Patent application number | Description | Published |
20100036836 | Contextual Keyword-Based Access Control - Various implementations of contextual keyword-based access control are disclosed. | 02-11-2010 |
20100040227 | Collaborative, Incremental Specification Of Identities - Methods and systems for collaborative, incremental specification of identities are provided. Users of an information processing system collaborate to define and refine identities of entities, and users can create references for those identities. Relationships among the identifiers implied related keywords that can be used to improve search, navigation, and integration. Relationship factoring can be used to maintain efficient logical and physical representations. | 02-18-2010 |
20100042410 | Training And Applying Prosody Models - Techniques for training and applying prosody models for speech synthesis are provided. A speech recognition engine processes audible speech to produce text annotated with prosody information. A prosody model is trained with this annotated text. After initial training, the model is applied during speech synthesis to generate speech with non-standard prosody from input text. Multiple prosody models can be used to represent different prosody styles. | 02-18-2010 |
20110137848 | GENERAL PREDICTION MARKET - Methods evaluating propositions about timeseries are provided. A service accepts a proposition about one or more timeseries, and the service monitors those timeseries. A proposition can reference multiple timeseries with different time intervals and different units. When new data is available, the service evaluates the proposition to determine if the proposition is true, false, or neither. The service automatically performs unit conversions and selects relevant, previously observed values before evaluating a proposition when new data is available. | 06-09-2011 |
20120010888 | Method and System for Speech Synthesis and Advertising Service - Methods and systems for providing a network-accessible text-to-speech synthesis service are provided. The service accepts content as input. After extracting textual content from the input content, the service transforms the content into a format suitable for high-quality speech synthesis. Additionally, the service produces audible advertisements, which are combined with the synthesized speech. The audible advertisements themselves can be generated from textual advertisement content. | 01-12-2012 |
20120023577 | VERIFYING WORK PERFORMED BY UNTRUSTED COMPUTING NODES - Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes. | 01-26-2012 |
20120122428 | Automatic Annunciator Allocation - Technologies described herein generally relate to allocating annunciators to provide annunciations in response to annunciation requests in a computing device. The computing device may include a platform application, which may be configured to receive annunciation requests from applications for providing annunciations. The platform application may discover annunciators capable of providing the at least one annunciation. The platform application may schedule the annunciation request with one of the discovered annunciators and upon scheduling the annunciation request with one of the discovered annunciator, may cause the scheduled annunciator to provide the annunciation in response to the annunciation request. The technologies presented herein can allocate annunciators according to the demands of a user by determining a prioritization level of an annunciation request and an attention limit of the computing device such that the computing device can manage multiple annunciation requests without inundating a user with extraneous annunciations. | 05-17-2012 |
20120246182 | PROPAGATION THROUGH PERDURANCE - An event processor accepts event representations that comprise perdurance and epistemological relationships among entities or entity references, and the event processor stores information derived from event representations in a datastore. A search component searches entities based on local epistemological and perdurance properties, and a perdurance engine traverses the perdurance relationships obtained from the datastore. An epistemological propagator generates derived epistemological relationships using the perdurance engine and local epistemological data obtained from the datastore. | 09-27-2012 |
20120323912 | Collaborative, Incremental Specification Of Identities - Methods and systems for collaborative, incremental specification of identities are provided. Users of an information processing system collaborate to define and refine identities of entities, and users can create references for those identities. Relationships among the identifiers imply related keywords that can be used to improve search, navigation, and integration. Relationship factoring can be used to maintain efficient logical and physical representations. | 12-20-2012 |
20130085760 | TRAINING AND APPLYING PROSODY MODELS - Techniques for training and applying prosody models for speech synthesis are provided. A speech recognition engine processes audible speech to produce text annotated with prosody information. A prosody model is trained with this annotated text. After initial training, the model is applied during speech synthesis to generate speech with non-standard prosody from input text. Multiple prosody models can be used to represent different prosody styles. | 04-04-2013 |
20130132321 | GENERAL MARKET PREDICTION USING POSITION SPECIFICATION LANGUAGE - Methods evaluating propositions about timeseries are provided. A service accepts a proposition about one or more timeseries, and the service monitors those timeseries. A proposition can reference multiple timeseries with different time intervals and different units. When new data is available, the service evaluates the proposition to determine if the proposition is true, false, or neither. The service automatically performs unit conversions and selects relevant, previously observed values before evaluating a proposition when new data is available. | 05-23-2013 |
20140019138 | Training and Applying Prosody Models - Techniques for training and applying prosody models for speech synthesis are provided. A speech recognition engine processes audible speech to produce text annotated with prosody information. A prosody model is trained with this annotated text. After initial training, the model is applied during speech synthesis to generate speech with non-standard prosody from input text. Multiple prosody models can be used to represent different prosody styles. | 01-16-2014 |
20140082191 | VERIFYING WORK PERFORMED BY UNTRUSTED COMPUTING NODES - Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes. | 03-20-2014 |
20140129555 | Collaborative, Incremental Specification of Identities - Methods and systems for collaborative, incremental specification of identities are provided. Users of an information processing system collaborate to define and refine identities of entities, and users can create references for those identities. Relationships among the identifiers imply related keywords that can be used to improve search, navigation, and integration. Relationship factoring can be used to maintain efficient logical and physical representations. | 05-08-2014 |
20140200895 | Systems and Methods for Automated Media Commentary - Techniques for providing automated media commentary are provided. A user agent requests audio commentary for media. In response, a service searches data sources to identify the specified media, finds information related to those entities, generates text that represents those information, combines the text into a textual monologue, and synthesizes speech audio from that textual monologue. The service selects relevant information to be likely unknown to the user while also being desired by the user. | 07-17-2014 |