprofile and/or based on a level of probability of occurrence, a newsfeed of items shared and/or spread by simulated user profiles in thesimulated network (e.g., those simulated user profiles proximate anassociation of a comparison profile), other information related to theitems shared and/or spread in a simulated network, and any combinationsthereof.

Information provided regarding the operation of one or more simulatedsharing and/or spreading operations can occur via a variety of ways.Example ways of providing information to a real-world user include, butare not limited to, providing a graphical user interface via a displayassociated with a real-world e-commerce or other real world system,providing a graphical user interface via a display associated with acomputing device connected to a real-world e-commerce or otherreal-world system, providing the information via a communication networkfrom the simulated network system to a real-world e-commerce or otherreal-world system, embedding information in an electronic communication(e.g., an email or other messaging protocol), embedding the informationin a website display associated with a real-world e-commerce or otherreal world system, providing a running list of items shared and/orspread by simulated users, and any combinations thereof. FIG. 18illustrates one exemplary implementation of a display of an example listof terms from top topics in a vocabulary of a simulated network. In thedisplay, terms with higher occurrences (e.g., in item profiles, in itemprofiles being shares and/or spread, etc.) are displayed with a largersize than terms with lower occurrences.

FIG. 19 illustrates another exemplary implementation of a display ofinformation from a simulated network. A listing of items 1905 (in thiscase a listing of publications shared/spread by the simulated users:@married-teaching, @faithful-point, @plastic-grandfather,@evasive-cream, @daffy-silk, and @fast-size). The simulated users inthis example are simulated users that were determined to have a certainsimilarity of terms in the profile to the comparison profile (shownrepresentatively in the box display 1910) for the real-world user“hanging-aunt.” In an alternative example, “hanging-aunt” is a simulateduser profile that is matched as being similar to a real-world userprofile. Display 1910 shows that the profile for “hanging-aunt” does notinclude a great number of terms. The terms in the profile are displayedat different sizes. Different sizes in a display can represent differentlevels of probabilistic value for a term (e.g., a measure of some valueof probability associated with the term in the profile), differentlevels of occurrence of the term (e.g., in items shared and/or spread),and/or other information. Each item in listing 1905 includes a graphicalavatar 1915 unique to the corresponding simulated user being displayed.Below each avatar 1915 is a display bar 1920 which represents a level ofsimilarity between the user profile for “hanging-aunt” and the simulateduser profile associated with the sharing/spreading of the item and/orthe item profile corresponding to the item.

FIG. 20 illustrates yet another exemplary implementation of a display ofinformation from a simulated network. A listing of items 2005 (in thiscase a listing of publications shared/spread by simulated users that areunidentified). The simulated users in this example are simulated usersthat were determined to have a certain similarity of terms in theprofile to the comparison profile (shown representatively in the boxdisplay 2010) for the real-world user “grotesque-attention.” In analternative example, “grotesque-attention” is a simulated user profilethat is matched as being similar to a real-world user profile. Display2010 shows that the profile for “grotesque-attention” includes moreterms than the previous example. The terms in the profile are displayedat different sizes. Each item in listing 2005 includes a graphicalelement 2015 that indicates the number of simulated users proximate to“grotesque-attention” that shared/spread each item. A real-world systemmay be connected to the simulated network to provide simulatedrecommendations and/or other listings of information or actions to oneor more real-world users. A real-world network (such as a real-worldsocial network or real-world e-commerce system) user (e.g., having aprofile defined by the same terms as used in the first vocabulary) canbe associated with one or more nodes of the simulated network. In onesuch example, the association is performed by comparing the similarityof the real-world network user profile to the simulated user profiles atthe nodes and making associations based on a desired level ofsimilarity. In another example, a real-world item (e.g., having aprofile defined by the same terms as used in the first vocabulary) canbe associated with one or more nodes of the simulated network (e.g., bycomparing similarity of the real-world item profile to the simulateduser profiles assigned to the one or more nodes). In yet anotherexample, a synthetic user or item may be associated with a simulateduser profile of one or more nodes of the simulated network (e.g., viasimilarity of like term profiles, such as terms based on the firstvocabulary). A synthetic user is a user that does not exist in thesimulated network or in a real-world network. A synthetic item is anitem that does not exist in the simulated network but that may not bepart of any real-world network. A synthetic user and/or a synthetic itemcan be utilized to obtain recommendations and/or other listings ofinformation from the simulated network without the need for a real-worlduser or item. In one example, association of a real-world user,real-world item, synthetic user, synthetic item to the simulated usercan be utilized to produce recommendations and/or other listings ofinformation by comparison of the profile being compared to the simulatednetwork to a history of sharing and/or spreading of items by nodes ofthe simulated network to which the profiles are associated.

In one exemplary implementation a method includes receiving from areal-world computer-based e-commerce system or a real-worldcomputer-based social network a first comparison profile, the firstcomparison profile representing a real item or a real social networkuser, the first comparison profile being defined using the set of termsbased on the first vocabulary; associating the first comparison profileto a set of comparison simulated user profiles including one or more ofthe simulated user profiles based on the similarity of terms used todefine the first comparison profile and the one or more simulated userprofiles; and generating a list of preferred items based on the portionof a historical record of simulated sharing and simulated spreadingcorresponding to the set of comparison simulated user profiles.

One or more simulated user profiles may be removed from a simulatednetwork at any time. Additionally, one or more new simulated userprofiles may be added into a simulated network at any time (e.g., toreplace a profile that has been removed). Such removal and/or additionmay add a way to refresh a simulated network. In one example, a newsimulated user profile is added after simulating over a number ofcycles. In one such example, a new simulated user profile is added aftergenerating one or more recommendations and/or listings of information. Anew simulated user profile may be such that it has no sharing and/orspreading history associated with it when added.

In one example of a simulated social networking system, the systemincludes: a first data store having a set of item profiles, each itemprofile in the set of item profiles defined using a set of terms basedon a first vocabulary; a second data store having a set of simulateduser profiles, each simulated user profile in the set of simulated userprofiles connected to one or more other simulated user profiles via asimulated social network via a first arrangement, the first arrangementbeing based on the similarity of the simulated user profiles; eachsimulated user profile in the set of simulated user profiles definedusing the set of terms based on the first vocabulary; a third data storeincluding a historical record of a plurality of simulated shares of eachof the item profiles in the set of item profiles from one or moresimulated user profiles to one or more other simulated user profiles anda historical record of a plurality of simulated spreads of each shareditem profile from one or more simulated user profiles to one or moreother simulated user profiles, each simulated share and simulated spreadbeing based on the similarity of the terms used to define thecorresponding user profile to the terms used to define the correspondingitem profile; a connection to a real-world computer-based e-commercesystem or a real-world computer-based social network, the connection forreceiving a first comparison profile from the e-commerce system or thesocial network, the first comparison profile representing a real item ora real social network user, the first comparison profile being definedusing the set of terms based on the first vocabulary; and a simulationcomparison processor configured to: associate the first comparisonprofile to a set of comparison simulated user profiles including one ormore of the simulated user profiles based on the similarity of termsused to define the first comparison profile and the one or moresimulated user profiles; and generate a list of preferred items based onthe portion of the historical record corresponding to the set ofcomparison simulated user profiles.

It is noted that any one or more of the predetermined or manually setvalues (including thresholds and minimum value requirements) describedabove with respect to various implementations, embodiments, examples,etc. may be adjusted to provide a desired optimization of a simulatednetwork (e.g., a desired optimization of sharing and/or spreading, orother simulation parameter).

It is to be noted that any one or more of details, concepts, aspects,features, characteristics, examples, and/or alternatives of acomponent/element, implementation, embodiment, and/or methodologydescribed herein may be conveniently implemented using one or moremachines (e.g., one or more computing devices and/or one or moresimulated network systems, such as the system of FIG. 16 ) programmedaccording to the teachings of the present specification, as will beapparent to those of ordinary skill in the computer art. Appropriatesoftware coding can readily be prepared by skilled programmers based onthe teachings of the present disclosure, as will be apparent to those ofordinary skill in the software art. Aspects and implementationsdiscussed above that lend themselves to employing software and/orsoftware modules may also include appropriate hardware for assisting inthe implementation of the machine executable instructions of thesoftware and/or software module.

Such software may be a computer program product that employs amachine-readable hardware storage medium. A machine-readable hardwarestorage medium may be any medium that is capable of storing and/orencoding a sequence of instructions for execution by a machine (e.g., acomputing device) and that causes the machine to perform any one of themethodologies and/or embodiments described herein. Examples of amachine-readable hardware storage medium include, but are not limitedto, a solid state memory, a flash memory, a random access memory (e.g.,a static RAM “SRAM”, a dynamic RAM “DRAM”, etc.), a magnetic memory(e.g., a hard disk, a tape, a floppy disk, etc.), an optical memory(e.g., a compact disc (CD), a digital video disc (DVD), a Blu-ray disc(BD); a readable, writeable, and/or re-writable disc, etc.), a read onlymemory (ROM), a programmable read-only memory (PROM), a fieldprogrammable read-only memory (FPROM), a one-time programmablenon-volatile memory (OTP NVM), an erasable programmable read-only memory(EPROM), an electrically erasable programmable read-only memory(EEPROM), and any combinations thereof. A machine-readable hardwarestorage medium, as used herein, is intended to include a single mediumas well as a collection of physically separate media, such as, forexample, a collection of compact discs or one or more hard disc drivesin combination with a computer memory. As used herein, amachine-readable storage medium does not include a signal.

Such software may also include information (e.g., data) carried as adata signal on a data carrier, such as a carrier wave. For example,machine-executable information may be included as a data-carrying signalembodied in a data carrier in which the signal encodes a sequence ofinstruction, or portion thereof, for execution by a machine (e.g., acomputing device) and any related information (e.g., data structures anddata) that causes the machine to perform any one of the methodologiesand/or embodiments described herein.

Some of the details, concepts, aspects, features, characteristics,examples, and/or alternatives of a component/element discussed abovewith respect to one implementation, embodiment, and/or methodology maybe applicable to a like component in another implementation, embodiment,and/or methodology, even though for the sake of brevity it may not havebeen repeated above. It is noted that any suitable combinations ofcomponents and elements of different implementations, embodiments,and/or methodologies (as well as other variations and modifications) arepossible in light of the teachings herein, will be apparent to those ofordinary skill, and should be considered as part of the spirit and scopeof the present disclosure. Additionally, functionality described withrespect to a single component/element is contemplated to be performed bya plurality of like components/elements (e.g., in a more dispersedfashion locally and/or remotely). Functionality described with respectto multiple components/elements may be performed by fewer like ordifferent components/elements (e.g., in a more integrated fashion).

Example benefits of a simulated network system and related methods ofgenerating a simulated network system, operating a simulated networksystem, and using information from simulated sharing/spreading of itemsvia a simulated network system to provide rich information to a realworld user or a real world system may include in one or more of theimplementations of the same, but are not limited to, presenting valuableinformation that may not be available to a real world usernetwork/e-commerce system due to limitations of that real-world system(e.g., size, volume of item shares, etc.), allowing a real-worlde-commerce system/user network to avoid contractual or otherrelationships with larger real-world Internet-based social networks(e.g., Facebook, Instagram) and/or e-commerce sites (e.g., Amazon), andany combinations thereof. Other benefits may also exist for variousimplementations. The modern Internet user networking systems can haveinnate limitations of size, volume and other characteristics that limitthe ability to abstract desired information. In one exemplary aspect,certain implementations of a simulated network having simulatedsharing/spreading using simulated user profiles and item profilesdefined by the same vocabulary may provide valuable correlations thatcan be leveraged to real-world users and items that are part of existingreal-world systems.

Exemplary embodiments have been disclosed above and illustrated in theaccompanying drawings. It will be understood by those skilled in the artthat various changes, omissions and additions may be made to that whichis specifically disclosed herein without departing from the spirit andscope of the present invention.

What is claimed:
 1. A method of associating a real-world computer-basednetwork user to a computerized simulated network, the method comprising:defining within a computerized simulated network a plurality ofsimulated user profiles using a first set of terms based on a firstvocabulary, the first set of terms representing activity of real-worldusers of a real-world computer-based network, each of the plurality ofsimulated user profiles having one or more simulated user profile termsfrom the first set of terms; associating a real-world user of thereal-world computer-based network with a first profile of the pluralityof simulated user profiles based on a similarity of one or morecharacteristics of the real-world user to the one or more simulated userprofile terms for the first profile, the one or more characteristics ofthe real-world user based on the first vocabulary; and providing an itemof information to the real-world user based on the one or more simulateduser profile terms.
 2. A method according to claim 1, wherein each ofthe plurality of simulated user profiles is associated with a node of aplurality of nodes of the computerized simulated network, a proximity ofthe first profile to other simulated user profiles in the plurality ofnodes based on a similarity of the one or more simulated user profileterms for neighboring simulated user profiles.
 3. A method according toclaim 2, further comprising simulating a sharing and/or spreading of oneor more simulated item profiles from a first node of the plurality ofnodes to a second node of the plurality of nodes.
 4. A method accordingto claim 3, wherein each of the one or more simulated item profilesincludes a simulated item term based on the first vocabulary.
 5. Amethod according to claim 3, wherein each of the one or more simulateditem profiles includes a simulated item term being a term from the firstset of terms.
 6. A method according to claim 3, wherein said simulatinga sharing and/or spreading is based on the similarity of term used todefine the simulated user profiles associated with the first node andthe second node.
 7. A method according to claim 3, further comprisingstoring a historical record of multiple instances of said simulatedsharing and/or spreading.
 8. A method according to claim 7, wherein saidproviding an item of information includes reference to the historicalrecord.
 9. A method according to claim 3, wherein each of saidsimulating of a sharing and/or spreading represents an action includingan action selected from the group consisting of a download of an item, apurchase of an item, a view of an item, a tweet of an item, a sharing ofan item, a recommendation of an item, a favoriting of an item, and anycombinations thereof.
 10. A method according to claim 1, wherein each ofthe plurality of simulated user profiles is associated with a node of aplurality of nodes of the computerized simulated network, a proximity ofthe first profile to other simulated user profiles in the plurality ofnodes based on a similarity of the one or more simulated user profileterms for neighboring simulated user profiles, the method furthercomprising simulating a sharing and/or spreading of one or more itemsfrom the real-world computer-based network across the plurality of nodesin simulated operation of the computerized simulated network, each ofthe one or more items from the real-world computer-based networkrepresented by a simulated item profile.
 11. A method according to claim10, wherein each of the simulated item profiles includes a simulateditem term being a term from the first set of terms.
 12. A methodaccording to claim 10, further comprising storing a historical record ofa multiple instances of said simulated sharing and/or spreading.
 13. Amethod according to claim 10, further comprising storing a historicalrecord of a multiple instances of said simulated sharing and/orspreading wherein said providing an item of information includesreference to the historical record.
 14. A method according to claim 10,wherein each of said simulating of a sharing and/or spreading representsan action including an action selected from the group consisting of adownload of an item, a purchase of an item, a view of an item, a tweetof an item, a sharing of an item, a recommendation of an item, afavoriting of an item, and any combinations thereof.
 15. A methodaccording to claim 1, wherein the item of information includes an itemselected from the group consisting of a publication, a news article, apolitical advocacy document, an academic journal publication, ascientific study, an advertisement, a recommendation, an audio contentitem, a video content item, a photographic content item, a product forsale, a service for sale, and any combination thereof.
 16. A methodaccording to claim 1, wherein the item of information includes anadvertisement.
 17. A method according to claim 1, wherein the item ofinformation includes a recommendation.
 18. A method according to claim1, wherein activity of real-world users represents an action includingan action selected from the group consisting of a download of an item, apurchase of an item, a view of an item, a tweet of an item, a sharing ofan item, a recommendation of an item, a favoriting of an item, and anycombinations thereof.
 19. A machine-readable hardware storage mediumincluding machine-executable instructions for performing a method ofassociating a real-world computer-based network user to a computerizedsimulated network, the instructions comprising: a set of instructionsfor defining within a computerized simulated network a plurality ofsimulated user profiles using a first set of terms based on a firstvocabulary, the first set of terms representing activity of real-worldusers of a real-world computer-based network, each of the plurality ofsimulated user profiles having one or more simulated user profile termsfrom the first set of terms; a set of instructions for associating areal-world user of the real-world computer-based network with a firstprofile of the plurality of simulated user profiles based on asimilarity of one or more characteristics of the real-world user to theone or more simulated user profile terms for the first profile, the oneor more characteristics of the real-world user based on the firstvocabulary; and a set of instructions for providing an item ofinformation to the real-world user based on the one or more simulateduser profile terms.
 20. A machine-readable hardware storage mediumaccording to claim 19, wherein each of the plurality of simulated userprofiles is associated with a node of a plurality of nodes of thecomputerized simulated network, a proximity of the first profile toother simulated user profiles in the plurality of nodes based on asimilarity of the one or more simulated user profile terms forneighboring simulated user profiles, the instructions further comprisinga set of instructions for simulating a sharing and/or spreading of oneor more items from the real-world computer-based network across theplurality of nodes in simulated operation of the computerized simulatednetwork, each of the one or more items from the real-worldcomputer-based network represented by a simulated item profile