Patent application number | Description | Published |
20130122979 | COMPUTING A TARGET SPEED IN A VIRTUAL RACING ENVIRONMENT - A target speed profile for a specified racer is computed at various points along a track. The calculation is based on the real world physics of the racing environment and incorporates physical characteristics of the track, including curvature, undulation, and/or camber. A lateral acceleration component is developed to limit the realistic maximum speed a racer may obtain at any given point along the track. Furthermore, differences in realistic maximum speeds at different points along the track can overwhelm a racer's braking capability. As such, braking capacity adjustments can be applied to decrease the maximum speed in the target speed profile, so that the overall target speed profile is more realistic and attainable. | 05-16-2013 |
20130208798 | TIMESTAMP-INDEPENDENT MOTION VECTOR PREDICTION FOR PREDICTIVE (P) AND BIDIRECTIONALLY PREDICTIVE (B) PICTURES - Methods and apparatuses are provided for achieving improved video coding efficiency through the use of Motion Vector Predictors (MVPs) for the encoding or decoding of motion parameters within the calculation of the motion information in B pictures and/or P pictures. Certain exemplary methods and apparatuses selectively apply temporal and/or spatial prediction. Rate Distortion Optimization (RDO) techniques are also applied in certain methods and apparatuses to further help improve coding efficiency. | 08-15-2013 |
20130208897 | SKELETAL MODELING FOR WORLD SPACE OBJECT SOUNDS - A method for providing three-dimensional audio includes determining a world space object position and a world space ear position of a human subject based on a modeled virtual skeleton. The method further includes providing three-dimensional audio output to the human subject via an acoustic transducer array including one or more acoustic transducers. The three-dimensional audio output is configured such that sounds appear to originate from the object. | 08-15-2013 |
20130208898 | THREE-DIMENSIONAL AUDIO SWEET SPOT FEEDBACK - A method for providing three-dimensional audio is provided. The method includes receiving a depth map imaging a scene from a depth camera and recognizing a human subject present in the scene. The human subject is modeled with a virtual skeleton comprising a plurality of joints defined with a three-dimensional position. A world space ear position of the human subject is determined based on the virtual skeleton. Furthermore, a target world space ear position of the human subject is determined. The target world space ear position is the world space position where a desired audio effect can be produced via an acoustic transducer array. The method further includes outputting a notification representing a spatial relationship between the world space ear position and the target world space ear position. | 08-15-2013 |
20130208899 | SKELETAL MODELING FOR POSITIONING VIRTUAL OBJECT SOUNDS - Providing three-dimensional audio includes determining a world space ear position of a human subject based on a modeled virtual skeleton. A world space sound source position is determined such that a spatial relationship between the world space sound source position and the world space ear position models a spatial relationship between a virtual space sound source position of a virtual space sound source and a virtual space listening position. Three-dimensional audio is output to the human subject via an acoustic transducer array including one or more acoustic transducers. The three-dimensional audio output is configured such that at the world space ear position a sound provided by a particular virtual space sound source appears to originate from a corresponding world space sound source position | 08-15-2013 |
20130208900 | DEPTH CAMERA WITH INTEGRATED THREE-DIMENSIONAL AUDIO - A three-dimensional audio system includes a depth camera and one or more acoustic transducers in the same housing. Further, the same housing also houses logic for determining a world space ear position of a human subject observed by the depth camera. The logic also determines one or more audio-output transformations based on the world space ear position. The one or more audio-output transformations are configured to produce a three-dimensional audio output configured to provide a desired audio effect at the world space ear position. | 08-15-2013 |
20130208901 | QUANTIZATION MATRICES FOR DIGITAL AUDIO - Quantization matrices facilitate digital audio encoding and decoding. An audio encoder generates and compresses quantization matrices; an audio decoder decompresses and applies the quantization matrices. The invention includes several techniques and tools, which can be used in combination or separately. For example, the audio encoder can generate quantization matrices from critical band patterns for blocks of audio data. The encoder can compute the quantization matrices directly from the critical band patterns, which can be computed from the same audio data that is being compressed. The audio encoder/decoder can use different modes for generating/applying quantization matrices depending on the coding channel mode of multi-channel audio data. The audio encoder/decoder can use different compression/decompression modes for the quantization matrices, including a parametric compression/decompression mode. | 08-15-2013 |
20130208926 | SURROUND SOUND SIMULATION WITH VIRTUAL SKELETON MODELING - A method for providing three-dimensional audio includes determining a world space ear position of a human subject based on a modeled virtual skeleton. The method further includes providing three-dimensional audio output to the human subject via an acoustic transducer array including one or more acoustic transducers. The three-dimensional audio output is configured such that channel-specific sounds appear to originate from corresponding simulated world speaker positions. | 08-15-2013 |
20130208983 | UP-SAMPLING BINARY IMAGES FOR SEGMENTATION - A method of up-sampling binary images for segmentation is described. In an embodiment, digital images are down-sampled before segmentation. The resulting initial binary segmentation, which has a lower resolution than the original image, is then up-sampled and smoothed to generate an interim non-binary solution which has a higher resolution than the initial binary segmentation. The final binary segmentation for the image is then computed from the interim non-binary solution based on a threshold. This method does not use the original image data in inferring the final binary segmentation solution from the initial binary segmentation. In an embodiment, the method may be applied to all images and in another embodiment, the method may be used for images which comprise a large number of pixels in total or in single dimension and smaller images may not be down-sampled before segmentation. | 08-15-2013 |
20130210473 | Dynamically Managing and Reconfiguring Wireless Mesh Networks - A wireless network with multiple subscriber systems in a lobe pool may operate by determining a state of the wireless network, identifying a new condition, the new condition including a new demand condition or a new network health condition, determining whether the new condition has a threshold impact on operations of the wireless network or component subscriber systems of the wireless network, and if the threshold impact exists, reconfiguring the wireless network to accommodate the new condition. | 08-15-2013 |
20130211827 | SAMPLE RATE CONVERTER WITH AUTOMATIC ANTI-ALIASING FILTER - The subject disclosure is directed towards dynamically computing anti-aliasing filter coefficients for sample rate conversion in digital audio. In one aspect, for each input-to-output sampling rate ratio (pitch) obtained, anti-aliasing filter coefficients are interpolated based upon the pitch (e.g., using the fractional part of the ratio) from two filters (coefficient sets) selected based upon the pitch (e.g., using the integer part of the ratio). The interpolation provides for fine-grained cutoff frequencies, and by re-computation for each pitch, smooth anti-aliasing with dynamically changing ratios. | 08-15-2013 |
20130212272 | Service Denial and Termination on a Wireless Network - A method and system are provided for denying an application service request, such as a Multimedia Messaging Service (MMS) request, on wireless and wireline Internet Protocol (IP) Multimedia Subsystem (IMS) networks or Session Initiation Protocol (SIP) networks. In one example, the method includes receiving a request for an application service from a user via a transport network, determining to deny the request, and providing a response corresponding to the denial of the request to the user via the transport network. | 08-15-2013 |
20130212283 | Resource Sharing in Multi-Principal Browser - Techniques for providing resource sharing in a multi-principal browser are described. Resource sharing includes managing a resource for web entity by determining how to divide the resource to share among two or more web entities based at least in part on a Document Object Model (DOM)-recursive resource allocation policy or an application-specified resource allocation policy. A web entity includes a principal instance contending for the resource. The process identifies resource allocation mechanisms from each resource type based at least in part on the DOM-recursive sharing policy or the application-specified resource allocation policy along with the resource type. | 08-15-2013 |
20130212327 | COMPOSITE SOLID STATE DRIVE IDENTIFICATION AND OPTIMIZATION TECHNOLOGIES - Technologies for an operating system identifying SSD and CSSD devices based on a corresponding descriptor, and for optimizing operating system functionalities with respect to the SSD/CSSD device. Optimizations include disabling non-SSD/CSSD functionalities, such as HDD defragmentation, and by enabling SSD/CSSD specific functionalities, such as write optimization storage functionalities. | 08-15-2013 |
20130212341 | MIX BUFFERS AND COMMAND QUEUES FOR AUDIO BLOCKS - The subject disclosure is directed towards a technology that may be used in an audio processing environment. Nodes of an audio flow graph are associated with virtual mix buffers. As the flow graph is processed, commands and virtual mix buffer data are provided to audio fixed-function processing blocks. Each virtual mix buffer is mapped to a physical mix buffer, and the associated command is executed with respect to the physical mix buffer. One physical mix buffer mix buffer may be used as an input data buffer for the audio fixed-function processing block, and another physical mix buffer as an output data buffer, for example. | 08-15-2013 |
20130212421 | USING PULSES TO CONTROL WORK INGRESS - Clock pulses of a variable speed clock are adjusted relative to system utilization. A load monitor periodically collects sensor measurements of resources and based on the sensor measurements, the load monitor adjusts the clock speed up or down. | 08-15-2013 |
20130212433 | SELF-MANAGED PROCESSING DEVICE - A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to improve performance based on the one or more performance conditions. The processing device may monitor configuration and file changes and provide a user with a capability to persist or discard configuration changes and/or file changes made by an application during a session. The processing device may include a recovery button or switch, which when selected or pressed may cause the processing device to be restored to an operational state. The processing device may automatically detect instabilities and may automatically attempt to repair possible causes of the instabilities. The processing device may also include an additional chipset, which may perform backup and recovery services. | 08-15-2013 |
20130212457 | Creating and Inserting Links by Drag and Drop - A user interface is provided. The user interface may include a first portion and a second portion. The first portion may contain one or more listings corresponding to one or more entities. The second portion may include an editable surface for viewing and editing the entities. A command to drag and drop a listing corresponding to a first entity from the first portion displaying the listing into the second portion displaying a second entity is received. In response to receiving the command to drag and drop the listing from the first portion into the second portion, a link to the first entity is inserted into the second entity. | 08-15-2013 |
20130212590 | LOCK RESOLUTION FOR DISTRIBUTED DURABLE INSTANCES - A command log selectively logs commands that have the potential to create conflicts based on instance locks. Lock times can be used to distinguish cases where the instance is locked by the application host at a previous logical time from cases where the instance is concurrently locked by the application host through a different name. A logical command clock is also maintained for commands issued by the application host to a state persistence system, with introspection to determine which issued commands may potentially take a lock. The command processor can resolve conflicts by pausing command execution until the effects of potentially conflicting locking commands become visible and examining the lock time to distinguish among copies of a persisted state storage location. | 08-15-2013 |
20130212600 | CONSTRAINED MODE FOR RUNNING APPLICATIONS - The subject disclosure is directed towards a technology in which a game console or mobile device is able to run applications in parallel in different running modes/states. In a constrained running mode, an application has reduced resources available to the application relative to resources available to an application that is run in full running mode. Also described is transitioning between the running modes/states, as well as to and from other states. | 08-15-2013 |
20130212652 | DEVICE AUTHENTICATION WITHIN DEPLOYABLE COMPUTING ENVIRONMENT - A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g., user identification ticket). | 08-15-2013 |
20130212695 | SEGMENTED MEDIA CONTENT RIGHTS MANAGEMENT - Segmented media content rights management is described. A media device can receive segments of protected media content from media content streams that each include a different version of the protected media content. A media content file can be generated to include the segments of the protected media content that are sequenced to render the protected media content for viewing. A file header object can be instantiated in a file header of the media content file, where the file header object includes DRM-associated features, such as one or more DRM licenses, properties, and/or attributes that correspond to the media content file to provision all of the segments of the protected media content together. | 08-15-2013 |
20130215086 | INFRARED SENSOR INTEGRATED IN A TOUCH PANEL - An infrared source is configured to illuminate the underside of one or more objects on or above a touchable surface of a touch panel. Infrared light reflected from the underside of the object(s) is detected by an infrared sensor integrated in the touch panel below the touchable surface. | 08-22-2013 |
20130215971 | REDUCING DC LEAKAGE IN HD PHOTO TRANSFORM - In certain embodiments, to eliminate DC leakage into surrounding AC values, scaling stage within a photo overlap transform operator is modified such that the off-diagonal elements of the associated scaling matrix have the values of 0. In certain embodiments, the on-diagonal scaling matrix are given the values (0.5, 2). In some embodiments, the scaling is performed using a combination of reversible modulo arithmetic and lifting steps. In yet other embodiments, amount of DC leakage is estimated at the encoder, and preprocessing occurs to mitigate amount of leakage, with the bitstream signaling that preprocessing has occurred. A decoder may then read the signal and use the information to mitigate DC leakage. | 08-22-2013 |
20130215977 | SCALABLE MULTI-THREAD VIDEO DECODING - Decoding tasks are identified for decoding encoded video. Decoding tasks may include entropy decoding tasks, motion compensation tasks, inverse frequency transform tasks, inverse quantization tasks, intra decoding tasks, loop filtering tasks, or other tasks. Task dependencies are identified for the video decoding tasks. For example, one or more decoding tasks may depend on prior completion of entropy decoding tasks. The decoding tasks are prioritized based at least in part on the task dependencies. For example, a higher priority may be assigned to tasks that must be completed before other tasks that depend on them can begin. Prioritized decoding tasks are selected to be performed by hardware threads. For example, a first hardware thread may perform a first decoding task that does not depend on any uncompleted tasks while a second hardware thread performs a second decoding task that does not depend on any uncompleted tasks. | 08-22-2013 |
20130216066 | AUDIO SUBMIX MANAGEMENT - Described herein are one or more implementations offering a centralized (e.g., single-point) user-interface, where a user may manipulate audio properties (e.g., volume level) for one or more audio submixes produced by each of multiple active operating-system processes. | 08-22-2013 |
20130216081 | ADJUSTABLE EARPHONE AND EARPHONE SET - An earphone comprises an inner shell, a stem and a pivot connection. The inner shell has a generally circular periphery shaped to at least partially fit in a user's concha. The stem is mounted to the inner shell at a position spaced from a rotational center of the inner shell and supports a wire leading to the inner shell. The inner shell and the stem are rotatable relative to each other by the pivot connection to configure the earphone to fit the user's ear with the shell member positioned at least partially in the user's concha and the stem positioned exteriorly along an intertragic notch of the ear. | 08-22-2013 |
20130216127 | IMAGE SEGMENTATION USING REDUCED FOREGROUND TRAINING DATA - Methods of image segmentation using reduced foreground training data are described. In an embodiment, the foreground and background training data for use in segmentation of an image is determined by optimization of a modified energy function. The modified energy function is the energy function used in image segmentation with an additional term comprising a scalar value. The optimization is performed for different values of the scalar to produce multiple initial segmentations and one of these segmentations is selected based on pre-defined criteria. The training data is then used in segmenting the image. In other embodiments further methods are described: one places an ellipse inside the user-defined bounding box to define the background training data and another uses a comparison of properties of neighboring image elements, where one is outside the user-defined bounding box, to reduce the foreground training data. | 08-22-2013 |
20130216205 | AUTOMATED STORY GENERATION - Automatic story production is implemented by the utilization of theme scripts with user assets to generate a quality finished product with minimum user input or direction. A user chooses a predesigned theme script to be applied to the user's assets to automatically create a story with a particular look and feel. Metadata and feature information, when available, is automatically gathered from the user assets to personalize the generated story. A user can include additional information and/or alter any aspect of the generated story to further personalize the resultant finished product. | 08-22-2013 |
20130217357 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 08-22-2013 |
20130217416 | CLIENT CHECK-IN - Client check-in techniques are described. In embodiments thereof, a mobile device includes a communication interface for notification communication with one or more other devices associated with the mobile device. The mobile device has a selectable control for user selection to initiate a check-in notification that indicates a location of the mobile device and a timestamp of the date and time. The mobile device also includes a check-in service that is implemented to initiate communication of the check-in notification to the other associated devices responsive to a user selection to initiate the check-in notification. | 08-22-2013 |
20130218574 | Management and Prioritization of Processing Multiple Requests - Systems and methods are described for systems that utilize an interaction manager to manage interactions—also known as requests or dialogues—from one or more applications. The interactions are managed properly even if multiple applications use different grammars. The interaction manager maintains a priority for each of the interactions, such as via an interaction list, where the priority of the interactions corresponds to an order in which the interactions are to be processed. Interactions are normally processed in the order in which they are received. However, the systems and method described herein may provide a grace period after processing a first interaction and before processing a second interaction. If a third interaction that is chained to the first interaction is received during this grace period, then the third interaction may be processed before the second interaction. | 08-22-2013 |
20130218709 | MULTIPARTY COMPUTER-ASSISTED HAGGLING - The claimed subject matter relates to a computer-implemented architecture that can facilitate computer-assisted haggling and/or negotiation between multiple parties simultaneously. For example, various proxies associated with both buyers and sellers can be configured to negotiate with other proxies to buy or sell an item. The negotiations can be required to be progressive and during the negotiations a buyer or seller is, typically, allowed to withdraw his or her proposals. The architecture can include a registration component that can resolve concurrency and facilitate a registration of an agreement between two of the parties. The registration of an agreement can create a binding obligation between the parties after which other outstanding proposals can be terminated. | 08-22-2013 |
20130218824 | Action Prediction and Identification of User Behavior - User behavior modeling can include determining actions performed by various users. From the mined user actions, future actions can be predicted. Certain implementations include providing information and/or services based on the predicted future actions. Some implementations, include providing relevant information, services, and/or goods regarding the predicted future action. | 08-22-2013 |
20130219058 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 08-22-2013 |
20130219291 | PROVIDING ELECTRONIC DISTRIBUTION OF FILTERED CALENDARS - Systems and methods are disclosed for providing electronic distribution of filtered calendars. The disclosed systems and methods may include receiving control data. The control data may be configured to indicate a portion of master calendar data a user designates to transmit. Furthermore, the disclosed systems and methods may include filtering the master calendar data based on the control data to create filtered calendar data and transmitting the filtered calendar data. | 08-22-2013 |
20130219301 | RICH PROFILE COMMUNICATION WITH NOTIFICATIONS - A rich communication profile system with notifications. The system is a feedback mechanism that utilizes rich content, e.g., multimedia content, as one or more indicators that represent the status of a remote user. The system includes a state component that receives information relating to state of at least one entity. A notifications component dynamically renders at least one personalized graphical indicia representative of the entity's state. The entity can be a person, group of people, component, place, and object. | 08-22-2013 |
20130219366 | STEPPING AND APPLICATION STATE VIEWING BETWEEN POINTS - Various technologies and techniques are disclosed for providing stepping and state viewing in a debugger application. A start and end breakpoint are assigned, Source code execution begins, and upon reaching the start breakpoint, a logging feature begins storing one or more values that may be impacted upon execution of code between the start breakpoint and an end breakpoint. More lines of source code are executed until the end breakpoint is reached. When the end breakpoint is reached, the debugger is put into break mode. While in break mode, a playback feature is provided to allow a user to play back a path of execution that occurred between the start breakpoint and the end breakpoint. The playback feature uses at least some of the values that were stored with the logging feature to show how each referenced variable changed in value. | 08-22-2013 |
20130219523 | SELECTIVELY EXPOSING BASE CLASS LIBRARIES BASED ON APPLICATION EXECUTION CONTEXT - Allowing access to APIs based on application context. A method includes determining an application context for an application. A layer is determined for a base class library. Layers of the base class library are defined by one or more developer defined attributes associated with an API, where the API is included in the base class library. The base class library is divided into layers based on the developer defined attributes. The one or more attributes define which application contexts can access the API. If the layer matches the application context then access by the application to the API is allowed. | 08-22-2013 |
20130222517 | PERIPHERAL DEVICE FOR COMMUNICATION OVER A COMMUNICATIONS SYSTEM - A method and corresponding system for communicating over a network using a first device and a peripheral device, wherein the first device comprises a user interface and a network interface for connecting to the network, and the peripheral device has a local connection to the first device, the local connection being independent of the network. The method comprises receiving data packets from the network at the network interface of the first device and forwarding the received data packets from the first device to the peripheral device via the local connection. A client engine of a communication client, executed on a processor of the peripheral device, processes the received data packets. The peripheral device sends processed data packets to the first device via the local connection such that data contained in the received data packets is displayed on the first device using the user interface of the first device. | 08-29-2013 |
20130223262 | DYNAMIC CHANNEL AND TRANSMISSION RATE SELECTION - Dynamic channel and transmission rate selection is described. In an example, a communication resource for transmitting data to a receiver is selected from several channels, each having several associated rates. The selection comprises storing a weighting factor for each channel/rate combination, monitoring transmission performance on a selected channel and rate, and inferring performance for other rates on the selected channel from the monitored performance. Each weighting factor is then updated using the monitored and inferred performances, and used to select a channel/rate combination for subsequent transmission. In another example, a communication device comprises a transmitter, a processor, and a memory arranged to store a weighting factor associated with each receiver, channel and rate combination. The transmitter sends data to a receiver using one channel and rate, and the processor monitors the performance, updates the weighting factors accordingly, and selects a receiver, channel and rate combination for subsequent transmission. | 08-29-2013 |
20130223533 | VIDEO CODING - Improved video coding is described to encode video data within a sequence of video frames. To this end, at least a portion of a reference frame is encoded to include motion information associated with the portion of the reference frame. At least a portion of a predictable frame that includes video data predictively correlated to said portion of said reference frame is defined based on the motion information. At least said portion of the predictable frame is encoded without including corresponding motion information and including mode identifying data. The mode identifying data indicate that the encoded portion of the predictable frame can be directly derived using at least the motion information associated with the portion of the reference frame. | 08-29-2013 |
20130223754 | Removing Blur from an Image - Embodiments related to the removal of blur from an image are disclosed. One disclosed embodiment provides a method of performing an iterative non-blind deconvolution of a blurred image to form an updated image. The method comprises downsampling the blurred image to form a blurred image pyramid comprising images of two or more different resolution scales, downsampling a blur kernel to form a blur kernel pyramid comprising kernels of two or more different sizes, and deconvoluting a selected image in the blurred image pyramid according to a Richardson-Lucy deconvolution process in which a bilateral range/spatial filter is employed. | 08-29-2013 |
20130225151 | MOBILE DEVICE PARENTAL CONTROL - In implementations of mobile device parental control, a controlling device includes a communication interface for control communication with one or more associated devices of the controlling device, and the associated devices correspond to members of a group. An integrated display device displays a parental control user interface. A parental control service is implemented to receive an input of a device control via the parental control user interface, where the device control is initiated for one or more of the associated devices that are controllable by the controlling device. The parental control service can then initiate communication of the device control to the associated devices that are controlled by the controlling device. | 08-29-2013 |
20130225152 | AUTOMATICALLY QUIETING MOBILE DEVICES - In implementations of automatically quieting mobile devices, a mobile device includes a communication interface for communicating with other devices that are associated with the mobile device, and the other devices correspond to respective users of the devices. A device quiet service is implemented to initiate a device quiet control that quiets one or more of the other associated devices that are controllable by the mobile device, and the device quiet service initiates communication of the device quiet control to the associated devices. A device quiet control can be initiated to restrict communication functions of the other associated devices, such as for a designated time duration. Alternatively or in addition, a device quiet control can quiet the other associated devices at a designated location, during an event, within a designated quiet zone, and/or quiet the associated devices that are proximate the mobile device at a location. | 08-29-2013 |
20130226552 | CREATION AND USE OF VIRTUAL DEVICE DRIVERS ON A SERIAL BUS - A node on a serial bus, preferably a device such as a personal computer (PC), can emulate other devices using virtual device drivers. A PC connected to a 1394 bus exposes its CROM on the bus which presents an image to other nodes on the 1394 bus and describes the functional units supported by the node. The CROM can be changed dynamically by adding unit directories to the CROM detailing peripherals connected to the PC. The PC can then be enumerated as the connected device by other PCs on the bus. The PC can emulate or morph itself into any desired device or even multiple devices at the same time. The invention also allows a PC to create devices that don't yet exist on the bus. The invention allows a user to create virtual device objects with device properties to have just in case a user plugs the particular device in to the PC. | 08-29-2013 |
20130226874 | ITEM LEVEL RECOVERY - A backup and restore system may present recovered backup data as local resources and in a read and write manner so that the recovered backup data may be accessed using an application that created the data. In some embodiments, the recovered data may be read only data, but a differencing virtual hard disk (VHD), Common Internet File System protocol, or differencing driver may be used to present a read/write version of the data. Additionally, the data may be presented using iSCSI or other technologies to present the data as local data, even though the data may be remotely located. The backup and restore system may additionally use VHD differencing technologies to create multiple backups. | 08-29-2013 |
20130226973 | ONLINE DATABASE AVAILABILITY DURING UPGRADE - An online service includes databases that are upgraded while still processing requests. For example, web servers continue to request operations on the database while it is being upgraded. The schema of the database is upgraded before the web servers are upgraded to utilize the upgraded schema. Changes that are made to the upgraded schema are backwards compatible with the schema being used during the upgrade process. Restrictions are placed on the operations performed on the database during the upgrade process. After upgrading the schema, the web servers of the online service are upgraded to use the upgraded schema. | 08-29-2013 |
20130227314 | INTEGRATING ENERGY BUDGETS FOR POWER MANAGEMENT - Power consumption of a device (e.g., flash storage driver, hard drive, etc.) connected to a host computer system is managed to promote efficient power usage and improved service. Communication between a host computer system (e.g., an operating system) and a device is enabled so that the host system can ascertain a power footprint of the device. Taking the power footprint of the device into consideration, along with the power consumption of the system as a whole (e.g., including the power consumption needs of other devices), a power manager can provide a power budget to the device based upon an informed decision. This allows for improved system power management through a coordination of the device's power consumption by the host system, specifically during operation allowing device performance to be enhanced for the task at hand. | 08-29-2013 |
20130227451 | SELECTIVE ENABLING OF MULTI-INPUT CONTROLS - A control system is disclosed that is configurable (e.g., by a programmer) so as to enable input from multiple sources to capture to multiple controls. Also or alternatively, the system is configurable so as to enable input from multiple sources to capture to a single control. The system also provides a consistent and extendable scheme for filtering out conflicting events for individual controls. In one embodiment, this means that the system is configurable (e.g., based on the programmer's asserted preferences) so as to enable a selective determination as to whether additional inputs can be captured for a given control. | 08-29-2013 |
20130227466 | MANAGING INPUTS FROM A PLURALITY OF USER INPUT DEVICE ACTUATORS - A computing device and method for managing inputs from a plurality of user input device actuators are provided. The computing device may include code stored in memory for implementing, via a processor, an actuator input module configured to receive a first actuator input from a first user input device actuator, and a second actuator input from a second user input device actuator. The computing device may further execute code to implement a window selection module configured to select a first selected window to which the first actuator input is sent according to predetermined selection rules, to select a second selected window to which the second actuator input is sent according to the predetermined selection rules, and to send the first actuator input to the first selected window and to send the second actuator input to the second selected window. | 08-29-2013 |
20130227539 | UPDATING APPLICATIONS - Portions of an application can be delivered through a network without having to download the entire application. When an application is installed, HTML, CSS and javascripts or other User Interface (UI) files can be copied into local cache. A version number can also be stored with this code, so that when the application is launched, a web service checks the latest version on a server computer. If the latest version differs from the cached version, then an update is needed. New UI files can then be downloaded to the local cache. The local cache can be a folder that is used by the application, wherein the folder is stored on a hard drive of the client device. Binaries associated with the application can be stored in a different folder. | 08-29-2013 |
20130227545 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 08-29-2013 |
20130227546 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 08-29-2013 |
20130227548 | PACKAGE DESIGN AND GENERATION - Solution packages for a product for deployment on a collection of servers can be designed using one or more designers that provide user interfaces for visually arranging and configuring elements of the product. A package object model includes a managed object model that represents a package or feature manifest as defined by a product manifest XML schema. The object model can be used to create references to other project item and feature definitions. The extended object model can be used to generate an equivalent package or feature manifest XML file. | 08-29-2013 |
20130227571 | VIRTUAL MACHINE AND/OR MULTI-LEVEL SCHEDULING SUPPORT ON SYSTEMS WITH ASYMMETRIC PROCESSOR CORES - Different processor cores in a computing device can support different features. In one or more embodiments, the features supported by each of multiple physical processor cores of a computing device are identified. A set of one or more features of the multiple physical processor cores to make available to virtual processor cores of the virtual machine are determined based at least in part on both the one or more features supported by each of the multiple physical processor cores and a number of virtual processor cores of the virtual machine. In additional embodiments, a multi-level scheduling model is used. An operating system level scheduler of an operating system schedules multiple applications for execution on multiple processor cores, and a user level scheduler of an application schedules application threads of that application for execution on one or more of the multiple processor cores. | 08-29-2013 |
20130275495 | Systems and Methods for Managing Multimedia Operations in Remote Sessions - Techniques relating to managing multimedia transmissions in terminal services scenarios are described. In an example, a method sends a user-interface component from a server to a remote client. The exemplary method further streams a media component for presentation on the remote client in combination with the user-interface component and wherein the media presentation is tracked but not displayed by the server. | 10-17-2013 |
20130275797 | DERIVING ACCURATE MEDIA POSITION INFORMATION - Various embodiments utilize different counters or clocks, working in concert, to smooth out position information that is derived for a rendering/capturing device. Specifically, in at least some embodiments, each counter or clock has a different speed. A faster counter or clock is used to determine intra-transition position offsets relative to a slower counter or clock. | 10-17-2013 |
20130283215 | APPLICATION DISPLAY ON A LOCKED DEVICE - A user request to display an application while the device is locked is received. In response to this user request, one or more images generated by the application are obtained and displayed while the device is locked. Additionally, an indication of an application to be displayed upon resuming operation from a power-saving mode can be received, and an image generated by the application is displayed in response to resuming operation from the power-saving mode. | 10-24-2013 |
20130290446 | Reactive Avatars - Avatars are used to graphically represent users in a communications session, and the avatars are capable of being animated. An indication of an animation of one of the avatars is received. Another avatar that represents another of the users is animated in response to, and based on, the animation of the avatar in the same communications session. | 10-31-2013 |
20130295913 | MOBILE DEVICES CONTROL - In embodiments of mobile devices control, a mobile device includes a communication interface for control communication with associated devices of the mobile device, and the associated devices correspond to members of a private interaction hub. A device control service is implemented to determine that the mobile device is moving in a vehicle based on motion data, and can generate a device quiet control to restrict at least audible outputs from one or more of the associated devices that are in the vehicle with the mobile device. The device control service can then initiate communication of the device quiet control to the associated devices in the vehicle to quiet the associated devices that are controllable from the mobile device. | 11-07-2013 |
20130297559 | STRUCTURED COAUTHORING - A system is presented for structured coauthoring of a document, the system comprising a server. The server includes one or more documents organized into sections, a document permissions module that stores user access permissions for each section of a document, a document update processing module that processes requests from a user to share document updates with other users and that processes requests from a user to receive document updates from other users and a document rendering module that renders a document for display on a client so that sections of the document are updated with shared document updates made by users. The user access permissions determine the extent to which a user can modify each section of the document. | 11-07-2013 |
20130301606 | LOAD AWARE RESOURCE ALLOCATION IN WIRELESS NETWORKS - A technique for resource allocation in a wireless network (for example, an access point type wireless network), which supports concurrent communication on a band of channels, is provided. The technique includes accepting connectivity information for the network that supports concurrent communication on the band of channels. A conflict graph is generated from the connectivity information. The generated conflict graph models concurrent communication on the band of channels. A linear programming approach, which incorporates information form the conflict graph and rate requirements for nodes of the network, can be utilized to maximize throughput of the network. | 11-14-2013 |
20130305319 | HUB KEY SERVICE - In embodiments of a hub key service, a device includes a communication interface for communication coordination with one or more associated devices of the device, and the associated devices correspond to hub members. A hub manager is implemented to generate an electronic key that includes access permissions, which are configurable to enable controlled access for the hub members, such as to a building, vehicle, media device, or location. The hub manager can then correlate the electronic key with the device to enable access to the building, vehicle, media device, or location with the device utilized as the electronic key. | 11-14-2013 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 11-14-2013 |
20130307673 | RFID DEVICE GROUPS - The claimed subject matter provides a system and/or a method that facilitates configuring at least one radio frequency identification (RFID) device. An RFID network can include at least one device associated with a device group, wherein the device group corresponds to a characteristic. An organizational manager can uniformly configure the at least one device based at least in part upon membership of the device group. | 11-21-2013 |
20130311734 | DATA COPY MANAGEMENT FOR FASTER READS - Multiple copy sets of data are maintained on one or more storage devices. Each copy set includes at least some of the same data units as other sets. Different sets optionally have data units stored in different orders on the storage device(s). A particular one of the sets of data is selected as the set to be accessed in response to detecting a particular scenario. | 11-21-2013 |
20130311908 | Indication of Delayed Content Output in a User Interface - Indication of delayed content output is described. In an implementation, content is output for display as a user interface having one or more selectable elements. When a cursor is positioned proximally to one of the selectable elements, a graphical symbol is output in the user interface that indicates a delay of a user-specified amount of time before additional content is displayed. | 11-21-2013 |
20130312000 | ORCHESTRATING COMPETING ACTIVITIES FOR SCHEDULING ACTIONS OF MULTIPLE NODES IN A DISTRIBUTED ENVIRONMENT - Automatic programming, scheduling, and control of planned activities at “worker nodes” in a distributed environment are provided by a “real-time self tuner” (RTST). The RTST provides self-tuning of controlled interoperation among an interconnected set of distributed components (i.e., worker nodes) including, for example, home appliances, security systems, lighting, sensor networks, medical electronic devices, wearable computers, robotics, industrial controls, wireless communication systems, audio nets, distributed computers, toys, games, etc. The RTST acts as a centralized “planner” that is either one of the nodes or a dedicated computing device. A set of protocols allow applications to communicate with the nodes, and allow one or more nodes to communicate with each other. Self-tuning of the interoperation and scheduling of tasks to be performed at each node uses an on-line sampling driven statistical model and predefined node “behavior patterns” to predict and manage resource requirements needed by each node for completing assigned tasks. | 11-21-2013 |
20130317947 | TRAVEL INFORMATION DEPARTURE DATE/DURATION GRID - A method and system for presenting travel information in a way that facilitates identifying travel plans that satisfy objectives is provided. A travel information system collects travel information for the travel items on various observation dates including the current date and presents the travel information to a user in a way that facilitates travel planning and travel shopping. The travel information system stores the travel information in an observation store. To provide travel information that satisfies a search criterion, the travel information system retrieves the travel information that satisfies the search criterion either from flight information of the observation store or from current flight information provided in real time from a source of travel information. The flight information system provides the travel information in various formats to facilitate travel planning. These formats include a fare history graph, an interval grid, a route map, a future fare graph, and/or a departure date/duration grid. | 11-28-2013 |
20130318032 | EMBEDDING AND RETRIEVING DATA IN AN APPLICATION FILE FORMAT - Third party data embedding may be provided. Data associated with a third party provider may be saved in a native application save file. If a save file opened by the application is determined to comprise third party data, the application may determine whether an appropriate data provider is available. The application may connect to the data provider and provide on-demand, asynchronous access to the third party data upon request from a user. | 11-28-2013 |
20130339344 | WEB-SCALE ENTITY RELATIONSHIP EXTRACTION - Techniques for displaying a relationship graph are described herein. In one example, a search term may be used to obtain a plurality of documents from a network, such as the Internet. A plurality of entities, and relationships between at least some of those entities, may be extracted from the documents. In an example user interface, representations of a plurality of entities may be displayed, such as by shapes (e.g., circles) labeled to identify people or organizations. Edges (e.g., lines) may be used to connect different representations of entities and to thereby indicate a relationship between the connected entities. In a particular example, input from movement of a cursor over an edge may result in display of a description of a relationship between the connected entities. In a further particular example, size of each entity may be related to a number of connections each has with others. | 12-19-2013 |
20140019956 | Packaging Content Updates - Aspects of the present disclosure are directed to obtaining user feedback and causing a package of content updates to be created and distributed based on the received feedback. In accordance with one embodiment, a method is provided for creating a package that contains one or more content updates that are configured for implementation on a remote device. | 01-16-2014 |
20140037204 | Image Compression Based On Parameter-Assisted Inpainting - Systems and methods provide image compression based on parameter-assisted inpainting. In one implementation of an encoder, an image is partitioned into blocks and the blocks classified as smooth or unsmooth, based on the degree of visual edge content and chromatic variation in each block. Image content of the unsmooth blocks is compressed, while image content of the smooth blocks is summarized by parameters, but not compressed. The parameters, once obtained, may also be compressed. At a decoder, the compressed image content of the unsmooth blocks and the compressed parameters of the smooth blocks are each decompressed. Each smooth block is then reconstructed by inpainting, guided by the parameters in order to impart visual detail from the original image that cannot be implied from the image content of neighboring blocks that have been decoded. | 02-06-2014 |
20140040484 | END-POINT IDENTIFIERS IN SIP - A system and method for uniquely identifying an SIP device extends the SIP communications protocol with an end point identifier, carried for example in the header of an SIP transmission. The end point identifier is useful for routing, registration, subscription, and authentication. The end point (device) of a given user epid can be uniquely identified by creating a key from an epid and a user's address-of-record (URI). This in turn enables improved connection management and security association management when the connections/IP addresses are transient, such as when HTTPS tunneling is used. | 02-06-2014 |
20140052442 | System and Method for the Transformation and Canonicalization of Semantically Structured Data - A method of transforming and canonicalizing semantically structured data includes obtaining data from a network of computers, applying text patterns to the obtained data and placing the data in a first data file, providing a second data file containing the obtained data in a uniform format, and generating interface specific sentences from the data in the second data file. | 02-20-2014 |
20140055499 | METHODS FOR AUTOMATED AND SEMIAUTOMATED COMPOSITION OF VISUAL SEQUENCES, FLOWS, AND FLYOVERS BASED ON CONTENT AND CONTEXT - A system with the ability to dynamically compose a sequence of visual views or flows allowing a single object or region, or multiple objects or regions, to be viewed from different perspectives and visual distances is described. The sequence of views can provide smooth flyovers over positions and details on objects that are deemed to be of interest, with changes in zoom level and/or velocity that are functions of the estimated complexity and/or unfamiliarity with features of the object. In an example, a flyover displaying different views on a map of a city arterial system on a small-screened mobile device is composed based on current traffic conditions, swooping up and down with parabolic trajectories, based on distances being traversed, and pausing at times over key traffic jams and other findings of interest based on the estimated visual complexity and predicted atypicality of situations. | 02-27-2014 |
20140068446 | Mobile Communications Device User Interface - A mobile communications device user interface is described. In an implementation, a method is implemented by a mobile communications device that includes outputting a user interface having a portion that is configured to accept content. When an option is selected in relation to the portion to initiate a communication and the content includes one or more contacts, the communication is formed that includes the content and is automatically addressed to the one or more contacts. | 03-06-2014 |
20140068755 | MOBILE DEVICE CHILD SHARE - In embodiments of mobile device child share, a mobile device can display a default device lock screen on an integrated display device, and receive an input effective to transition from the default device lock screen to display a child lock screen without receiving a PIN code entered on the default device lock screen. The mobile device can receive a second input effective to transition from the child lock screen to display a child space. The mobile device implements a device share service that activates a child share mode of the mobile device, and restricts functionality of device applications and access to device content based on designated restriction limits. | 03-06-2014 |
20140081942 | Automatic Browser Search Provider Detection and Usage - Various embodiments enable a web site to expose various search providers that it promotes to browsers that navigate to that site. In at least some embodiments, the search providers are exposed using the HTML of a web page. When a browser navigates to that site, it processes the HTML of the associated web page and exposes the promoted search providers to the user. In at least some embodiments, the browser can permit use of one or more search providers without requiring the user to install the search provider. Alternately or additionally, in at least some other embodiments, the browser can enable the user to quickly and efficiently install the search provider so that the search provider can be available whenever the user uses their browser application. | 03-20-2014 |
20140095992 | GROUPING WRITING REGIONS OF DIGITAL INK - A method for grouping writing regions of digital ink receives processed digital ink that comprises writing regions. A relationship can be generated between a plurality of the writing regions. A feature set can be determined that is associated with the plurality of the writing regions. The plurality of the writing regions can be grouped based on the feature set. | 04-03-2014 |
20140109005 | Column Organization of Content - Column organization of content is described. In an implementation, a mobile communications device configures a user interface to include a plurality of representations of content arranged according to a plurality of columns that permits navigation between first and second said columns upon detection of a gesture input via a touchscreen of the mobile communications device. The user interface is displayed on a display device of the mobile communications device. The first column is configured for vertical navigation through each of the plurality of representations and the second column includes a filtered subset of the plurality of representations such that at least one of the representations is included in the first column and not the second column. | 04-17-2014 |
20140128038 | LOCAL VOICEMAIL FOR MOBILE DEVICES - This document describes various techniques for implementing local voicemail on a mobile device. These techniques may include enabling the mobile device to answer a voice call, record audio of the voice call to provide a voicemail file, and store the voicemail file to local computer-readable media. A locally stored voicemail file may be associated with relevant data, exposed via the associated data for local processing, and/or manipulated through a user interface of the mobile device. | 05-08-2014 |
20140129817 | DEVICE BOOTING WITH AN INITIAL PROTECTION COMPONENT - Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner. | 05-08-2014 |
20140132518 | CONCURRENTLY DISPLAYING MULTIPLE CHARACTERS FOR INPUT FIELD POSITIONS - For each of multiple user inputs, multiple keys of a keyboard that are touched as part of the user input are identified. Additionally, for each of the multiple user inputs, multiple characters that are to be displayed concurrently are determined based on the multiple keys that are touched as part of the user input. Both a character input field and the multiple characters determined for each of the multiple user inputs are displayed. One or more suggested inputs can also be displayed, and a user-selected one of the suggested inputs identified as an input to the character input field. | 05-15-2014 |
20140146825 | IMPLEMENTING MULTIPLE PORTALS INTO AN RBRIDGE NETWORK - Shortest-path spanning trees are created outward from each portal on a Rbridge network with nodes on the network being assigned to the spanning trees. For those nodes equidistant to two portals, an election process is used to determine which tree the node should join. To enable routes associated with nodes on the Rbridge network to be distinguished from routes external to the Rbridge network, messages may be transmitted between the portals. The messages enable portals to identify routing updates received from the external network as containing internal routes, so that traffic that is required to pass between nodes on different trees may pass over the Rbridge network rather than over the external network. | 05-29-2014 |
20140149508 | Managing Web Services Data and Presence Data - Interfacing a wireless device with web services, including social networking web services, is described. For example, a system for interfacing a wireless device with a plurality of web services comprises a web service proxy having an API to allow other modules to interface with the web service proxy; a plurality of web services adapters interfaced with the web services proxy through the API, each one of the web services adapters configured to communicate with a particular web service using the specific communication formats for the web service; where the web services adapters and the web services proxy convert between the communication formats employed to communicate with each of the web services and a wireless communication format, the wireless communication format being a different format than the communication formats for each of the web services, thereby enabling bi-directional communication between the wireless device and the plurality of web services. | 05-29-2014 |
20140149835 | USING STRUCTURED DATA FOR ONLINE RESEARCH - Various embodiments utilize structured data contained within a resource, such as a web page, to enable a user to define collections of data. Individual constituent parts of a collection or “links” are collected within a collection. In one or more embodiments, a full page viewing experience can be provided which enables users to not only view more details for a given link, but to view multiple different links at a time. Other viewing options and collection interactions are provided. | 05-29-2014 |
20140150119 | Security Restrictions on Binary Behaviors - A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access. | 05-29-2014 |
20140164059 | Heuristics to Quantify Data Quality - Various embodiments provide an ability to detect an input associated with an element for which a cascading operation has been defined. Some embodiments apply the cascading operation to the element, and further apply one or more cascading operations to less than all ancestral elements in an associated tree for which cascading operations have been defined. In some cases, the one or more cascading operations can be applied to one or more respective ancestral elements after a predefined waiting period. | 06-12-2014 |
20140181093 | Search Results Through Interest Circles - Systems, methods, and computer-readable media for responding to a search query with search results ranked according to interest circles of a plurality of computer users are presented. Interest circles are formed from a computer user's navigation data, including the computer user's navigation history. A search query is received from a requesting computer user. The search query is directed to a query topic or set of query topics. A set of search results responsive to the search query are obtained. A plurality of computer users, each of the plurality of computer users having an established interest circle corresponding to the query topic, is identified. The set of search results are then ordered according to the interest circles of the identified plurality of computer users. Thereafter, the higher ordered search results are returned to the requesting computer user in response to the search query. | 06-26-2014 |
20140201176 | FILE SYSTEM WITH PER-FILE SELECTABLE INTEGRITY - A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various accesses, while other file system objects do not. Different default settings can be provided for different file system objects. Such a setting for a file system object can be changed to and from having integrity on. Given a file system object with an attribute, the file system provides file system operations for which the data integrity operation used on the file system object depends on this attribute. Such operations include, but are not limited to, operations for changing the attribute, creating file system objects with such attributes, providing and changing default settings for such attributes, and writing data to and reading data from files, which use different data integrity techniques based on this attribute. | 07-17-2014 |
20140211858 | SPATIALLY ADAPTIVE VIDEO CODING - A video signal comprises a sequence of source frames to be encoded. A pre-processing stage determines a region of interest for a plurality of the source frames, and spatially adapts each of the plurality of the source frames to produce a respective warped frame. In the respective warped frame, the region of interest comprises a higher spatial proportion of the warped frame than in the source frame. The pre-processing stage supplies the warped frames to an encoder to be encoded into an encoded version of the video signal. | 07-31-2014 |
20140211860 | CONDITIONAL CONCEALMENT OF LOST VIDEO DATA - A receiving apparatus comprises a receiver for receiving a video signal, an output for outputting the video signal to a screen, storage device or further terminal; and a concealment module for applying a concealment algorithm to a lost area of the video signal. The concealment module is configured to determine an estimate of concealment quality selectively directed toward a region of interest within the area in question, and based on this estimate to determine whether or not to apply the concealment algorithm. | 07-31-2014 |
20140266876 | USING SATELLITE VISIBILITY DATA FOR IMPROVED LOCATION ACCURACY - Described is a technology by which GPS-capable devices work with a cloud service to receive satellite visibility-related data. The satellite visibility-related data may be used to determine a location, and/or to abort a search for satellites. The cloud service may use crowd data from other GPS-capable devices. In one aspect, line-of-sight satellites are differentiated from other satellites, and used to determine which satellite signals are more trustworthy. Reflected signals also may be determined. | 09-18-2014 |
20140267045 | Adaptive Language Models for Text Predictions - Adaptive language models for text predictions are described herein. In one or more implementations, text prediction candidates corresponding to detected text characters are generated according to an adaptive language model. The adaptive language model may be configured to include multiple individual language model dictionaries having respective scoring data that is combined together to rank and select prediction candidates for different interaction scenarios. In addition to a pre-defined general population dictionary, the dictionaries may include a personalized dictionary and/or interaction-specific dictionaries that are learned by monitoring a user's typing activity to adapt predictions to the user's style. Combined probabilities for predictions are then computed as a weighted combination of individual probabilities from multiple dictionaries of the adaptive language model. In an implementation, dictionaries corresponding to multiple different languages may be combined to produce multi-lingual predictions. | 09-18-2014 |
20140267559 | Smart Device Pairing and Configuration for Meeting Spaces - Pairing and configuring a computing device for use in a meeting space is provided. An appliance may communicate a broadcast to a computing device which announces the availability of a meeting space for a meeting. The computing device may establish a connection with the appliance. The computing device may then join the meeting in the meeting space. | 09-18-2014 |
20140273990 | Observation Assisted Bandwidth Management - Observation assisted bandwidth management techniques are described. In one or more implementations, a request is received at a terminal to initiate a call with another terminal. Responsive to the request, a communication is formed to be communicated to a service provider for bandwidth parameters, the request including network parameters associated with the terminal. The bandwidth parameters, received form the service provider, are used as part of a model to estimate an amount of bandwidth that is available for the call. The call with the other terminal is initiated, the call configured to at least initially consume the estimated amount of bandwidth. | 09-18-2014 |
20140278047 | ENRICHING DRIVING EXPERIENCE WITH CLOUD ASSISTANCE - Described is a technology by which driver safety technology such as collision detection is implemented via mobile device (e.g., smartphone) sensors and a cloud service that processes data received from vehicles associated with the devices. Trajectory-related data is received at the cloud service and used to predict collisions between vehicles and/or lane departures of vehicles. To operate the service in real-time with low latency, also described is dividing driving areas into grids, e.g., based upon traffic density, having parallel grid servers each responsible for only vehicles in or approaching its own grid, and other parallel/distributed mechanisms of the cloud service. | 09-18-2014 |
20140278091 | PLANNING UNDER DESTINATION UNCERTAINTY - The subject disclosure is directed towards resolving an uncertain transportation context by suggesting one or more potential diversions. An automated routing system may generate routing information that includes map data as well as a location of a diversion having an expected cost in compliance with the uncertain transportation context. Such a diversion may be a waypoint that satisfies one or more user needs given an unknown/uncertain destination. | 09-18-2014 |
20140278634 | Spatiotemporal Crowdsourcing - The subject disclosure is directed towards spatiotemporal crowdsourcing, in which a task including task criteria is received, and an actor set (e.g., human workers) are selected based upon user task preference data and task ability data with respect to accomplishing the task. The actor set is summoned to a location at a time to participate in the task. Spatiotemporal crowdsourcing may be implanted as a service that selects the actor set and tracks state information as to a completion state of the task. | 09-18-2014 |
20140278657 | HIRING, ROUTING, FUSING AND PAYING FOR CROWDSOURCING CONTRIBUTIONS - The subject disclosure is directed towards using one or more machines with respect intelligently performing a task, such as a crowdsourcing task. Prediction models are used to determine how many workers are needed for a task, based upon a budget and a general goal of trying to use as few workers as needed to achieve a desired result. A number of workers needed to perform a task, without exceeding a budget is computed by predicting future contributions to estimate the number of workers. Also described is predicting based upon existing data, predicting when there is no existing data with which to start based upon adapting, and fairer payment schemes. | 09-18-2014 |
20140279719 | VALUE OF INFORMATION WITH STREAMING EVIDENCE - The subject disclosure is directed towards processing evidence, which may include high-dimensional streaming evidence, into a future belief state. The existing evidence is used to project a belief about a future state. The future belief state may be used to determine whether to wait for additional evidence, or to act now without waiting for additional evidence, e.g., based on a cost of the delay. For example, an autonomous assistant may decide based upon the belief whether to engage a person or not, or to wait for more information before the engagement decision is made. | 09-18-2014 |
20140280664 | CACHING CONTENT ADDRESSABLE DATA CHUNKS FOR STORAGE VIRTUALIZATION - The subject disclosure is directed towards using primary data deduplication concepts for more efficient access of data via content addressable caches. Chunks of data, such as deduplicated data chunks, are maintained in a fast access client-side cache, such as containing chunks based upon access patterns. The chunked content is content addressable via a hash or other unique identifier of that content in the system. When a chunk is needed, the client-side cache (or caches) is checked for the chunk before going to a file server for the chunk. The file server may likewise maintain content addressable (chunk) caches. Also described are cache maintenance, management and organization, including pre-populating caches with chunks, as well as using RAM and/or solid-state storage device caches. | 09-18-2014 |
20140281491 | IDENTITY ESCROW MANAGEMENT FOR MINIMAL DISCLOSURE CREDENTIALS - The subject disclosure is directed towards identity escrow management where anonymous online users can be de-anonymized if certain conditions are met. An auditor is configured to control a user's anonymity using a prime-order cryptographic group based encryption scheme. Via an authentication component, the auditor verifies that a pseudonym corresponding to the user's identity was encrypted correctly. If valid, the auditor decrypts encrypted pseudonym data using a private cryptographic key based upon the prime-order cryptographic group | 09-18-2014 |
20140281512 | SECURE QUERY PROCESSING OVER ENCRYPTED DATA - The subject disclosure is directed towards secure query processing over encrypted database records without disclosing information to an adversary except for permitted information. In order to adapting semantic security to a database encryption scheme, a security model for all query processing is specified by a client and used to determine which information is permitted to be disclosed and which information is not permitted. Based upon the security model, a trusted, secure query processor transforms each query and an encrypted database into secure query results. Even though the adversary can view the secure query results during communication to the client, the adversary cannot determine any reliable information regarding the secure query results or the encrypted database. | 09-18-2014 |
20140281525 | MINIMAL DISCLOSURE CREDENTIAL VERIFICATION AND REVOCATION - The subject disclosure is directed towards credential verification for accessing a service provider. A user may prove to the service provider the validity of the credential by communicating a non-revocation component that is based upon a prime-order cryptographic group without a bilinear pairing. In order to authenticate the user, a verification mechanism within an identity management system applies private cryptographic data, including a verifier-designated private key to the non-revocation component, which proves that the user's identity and therefore, the credential is not revoked. The presentation proof includes a hash value that is computed using the credential's commitment and the prime-order cryptographic group. By verifying that the hash value was computed using that commitment, the verification mechanism validates the credential and permits access to the service provider. | 09-18-2014 |
20140285626 | Representation and Compression of Depth Data - The techniques and arrangements described herein provide for layered compression of depth image data. In some examples, an encoder may partition depth image data into a most significant bit (MSB) layer and a least significant bit (LSB) layer. The encoder may quantize the MSB layer and generate quantization difference data based at least in part on the quantization of the MSB layer. The encoder may apply the quantization difference data to the LSB layer to generate an adjusted LSB layer. | 09-25-2014 |
20140286134 | Time Indicators for Calendars - In a multiday view of a calendar, a time indicator is shown adjacent to a graphical element for the current day. In the multiday view, such a time indicator accurately indicates the current time on the current day, but not on other days of the week. If the current day is not viewable, the time indicator is not shown. By being adjacent to the graphical element for the current day, the time indicator does not obscure information, such as events, for the current day. | 09-25-2014 |
20140293069 | REAL-TIME IMAGE CLASSIFICATION AND AUTOMATED IMAGE CONTENT CURATION - The present disclosure describes real-time image classification and automated image content curation. An image is uploaded to a database of a real-time image classification system after its capture using an image capture device. The real-time image classification system automatically determines a classification for the image in real-time based on a feature optically extracted from the image using an optical recognition module. The classification is associated with the image in the database and transmitted to the image capture device for display together with the image. | 10-02-2014 |
20140297953 | Removable Storage Device Identity and Configuration Information - In embodiments of removable storage device identity and configuration information, a removable storage device is accessible by device applications while connected to a computing device, such as to access application data. A device manager can identify one or more storage volumes on the removable storage device while the removable storage device is connected to the computing device. A storage volume may be previously identified as a storage location for another computing device when the removable storage device is connected to the other computing device. The device manager can also determine whether at least one of the storage volumes is associated with a user of the computing device if the storage volume is identified on the removable storage device, and then add the storage volume to a library of storage locations for the computing device at the identified storage location that is the same for the other computing device. | 10-02-2014 |
20140300736 | MULTI-SENSOR CAMERA RECALIBRATION - One or more techniques and/or systems are providing for facilitating recalibration of a multi-sensor camera. That is, a multi-sensor camera may comprise a nadir sensor and one or more oblique sensors. Temperature, mechanical stress, and other factors can lead to misalignment of one or more sensors within the multi-sensor camera. Accordingly, a set of tie points and/or observations may be generated based upon a search matching technique, a densification technique, and/or a virtual matching technique. A bundle technique may be utilized to generate updated eccentricity information based upon the set of tie points and/or observations. The updated eccentricity information (e.g., orientation and/or position information of a sensor, such as an oblique sensor, with respect to a nadir view) may be used to recalibrate the multi-sensor camera, such as in real-time (e.g., during a flight mission that utilizes the multi-sensor camera to capture aerial images of a city or other scene). | 10-09-2014 |
20140308031 | WEARABLE CAMERA - A garment clip is disclosed. The garment clip houses a camera and comprising a first portion housing operational circuitry and a second portion supporting an image capture component. The second portion has a mass which is less than the first portion. The first and second portions are connected in a configuration such that, when the clip is secured to the garment, the image capture component faces outwardly and the first portion is at least partially concealed by the garment. | 10-16-2014 |
20140320493 | Anti-Aliasing for Geometries - Techniques for anti-aliasing for geometries are described. In at least some embodiments, a graphical image is reduced to a collection of polygonal geometric primitives (“geometries”). The individual geometries are processed according to techniques discussed herein such that anti-aliasing is applied to the geometries when the geometries are displayed as part of the graphical image. For example, anti-aliasing of a general-purpose geometry is achieved via an associated collection of quadrilaterals and bevels that can be dynamically transformed when the geometry is rendered for display. In at least some embodiments, quadrilaterals and bevels generated for a geometry enable the geometry to be dynamically transformed and re-rendered multiple times to achieve a variety of visuals. | 10-30-2014 |
20140324966 | OBTAINING HYPERLOCAL CONTENT FROM SOCIAL MEDIA - Hyperlocal information may be marshaled from social network postings, and may be analyzed to create content about a hyperlocality. In one example, tweets on the Twitter service are examined to determine the hyperlocality with which the tweets are associated. The tweets are then analyzed to identify trending terms, and events are identified based on the trending terms. Additionally, patterns of posting and re-posting are analyzed to identify prominent members in the hyperlocality. A user interface, such as a web page, may be created for the hyperlocality, where the user interface may identify events, topics, people, places, and postings associated with the hyperlocality. | 10-30-2014 |
20140325622 | SYNCHRONIZING CREDENTIAL HASHES BETWEEN DIRECTORY SERVICES - The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a target location (e.g., a cloud directory service), so that the same credentials may be used to log into the source or target location, yet without necessarily having each domain controller handle the synchronization. The plaintext password is not revealed, instead using hash values computed therefrom to represent the password-related data. The target may receive a secondary hash of a primary hash, and thereby only receive and store a password blob. Authentication is accomplished by using the same hashing algorithms at the target service to compute a blob and compare against the synchronized blob. Also described are crypto agility and/or changing hashing algorithms without requiring a user password change. | 10-30-2014 |
20140327126 | COOLING INTEGRATED CIRCUIT PACKAGES FROM BELOW - The subject disclosure is directed towards cooling an integrated circuit package such as a flip chip ball gate array from beneath the package. The integrated circuit package comprises a silicon die, and a substrate below the silicon die. The substrate includes microvias configured to transfer heat away from the silicon die in a direction towards the circuit board for cooling the silicon die from beneath. The circuit board may likewise contain vias or share common vias with the package to facilitate cooling from beneath the circuit board. | 11-06-2014 |
20140330810 | IDENTIFYING SEARCH MATCHES AND ALTERED SEARCH RESULTS - In embodiments of identifying search matches and altered search results, a query is received from a device application, and a data search is initiated based on the query that specifies search terms. A search result set of search result items is then received, and properties of a search result item are correlated with the search result item, where the properties indicate why the search result item was returned as part of the search result set. Search terms of the query are also associated with respective properties of the search result item to indicate a correspondence of a search term with a property of the search result item. The search result set of the search result items can then be returned to the device application along with the properties of each search result item and the associated search terms of the query. | 11-06-2014 |