doc_id
stringlengths 7
11
| appl_id
stringlengths 8
8
| flag_patent
int64 0
1
| claim_one
stringlengths 12
21.5k
|
---|---|---|---|
20170220836 | 15418043 | 0 | 1. A system for classifying dominant singularity in a digital fingerprint image, the system comprising: an image enhancement unit configured to enhance the digital fingerprint image to generate an enhanced digital fingerprint image; a feature extraction and analysis unit configured to analyze image features within each of a predetermined number of local segments of the enhanced digital fingerprint image to translate the image features into orientations that estimate dominant structures in the underlying enhanced digital fingerprint image; a major block segmentation unit configured to determine, for each of a predetermined number of major blocks in the enhanced digital fingerprint image, a dominant orientation of ridge and valley patterns in the enhanced digital fingerprint image, wherein each major block comprises multiple local segments; a feature orientation calculation and extraction unit configured to generate an Orientation Feature Vector by listing, according to a pre-determined sequence, the dominant orientations of each of the major blocks of the enhanced digital fingerprint image; at least one memory storing a bank of regular expressions corresponding to a class of fingerprint images, wherein each regular expression describes sequences of dominant orientations associated with previous Orientation Feature Vectors generated from digital fingerprint images belonging to the class of fingerprint images; and a regular expression matching unit configured to determine whether the digital fingerprint image belongs to the class of fingerprint images by determining whether any of the regular expressions in the bank of regular expressions match the Orientation Feature Vector generated by the feature orientation calculation and extraction unit. |
9021066 | 13534922 | 1 | 1. A method comprising: receiving, with a network device included in a network, a request from a network device operator to interact with the network device to perform at least one of a software configuration or a hardware change; in response to the interaction request, generating a trigger outcome domain (TOD) for a logically distinct feature of the network device including a list of potential events that could occur in the network device in response to the interaction, the list of potential events including disabling or removing at least one forwarding component in a forwarding plane of the network device, and a list of potential outcomes in the network in response to each of the potential events, the list of potential outcomes including traffic loss on one or more routes through the network associated with the at least one forwarding component in the forwarding plane of the network device, wherein generating the TOD comprises retrieving interface mapping information for the network device from forwarding information maintained in a control unit of the network device and generating the TOD based at least on the retrieved interface mapping information; and displaying the TOD for the requested interaction to the network device operator prior to performing the requested interaction. |
9934588 | 14527326 | 1 | 1. A method of providing multimodal medical images, the method comprising: loading first image data and second image data obtained by two different imaging modalities; generating object modeling data based on at least one among the first image data and the second image data; displaying, on a display, the first image data, the second image data and the object modeling data that are registered based on information about a posture of an object during imaging of at least one among the first image data and the second image data; based on receiving an input of selecting a location on the displayed object modeling data, determining locations on the displayed first image data and the displayed second image data which correspond to the selected location; and displaying the determined locations on the first image data and the second image data, respectively. |
20110320238 | 13230304 | 0 | 1. A computer system comprising: at least one processor; and at least one non-transitory computer-readable medium coupled to the at least one processor having stored thereon: a composite application that includes a framework for query handlers and that is configured to combine services from multiple application resources on a network; wherein the composite application includes instructions which, when executed by the at least one processor, causes the at least one processor to perform operations comprising: checking for query handlers that fit in the framework included in the composite application; based on the checking, locating query handlers that fit in the framework included in the composite application; incorporating, into the composite application at runtime, the located query handlers; and providing collaborative functionality between the multiple application resources on the network by enabling multiple independent application resources to communicate with one another through the located query handlers incorporated into the composite application at runtime and presenting results of the collaborative functionality. |
20030113945 | 10350061 | 0 | 1. A plasma processing control system comprising: a plasma processor for performing plasma processing operation over a sample accommodated within a vacuum processing chamber; a sensor for monitoring process parameters during processing operation of the processor; means for providing a processing-result estimation model to estimate a processed result on the basis of a monitored output from the sensor and a preset processed-result estimation equation; means for providing an optimum recipe calculation model which calculates optimum processing conditions such that the processed result becomes a target value on the basis of the estimated result of the processed-result estimation model; and a controller for controlling the plasma processing system on the basis of a recipe generated from said optimum recipe calculation model. |
20130290877 | 13457875 | 0 | 1. A computer-implemented method for managing user interface (UI) building blocks (UIBB), the method comprising: presenting, by a form repeater UIBB, initial UI representations of structured entities through a graphical user interface (GUI), each initial UI representation comprising one or more fields; receiving a trigger from a user through the form repeater UIBB; determining, based on the trigger, an event condition; and based on the event condition, replacing, by a substitute UIBB, an initial UI representation of a particular structured entity of the initial UI representations of the structured entities with a substitute UI representation of the particular structured entity. |
7484182 | 11172422 | 1 | 1. A method comprising: inputting a first constraint image graphically establishing size information of a plurality of user interface window items with respect to a first window size; inputting a second constraint image graphically establishing size information of said plurality of user interface window items with respect to a second window size; deriving program code for dynamically generating a user interface window of a third size, wherein said program code comprises interpolative formulas for sizing said plurality of user interface window items for user interface windows of various sizes between said first window size and said second window size; and generating said user interface window of said third size and having said plurality of user interface window items disposed therein, wherein a size of each of said plurality of user interface window items is determined as a function of said size information of said first and second constraint images. |
20070260383 | 11415543 | 0 | 1. A method for diagnosing a lateral acceleration sensor fault in a vehicle stability control system, comprising: receiving at least one signal indicative of a vehicular measured yaw rate; at least one signal indicative of a vehicular measured velocity; at least one signal indicative of a vehicular measured hand wheel angle; and at least one signal indicative of a vehicular computed yaw rate desired; selecting a lateral acceleration estimator in accordance with a steady-state and a linear range of handling conditions and estimating a lateral acceleration in accordance with said selected linear acceleration estimator; applying a plurality of estimated lateral acceleration thresholds to determine a vehicle maneuver state, wherein said plurality of estimated lateral acceleration thresholds is vehicle specific; selectively applying diagnostic thresholds to said estimated lateral acceleration based on said maneuver state, wherein said selectively applied diagnostic thresholds is vehicle specific; measuring a lateral acceleration and comparing said measured lateral acceleration with said estimated lateral acceleration; detecting a true fault when the comparison is not within a selected comparison threshold value, wherein said selected comparison threshold value is vehicle specific; detecting a false fault when the comparison is within said selected comparison threshold value; activating a microprocessor controller associated with said vehicle stability control system upon occurrence of said true fault by disabling said vehicle stability control system to prevent unnecessary activation; and preventing said microprocessor controller from taking action upon occurrence of said false fault. |
7644863 | 10281074 | 1 | 1. A computer-readable storage medium having stored therein instructions, which when executed cause a machine to perform a set of operations comprising: interacting with one or more business computers to obtain one of replenishment and consumption activity data related to an inventory; creating a model for variations in the inventory; using the model to determine estimates of variation for one of currently planned replenishment activities and currently planned consumption activities; and using the estimates of variation to predict future inventory levels. |
8683386 | 11866959 | 1 | 1. A method for personalizing modeled objects in a multi-user VRU environment, comprising: modeling, in a memory of a host computer, a modeled three-dimensional space including modeled avatars each controlled in response to avatar control input from corresponding ones of a plurality of separate remote clients; maintaining personalized modeled objects and common modeled objects as distinct three-dimensional object types in the computer memory in the modeled three-dimensional space, wherein the host sets attributes of respective ones of the personalized modeled objects based on different personalization data associated with corresponding respective ones of the plurality of separate remote clients while setting attributes of the common modeled objects without reference to the personalization data, and wherein the attributes comprise information that controls textures for the personalized modeled objects; and transmitting environmental modeling information to the plurality of separate remote clients configured for displaying an animated view of the modeled three-dimensional space including the modeled avatars, the common modeled objects, and different ones of the personalized modeled objects depending on respective identities of the plurality of separate remote clients. |
8650019 | 12695800 | 1 | 1. A method of creating a timed hybrid simulation model for a module of a circuit design specification, comprising: inputting an untimed, high-level language (HLL) data-path model of the module; inputting an HLL data-path interface specification that specifies input ports of the HLL data-path model; generating, by a programmed processor, a hardware description language (HDL) control-path model of the module that specifies port attributes and associated stitching directives, wherein each stitching directive specifies a control port and an associated one of the input ports of the HLL data-path model; wherein during simulation, behavior of the data-path model is bit-accurate, timing of the data-path model is not cycle-accurate, timing of the control-path model is cycle accurate, and simulation speed of the data-path model is faster than a cycle-accurate simulation of the module; linking the HLL data-path and HDL control-path models to create the timed hybrid simulation model including an HDL wrapper; wherein the HDL wrapper during simulation sends and receives bit-accurate data values to and from the data-path model according to timing constraints provided by the control-path model and delays simulation output from the data path model according to simulated timing behavior of the control-path model; and storing the timed hybrid simulation model in a processor-readable storage medium. |
20080092140 | 11542674 | 0 | 1. A method of executing a computer program that performs multiple processes, comprising: before executing the computer program, identifying a plurality of the processes that are capable of being executed in parallel on separate processors and generating computer code that identifies the plurality of processes; upon executing the computer program on a client computer, accessing metadata to determine if a computer grid having multiple nodes is available to execute the identified plurality of processes; and if the computer grid is available, then the using the computer code to cause the identified plurality of processes to be executed on the computer grid; the computer code enabling the computer program to execute the identified plurality of processes in parallel on different nodes of the computer grid. |
20120159109 | 12969520 | 0 | 1. A method for improving non-uniform memory access, comprising: dividing a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform; setting a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory; defining a plurality of processor sets; binding one of the plurality of groups to one of the plurality of processor sets; and running the one group of stream processing jobs on the one processor set. |
8516222 | 13315766 | 1 | 1. A method for processing instructions in an integrated circuit, the integrated circuit comprising a plurality of processor cores, the method comprising: managing a plurality of sets of processor cores, each set including one or more processor cores assigned to a respective function associated with executing instructions of the same program to be executed on the integrated circuit, where at least a first set includes one or more processor cores assigned to a first function associated with preparing the instructions for execution, and at least a second set includes one or more processor cores assigned to a second function, performed in parallel with the first function, associated with executing the prepared instructions; speculatively performing, by the first set of one or more processor cores, the first function on at least some instructions before it is determined that those instructions will be executed; storing the results of performing the first function as the prepared instructions; and determining, by the second set of one or more processor cores, when reaching a portion of the program not previously executed, whether the first function has been speculatively performed on instructions for that portion of the program and the results of performing the first function have been stored as prepared instructions, with the second set of one or more processor cores retrieving the stored prepared instructions if prepared instructions were stored, and stalling to wait for the first set of one or more processor cores to perform the first function on instructions for that portion of the program if prepared instructions were not stored. |
10067858 | 13650608 | 1 | 1. A processor-implemented method of software item testing, said method comprising: in exchange for a fee: initiating, in a cloud-based computing environment, an automated test of a software item using a test of a testing framework; in response to occurrence of an error condition during said test, pausing said test within said cloud-based computing environment; presenting a user interface for receiving an alteration to said test while said test is paused; accepting said alteration to said test while said test is paused, said alteration accepted via said user interface to said cloud-based computing environment; and continuing said test, within said cloud-based computing environment, using said altered test. |
20110202569 | 13095143 | 0 | 1. A system for creating transaction instructions, comprising: an interface for receiving a description of a set of objects at a server and for receiving for each of at least a subset of objects in the set of objects a description of one or more associated relationships; and a processor for processing the description of the set of objects and the descriptions of the one or more associated relationships for each object in the at least a subset of objects in the set of objects to create an ordered list of transaction instructions, wherein the ordered list of transaction instructions includes relationship transaction instructions, and wherein the relationship transaction instructions regarding an object are gathered such that the object can be updated for efficiency of access time associated with accessing the object, accessing the transaction instructions, or both; and a memory coupled to the processor and configured to provide the processor with instructions. |
20110307425 | 12813909 | 0 | 1. A method for organizing search results, comprising: retrieving user generated content based upon a search query; grouping at least some of the user generated content into one or more clusters; and organizing search results of the search query using the one or more clusters of user generated content. |
7594015 | 10712155 | 1 | 1. A computer-implemented method for managing a plurality of computer devices in a client server network, said method comprising: maintaining a plurality of grid managers in a grid computing environment, wherein each of the plurality of grid managers resides on a computer device and the plurality of grid managers have hierarchical relations, each of the relations being classified as superior or inferior; storing, in each of the plurality computer devices, the hierarchical relations of each grid manager; receiving, from at least one of the plurality of grid managers, current resource loading information, the current resource loading information comprising the computational resources available to the computer device on which the grid manager resides and the computational resources available to all computer devices having an inferior relation to the computer device on which the grid manager resides; receiving, from an application, utilization requirements for computational resources; comparing the utilization requirements to the current resource loading, and based on the comparison, dynamically reconfiguring resource allocations by changing the hierarchical relations between grid managers in the grid computing environment to maintain a predetermined resource allocation level. |
20040183708 | 10390324 | 0 | 1. A mixed-mode integrated circuit system, comprising: a plurality of analog input cells configured to program analog functions; a plurality of analog output cells configured to provide digital and/or analog outputs corresponding to said programmed analog functions; an interconnect array to process said programmed analog functions into signals indicative of said analog functions, said interconnect array selectively providing said signals to said plurality of analog output cells; and a programmable digital portion. |
20030219081 | 10152746 | 0 | 1. A method for receiving update data at a broadcast receiver having at least one data receiving parameter comprising: receiving a broadcast transmission including at least one broadcast receiver identifier and data; determining whether the at least one broadcast receiver identifier is associated with the at least one data receiving parameter of the broadcast receiver; and storing the data in the broadcast receiver as a function of the at least one broadcast receiver identifier. |
7594102 | 11013122 | 1 | 1. A method of operating a processor to fetch and execute a plurality of instructions, the processor comprising an execution unit, and the method comprising: a) operating the processor in a first mode to execute in the execution unit a first subset of instructions in the plurality of instructions, with each instruction in the first subset being executed no more than one time each time the instruction is fetched; and b) operating the processor in a second mode to execute in the execution unit a second subset of instructions in the plurality of instructions, with each instruction in the second subset executed a plurality of times each time the instruction is fetched, the second subset of instructions comprising a plurality of operands, each operand identified by an address, and wherein: operating the processor in the second mode comprises: comparing the address of each of the plurality of operands to a value defining a first range; and selectively processing each operand of the plurality of operands based on the comparing, the selectively processing comprising: for a first portion of the plurality of operands, renaming addresses identifying the operands successive times of the plurality of times that an instruction having an operand in the first portion is executed, the first portion of the plurality of operands each being identified based on the comparing as having an address in the first range; and for a second portion of the plurality of operands, using the same addresses identifying the operands for successive times of the plurality of times that an instruction having an operand in the second portion is executed, the second portion of the plurality of operands each being identified based on the comparing as having an address in a second range, the second range being different than the first range. |
20150348540 | 14287866 | 0 | 1. A method comprising: weighting a first automatic speech recognition model, to yield a weighted first automatic speech recognition model; weighting a second automatic speech recognition model, to yield a weighted second automatic speech recognition model; converting, via the processor, a speech document to text using the weighted first automatic speech recognition model, to yield a first transcript; converting, via the processor, the speech document to text using the weighted second automatic speech recognition model, to yield a second transcript; receiving, from a user, a judgment of perceived accuracy of the first transcript and the second transcript; and updating, via the processor, the weighted first automatic speech recognition model and the weighted second automatic speech recognition model based on the judgment. |
8108468 | 12321424 | 1 | 1. A system for providing customized experiences to a plurality of client stations in a shared environment, the system comprising: an online client application for execution by a client processor of a first client station of the plurality of client stations and for rendering the shared environment on a client display of the first client station; an accounts database having data relating to a plurality of clients; and an online server hosting the shared environment for access by the plurality of client stations, and the online server having a server processor configured to: retrieve client data from the accounts database relating to a first client of the plurality of clients; determine client preferences of the first client based on the client data; create a customized environment from the shared environment according to the client preferences; send the customized environment to the online client application executing on the first client station of the first client for rendering on the client display; receive interaction data from the online client application of the first client station, the interaction data having interactions specific to a customizable element of the customized environment, wherein the customizable element is a pet; translate the interaction data separately for each of the plurality of client stations based on a particular customization of the customizable element by each of the other of the plurality of clients; and affect each of the other of the plurality of client stations according to its separately translated interaction data. |
7823066 | 09518480 | 1 | 1. A method to facilitate the presentation of data associated with defined context-based events, wherein the data is retrieved from at least one database based upon receiving an event selection criterion from a user, and wherein the data is in various media formats, the method comprising: receiving the event selection criterion from the user via an interactive console; executing a standing query to continuously poll the at least one database, the standing query including at least one condition generated based on the event selection criterion received from the user via the interactive console; identifying the data stored in the at least one database that satisfies the at least one condition of the standing query, the data being captured and stored in the at least one database as the context-based events occur; displaying on the interactive console a list of context-based events associated with the data that satisfies the at least one condition of the standing query, wherein the list of context-based events is automatically updated as data associated with new context-based events satisfying the at least one condition is captured and stored in the at least one database during the execution of the standing query; and presenting the data in varying media formats to the user, the data being associated with one or more context-based events selected by the user, wherein the interactive console has a media player for each media format available in the at least one database, and said presenting data in varying media formats includes, for each data in a particular media format, presenting the data via a media player associated with the media format. |
20120095752 | 13334580 | 0 | 1. A method of refining a context-free grammar, the method comprising utilizing backoff grammar rules derived from context-free grammar to recursively modify the context free grammar. |
20140351569 | 13883883 | 0 | 1. A method for updating software in an embedded device ( 1 ), said software being stored in an EEPROM memory ( 12 ) of the embedded device, the method comprising the steps of: c) executing an update management program code, this execution step comprising: erasing the memory area storing the former software and storing at least an update instruction at the beginning of the memory area, the execution of this update instruction leading to an access to the update management program code; writing of the updated software in the erased memory area; d) deleting the update instruction so that the updated software is executed at startup. |
20050175219 | 10989966 | 0 | 1. A computer-based method for tracking a location of an object within two or more digital images of a set of digital images, the method comprising the steps of: receiving a first image vector representing a first image within the set of digital images; determining the location of the object from said first image vector; applying a dynamic model to said first image vector to determine a possible motion of the object between said first image vector and a successive image vector representing a second image within the set of digital images; applying an observation model to said first image vector to determine a most likely location of the object within said successive image vector from a set of possible locations of the object within said successive image vector; applying an inference model to said dynamic model and to said observation model to predict said most likely location of the object; and updating an Eigenbasis representing an image space of the two or more digital images. |
7689452 | 10847839 | 1 | 1. A computer-implemented method of predicting an active user's rating for an item in a recommendation system implemented on computing equipment, wherein the active user and a plurality of non-active users are members of a social network implemented on computing equipment, comprising: providing a similarity measure, w″ a,u for each pair of users in said recommendation system; determining ratings for items rated by non-active users in said recommendation system; calculating, with the similarity measure w″ a,u , by the processor, a weighted average of ratings for said item to produce the predicted active user's rating; wherein the similarity measure, w″ a,u comprises a relationship distance in said social network between pairs of users, wherein an initial version of the similarity measure w a,u for active user a and non-active user u in the system comprises the relationship w a , u = ∑ i ( r a , i - r _ a ) ( r u , i - r _ u ) ∑ i ( r a , i - r _ a ) 2 ∑ i ( r u , i - r _ u ) 2 where r u,i is the rating of non-active user u who has rated item i, r a,i is the rating of active user, a, who has rated item i, wherein calculating a second version of the similarity measure, w′ a,u for active user a and neighbor user u in the system comprises enhancing the initial version correlation coefficient w″ a,u in accordance with the relationship: w′ a,u =w′ a,u , if there are more than N co-rated items w a , u ′ = w a , u I a ⋂ I u N , otherwise where I u is the set of items that neighbor user u has rated, I a is the set of items that active user a has rated, wherein the similarity measure w″ a,u is enhanced from the second version w′ a,u of the similarity measure in accordance with the relationship
w″ a,u η d a,u +(1−η d a,u )w′ a,u where η is a tunable parameter and d a,u is a measure of relationship distance between active user a and non-active user u in the social network. |
8744642 | 13235263 | 1 | 1. A system for identifying a driver, comprising: an image capturing device for capturing a first image during vehicle operation and of an expected driver location; a processor configured to: detect a face of a driver in the first image; determine a quality score for the first image; in the event the quality score of the first image is determined to exceed a pre-determined threshold, determine a set of face data from the first image; determine a confidence index for the determined the set of face data, wherein the confidence index indicates a degree of confidence that the set of face data is likely to support correct driver identification; in the event the confidence index meets a confidence threshold, identify the driver based at least in part on the set of face data; and a memory coupled to the processor and configured to provide the processor with instructions. |
9568392 | 13040435 | 1 | 1. A computerized method for analyzing resource distribution throughout a network, the method comprising: receiving meter data, the meter data representing a plurality of parameters measured by a plurality of meters positioned within a resource distribution network; receiving secondary data from one or more sources external to the meters, the secondary data representing one or more conditions affecting a condition of network assets in a region serviced by the resource distribution network; statistically predicting meter data for at least one meter based on secondary data; comparing the received meter data with the likely distribution of predicted values to detect one or more anomalies if the received meter data deviates from the likely distribution of predicted values; identifying a resource distribution network event on the basis of the detected anomalies wherein identifying the resource distribution network event comprises identifying a faulty meter event by: receiving a first data set representative of a first meter to be analyzed, receiving a reference data set representative of a physically separate second meter, correlating the first data set with the reference data set, determining a time shift based on the correlation of the first data set with the reference data set, and issuing a faulty meter event based on a statistical significance of the time shift; and reporting the resource distribution network event. |
20160274875 | 15051704 | 0 | 1. A method, comprising: receiving a selection of a plurality of pre-coded software components, wherein said pre-coded software components are provided by a mobile application development software accessible from a user device via a network, and wherein said pre-coded software components are fully developed mobile applications executable by at least one processor; creating a new mobile application by launching a mobile application creation interface in said user device, wherein said creation of said new mobile application comprises: inserting one or more of said pre-coded software components into said launched mobile application creation interface; and assembling said inserted one or more of said pre-coded software components; and transmitting said newly created mobile application from said user device to an application store for publishing and distribution, wherein other users can download said newly created mobile application by accessing said application store directly from their user devices. |
7953751 | 12577242 | 1 | 1. A method of searching for audio features within multimedia files, comprising: specifying one or more classes of audio sounds, each of the classes comprising acoustic characteristics of a range of sounds; searching an audio track of a multimedia file to detect occurrences of the classes; and retrieving at least a segment of the searched multimedia file, if the segment contains at least one occurrence of the classes. |
20020162056 | 09846007 | 0 | 1. A computerized diagnostic system comprising: a data base correlating product information with keywords related to failure modes; and an interface program for receiving plain text related to the failure modes and for comparing said plain text to the keywords and for predicting probabilities of potential solutions to said failure modes based upon said comparing. |
8965763 | 13461093 | 1 | 1. A method comprising: determining, by a computing system, a reference transcription of a reference utterance, wherein the reference transcription is derived using a strong acoustic model, a language model and a weight vector, and wherein the reference transcription has a confidence level of at least 70%; based on the reference transcription having the confidence level of at least 70%, determining a secondary transcription of the reference utterance, wherein the secondary transcription is derived using a weak acoustic model, the language model and the weight vector, wherein the secondary transcription has a secondary confidence level, wherein the weak acoustic model has a higher error rate than the strong acoustic model, and wherein the secondary transcription is different from the reference transcription; and based on the secondary transcription being different from the reference transcription, updating the weight vector so that transcribing the reference utterance using the weak acoustic model, the language model and the updated weight vector results in a tertiary transcription with a tertiary confidence level that is greater than the secondary confidence level. |
9373329 | 14064755 | 1 | 1. A computer-implemented method comprising: receiving, at a computer system, an audio signal; initiating, by the computer system, a plurality of speech recognition tasks for the audio signal, wherein the speech recognition tasks each use a different one of a plurality of language models; detecting that a portion of the plurality of speech recognition tasks have completed, wherein a remaining portion of the plurality of speech recognition tasks have not completed; obtaining recognition results and confidence values for each of the plurality of speech recognition tasks included in the portion, wherein the recognition results identify one or more candidate transcriptions of the audio signal, and the confidence values identify one or more probabilities that the recognition results are correct; determining, by the computer system, whether at least one of the one or more confidence values is greater than or equal to a threshold confidence value; and in response to determining that the at least one of the one or more confidence values is greater than or equal to the threshold confidence value and before all of the remaining portion of the plurality of speech recognition tasks have completed, providing a final recognition result for the audio signal based on the recognition results and the one or more confidence values. |
8364666 | 12464694 | 1 | 1. A computer-implemented method for performing a data analysis task having an associated analysis context, the method comprising: defining the analysis context associated with the data analysis task, wherein data items have a variable relevance in accordance with the context, and wherein the data items are grouped together to form logical transactions conducted by a user over a predetermined time period; receiving the logical transactions exchanged over a communication network, wherein the logical transactions include a first data item type and a second data item type that is different from the first data item type; processing the logical transactions with a set of prioritization rules to generate relevance scores that quantify a relevance of the logical transactions to the analysis context, wherein the relevance scores are assigned according to a common scale; and generating a prioritization of the logical transactions based on the relevance scores. |
20070074150 | 11218344 | 0 | 1. A method of processing function calls in a distributed application environment, the method comprising: storing a plurality of function calls in one or more queues for communication from a sending application to a receiving application; determining one or more dependencies among at least a portion of the stored plurality of function calls; and generating a schedule of execution of the stored plurality of function calls based on the determined dependencies. |
20150039767 | 13959165 | 0 | 1. A method, comprising: receiving, by a device of a cloud computing environment, information associated with one or more computing resources of a local portion of the cloud computing environment; receiving, by the device and from a global allocator device, a request for placement of a computing resource element at a selected computing resource of the one or more computing resources; determining, by the device and based on the information, whether the request can be satisfied by the selected computing resource; placing, by the device, the requested computing resource element in the selected computing resource when the request can be satisfied by the selected computing resource; and sending, by the device and to the global allocator device, a message indicating that the requested computing resource element has been successfully placed in the selected computing resource. |
5465308 | 08111616 | 1 | 1. A pattern recognition system, comprising: first means for receiving a plurality of images and corresponding image identification information; second means for processing said plurality of images into image information; third means for determining the most distinctive aspects of said image information, said third means including means for performing an In-Class to Out-of-Class study including: means for generating an In-Class Variation Matrix; means for generating an Out-Class Variation Matrix; means for normalizing said In-Class Variation Matrix; means for normalizing said Out-Class Variation Matrix; means for generating a feature Matrix; means for normalizing said feature Matrix into a normalized feature Matrix; means for partitioninq said normalized feature Matrix into bricks; means for prioritizing said bricks, and means for creating a feature template vector whose elements correspond to a subset of said bricks; fourth means for forming feature vectors of the magnitudes of said most distinctive aspects of said image information; fifth means for storing said feature vectors, said fifth means including neural network processor means adapted to store said feature vectors; sixth means for receiving a query image; seventh means for generating a query feature vector from said query image; eighth means for querying said fifth means to determine the most similar previously stored feature vectors to said query feature vector; ninth means for outputting image identification information corresponding to the previously stored feature vector most similar to said query feature vector. |
9104771 | 13288356 | 1 | 1. A method for providing relevant product reviews to a user, the method comprising: monitoring a user session on a first website to gather information related to one or more of the following: purchasing habits, browsing habits and reviewing and writing product reviews; populating a database with actions performed by said user in connection with said monitored user session; generating both a personality report of said user comprising personality traits directed to actions, attitudes and behaviors of said user using said populated database and a list of reviewers designated as favored using said populated database; searching and identifying product reviews of interest on a product or a service using both said personality report of said user and said list of reviewers designated as favored; displaying, by a processor, one or more of said identified product reviews of interest on said product or said service that meet a threshold criteria to said user; searching and identifying said product reviews of interest on said product or said service being viewed by said user on a second website using one or more of said personality report of said user and said list of reviewers designated as favored; and searching and identifying said product reviews of interest on said product or said service related to a product review being viewed by said user using one or more of said personality report of said user and said list of reviewers designated as favored. |
20120311079 | 13486106 | 0 | 1. A communication method for a content requester in a network based on a hierarchical name structure, the communication method comprising: generating a content search request packet comprising a portion of but not an entire hierarchical name of content corresponding to a content search request; and requesting a communication device included in at least one virtual community in the network based on a hierarchical name structure to search for the content by transmitting the content search request packet. |
20080082411 | 11540361 | 0 | 1. An automated method of targeting specific consumers for a marketing campaign of goods and/or services, comprising: defining a multi-factorial mathematical model of defined parameters; calculating a numerical value using the multi-factorial mathematical model for respective consumers; then ranking the consumers based on the calculated value associated with the model. |
20130289660 | 13826837 | 0 | 1. A method comprising: receiving, with one or more processors, a therapy delivery element selection, wherein the therapy delivery element selection corresponds to a therapy delivery element selected for implantation in a patient; receiving, with the one or more processors, a set of therapy parameter values, the set of therapy parameter values defining stimulation to be modeled; retrieving, from a memory, an area of activation look-up table based on the therapy delivery element selection, the area of activation look-up table comprising a neuron representative grid, wherein each neuron representative of the neuron representative grid is associated with a plurality of activation thresholds, each threshold of the plurality of activation thresholds being associated with an angle of rotation around an axis, and wherein thresholds of the plurality of activation thresholds are organized into a plurality of activation threshold sets; and generating, with the one or more processors, a plurality of areas of activation based on the set of therapy parameter values, wherein each area of activation is generated based on a different threshold set of the plurality of activation threshold sets. |
9270750 | 14312985 | 1 | 1. A computerized method for providing distributed electronic content to a consumer of the content, the method comprising: implementing, into a first website, a first embedded delivery portal component for managing delivery of electronic content comprising base content and invisible content, wherein the first embedded delivery portal component manages the delivery, to a first user, of the base content from a web server and the invisible content from one or more users other than the first user; receiving, from the first user, a request to receive the electronic content from the first website; and in response to the request, transmitting the base content and a content facilitator module—with the base content from the web server to the first user, wherein the content facilitator module comprises a peer map which identifies the one or more users other than the first user to provide the invisible content to the first user, wherein each of the users other than the first user is available to provide the invisible content while having open the first website or another website that has implemented an embedded delivery portal component for managing delivery of the invisible content, wherein a particular one of the users other than the first user is no longer available to provide the invisible content upon closing of the first website or the other website that was open. |
7848275 | 11672767 | 1 | 1. A mobile terminal configured to constitute an ad hoc network together with a plurality of other terminals, comprising: a packet relay unit configured to execute a relay operation of relaying a packet transferred between the other terminals; a packet transmitter configured to execute a transmission operation of transmitting a packet generated in the mobile terminal to any one of the other terminals; a power supply manager configured to execute a power supply control operation, which includes a power-off operation; a coordination controller configured to: cause the relay operation, the power supply control operation and the transmission operation to be coordinated with each other by selectively controlling whether each of the relay operation, the transmission operation and the power supply control operation is executed; prioritize the relay operation over the transmission operation and the power-off operation; and reject a packet transmission request from the packet transmitter during a predetermined time period after power-on, and cause only the relay operation to be executed; and a determination unit configured to increase the predetermined time period for executing only the relay operation when it is determined that a node density in the ad hoc network is low. |
8589584 | 13679708 | 1 | 1. A computer-implemented method for performing a specified collective operation on a parallel computer comprising a plurality of compute nodes, each compute node having at least a processor and a memory, the method comprising: performing a first collective operation by a source node on a plurality of target nodes to determine a characteristic of each of the target nodes, wherein the characteristic for each target node specifies whether a buffer of the respective target node is N-byte aligned, where N is a power of two; from a plurality of protocols, selecting a target protocol based on a result of determining whether or not all of the target nodes are N-byte aligned; performing the specified collective operation by the source node on the plurality of target nodes using the target protocol; performing a second collective operation by one of the target nodes on a plurality of downstream nodes to determine a characteristic of each of the downstream nodes, wherein the characteristic for each downstream node specifies whether a buffer of the respective downstream node is N-byte aligned, where N is a power of two; from the plurality of protocols, selecting a downstream protocol based on a result of determining whether or not all of the downstream nodes are N-byte aligned; and performing the specified collective operation by the target node on the plurality of downstream nodes using the downstream protocol. |
10028116 | 14618854 | 1 | 1. A mobile device comprising: a memory area storing a plurality of applications and computer-executable instructions for managing the plurality of applications; and a processor configured to execute the computer-executable instructions to: store a template associated with an application of the plurality of applications, the template including a plurality of entities that are associated with user interface (UI) elements, the template configured to provide context-sensitive information to user interactions with the associated application at runtime to infer semantics of user activities on the mobile device based on at least one of a navigation through a plurality of pages in the application or an interaction with the UI elements performed during runtime, wherein each UI element includes a name and a list of key-value pairs indicating semantic information of content and syntactical information regarding where the entity appears in the application; receive one or more user interactions with the application based on the template; and determine one or more user interests by comparing the one or more user interactions with the plurality of entities of the template; and initiate a tailored service to a user of the mobile device to provide a user task completion, the tailored service inferred based on the one or more determined user interests. |
20020048331 | 09952212 | 0 | 1. A method of normalizing alpha (a) values in a map decoder the method comprising: detecting when all a values have reached a certain value; and subtracting a constant value from all a values on a next decoder cycle. |
20090195405 | 12417078 | 0 | 1. A configurable, wall-mountable controller, including: a wall-mountable subassembly including circuitry operable in a learning mode, a cloning mode, and a control mode; an infrared receiver coupled to the circuitry; an infrared emitter coupled to the circuitry; and control keys coupled to the subassembly, wherein the circuitry in the learning mode is configurable to perform control operations in response to actuations of the control keys in the control mode, when performing said control operations the circuitry generates emulated versions of signals received at the infrared receiver during the learning mode, and the circuitry is operable in the cloning mode to learn the configuration of a second device including by receiving at the infrared receiver modulated infrared signals that have been transmitted to said infrared receiver from the second device. |
7937348 | 11811368 | 1 | 1. A computer program product comprising a computer useable medium having program logic stored thereon, the program logic comprising machine readable code executable by a computer, the machine readable code comprising a system for interrogating a user profile and reading a learning objective as a first input; a system for interrogating a software application and reading a learning objective as a second input; a calculation component for determining a relevance of the first input learning objective to the second input learning objective; and a system for adapting the software application in accordance with the determined relevance and updating the user profile in accordance with the determined relevance. |
20080147725 | 11999649 | 0 | 1. A method for handling a plurality of information units in an information processing system through verification process for said plurality of information units, comprising the following steps of: a) converting each information unit in said plurality of information units into verified object by augmenting the first meaning in said information unit with a second meaning, b) expressing the verified objects, converted from said plurality of information units, by object representation for each verified object, c) constructing a processing structure that is capable of applying a plurality of relationships among said verified objects, and d) applying said processing structure to said verified objects to handle said plurality of information units. |
20150186166 | 14143297 | 0 | 1. A method for dynamically turning on or off just-in-time compilation in a dynamic translator using instruction code translation, comprising: fetching a non-native instruction from a plurality of non-native instructions; interpreting the non-native instruction to generate an instruction code; determining if the instruction code satisfies a criteria which prohibits compilation of the instruction code; and when the criteria is determined to be satisfied: prohibiting compilation of the instruction code; and implementing a virtual machine instruction corresponding to the non-native instruction based, at least in part, on the instruction code if the criteria is determined to be satisfied. |
8650456 | 13219818 | 1 | 1. An apparatus, comprising: a decoder configured to perform a decoding process on codewords to verify that the codewords meet coding constraints; and wherein the decoder comprises a recovery unit configured to store recovery instructions for performing a modified decoding process, wherein the decoder is further configured to perform the modified decoding process by executing the stored recovery instructions when a decoded codeword fails to meet the coding constraints. |
20140233423 | 14082546 | 0 | 1. A system comprising: a plurality of ports configurable to receive and forward data; and a processor configurable to: enable creation of a parent service instance, the parent service instance specifying both a network as an element of the parent service instance and one or more packet encapsulation attributes values; enable creation of a child service instance, the child service instance specifying a set of one or more networks and one or more packet encapsulation attribute values as elements of the child service instance; enable a hierarchical relationship to be created between the parent service instance and the child service instance by specifying the child service instance as an element of the parent service instance, the hierarchical relationship causing the one or more networks specified as elements of the child service instance to be aggregated and carried over the network specified as an element of the parent service instance, and the hierarchical relationship causing the parent service instance to incorporate the one or more encapsulation attribute values of the child service instance; and perform packet encapsulation for packets moving from the one or more networks specified as elements of the child service instance to the network specified as an element of the parent service instance based upon the one or more encapsulation attribute values that the parent service instance incorporates from the child service instance. |
9342274 | 13111927 | 1 | 1. A method, comprising: receiving, by a browser application of a computing device, script code including receiving code representing a component object model (COM) object; generating a prototype of the COM object including generating a type representation including at least one dynamic type associated with the COM object; by a marshaling component of the computing device, prior to a request for native code representing the COM object, in response to identifying a request for at least one intermediate data structure, dynamically generate the at least one intermediate data structure tailored for dynamic COM object translation between the script code and the native code, the at least one intermediate data structure generated based on the at least one dynamic type associated with the prototype of the COM object; and in response to the request for native code representing the COM object, marshaling, by the marshaling component of the computing device, the code representing the COM object to the native code based on the at least one intermediate data construct. |
20060184687 | 11400674 | 0 | 1. A method comprising: receiving a data stream at an input data transmission rate which is greater than a data storage rate of a target storage device; compressing the data stream, with a plurality of encoders provided in a parallel configuration, at a compression rate that increases the effective data storage rate of the data storage device; and storing the compressed data stream in the target storage device. |
7606100 | 12040632 | 1 | 1. A method of erasing non-volatile storage, comprising: applying an erase voltage to a set of non-volatile storage elements while enabling erasing of each non-volatile storage element in said set, said set including a first subset of non-volatile storage elements and a second subset of non-volatile storage elements; verifying whether said set is erased after applying said erase voltage by testing conduction through said set while applying a verify voltage to said first subset of non-volatile storage elements and applying a first voltage to said second subset of non-volatile storage elements, said first voltage is different from said verify voltage; repeating said applying said erase voltage and verifying whether said set is erased until successfully verifying that said set is erased; and applying said erase voltage to said set while inhibiting erasing of said first subset after successfully verifying that said set is erased. |
20160042182 | 14453851 | 0 | 1. A method for dynamic verification of a computer software application execution path, the method comprising: detecting, by one or more processors, execution of a target instruction of a computer software application, wherein the computer software application is configured to generate a token at an instruction near a waypoint instruction of the computer software application, and wherein the waypoint instruction lies along an execution path that leads to the target instruction; determining, by one or more processors, responsive to detecting execution of the target instruction, whether a token exists; and performing, by one or more processors, a computer-security-related remediation action responsive to determining that the token does not exist. |
8214452 | 11830029 | 1 | 1. A method executed by a computer, comprising: collecting, at time t 1 during simulation of a software application on a computer, a first value for a cursor position on a display and a first value for a mouse position on the display; collecting, at time t 2 during simulation of the software application on the computer, a second value for the cursor position and a second value for the mouse position on the display; and comparing the first value for the cursor position to the second value for the cursor position and the first value for the mouse position to the second value for the mouse position to determine whether the software application is properly executing on the computer; determining that the software application is hung when the first value for the cursor position, the second value for the cursor position, the first value for the mouse position, and the second value for the mouse position do not change from the time t 1 to the time t 2 . |
7681010 | 11391453 | 1 | 1. An apparatus of managing a file system, comprising: a data storage unit that includes a plurality of data blocks each having a predetermined size that store data; a data information storage unit that stores data information on the data stored in the data blocks; and a control unit that writes the data into an empty space of each data block using the stored data information, wherein the data information storage unit comprises: a block map that comprises information on a total used space of each data block; and a sub block map that comprises information on a use space used by the data stored in the data blocks, wherein the control unit updates the block map and the sub block map in order to allow a user to reference the block map and the sub block map when storing data, wherein the sub-block map comprises a next sub-block ID allocated to a next sub-block corresponding to a set of data within a data block storing data. |
20090259879 | 12102269 | 0 | 1. A method for determining a corrective action for a diagnosable system, comprising: receiving a first evidence notification; determining a plurality of evidentiary-failure-mode-probability rectangles (EFMPRs) based on the first evidence notification; determining a first candidate EFMPR in the plurality of EFMPRs; determining an overlap area between the first candidate EFMPR and the other EFMPRs in the first plurality of EFMPRs; determining the overlap area of the first candidate EFMPR is less than an overlap threshold; and responsive to determining that the overlap area of the first candidate EFMPR is less than the overlap threshold, determining a reasoned corrective action for the diagnosable system, based on the first candidate EFMPR. |
10152557 | 14278811 | 1 | 1. A computer system comprising: at least one processor; and memory storing: a bipartite graph having a first set of nodes and a second set of nodes, nodes in the first set being connected to nodes in the second set by edges, and instructions that, when executed by the at least one processor, cause the system to: partition each node in the second set into one category of a plurality of disjoint categories, for each category of the plurality of disjoint categories: generate a subgraph for the category, the subgraph comprised of a subset of nodes in the first set and edges linking the nodes in the subset, where the nodes in the subset are selected based on connection to a common neighbor node in the second set that is partitioned into the category, and where edges in the subgraph are based on edges between pairs of nodes in the first set that have the common neighbor node from the second set, and store the subgraph in the memory. |
7793272 | 11273111 | 1 | 1. A method of executing program code during conversion of subject code executable by a subject processor into target code executable by a target processor, in combination with native code that is natively executable by the target processor, said method comprising the steps of: executing a first subject code portion on the target processor as translated target code; calling from the first subject code portion to execute a native code portion natively on the target processor; dynamically determining whether to execute either a second subject code portion or a second native code portion when both the second subject code portion and the second native code portion are available to be executed, wherein the determining comprises determining if a reverse bind point description exists; and providing to a translator the reverse bind point description which includes (a) an identification of a native function of the second native code portion to be reverse bound, and (b) an identification of a subject function of the second subject code portion to be called in substitution for the native function; providing a link from the native code portion to the second native code portion if there is no reverse bind point description, or else providing a link from the native code portion to the second subject code portion by inserting in the native code portion a reverse call stub to the identified subject function of the second subject code portion when encountering the identified native function of the second native code portion; calling from the second native code portion to execute the second subject code portion as translated target code; returning from execution of the second subject code portion to execution of the second native code portion; returning from execution of the second native code portion to execution of the native code portion; and returning from execution of the native code portion to execution of the first subject code portion. |
7530074 | 10789609 | 1 | 1. A system for a joint tactical radio system (JTRS) compliant device for providing communication at low power requirements, the system comprising: an object request broker that marshals data from a waveform application, wherein at least a portion of the object request broker is implemented in hardware rather than software; a pluggable protocol interface that communicates the marshaled data from the object request broker, wherein at least a portion of the pluggable protocol interface is implemented in hardware; and a memory pool that communicates data from the pluggable protocol interface directly and without transport overhead; wherein the portion of the pluggable protocol interface and the portion of the object request broker implemented in hardware comprise logic and data formatting functions of the object request broker that are determined to consume excessive processor throughput for a specific software application and an interface to the memory pool, wherein the logic and data formatting functions are implemented as a programmable application specific integrated circuit, wherein the pluggable protocol interface utilizes an operating system protocol stack, wherein the operating system protocol stack is implemented in hardware. |
8181167 | 11971904 | 1 | 1. A method for producing a source code intermediate representation of a source code package, the source code intermediate representation comprising a plurality of intermediate representation data sets, the method comprising: providing a data storage; analyzing a first source code listing of the source code package using a source code processor for a syntax, wherein the source code processor performs at least parsing of the first source code listing using the syntax; analyzing a second source code listing of the source code package using the source code processor; creating a plurality of listing identifiers comprising a first listing identifier indicating a first listing mapping to the first source code listing and a second listing identifier indicating a second listing mapping to the second source code listing; creating one or more processor identifiers comprising a processor identifier indicating a processor mapping to the source code processor; gathering source code information for composing an intermediate representation data set for a first construct of a plurality of constructs recognized by said source code processor, wherein the intermediate representation data set captures data fields comprising a first location of the first construct, a processor identification of said source code processor, a category for the intermediate representation data set, and an attribute describing the first construct; inserting the intermediate representation data set into a data set arrangement using the first location, wherein the data set arrangement uses at least one value of the first location for a position of the intermediate representation data set in the data set arrangement; and saving the data set arrangement into the data storage using a predetermined data format, whereby an application can identify and interpret the first construct in the first source code listing using the intermediate representation data set saved in the data storage. |
20130231924 | 13589977 | 0 | 1. A method of reconstructing a speech signal from an audible signal using a formant-based codebook, the method comprising: detecting one or more formants in an audible signal; receiving a pitch estimate associated with the one or more detected formants; selecting one or more codebook tuples from the formant-based codebook based at least on the one or more detected formants, wherein each codebook tuple includes a respective formant spectrum value and a respective one or more formant amplitude values, wherein the respective formant spectrum value is indicative of the spectral location of one or more formants associated with the codebook tuple, and the respective one or more formant amplitude values are indicative of the corresponding amplitudes of the one or more formants associated with the codebook tuple; and interpolating the spectrum between the corresponding one or more formants associated with the one or more selected codebook tuples to generate a reconstructed speech signal using the received pitch estimate. |
20130218887 | 13398313 | 0 | 1. A method comprising: obtaining a plurality of interests representing a plurality of subjects' affinities towards a plurality of topics to provide obtained interests; generating, by a processing device, an interest graph based on the obtained interests to provide a generated interest graph, wherein the generated interest graph comprises: at least two nodes, each of the at least two nodes representing an interest of the obtained interests, wherein the obtained interests are free of any personally identifiable information associated with the plurality of subjects; and at least one link connecting a first node to a second node of the at least two nodes, the at least one link representing a relatedness of the interest represented by the first node to the interest represented by the second node. |
20080098001 | 11743563 | 0 | 1. A method for encoding XML, comprising the computer-implemented steps of: receiving a request for a specified amount of binary encoded XML; in response to the request, encoding text XML on a per-node basis until sufficient binary XML has been generated to satisfy the request; responding to the request with said amount of binary XML; and once the request has been satisfied, ceasing to encode the text XML until receiving a subsequent request for binary encoded XML. |
7863510 | 11650446 | 1 | 1. A method of classifying music, comprising: generating a theme vector corresponding to at least one music theme; generating a music title vector corresponding to a music title for the music; calculating, using at least one processing device, a similarity between the theme vector and the music title vector; and assigning a theme of the music title, to classify the music according to theme, based on the similarity. |
20090030740 | 12245418 | 0 | 1. A computer-implemented retirement planning system, comprising: program logic including machine-executable instructions stored in a machine-readable medium, the program logic including data collection logic, the data collection logic being configured to receive data pertaining to an individual planning for retirement and to present questions configured to elicit information useable to ascertain what the individual planning for retirement considers to be a worst case scenario basic needs level of income; retirement modeling logic, the retirement modeling logic being configured to process the data to generate parameters of a retirement plan based on the worst case scenario basic needs level of income, the retirement plan comprising a retirement income arrangement in which the amount of inflation-adjusted retirement income from sources other than long term care insurance and health insurance is larger during early years of the retirement plan and decreases as the maximum life expectancy of the individual is reached; and report generation logic, the report generation logic being configured to generate a retirement plan report describing the retirement income arrangement. |
20060120590 | 11007529 | 0 | 1. A method of determining location of a target image within a two-dimensional input image by employing a three-dimensional reference model, the method comprising the steps of: extracting object edge points in the input image; given estimated seeker line-of-sight orientation and range data, projecting a three-dimensional target reference model to obtain a two-dimensional reference image; applying a weighted-direction-cross-product Hough Transform to the object edge points and points of the two-dimensional reference image; classifying the input image as containing a target image or not; if the input image contains the target image, identifying a location of the target image within the two-dimensional input image; computing confidence measure as to the identified location of the target image within the two-dimensional input image; and performing confidence accumulation over a plurality of instances of application of the method. |
20090282022 | 12368978 | 0 | 1. A computing device comprising: a communication interface; memory; and processing circuitry coupled to the communication interface and to the memory, the processing circuitry, memory, and communication interface operable to: receive search criteria information from an external environment through the communication interface; process the search criteria information to obtain a first set of search results selected from at least one maxima category and a second category within the at least one maxima category, wherein a first set of communication data is created to output information related to the first set of search results to the external environment through the communication interface; receive user interaction data from the external environment, the user interaction data indicating some level of user interaction with the first set of search results; process the user interaction data to obtain a second set of search results selected from at least one maxima category and a second category within the at least one maxima category where this at least one maxima category was identified at least in part from analyzing the user interaction data, wherein a second set of communication data is created to output information related to the second set of search results to the external environment through the communication interface; and iteratively repeat the process of analyzing user interaction data and selecting other sets of search results from maxima that are favorably associated with user interaction data and provide corresponding output to the external environment via the communication interface. |
20070026367 | 11381964 | 0 | 1. A system comprising: at least one peg defining a receptacle; at least one shaft sized so that an end of the at least one shaft may be inserted into the receptacle; at least one cube defining a sleeve sized to allow the at least one shaft to be inserted through the sleeve; at least one divider defining an open slot, the slot sized to allow the at least one shaft to fit into the slot; at least one tray defining a peg receptacle, the peg receptacle sized to allow insertion of at least one peg into the peg receptacle. |
20160330291 | 15214583 | 0 | 1. An industrial controller, comprising: a memory that stores executable components; a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising: a transformation component configured to modify raw data generated by an industrial control program executed by the industrial controller in accordance with at least one requirement of an industrial analytics application executing on a cloud platform to yield transformed data; a customer profile component configured to append customer-specific information to the transformed data to yield profiled data; and a cloud gateway component configured to send the profiled data to the industrial analytics application. |
8452975 | 12921507 | 1 | 1. A method, used in a signature generation device and a signature verification device, for generating and verifying a signature for target data having one of a shortest vector problem and an approximate shortest vector problem as a basis for security, in which a vector is a multi-dimensional representation of data divided into a plurality of pieces, the method comprising the steps of: acquiring, using the signature generation device, the target data; converting, using the signature generation device, the target data using a private disturbance vector smaller than a first size to generate a converted vector; generating, using the signature generation device, a signature vector for the converted vector by seeking, in a lattice whose basis vectors are determined by private key vectors, a lattice point closest to the converted vector and selecting a part of the signature vector as signature data; recovering, using the signature verification device, the signature vector with public key vectors and the signature data, thus yielding a recovered signature vector, and verifying, using the signature verification device, whether a distance between a vector representing the target data and the recovered signature vector is equal to or less than a second size that is larger than the first size; and outputting, using the signature verification device, information indicating that verification is successful when the distance is equal to or less than the second size, wherein the first size is a size of a vector, and the second size is a size of a different vector, wherein each vector is represented as a polynomial, wherein the signature generation device stores a disturbance vector distribution table that includes, in correspondence, an upper limit on a coefficient, a lower limit on the coefficient, and a model polynomial serving as a basis for generating of the disturbance vector, and wherein the converting step randomly selects the coefficient between the upper limit and the lower limit, inclusive, multiplies the model polynomial by the selected coefficient, and treats the result as a polynomial representing the disturbance vector. |
20080281578 | 11745291 | 0 | 1. A method performed by a computer system to improve document translations, comprising: receiving a request for a translated document in a preferred natural language; retrieving an identified document, the identified document storing text in a first natural language; translating the retrieved document to create the translated document containing text translated into the preferred natural language wherein the preferred natural language is a natural language that is not the first natural language; providing the translated document; receiving a modification to a word in the translated document; and storing the received modification to the translated word to improve a subsequent request for the translated document. |
9129345 | 13637366 | 1 | 1. A data stream processing architecture, the data forming matrices of pixels of dimension NI×Nc, the architecture comprising: a plurality of sets of processors, each set of processors being capable of receiving an input data stream and of delivering an output data stream, and each set of processors comprising: a control circuit capable of supplying instructions, a set of neighborhood processors capable of performing the instructions received from the control circuit and of supplying data forming the output data stream of the set of processors, and a neighborhood memory enabling each neighborhood processor to access data of the input data stream received by the set of processors forming a neighborhood of pixels of dimension VI×Vc, each neighborhood memory comprising, for each neighborhood processor, a local memory for storing dynamically the data forming the neighborhoods of pixels which the neighborhood processor can access, the neighborhoods of pixels accessible to the processors being centered on contiguous pixels of the same row of a matrix, two processors being neighbors when the neighborhoods that they can access are centered on contiguous pixels in the same row of a matrix; and interconnectors capable of receiving a data stream at an input of the architecture and the output data streams of the set of processors, and capable of delivering a data stream at an output of the architecture, wherein two set of processors can be coupled on a North/South axis and each comprise: same number N of neighborhood processors; and connectors enabling each neighborhood processor, within the set of processors, to exchange data with each of its neighboring processors belonging to the same set of processors, so that the neighborhood of pixels accessible to a neighborhood processor can be extended to all the neighborhoods of pixels accessible to the neighborhood processors of the same set of processors said set forming a neighborhood of pixels of dimension VI×(Vc+N−1); and the architecture further comprises: a storage manager capable of receiving a data stream from the interconnectors and enabling the neighborhood processors of a first coupled set of processors to access neighborhoods of pixels contiguous with the neighborhoods of pixels accessible to the neighborhood processors of a second coupled set of processors, so that the neighborhoods of pixels accessible to the neighborhood processors of the two coupled set of processors can form a vicinity of dimension 2·VI×(Vc+N−1); and connectors on the North/South axis enabling each neighborhood processor of the first coupled set of processors to exchange data with one of the neighborhood processors of the second coupled set of processors, the neighborhood processors being linked in pairs so as to have access to each other's local memory and to have access to neighborhoods of pixels centered on one and the same column of a matrix, so that the neighborhood of pixels accessible to each neighborhood processor can be extended to the neighborhoods of pixels accessible to the neighborhood processor to which it is linked. |
10044751 | 14981738 | 1 | 1. A system for mitigating network attacks, the system comprising: a protected network comprising a plurality of devices; and one or more attack mitigation devices communicatively coupled to the protected network, wherein the one or more attack mitigation devices are configured and operable to employ a recurrent neural network (RNN) programmed to use a Backpropagation Through Time (BPTT) method to obtain total request probability information related to a request stream, wherein the request stream comprises a plurality of at least one of: HTTP (hypertext transfer protocol), RTSP (Real Time Streaming Protocol) and/or DNS (Domain Name System protocol) messages and wherein the total request probability information represents a probability of a respective request message string being a valid one and wherein the total request probability information related to the request stream is obtained by multiplying language-conditional character probabilities for each character included in the request message; analyze the obtained total request probability information using the BPTT method to detect one or more atypical requests in the request stream and perform, in response to detecting the one or more atypical requests, one or more mitigation actions on the one or more atypical requests in order to block an attack including: (1) determining a rate at which a source associated with a particular atypical request sends atypical requests and (2) blocking the source in response to determining that the rate exceeds a predefined threshold. |
20130282965 | 13919738 | 0 | 1. In a computing environment, a system comprising: a RAM-based index; and a storage mechanism configured to maintain data items in pages, with at least some of the pages in a secondary storage device, the storage mechanism configured to access the RAM-based index to determine whether a data item is retrievable, the RAM-based index returning information corresponding to one or more pages in which the data item is maintained, or returning information indicating that the data item cannot be found. |
7752554 | 11538976 | 1 | 1. One or more computer-readable storage media embodying computer-readable instructions which, when executed by one or more processors, cause the one or more processors to implement a method comprising: detecting non-human traffic patterns of a contact identifier in a presence based environment, wherein detecting non-human traffic patterns includes detecting at least one member of a group comprising: a high number of contact lists associated with the contact identifier, a high rate of conversations per minute for the contact identifier, and continuous traffic patterns of the contact identifier; based on the detecting, associating the contact identifier with a bot; ascertaining that a user is or is about to converse with the bot; presenting, in a user interface, a first indicia that the user is or is about to converse with the bot as compared to a human user; and presenting in a user interface, a second indicia that the bot is approved or verified, wherein the second indicia is presented proximate to an icon which represents the bot in a user contact list and the second indicia includes textual indicia which represents that the bot is approved or verified. |
8707294 | 12419685 | 1 | 1. A system for providing a model for system-wide application extension, said system comprising: an application server that executes on one or more microprocessors, wherein the application server includes a plurality of applications , wherein each application is associated with an application type, and includes application code and application configuration data; a first shared library that contains fragment code, fragment configuration data, and a first tag, wherein the first shared library is identified by the application server as an auto-ref library using the first tag; wherein when a particular application of said plurality of applications is deployed as a particular deployed application on the application server, the application server causes the particular deployed application to automatically reference the auto-ref library unless the application type associated with the particular application is excluded by the auto-ref library; wherein when referencing the auto-ref library, the fragment code and the fragment configuration data of the auto-ref library are automatically merged into the application code and application configuration data of the particular application at deployment time without replacing any conflicting application code, and wherein conflicting application code and application configuration data of the particular application are used without modification in the particular deployed application; a second shared library that contains superseding code, superseding configuration data, and a second tag, different than the first tag, wherein the second shared library is identified by the application server as a superseding library using the second tag; wherein when the particular application is deployed on the application server as the particular deployed application, the application server causes the particular deployed application to automatically reference the superseding library unless the application type associated with the particular application is excluded by the superseding library; and wherein when referencing the superseding library, the superseding code and the superseding configuration data override the application code of the particular application, such that conflicting application code and configuration data of the particular application is replaced by the superseding code and superseding configuration data in the particular deployed application, and wherein application code and application configuration data of the particular application that is not replaced by the superseding library is used without modification in the particular deployed application. |
9189522 | 12188678 | 1 | 1. A method comprising: identifying a plurality of query execution plans that have been designated as acceptable for use by a database server to execute a database command, the database command being a query statement that instructs the database server to perform one or more operations on data stored in a database; persistently maintaining, at the database server, for the database command, baseline data specifying the plurality of query execution plans that have been designated as acceptable for executing the database command, wherein the baseline data includes a plurality of query execution plan outlines, wherein the plurality of query execution plan outlines is a set of data from which the database server reconstructs each query execution plan in the plurality of query execution plans; while persistently maintaining the baseline data, the database server receiving a first request to execute the database command; estimating, by the database server, for each given query execution plan in the plurality of query execution plans, predicted costs for executing the database command in response to the first request according to the given query execution plan; based on the predicted costs for each query execution plan in the plurality of query execution plans, the database server selecting a particular query execution plan from the plurality of query execution plans that have been designated as acceptable for executing the database command; and in response to the first request to execute the database command, the database server executing the database command according to the particular query execution plan; wherein the method is performed by one or more computing devices. |
8645842 | 11935183 | 1 | 1. A system comprising: a plurality of interactive content facilities, each of said plurality of interactive content facilities within a respective one of a plurality of access devices; and a content hub subsystem selectively and communicatively coupled to said plurality of access devices associated with a predefined group of users, said content hub subsystem being configured to receive data representative of content from at least one of said access devices associated with said predefined group of users, map said content to said access devices associated with said predefined group of users, identify a computing platform of each of said plurality of access devices associated with said predefined group of users, transcode data representative of said content into a data format selected for each of said plurality of access devices associated with said predefined group of users based on said identified computing platform, and provide data representative of said content to each of said plurality of access devices associated with said predefined group of users in said data format; wherein each of said access devices associated with said predefined group of users is configured to generate at least one interactive graphical object representative of said content, generate and present a graphical user interface including said at least one interactive graphical object; and wherein said content hub subsystem is further configured to receive data representative of an edit of said content from at least one of said access devices associated with said predefined group of users, map said edit of said content to said access devices associated with said predefined group of users, transcode data representative of said edit of said content into said data format for each of said plurality of access devices associated with said predefined group of users, and push data representative of said edit to each of said access devices associated with said predefined group of users in said data format. |
20100266120 | 12551117 | 0 | 1. A method for execution by a processing module, the method comprises: encrypting data using an encryption key to produce encrypted data; encoding the encryption key to produce an encoded encryption key; combining the encrypted data and the encoded encryption key to produce transformed data; and error encoding the transformed data to produce error coded data. |
20120274777 | 13543668 | 0 | 1. A method of tracking an object captured by a camera system, the method comprising: receiving image data representing first and second images of a field of view of the camera system; detecting a first object captured in the first image and a second object captured in the second image; producing a first signature of the first object and a second signature of the second object, the first signature representing a first set of features of the first object and the second signature representing a second set of features of the second object; producing data derived from the first and second signatures, the data corresponding to a first subset of features selected from the first set and a second subset of features selected from the second set; and analyzing the data to determine whether the second object is an instance of the first object. |
20130336588 | 13525222 | 0 | 1. A method for representing an image, comprising the steps of: extracting features from the image, wherein the features are scale-invariant; projecting the features to produce a matrix of random projections by multiplying the features by a matrix of random entries; and quantizing the matrix of random projections to produce a matrix of quantization indices, wherein the steps are performed by a processor in a client. |
9697266 | 14039926 | 1 | 1. A method comprising: obtaining, at a migration management system, a first data set specifying configuration information associated with elements of a computing system, a second data set specifying dependency information associated with the elements of the computing system, and a third data set specifying deployment constraint information associated with the elements of the computing system; generating, at an environment constructor component of the migration management system, an in-memory representation of a current configuration of the elements of the computing system by assimilating data from a plurality of tables in the first data set, the plurality of tables comprising a first table specifying a plurality of servers in the current configuration of the elements of the computing system and at least a second table specifying applications hosted by respective ones of the plurality of servers in the current configuration of the elements of the computing system; generating, at a dependency analyzer component of the migration management system, a dependency model for the current configuration of the elements of the computing system based on at least a portion of the first data set and at least a portion of the second data set, the second data set comprising dependencies between the plurality of servers in the current configuration of the elements of the computing system; generating, at a constraint builder component of the migration management system, a set of constraints based on at least a portion of the third data set, wherein the set of constraints comprises one or more bundling constraints and one or more deployment constraints, the one or more bundling constraints specifying dependencies between at least one of one or more servers and one or more applications, the one or more deployment constraints specifying one or more temporal constraints associated with migrating specified ones of the servers and one or more ordering constraints associated with migrating specified ones of the servers; wherein generating the set of constraints comprises invoking a constraint application programming interface to initialize the set of constraints, the third data set being obtained at least in part by specification of one or more of the set of constraints via the constraint application programming interface, and wherein the third data set is isolated from the first data set and the second data set such that the third data set is modifiable via the constraint application programming interface without affecting the first data set and the second data set; generating a set of validated constraints, wherein generating the set of validated constraints comprises identifying, at a constraint checker component of the migration management system, one or more conflicting ones of the set of constraints utilizing the dependency model and the in-memory representation of the current configuration of the elements of the computing system; automatically generating, by a joint plan generator of the migration management system, a migration plan for migrating one or more of the elements of the computing system based on the set of validated constraints, the migration plan comprising a schedule for migrating two or more different bundles of servers in the current configuration of the elements of the computing system at different times, each bundle comprising a set of the plurality of servers in the current configuration of the elements of the computing system that is identified based on the deployment constraints and the bundling constraints; and responsive to modifying the third data set via the constraint application programming interface, the joint plan generator is configured to automatically generate a modified migration plan; wherein the method is performed by at least one processing device configured to implement the migration management system for automatically generating the migration plan such that at least a portion of the elements of the computing system are deployed in accordance with the generated migration plan. |
20070250650 | 11399271 | 0 | 1. A method of enabling input into a handheld electronic device of a type including an input apparatus, an output apparatus, and a processor apparatus comprising a memory having stored therein a plurality of objects including a plurality of language objects and a number of contextual values, at least some of the language objects each having associated therewith at least a first contextual value, the input apparatus including a plurality of input members, at least some of the input members each having a plurality of linguistic elements assigned thereto, the method comprising: detecting a first input; outputting as a first output an interpretations of the first input; detecting as a second input an ambiguous input that comprises a number of input member actuations; outputting at least a portion of each of a first language object and a second language object as proposed interpretations of the ambiguous input, the at least a portion of the first language object being output at a position of preference with respect to the at least a portion of the second language object; detecting a selection of the at least a portion of the second language object; detecting another first input; outputting as another first output an interpretations of the another first input, the first output and the another first output being the same; detecting as another second input another ambiguous input that comprises another number of input member actuations; outputting at least a portion of each of another first language object and another second language object as proposed interpretations of the another ambiguous input, the at least a portion of the another first language object being output at a position of preference with respect to the at least a portion of the another second language object, the second language object and the another second language object being the same; detecting a selection of the at least a portion of the another second language object and, responsive thereto: storing at least one of a representation of the another first input and a representation of the another first output as a contextual value, associating the contextual value with the another second language object. |
20120109633 | 12913667 | 0 | 1. A computer-executable method of diacritizing a text, the method comprising: analyzing the text to determine whether the text requires at least one diacritical mark, wherein the at least one diacritical mark is from a set of diacritical marks, the text comprises a plurality of characters associated with an Arabic language; and applying a diacritical mark of the set of diacritical marks on each character of the plurality of characters based on a context associated with the text to obtain a diacritized text. |
9626190 | 12900124 | 1 | 1. A method, comprising: mapping a first set of architected registers defined by a first instruction set to a memory outside of a plurality of physical registers, wherein the plurality of physical registers are configured to map to the first set of architected registers, a second set of architected registers defined by a second instruction set, and a set of rename registers, wherein the first set of architected registers are initially mapped to a cache memory outside of the plurality of physical registers; adding the physical registers corresponding to the first set of architected registers to the set of rename registers in response to said mapping; and remapping the first set of architected registers to the physical registers in response to demand usage associated with instructions from the first instructions set. |
20100325551 | 12814057 | 0 | 1. A system for bandwidth management in a communications network, the communication network having a plurality of network conditions and including connections with a plurality of service-specific bandwidth managers, the system comprising: a high-level bandwidth manager comprising at least one user interface and using the at least one user interface to provide user operation to control a plurality of service-specific bandwidth managers; a control interface to each of the service-specific bandwidth managers, each control interface providing an ability for the high-level bandwidth manager to control at least one aspect of the associated service-specific bandwidth managers, each service-specific bandwidth managers affecting at least one associated network condition; and at least one observation reporting element associated with each of the service-specific bandwidth managers, each observation reporting element providing associated ongoing observation information to the high-level bandwidth manager, associated ongoing observation information responsive to at least one network condition affected by the associated service-specific bandwidth manager; wherein the at least one element of outgoing control information is conveyed to at least one of the service-specific bandwidth managers using the associated control interface. |
20090299991 | 12130629 | 0 | 1. A computer-implemented method, comprising: receiving from a user a query including one or more current search terms; executing the query against a target database; when the executing of the query yields a number of results at least reaching a current search threshold, presenting the results; when the executing of the query yields a number of results less than the current search threshold, comparing the current search terms of the query against an associations database, wherein the associations database includes: search terms for a plurality of previously-executed queries, wherein each of the previously-executed queries yielded less than a threshold number of results and the previously-executed query was modified to generate a successful query yielding at least the threshold number of results; and associations between the search terms in the previously-executed queries and replacement search terms used in modifying the previously-executed queries to generate the successful query; upon finding a match between one or more of the search terms and the current search terms, using the associations between the search terms and the replacement search terms to identify one or more suggested replacement search terms for the one or more of the current search terms; presenting the one or more suggested replacement search terms to the user; and allowing the user to select one or more of the one or more suggested replacement terms to generate a new search. |
8339404 | 12323572 | 1 | 1. A method, executable on a digital computer that includes a central processing unit (CPU) and a graphics processing unit (GPU), for executing a series of instructions, comprising the actions of: a. defining a GPU data type and designating at least one data unit with the GPU data type; b. executing a series of instructions on the central processing unit; c. determining that a first unit of instruction code, included in the series of instructions, will be scheduled to operate on a GPU data type-designated data unit within a predetermined number of cycles; d. when the GPU includes a second unit of instruction code that includes a function that corresponds to the first unit of instruction code, causing the GPU data type-designated data unit to be operated on by the GPU employing the second unit of instruction code and causing the GPU data type-designated data unit to be operated on by the CPU employing the first unit of instruction code when the GPU does not include a second unit of instruction code that includes a function that corresponds to the first unit of instruction code; and e. executing the second unit of instruction code on the graphics processing unit. |
9086964 | 14302397 | 1 | 1. A method for updating content data for a plurality of user devices, the method comprises: when content data has been updated: dispersed storage error encoding updated content of the content data to produce a plurality of sets of encoded updated content data slices, wherein the updated content includes at least one of: a portion of content data that is edited, new data that is added to the content data, and a segment of the content data that is deleted, wherein updated content data includes the updated content and unaltered portions of the content data; storing the plurality of sets of encoded updated content data slices in storage units of a dispersed storage network (DSN); and updating an entry in a content data directory regarding the content data to combine DSN addressing information for the plurality of sets of encoded updated content data slices with DSN addressing information of a plurality of encoded unaltered content data slices regarding the unaltered portions of the content data to produce an updated entry; and for accessing the updated content data by the plurality of user devices: receiving, from a user device of the plurality of user devices, a read request for the content data; when the read request is valid, accessing the updated entry to obtain the DSN addressing information for the plurality of sets of encoded updated content data slices and the DSN addressing information of the plurality of encoded unaltered content data slices; receiving, by the user device, a decode threshold number of encoded data slices for each set of the plurality of sets of encoded updated content data slices and the plurality of encoded unaltered content data slices; and dispersed storage error decoding, by the user device, the decode threshold number of encoded data slices for each set of the plurality of sets of encoded updated content data slices and the plurality of encoded unaltered content data slices to recover the updated content data. |
20070220074 | 11585658 | 0 | 1. A circuit for calculating a discriminating function with successive iterations and with a work register on data divided into blocks, comprising: a single operator in wired logic for executing the function; a plurality of work registers sharing said operator, each register storing a current state of the operator and the rank of the corresponding iteration; and an element for selecting one of the work registers to be associated with the operator. |
20090199210 | 12012941 | 0 | 1. A computer implemented method comprising: receiving a web service call indicating a beginning of a database transaction from a client; creating a database transaction in response to the web service call indicating the beginning of the database transaction; receiving subsequent web service calls from the client; for each subsequent web service call, associating a corresponding web service call with the database transaction, and performing the corresponding web service call; and terminating the database transaction upon committing or rolling back data resulting from the subsequent web service calls. |
9092408 | 12184938 | 1 | 1. A method for dependency processing of computer files, the method comprising: receiving a data stream input at a scanner component that scans the data stream input to identify data types that are used by program elements in the data stream input, the data stream input representing a plurality of program elements of one or more computer files; using the scanner component to identify type usages of the program elements, each type usage identifying a usage of a corresponding data type that classifies data structures of the program elements in accordance with a corresponding type definition; generating a data stream comprising the type definitions and type usages corresponding to the program elements; providing the data stream comprising the type definitions and type usages as an input to a listening component, wherein the listening component performs one of the listening functions comprising: filtering the type definition and type usage data by evaluating a filter condition that filters out certain type definitions and type usages to produce a filtered data stream output in which the certain type definitions and type usages have been filtered out, aggregating type usage data for one or more type definitions by collecting the type usages for the data types to produce an aggregated data stream output in which the type usages from multiple occurrences of the data types are combined, or echoing the type definitions and type usages for access by one or more users or processors by identifying a print format associated with the one or more users or processors to produce an echoed data stream output that includes the type definitions and type usages in the print format; and generating an output from the listening component. |
9235514 | 13736254 | 1 | 1. A method for operating a cache, comprising: in a prediction mechanism, performing operations for: performing a lookup in each table in a hierarchy of lookup tables in parallel to determine if a memory request is predicted to be a hit in the cache, each table in the hierarchy comprising predictions whether memory requests to corresponding regions of a main memory will hit in the cache, each of the regions in a given table including a corresponding number of addresses in the main memory, wherein the regions include a smaller number of addresses in the main memory for each table lower in the hierarchy. |
8533673 | 12052601 | 1 | 1. A method for creating a software program that integrates multiple programming languages, the method comprising: adding computer code written in a host language to a source code file, the source code file being stored on a computer-readable storage medium; adding inset computer code to the source code file, the inset computer code being written in a domain specific language that is different from the host language; and providing a domain specific language specification that comprises instructions written in the host language for executing the inset computer code in accordance with the domain specific language, the inset computer code being executed by relating tokens that include strings of characters from the domain specific language to corresponding tokens that include strings of characters from the host language and relating at least one grammatical rule for operations on tokens from the domain specific language to at least one corresponding grammatical rule for operations on tokens from the host language. |
9015097 | 13720437 | 1 | 1. A method comprising: retrieving, from a memory, a global structure and a plurality of candidate answers therein; computing a first probability of a candidate answer based on a local structure of the candidate answer within the global structure; computing a second probability of the candidate answer based on content of the candidate answer given content of a query; computing a third probability of the candidate answer based on context of the candidate answer given the content of the query; and providing a combined probability of the candidate answer as a function of the first probability, second probability, and third probability. |
Subsets and Splits