Method and apparatus for dynamic geo-fencing
11044579 · 2021-06-22
Assignee
Inventors
- Chi-Chao Chang (Palo Alto, CA, US)
- Prakash Muttineni (San Ramon, CA, US)
- Srihari Venkatesan (Cuppertino, CA, US)
- Mauricio Mediano (Campbell, CA, US)
- Dipanshu Sharma (New York, NY, US)
Cpc classification
H04W4/021
ELECTRICITY
International classification
H04W4/021
ELECTRICITY
Abstract
The present disclosure provides method and system to facilitate definition, tuning and visualization of a geo-fence at a computer system. The method comprises receiving an application program interface (API) call from the computer system, and in response to the API call, enabling the computer system to display a user interface (UI) on a display screen of the second computer system. The UI includes a first region and a second region, the first region including a plurality of screen areas for receiving input parameters for defining the geo-fence via a user input device of the computer system, and a second region is configured to display the geo-fence over a map of a geographical region around a location specified in the input parameters. The method further comprises, in response to receiving user inputs in the second region, generating the geo-fence based on the input parameters and mobile device events data stored in an electronic storage. The method further comprises causing the geo-fence to be displayed over the map in the second region of the UI.
Claims
1. A method implemented by one or more first computer systems to facilitate definition, tuning and visualization of a geo-fence at a second computer system, the second computer system being coupled to the first computer system via a packet-based network, the one or more first computer systems having access to an electronic storage, the method comprising: storing, by a processor of the one or more first computer system, mobile device events data into the electronic storage, the mobile device events data being related to events occurring on a plurality of mobile devices communicating with the packet-based network and including, for each event, an event type, a time of the event and a location of an associated mobile device at the time of the event, the event type being one of an advertisement (ad) impression on the associated mobile device, a click on an ad on the associated mobile device, and a secondary action taken in response to an ad on the associated mobile device; receiving, by a processor of the one or more first computer system, an application program interface (API) call from the second computer system; in response to the API call, enabling, by a processor of the one or more first computer system, the second computer system to display an user interface (UI) on a display screen of the second computer system, the UI including a first region and a second region, the first region including a plurality of screen areas for receiving input parameters for defining and tuning the geo-fence via a user input device of the second computer system, the plurality of screen areas including a first screen area for receiving one or more keywords, a second screen area for receiving at least one location, a third screen area for receiving tuning parameters for tuning shape and size of the geo-fence; and a fourth screen area for receiving demographic definitions for the geo-fence, the second region being configured to display the geo-fence over a map of a geographical region around one of the at least one location; and in response to receiving from the second computer system user inputs in the first region, generating the geo-fence by a processor of the one or more first computer system, wherein generating the geo-fence includes: dividing the geographical region into a plurality of geographical areas based on mobile device events data associated with a plurality of events matching the one or more keywords and the demographic definitions and with locations near the one of the at least one location, determining a weight for each of the plurality of geographical areas based at least on the input parameters and the mobile device events data associated with the plurality of events, selecting a subset of the plurality of geographical areas based on the weights of the plurality of geographical areas, forming the geo-fence using the subset of the plurality of geographical areas, and causing the geo-fence to be displayed over the map in the second region of the UI, the geo-fence including one or more contiguously closed regions each formed by a clusters of adjacent geographical areas among the subset of the plurality of geographical areas.
2. The method of claim 1, further comprising: automatically generating a series of updated geo-fences in response to changes in the mobile device events data in the electronic storage; and causing the series of updated geo-fences to be displayed as a video in the second region of the UI.
3. The method of claim 2, wherein the UI further includes a stop/play button to stop/continue the video.
4. The method of claim 1, wherein the UI further includes a mechanism to select a time for the geo-fence, the method further comprising: automatically generating a series of updated geo-fences in response to changes in the mobile device events data in the electronic storage, each of the series of updated geo-fence corresponding to a respective time during a time period; and in response to the time selected by the mechanism of the UI, selecting a geo-fence corresponding to the selected time from the series of updated geo-fences; and causing the selected geo-fence to be displayed in the second region of the UI.
5. The method of claim 4, wherein the mechanism is a slider or dial that can be set via an input device of the second computer system.
6. The method of claim 1, wherein dividing the geographical region into a plurality of geographical areas comprises: identifying a plurality of locations in the mobile device events data associated with the plurality of events; and dividing the geographical region into the plurality of geographical areas corresponding to respective ones of the plurality of locations.
7. The method of claim 1, wherein the input parameters include a parameter related to an effective targeting area, and wherein the subset of the plurality of geographical areas are selected such that a total area size of the subset of the plurality of geographical areas is equal to or less than the effective targeting area.
8. The method of claim 1, wherein the one or more contiguously closed regions include disconnected regions.
9. The method of claim 1, wherein the input parameters further include a time, and wherein the plurality of events are selected from events near the time, resulting in a shape of the geo-fence being a function of the time.
10. The method of claim 9, wherein the time is a time of a day, a day of a week, a day of a month, or a holiday.
11. A method implemented by one or more first computer systems to facilitate definition, tuning and visualization of a geo-fence at a second computer system, the second computer system being coupled to the first computer system via a packet-based network the method comprising: receiving, by a processor of the one or more first computer system, an application program interface (API) call from the second computer system; in response to the API call, enabling, by a processor of the one or more first computer system, the second computer system to display an user interface (UI) on a display screen of the second computer system, the UI including a first region and a second region, the first region including a plurality of screen areas for receiving input parameters for defining and tuning the geo-fence via a user input device of the second computer system, the plurality of screen areas including a first screen area for receiving one or more keywords, a second screen area for receiving at least one location, a third screen area for receiving tuning parameters for tuning shape and size of the geo-fence; and a fourth screen area for receiving demographic definitions for the geo-fence, the second region being configured to display the geo-fence over a map of a geographical region around the at least one location; and in response to receiving from the second computer system user inputs in the first region, generating the geo-fence by a processor of the one or more first computer system, wherein generating the geo-fence includes: dividing the geographical region into a plurality of geographical areas based on the one or more keywords, the demographic definitions, and mobile device data associated with a plurality of mobile devices communicating with the packet-based network at locations near the at least one location, the mobile device data including historical search, display and demand data; determining a weight for each of the plurality of geographical areas based at least on the input parameters and the mobile device data associated with the plurality of mobile devices, selecting a subset of the plurality of geographical areas based on the weights of the plurality of geographical areas, forming the geo-fence using the subset of the plurality of geographical areas, and causing the geo-fence to be displayed over the map in the second region of the UI, the geo-fence including one or more contiguously closed regions each formed by a cluster of adjacent geographical areas among the subset of the plurality of geographical areas; wherein determining a weight of each of the plurality of geographical areas comprises: deriving a signal strength for each keyword of the one or more keywords and for each geographical area of the plurality of geographical areas from historical search, display and demand data related to the each keyword and the each geographical area.
12. The method of claim 11, wherein the signal strength for the each keyword and for the each geographical area is a function of a number and density of clicks and conversions related to the each keyword and the each geographical area.
13. The method of claim 12, wherein the signal strength for the each keyword and for the each geographical area is made to decay with a distance between the one of the at least one location and the each geographical area.
14. The method of claim 12, wherein the tuning parameters include one or more of a volume priority, a click priority and a secondary action priority, and wherein the weight of the each of the plurality of geographical areas is determined based on the signal strength of the each of the plurality of geographical areas and one of the tuning parameters.
15. A system coupled to a packet-based network, comprising: an electronic storage storing therein mobile device events data related to events occurring on a plurality of mobile devices communicating with the packet-based network, the mobile device events data including, for each event, an event type, a time of the event and a location of an associated mobile device at the time of the event, the event type being one of an advertisement (ad) impression on the associated mobile device, a click on an ad on the associated mobile device, and a secondary action taken in response to an ad on the associated mobile device; one or more processors having access to the electronic storage; a memory coupled to at least one processor of the one or more processors and storing therein program instructions, which when executed by the at least one processor, cause the at least one processor to: receive an application program interface (API) call from a second computer system in the packet-based network; in response to the API call, enable the second computer system to display an user interface (UI) on a display screen of the second computer system, the UI including a first region and a second region, the first region including a plurality of screen areas for receiving input parameters for defining a geo-fence via a user input device of the second computer system, the plurality of screen areas including a first screen area for receiving one or more keywords, a second screen area for receiving at least one location, a third screen area for receiving tuning parameters for tuning shape and size of the geo-fence; and a fourth screen area for receiving demographic definitions for the geo-fence, the second region being configured to display the geo-fence over a map of a geographical region around one of the at least one location; and in response to receiving from the second computer system user inputs in the first region, divide the geographical region into a plurality of geographical areas based on mobile device events data associated with a plurality of events matching the one or more keywords and the demographic definitions and with locations near the one of the at least one location, determine a weight for each of the plurality of geographical areas based at least on the input parameters and the mobile device events data associated with the plurality of events and the tuning parameters, select a subset of the plurality of geographical areas based on the weights of the plurality of geographical areas, generate the geo-fence from the subset of the plurality of geographical areas, and cause the geo-fence to be displayed over the map in the second region of the UI, the geo-fence including one or more contiguously closed regions each formed by a cluster of adjacent geographical areas among the subset of the plurality of geographical areas.
16. The system of claim 15, wherein the program instructions when executed by the at least one processor further cause the at least one processor to: automatically generating a series of updated geo-fences in response to changes in the mobile device events data in the electronic storage; and causing the series of updated geo-fences to be displayed as a video in the second region of the UI.
17. The system of claim 15, wherein the UI further includes a mechanism to select a time for the geo-fence, wherein the program instructions when executed by the at least one processor further cause the at least one processor to: automatically generating a series of updated geo-fences in response to changes in the mobile device events data in the electronic storage, each of the series of updated geo-fence corresponding to a respective time during a time period; and in response to the time selected by the mechanism of the UI, selecting a geo-fence corresponding to the selected time from the series of updated geo-fences; and causing the selected geo-fence to be displayed in the second region of the UI.
18. The system of claim 15, wherein the input parameters further include a time, and wherein the plurality of events are selected from events near the time, resulting in a shape of the geo-fence being a function of the time.
19. The system of claim 15, wherein dividing the geographical region into a plurality of geographical areas comprises: identifying a plurality of locations in the mobile device events data associated with the plurality of events; and dividing the geographical region into the plurality of geographical areas corresponding to respective ones of the plurality of locations.
20. The system of claim 15, wherein the input parameters include a parameter related to an effective targeting area, and wherein the subset of the plurality of geographical areas are selected such that a total area size of the subset of the plurality of geographical areas is equal to or less than the effective targeting area.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DESCRIPTION OF THE EMBODIMENTS
(13) According to certain embodiments, geographical representation of objects and/or virtual regions or fences around the objects is generated based on signals from historical events associated with these objects. These regions are generated to capture as much relevant signals as applicable and can change during the course of the day and day after day. The regions so generated represent areas to be targeted in location-based applications, including, but not limited to: Local advertising, where advertisements can be displayed for any kind of business, for both search and display advertising. Local search, where fences that define area of relevance for any type of business can be computed. Social, where a fence defining an area in which social connections for a specific individual is more likely to be effective, e.g. the best area to make friends etc.
(14) A computer system (e.g., a server computer) executing a software program can be used to generate the virtual regions or fences.
(15)
(16) As shown in
(17) As shown in
(18)
(19) In one embodiment the one or more probable areas can simply be an area associated with the location information. For example, if the location information includes a zip code, the one or more probable areas can be an area associated with the zip code. In a further embodiment, the location engine is used to carry out a method described in the co-pending commonly owned U.S. Patent Application entitled “Method and Apparatus for Probabilistic User Location,” filed on even date herewith, and generates the one or more probable areas with their associated weights or probabilities.
(20) The document retrieval engine 168 is configured to compare the one or more probable area with the one or more fenced areas to determine 174 one or more target areas, and to retrieve 175 one or more documents (e.g., advertisement), which can be delivered 176 to the mobile user using the interface engine 162. In one embodiment, each target area has an associated probability and the document retrieval engine chooses an advertisement associated with a target area with the highest probability. In another embodiment, the document retrieval engine performs a coin toss using the probabilities associated with the target areas as weight to choose an advertisement for delivery in response to the ad request. In a further embodiment, the document retrieval engine is configured to carry out a method described in the co-pending U.S. Patent Application entitled “Method and Apparatus for Geographical Document Retrieval,” filed on even date herewith, to retrieve the document. The interface engine 162, location engine 164, fencing engine 166 and document retrieval engine 168 can be provided by one computer/server 150 or multiple computers/servers 150.
(21) The fencing engine 166 can be run separately from the location engine 164 and/or the document retrieval engine 168. In one embodiment, as shown in
(22) In a further embodiment, as shown in
(23) One important characteristic of dynamic fencing is that the shape of the fence may vary depending on the time of the day.
(24) Thus, embodiments in the present disclosure provide a dynamic fencing method executed by a computer system to determine the boundaries of a geographical region of arbitrary shape, called dynamic fence, where advertisements for a certain advertisement campaign are displayed on mobile devices. Impressions for an ad campaign enabled with dynamic fencing take place when the location of a user of a mobile device 101 is inside the fence generated. One important characteristic of dynamic fencing is that the shapes and sizes of the fences may vary over time. Therefore, the dynamic fences are time-dependent and may change in shapes and sizes depending on the time of day, day of the week, day of the month, holidays and/or other time-dependent aspects. One typical example is that the fence for a restaurant may cover larger areas around lunchtime and smaller areas at night. Further more, the dynamic fences may change in real-time based on continuously updated historical data as allowed by data pipelines implemented in the cloud.
(25) These and other aspects of the embodiments are described in further details with respect to the following examples: A retail chain uses hyper-local advertising to let consumers in the neighborhood of their physical stores know of in-store sale items hoping to attract them into the stores; The owner of a fast-food franchise targets users who are commuting down an adjacent highway to promote their new hearty and healthy lunch combo; A dentist who is new in town wants to acquire new customers in nearby residential areas; An electronic retailer wants to advertise to customers who are near or in competing retailers in a same area (e.g., a city or shopping mall); and A sports gear retailer wants to target sports fans in a stadium attending a baseball game, and later in adjacent highways as they leave the game.
(26) In one embodiment, a business is represented by a data structure B=(B.sub.lat, B.sub.lon, B.sub.cat, B.sub.dem), wherein B.sub.lat and B.sub.lon represent geographical coordinates of the business' physical presence, B.sub.cat represents a category of the business, and B.sub.dem defines the business' demographic of target customers. Let b.sub.i,t=(lat.sub.i, lon.sub.i, w.sub.i,t) be a control point of coordinates lat.sub.i and lon.sub.i where w.sub.i,t is a number that represents an amount of interest that mobile users that belong to the demographics B.sub.dem and are present in the neighborhood of (lat.sub.i, lon.sub.i) at the moment in time t have on a business of category B.sub.cat located at (B.sub.lat, B.sub.lon). In some embodiments, effective advertising campaigns for businesses in the neighborhood of (B.sub.lat, B.sub.lon) that belong to category B.sub.cat have a maximum effective targeting area ETA.sub.B,t, which is dependent on a few variables, e.g.,
ETA.sub.B,t=EffectiveArea(t,B.sub.lat,B.sub.lon,B.sub.cat),
and a dynamic fence is generated by calculating a geographic region R.sub.B,t where advertisements from business B are displayed in mobile devices in a moment in time t, such that
Area(R.sub.B,t)≤ETA.sub.B,t,
and that the objective function below is maximized
MAXΣ.sub.contains(R.sub.
(27) In such embodiments, the dynamic fence defines a region with arbitrary shape whose size can be limited by the ETA. In that sense, the ETA can be an input parameter for dynamic fencing.
(28)
(29) A simple way of generating dynamic fences includes generating convex polygons either around the business location or around the center of mass of the control points.
(30) In one embodiment, the fencing engine 166 takes as input some or all of the following input parameters associated with an advertisement campaign: Location of the business advertised. It can be one of the following: Latitude and longitude coordinates. Name or address of the business to be advertised. Location targeted. Optional parameter. The location targeted can be one of the following: Latitude and longitude coordinates. Name or address of the business or point of interest to be targeted. Example: Times Square, N.Y. Sequence of coordinates representing a path to be targeted. Name or description of road or segment of road. Example: El Camino Real between Lawrence Expressway and Mathilda Avenue Time. Time of day Date Volume priority. This is a tuning parameter used by advertisers to increase the number of impressions, regardless of the ratio of the clicks and secondary actions. Possible values are in the [0,1] range. Click priority. This is a tuning parameter used by advertisers to increase the focus of the campaign on maximizing the click through rate. Possible values are in the [0,1] range. Secondary action priority. This is a tuning parameter used by advertisers to increase the secondary action through rate. Possible values are in the [0,1] range. Targeting demographics Age Gender Income Race/Ethnicity Marital status Others List of categories and/or keywords related to the ad campaign
(31) The above data can be input via the UI or API provided by the fencing engine. Advertisers can initiate such interaction via an API call and can tune the advertising campaigns through changes to the values of the above-listed parameters through the UI or API, which can also display the dynamic fence generated, as discussed in further detail below.
(32) In one embodiment, the fencing engine 166 can generate as its output one or more regions of arbitrary shapes. A region with arbitrary shape R may include a set of one or more contiguous closed regions R={r.sub.1, r.sub.2, . . . , r.sub.n} where each contiguous region r.sub.i has an external boundary e.sub.i and a set of one or more internal boundaries {k.sub.i1, k.sub.i2, . . . , k.sub.im}. Each boundary b, external or internal, can be defined by a sequence of points b=seq{p.sub.1, p.sub.2, . . . , p.sub.n}. A point p can have two coordinates, latitude and longitude.
(33) In one embodiment, the external boundaries of two contiguous closed regions that belong to the same arbitrary region can only touch on a single point. Likewise, an internal boundary of a contiguous closed region can only touch another internal boundary on a single point.
(34) In a further embodiment, an internal boundary of a contiguous closed region can only touch the external boundary of the region on a single point.
(35)
(36) The process 400 further includes annotating 420 the control points with data that adds signal from keywords (or categories). For example, if a control point is in the neighborhood of several restaurants, the control point can be annotated with the tuple (category=“restaurants”, signal=0.5). Multiple annotations of the same keyword (or category) to the same control point can be combined into a single annotation.
(37) The process 400 further includes producing 430 a topological data structure (TDS) using the control points and annotations. The TDS divides a region covered by control points into small regions, called faces. The process 400 further includes generating 440 the dynamic fence using the TDS by combining the faces.
(38) Certain logical aspects of the process 400 are described in further detail below. At a high level, according to one embodiment, a dynamic fence can be generated by: (i) subdividing a region into faces; (ii) selecting a subset of faces; and (iii) collapsing the subset of faces to generate the dynamic fence.
(39) In one embodiment, to subdivide a geographic region, the neighborhood of a targeted location is divided into small areas, s.sub.1, s.sub.2, . . . , s.sub.n, called faces, such that each control point p.sub.i is associated with a face s.sub.i. An objective function is used to bring as many faces with high weights as possible into a final region.
(40) In one embodiment, in a so-called greedy process for calculating a dynamic fence, the density of each face is computed as
(41)
and all of the faces are sorted in descending order of density. Then the top most dense faces are merged while keeping dynamicFenceArea≤ETA. The complexity of this process is the complexity of the sorting step O(N*log(N)) as the sorting step dominates the process. This greedy process produces optimal results in cases where all of the faces have about the same size.
(42) For faces with distinct sizes, the greedy process is not optimal due to, for example, a corner case where the following conditions happen: (i) dynamicFenceArea<ETA and (ii) There is a face s.sub.l not included in the dynamic fence, with lower density, greater w.sub.l and greater area (s.sub.l) that could replace one of the faces included in the dynamic fence, increasing the result of objective function while still keeping dynamicFenceArea≤ETA. In real-life scenarios with dynamic fences with tens of thousands of faces, any processs that attempt to improve the greedy process by reducing the difference (ETA—dynamicFenceArea) would produce negligible improvements. Therefore, it is unnecessary to invest in complex heuristics and expensive combinatorial processs to address such corner cases.
(43)
(44) As shown in
where “1” indicates that the control point had a least one impression (click or call) in the past, and “0” indicates otherwise. Only one of the annotations is usually applied to a control point.
(45) Note that such time dependent approach for control point retrieval can enable dynamic fences to vary in shape depending on the time of day, day of week, day of the month, holidays etc.
(46) After control points are generated, in 420, a series of annotators 422 can process the control points and annotate each point with (keywordOrCategory, signalStrength) annotations. Each annotation has a signal strength in the (0 . . . 1] range. The annotator's model that computes the signal strength should consider using the API input parameters as input features. For example, for categories (input parameter) where proximity is correlated with clicks and secondary actions, such as “restaurants” and “gas stations”, the signal strength should decay with the distance between the business location (input parameter) and the control point.
(47) A case that requires special attention is when the advertiser targets a business or point-of-interest. In such case, the signal strength should decay with the distance between the business or target location and control point.
(48) Annotators 422 may use historical search, display data and demand data stored in their respective repositories 425 to generate annotations. In an example in which search data is used to generate annotations, the locations of control points can be joined with nearby historical data for search and display requests. If clicks and secondary actions were generated for a cluster of searches to “restaurants”, the annotators 422 can annotate nearby control points with the keyword “restaurants.” The signal strength can be a function of the number and density of clicks and conversions for restaurants in the area.
(49) The control points can also be annotated using other types of sources. In a high level example, Nielsen PRIZM could be used as an external source annotator. The Nielsen PRIZM is a set of geo-demographic segments for the United States. It assigns segments such as “Money & Brains” to geographical locations. A Nielsen PRIZM annotator could annotate control points inside regions marked by Nielsen PRIZM as “Money & Brains” with keywords associated with luxury items such as “Lexus” or “Vacation in Europe.”
(50) In certain embodiments, annotations are blended in 420 using a linear model. For example, let A.sub.W=(w.sub.a.sub.
(51)
(52) The vector of annotator weights A.sub.W=(w.sub.a.sub.
(53) Before generating the dynamic fence, the process 400 generates a topological data structure (TDS) in 430 to subdivide the neighborhood of the target location into a set of small regions, s.sub.1, s.sub.2, . . . , s.sub.n, i.e, the faces. The build graph component also computes the final signal strength, w.sub.i, of each face. Each face s.sub.i in the TDS corresponds to one control point p.sub.i. Each face knows which faces are adjacent to it and also knows the sequence of coordinates that form its boundary.
(54)
(55) In one embodiment, the weight w.sub.i for each face is computed as follows. First, a combined weight for the keywords (or categories) associated with the ad campaign is computed using a weighted average function. For example, assuming the process 400 is trying to draw a dynamic fence for a business associated with “restaurant” and “fast food” keywords, a control point p.sub.i is annotated with W(restaurant, p.sub.i)=0.6 and W(fast food, p.sub.i)=0.3, and the weights for the keywords “restaurant” and “fast food” are W.sub.restaurant=4 and W.sub.fastfood=2. The final value for the weighted average is
(56)
(57) In one embodiment, the result of the weighted average is multiplied by the impression, click and secondary action tuning parameters set by the advertisers. For example, assuming that the ad campaign has the priorities 1, 4 and 10 for impressions, clicks and secondary actions, respectively. If p.sub.i is a secondary action, the value of w.sub.i after the ad campaign priority is applied is: w.sub.i=0.5*10=5.
(58) In 440 of process 400, the TDS and the weights associated with each face of the TDS are used to select a subset of faces to shape the dynamic fence. For example, when the greedy process adds a face to the dynamic fence, one of three scenarios may happen: The new face is not adjacent to any other face in the dynamic fence. This face becomes a new cluster of faces (with a single face). The new face is adjacent to one or more faces in one cluster of faces. This face is added to the cluster of faces adjacent to it. The new face is adjacent to faces in two or more clusters of faces. A new parent cluster is created that contains the new face and references the adjacent clusters as child clusters.
(59) After the clusters of faces are identified, each hierarchy of clusters should be transformed in a single cluster. A trivial linear process can be used to flatten the hierarchies of clusters. Each final cluster can become a contiguous closed region. Note that the dynamic fence is represented as a collection of contiguous closed regions that form a region with arbitrary shape (see
(60) At this point the boundaries of each contiguous closed region are identified but it is not known yet which boundary is the external boundary. One simple solution is to calculate the area defined by each boundary. The boundary with the greatest area is the external boundary, and the remaining boundaries are internal boundaries.
(61) In certain embodiments, external boundaries should be oriented clock-wise and internal boundaries should be oriented counter-clock wise. The orientation may be useful to display the contiguous closed regions.
(62) The process discussed so far is linear with the number of faces. Therefore, the complexity of the process remains O(N*log(N)) as previously asserted.
(63) Optionally, the following extra steps can be applied for performance reasons: Drop very small contiguous closed regions and small holes. Simplify the boundaries of contiguous regions, through the replacement of each boundary with a new smaller sequence of points, while minimizing alterations to the geographic region covered. The simplification of boundaries can be a trivial computer graphics process extensively covered in the literature.
(64) Small contiguous closed regions and small holes can be dropped while minimizing the impact on the result of the ranking function in that all of the faces whose contiguous closed regions fall below a given threshold are moved to a set of faces that are not assigned to any cluster.
(65) One possible threshold could be defined as a fraction of the result of the objective function. Contiguous closed regions whose combined sum of w.sub.i is less than the threshold are excluded from the dynamic fence. The threshold should be tuned based on a proper balance between the performance improvement and the negative impact in metrics (clicks and secondary actions).
(66) Note that the set of faces that are not assigned to any cluster includes: (i) the faces that belonged to contiguous closed regions that were just recycled and (ii) faces that were never assigned to any contiguous regions.
(67) The greedy process that assigns faces to clusters is repeated with one exception, i.e., new clusters cannot be created. Faces can only be assigned to existing clusters or cause clusters to merge. This step is repeated until the maximum area size ETA is reached. Note that the faces don't need to be sorted again. The order set for the first run of the greedy process is reused.
(68) In order to eliminate holes, the process should tolerate an increase in the final size of the dynamic fence by a constant factor. Again, such threshold should be tuned based on a proper balance between the performance improvement and the negative impact in metrics (clicks and secondary actions).
(69) It is worth mentioning that eliminating small contiguous regions and holes can also help avoiding overfitting. In this context, very small contiguous regions may represent sparse historical signals (e.g. clicks and secondary actions) that may not repeat over time. Larger regions are more likely to be associated with patterns of events that repeat over time.
(70)
(71) The image displayed in the canvas 720 shows the state of the dynamic fence 722 at 5 PM. Instead of using an animation, the UI may offer a mechanism such as a slider or dial that the advertiser can use to visualize the dynamic fence at a specific time of day. The UI can also use stop/play buttons to stop and continue the animation on the canvas.
(72) In one embodiment, the UI 700 in
(73) Similar to competitive conquest, in a method for real-time point-of-interest (POI) targeting, made possible with time-variant dynamic fences, an advertiser can target a region in a map associated with a POI (e.g. a neighborhood, a section of an interstate highway) where their target users are mobile in real-time.