Institution
Visa Inc.
Company•London, United Kingdom•
About: Visa Inc. is a company organization based out in London, United Kingdom. It is known for research contribution in the topics: Database transaction & Transaction data. The organization has 1031 authors who have published 1076 publications receiving 36053 citations. The organization is also known as: Visa & Visa Inc.
Papers published on a yearly basis
Papers
More filters
•
28 Mar 2019TL;DR: In this article, a method to identify a transaction between a user computer and a resource provider computer is presented. But the method requires the user computer to be a party to the transaction.
Abstract: A method is disclosed. The method includes receiving, from a user computer that is a party to a transaction, information that can be used to identify a transaction between the user computer and a resource provider computer. The method further includes determining one or more attributes. The method additionally includes presenting a first question based on the one or more attributes. The method also includes receiving a response to the first question, presenting a second question based on the received response, and receiving a response to the second question. The method further includes storing the received responses in a data storage element, wherein the data storage element is accessible by an authorizing entity computer.
1 citations
•
25 May 2016TL;DR: In this paper, accounts are grouped in a database via replaceable connections and non-replaceable connections to form account groups that can be used to efficiently track the propagation of resources or privileges among users.
Abstract: Accounts are grouped in a database via replaceable connections and non-replaceable connections to form account groups that can be used to efficiently track the propagation of resources or privileges among users. Accounts that can be treated as a same account are linked or grouped via replaceable connections. Accounts having different ownerships are grouped via non-replaceable connections. The account groups created via the replaceable connections and non-replaceable connections can be used to track offer sharing and/or distribution from primary accounts to secondary accounts in respective account groups. For example, users of an offer propagation platform may split an offer into sub-offers and share sub-offers with others. Using replaceable and non-replaceable account groups the system can operate with the capability of supporting linked accounts in millions, allowing the offers to be propagated among users via sharing, redistribution and/or subdivision for improved usage.
1 citations
••
24 May 2022TL;DR: In this paper , the authors experimented with different recurrent neural network architectures to predict stock prices for elite Nasdaq companies and showed that with better architecture design, RNN variants can outperform baseline models despite having a fraction of the parameters.
Abstract: The stock market is one of the most important topics of today’s economy due to its fluctuating nature and far-reaching impact. Despite the difficulty of mathematical modeling of time-series of stock prices, deep learning and black-box modeling have been reported to perform well in literature. In this work, we have experimented with different recurrent neural network architectures to predict stock prices for elite Nasdaq companies. We have improved the baseline models by reducing the number of parameters and using bidirectional processing with attention. We show that using a Gaussian noise vector can regularize the model to improve the robustness without using any dropout. Our proposed model achieves the lowest mean square error for AMZN (0.12), AAPL (0.15), NFLX (0.03), GOOG (0.08), GOOGL (0.06), CSCO (0.01), COST (0.06), FB (0.03), 8 out of 10 companies. Our work aims to show that with better architecture design, RNN variants can outperform baseline models despite having a fraction of the parameters.
1 citations
•
17 Sep 2019TL;DR: In this paper, the authors describe systems, methods, apparatuses, and computer readable media for generating a network topology for a network based on dependencies between network components, where transactions between network component may be monitored in accordance with at least some embodiments.
Abstract: Described herein are systems, methods, apparatuses, and computer readable media for generating a network topology for a network based on dependencies between network components. Transactions between network components may be monitored in accordance with at least some embodiments. Dependencies may be identified between network applications and/or network devices based on detected transactions detected between those network components. A network topology may then be generated for a network based on the identified dependencies. In some embodiments, the network topology may be used to determine an impact score for one or more network components within the network. An impact score may be used to make determinations with respect to the network.
1 citations
•
07 Jul 2020TL;DR: In this article, a message may include a digital signature generated based at least in part on second access device identification data, and the user device may validate the message utilizing the digital signature and a public key.
Abstract: Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction with the second access device accordingly.
1 citations
Authors
Showing all 1032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Ayman Hammad | 43 | 115 | 6489 |
Mark Carlson | 42 | 114 | 5417 |
Patrick Faith | 39 | 101 | 5800 |
Selim Aissi | 31 | 87 | 2974 |
Lisa J. Anderson | 31 | 72 | 6418 |
Payman Mohassel | 28 | 105 | 3784 |
Kevin P. Siegel | 28 | 39 | 3496 |
Patrick Stan | 25 | 42 | 1915 |
Gyan Prakash | 25 | 133 | 2053 |
Konstantinos Markantonakis | 24 | 208 | 2697 |
Glenn Powell | 23 | 31 | 1834 |
Leigh Amaro | 23 | 23 | 2331 |
John F. Sheets | 21 | 41 | 1968 |
Edward W. Fordyce | 20 | 23 | 2222 |
Krishna Prasad Koganti | 19 | 23 | 1284 |