scispace - formally typeset
Search or ask a question
Institution

Visa Inc.

CompanyLondon, United Kingdom
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.


Papers
More filters
Patent
28 Mar 2019
TL;DR: In this article, a method to identify a transaction between a user computer and a resource provider computer is presented. But the method requires the user computer to be a party to the transaction.
Abstract: A method is disclosed. The method includes receiving, from a user computer that is a party to a transaction, information that can be used to identify a transaction between the user computer and a resource provider computer. The method further includes determining one or more attributes. The method additionally includes presenting a first question based on the one or more attributes. The method also includes receiving a response to the first question, presenting a second question based on the received response, and receiving a response to the second question. The method further includes storing the received responses in a data storage element, wherein the data storage element is accessible by an authorizing entity computer.

1 citations

Patent
25 May 2016
TL;DR: In this paper, accounts are grouped in a database via replaceable connections and non-replaceable connections to form account groups that can be used to efficiently track the propagation of resources or privileges among users.
Abstract: Accounts are grouped in a database via replaceable connections and non-replaceable connections to form account groups that can be used to efficiently track the propagation of resources or privileges among users. Accounts that can be treated as a same account are linked or grouped via replaceable connections. Accounts having different ownerships are grouped via non-replaceable connections. The account groups created via the replaceable connections and non-replaceable connections can be used to track offer sharing and/or distribution from primary accounts to secondary accounts in respective account groups. For example, users of an offer propagation platform may split an offer into sub-offers and share sub-offers with others. Using replaceable and non-replaceable account groups the system can operate with the capability of supporting linked accounts in millions, allowing the offers to be propagated among users via sharing, redistribution and/or subdivision for improved usage.

1 citations

Proceedings ArticleDOI
Aarie Glas1
24 May 2022
TL;DR: In this paper , the authors experimented with different recurrent neural network architectures to predict stock prices for elite Nasdaq companies and showed that with better architecture design, RNN variants can outperform baseline models despite having a fraction of the parameters.
Abstract: The stock market is one of the most important topics of today’s economy due to its fluctuating nature and far-reaching impact. Despite the difficulty of mathematical modeling of time-series of stock prices, deep learning and black-box modeling have been reported to perform well in literature. In this work, we have experimented with different recurrent neural network architectures to predict stock prices for elite Nasdaq companies. We have improved the baseline models by reducing the number of parameters and using bidirectional processing with attention. We show that using a Gaussian noise vector can regularize the model to improve the robustness without using any dropout. Our proposed model achieves the lowest mean square error for AMZN (0.12), AAPL (0.15), NFLX (0.03), GOOG (0.08), GOOGL (0.06), CSCO (0.01), COST (0.06), FB (0.03), 8 out of 10 companies. Our work aims to show that with better architecture design, RNN variants can outperform baseline models despite having a fraction of the parameters.

1 citations

Patent
17 Sep 2019
TL;DR: In this paper, the authors describe systems, methods, apparatuses, and computer readable media for generating a network topology for a network based on dependencies between network components, where transactions between network component may be monitored in accordance with at least some embodiments.
Abstract: Described herein are systems, methods, apparatuses, and computer readable media for generating a network topology for a network based on dependencies between network components. Transactions between network components may be monitored in accordance with at least some embodiments. Dependencies may be identified between network applications and/or network devices based on detected transactions detected between those network components. A network topology may then be generated for a network based on the identified dependencies. In some embodiments, the network topology may be used to determine an impact score for one or more network components within the network. An impact score may be used to make determinations with respect to the network.

1 citations

Patent
07 Jul 2020
TL;DR: In this article, a message may include a digital signature generated based at least in part on second access device identification data, and the user device may validate the message utilizing the digital signature and a public key.
Abstract: Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction with the second access device accordingly.

1 citations


Authors

Showing all 1032 results

NameH-indexPapersCitations
Ayman Hammad431156489
Mark Carlson421145417
Patrick Faith391015800
Selim Aissi31872974
Lisa J. Anderson31726418
Payman Mohassel281053784
Kevin P. Siegel28393496
Patrick Stan25421915
Gyan Prakash251332053
Konstantinos Markantonakis242082697
Glenn Powell23311834
Leigh Amaro23232331
John F. Sheets21411968
Edward W. Fordyce20232222
Krishna Prasad Koganti19231284
Network Information
Related Institutions (5)
Adobe Systems
8K papers, 214.7K citations

77% related

German Research Centre for Artificial Intelligence
3.9K papers, 75.2K citations

77% related

NICTA
2.5K papers, 79.8K citations

76% related

Hasso Plattner Institute
2.7K papers, 58.1K citations

76% related

Swedish Institute of Computer Science
1.3K papers, 56K citations

76% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20221
202137
2020138
2019118
201869
201761