Microsoft Corporation Patent applications |
Patent application number | Title | Published |
20160132567 | MULTI-SEARCH AND MULTI-TASK IN SEARCH - Map multi-search architecture that enables users to multi-task on the mapping engine website. A card interaction model enables the creation of new cards for new tasks and from which users can retrieve previous results without needing to redo the search task. One or more cards can be retrieved by scrolling through and selecting the desires card(s). Point-of-interest (POI) capabilities of the architecture introduce different POI colors, POI sizes, and a decay model which enables users to differentiate between different sets of results and furthermore, enables users to see the proximity of different sets of results. The POI system enables differentiated POI sets for different sets of search results and/or detail cards. | 05-12-2016 |
20160127441 | APPLICATION LEVEL AUDIO CONNECTION AND STREAMING - Systems and methods disclosed herein may include receiving from an audio application running on the computing device, a selection of a multimedia endpoint device. The multimedia endpoint device may be connected with the audio application in response to a request from the audio application. An audio stream of the audio application may be separated from a system audio stream. The system audio stream may include a plurality of audio signals generated by system components of the computing device or applications running on the computing device. The plurality of audio signals may be played on a default audio endpoint of the computing device. The separated audio stream of the audio application may be communicated to the selected multimedia endpoint device for playback. Separating the audio stream of the audio application from the system audio stream may be based on an API request from the application. | 05-05-2016 |
20160117069 | COMMAND USER INTERFACE FOR DISPLAYING SELECTABLE SOFTWARE FUNCTIONALITY CONTROLS - An improved user interface is provided for displaying selectable software functionality controls and for presenting logical groupings of particular functionality controls associated with a selected top-level functionality. Underneath a row of top-level functionality tabs, functionalities controls associated with a given top-level functionality tab are presented in logical groupings. Selection of a particular tab switches modes of the user interface to present controls for functionalities associated with the selected tab. | 04-28-2016 |
20160117057 | Screen Magnification with Off-Screen Indication - In one example, a magnification display system may alert a user to event notifications that are presented outside the magnification area. The magnification display system may apply a magnification area with a magnification module to a section of a viewing area presented by a display. The magnification display system may receive an event notification outside the magnification area. The magnification display system may introduce a notification indication alerting a user to the event notification. | 04-28-2016 |
20160116995 | SYSTEM AND METHOD FOR EXECUTING A PROCESS USING ACCELEROMETER SIGNALS - Apparatus and process for controlling a computer process with gestures and a handheld pointing device. The computer system employing the pointing device to determine what component a user wants to control and what control action is desired. | 04-28-2016 |
20160105640 | TELEPRESENCE EXPERIENCE - The description relates to creating a window-like experience during video communication scenarios. One example can include a spatial light deflector including a steerable array of light deflecting elements. The example can also include a wedge device positioned relative to the spatial light deflector. The example can also include a camera positioned at an end of the wedge device to receive the captured light. | 04-14-2016 |
20160104200 | USER DIRECTED INFORMATION COLLECTIONS - Systems and methods for creating and/or displaying a user information collection are described herein. The user information collections include relevant information for a user of one or more devices. More specifically, the relevant information in the user information collections can include user directed advertisements. User information collections improve a user's ability to accomplish tasks, save money, and/or get desired products and/or services as opposed to just viewing content. Additionally, the user information collections reduce or prevent unwanted data from being added to the user information collections improving the usability of the data in the user information collections and improving user interactions with the device. | 04-14-2016 |
20160104094 | FUTURE MEETING EVALUATION USING IMPLICIT DEVICE FEEDBACK - This document relates to meeting evaluation. One example determines previous meeting attributes of previous meetings that were attended by a user or to which the user was invited, and obtains implicit feedback about the previous meetings from a device of the user. The example includes training a predictive algorithm to evaluate future meetings for the user using the previous meeting attributes and the implicit feedback about the previous meetings. | 04-14-2016 |
20160103613 | TAGGING FOR STORAGE DEVICE REGIONS - A computing device manages access to a block-based storage device. The computing device has an operating system with a storage stack. The storage stack may have a file system, a device driver driving the block-based storage device, and a storage component intermediating between the device driver and the file system. The file system may receive a request to tag a file that is managed by the file system and is stored on the storage device. In response the file system requests the storage component to tag blocks corresponding to the file. The device driver forwards or translates the request from the storage component to the storage device. In turn, the storage device stores indicia of the blocks. Data stored in the identified blocks may receive differentiated treatment, by the storage device and/or the operating system, such as a particular choice of backing store, preferential handling, or others. | 04-14-2016 |
20160099915 | SECURITY CONTEXT MANAGEMENT IN MULTI-TENANT ENVIRONMENTS - Examples of the present disclosure describe security context enforcement in a multi-tenant environment. Security context data may be transmitted through an un-secure multi-tenant computational environment. The security context data is secured by protection layers that restrict untrusted resources from running tenant applications and restrict the ability of unauthorized tenants to access context information associated with a tenant. Data may be received and evaluated at a component of a multi-tenant environment. If the component is a trusted component and the security context data indicates that the tenant is authorized to execute an application using a specified context, the component may run a tenant application in a context associated with the security context data. | 04-07-2016 |
20160099811 | End-to-End Security For Hardware Running Verified Software - A verified software system may be executable on secure hardware. Prior to being executed, the software system may be verified as conforming to a software specification. First credentials attesting to an identity of the software system may be sent to an external application. Second credentials signed by a provider of the secure hardware may be sent to the external application. The second credentials may attest to an identity of the secure hardware. The external application may securely exchange one or more messages with a software application of the software system. For example, the one or more messages may be decryptable only by the external application and the software application to provide confidentiality for each message. As another example, an attestation may vouch for an identity of a sender of each of the one or more messages to attest to an integrity of each message. | 04-07-2016 |
20160098645 | HIGH-PRECISION LIMITED SUPERVISION RELATIONSHIP EXTRACTOR - Automatic relationship extraction is provided. A machine learning approach using statistical entity-type prediction and relationship predication models built from large unlabeled datasets is interactively combined with minimal human intervention and a light pattern-based approach to extract relationships from unstructured, semi-structured, and structured documents. Training data is collected from a collection of unlabeled documents by matching ground truths for a known entity from existing fact databases with text in the documents describing the known entity and corresponding models are built for one or more relationship types. For a modeled relationship-type, text chunks of interest are found in a document. A machine learning classifier predicts the probability that one of the text chunks is the entity being sought. The combined machine learning and light pattern-based approach provides both improved recall and high precision through filtering and allows constraining and normalization of the extracted relationships. | 04-07-2016 |
20160094847 | COUPLING SAMPLE METADATA WITH MEDIA SAMPLES - Innovations in the area of sample metadata processing can help a media playback tool avoid loss of synchronization between sample metadata and media samples. For example, a media playback tool identifies encoded data and sample metadata for a current media sample, then couples the sample metadata with the current media sample. The media playback tool provides the sample metadata and encoded data for the current media sample to a media decoder, which maintains the coupling between at least one element of the sample metadata and the current media sample during at least one stage of decoding, even when the current media sample is dropped, delayed, split, or repeated. For example, the media playback tool can determine whether to drop the current media sample and, if the current media sample is dropped, also drop the sample metadata that is coupled with the current media sample. | 03-31-2016 |
20160092565 | Unified Search on a Personal Computing Device - A unified search leverages exposed search functions of one or more applications to supplement search results of a global search function. When a user initiates a global search, a local data store is searched to generate a first set of search results. The global search function calls exposed search functions associated with one or more applications, which provide additional search results. | 03-31-2016 |
20160092518 | DYNAMIC RESULTS - Architecture that enables increased content presentation as part of the results where the results returned are insufficient to fill the results page being presented. An analysis component can be provided and configured to compute excess presentation space of a results area, where the results area comprises map results having content presented in association with a map. A content component presents additional content in the results area based on availability of the excess presentation space of the results area. The additional content and map results are limited to a maximum presentation space of the results area. The additional content includes portions of content individually relevant to corresponding map results and the portions of content are distributed in equivalent amounts of space among the map results. | 03-31-2016 |
20160092440 | Visually Differentiating Strings for Testing - In one embodiment, a data string test system may use a color-coding system, or other visual marker, to indicate which data strings are ready for testing. The data string test system may calculate a localization test status of a data string. The data string test system may apply a visual marker of the localization test status of the data string to the data string. The data string test system may present the visual marker and the data string to a user. | 03-31-2016 |
20160091932 | COMPUTING DEVICE BONDING ASSEMBLIES - The description relates to computing devices, such as mobile computing devices. One example can include a first portion, a second portion, and an adhesive. The example can also include micro heaters positioned proximate to the adhesive. The micro heaters are configured to be selectively energized to supply sufficient thermal energy to the adhesive to facilitate curing of the adhesive. | 03-31-2016 |
20160085840 | Universal Interaction for Capturing Content to Persistent Storage - Systems and methods for enhanced content capture on a computing device are presented. In operation, a user interaction is detected on a computing device with the intent to capture content to a content store associated with the computer user operating the computing device. A content capture service is executed to capture content to the content store, comprising the following: applications executing on the computing device are notified to suspend output to display views corresponding to the applications; content to be captured to the content store is identified and obtained; the applications executing on the computing device are notified to resume output to display views; and automatically storing the obtained content in a content store associated with the computer user. | 03-24-2016 |
20160085273 | COMPUTING DEVICE HEAT MANAGEMENT - The description relates to computing devices, such as mobile computing devices. One example can include a housing containing a processor. This example can also include a transition component configured to automatically change a distance between the processor and a proximate region of the housing based upon a state of the processor. | 03-24-2016 |
20160080911 | ACCOUNTING FOR INDOOR-OUTDOOR TRANSITIONS DURING POSITION DETERMINATION - A determination of whether a mobile computing device is indoors or outdoors can incorporate any of a variety of factors to make an efficient and accurate determination of indoor-outdoor status. Such a status can be useful for use in conjunction with positioning services. Features such as bounding boxes, activity determination, and the like can be used to strike a balance between power consumption and accuracy. A positive user experience with fewer false detections can result. | 03-17-2016 |
20160080488 | IMPLEMENTING FILE-BASED PROTOCOL FOR REQUEST PROCESSING - Examples of the present disclosure describe implementations of a file-based protocol for request processing. A request, sent from a first device, may be received at a second device using a file-based transport protocol as a transport service. The request may be processed by the second device using a virtual file system, which implements a transport layer to interface with the file-based transport protocol. The transport layer of the virtual file system may be utilized to receive, evaluate and process transmissions from the file-based transport protocol. The virtual file system may forward a response to the file-based transport protocol for transmission to the first device. Other examples are also provided. | 03-17-2016 |
20160078671 | Render-Time Linking of Shaders - In one example, a graphics rendering subsystem may selectively link a set of graphic effect modules, such as shaders, to increase processing efficiency. The graphics rendering subsystem may execute a comparison of a performance attribute of a first pre-compiled graphic effect module with a linking criteria. The graphics rendering subsystem may link the first pre-compiled graphic effect module and a second pre-compiled graphic effect module at render-time in response to the performance attribute satisfying the linking criteria. | 03-17-2016 |
20160078655 | Text Realization - In one example, a graphics processing unit may use an optimized geometric realization to render a text shape as a scalable geometry. The graphics processing unit may generate an inner geometry for a text shape. The graphics processing unit also may generate a tessellated edge geometry abutting the inner geometry for an edge of the text shape. The graphics processing unit further may assign a coverage gradient to the tessellated edge geometry to create an anti-aliased edge for the text shape. | 03-17-2016 |
20160077917 | DATA RECOVERY USING BITMAP DATA STRUCTURE - Examples of the present disclosure describe implementing bitmap-based data replication when a primary form of data replication between a source device and a target device cannot be used. According to one example, a temporal identifier may be received from the target device. If the source device determines that the primary replication method is unable to be used to replicate data associated with the temporal identifier, a secondary replication method may be initiated. The secondary replication method may utilize a recovery bitmap identifying data blocks that have changed on the source device since a previous event. | 03-17-2016 |
20160077673 | Intelligent Canvas - According to aspects of the disclosed subject matter, systems and methods for providing improved access to content accessible outside of the current execution context. On a computing device, an intelligent canvas is provided as an operating system-level service. By implementing and/or providing the intelligent canvas as an operating system-level service, interaction by a user with the intelligent canvas does not require a change from the current execution context. Upon receiving a request to interact with the intelligent canvas, an intelligent canvas view is presented for display. The intelligent canvas view includes a plurality of user-actionable controls and at least one user-actionable control corresponds to content for importing into the current execution context. Moreover, the corresponding content of the at least one user-actionable control is anticipatorily selected for presentation in the intelligent canvas view. | 03-17-2016 |
20160077587 | SMART RING - The description relates to a smart ring. In one example, the smart ring can be configured to be worn on a first segment of a finger of a user. The example smart ring can include at least one flexion sensor secured to the smart ring in a manner that can detect a distance between the at least one flexion sensor and a second segment of the finger. The example smart ring can also include an input component configured to analyze signals from the at least one flexion sensor to detect a pose of the finger. | 03-17-2016 |
20160073094 | DEPTH MAP ENHANCEMENT - The description relates to depth images and obtaining higher resolution depth images through depth dependent measurement modeling. One example can receive a set of depth images of a scene captured by a depth camera. The example can obtain a depth dependent pixel averaging function for the depth camera. The example can also generate a high resolution depth image of the scene from the set of depth images utilizing the depth dependent pixel averaging function. | 03-10-2016 |
20160071315 | Convex Polygon Clipping During Rendering - In one example, a graphic computing device may apply a clipping technique to accurately and efficiently render a graphic data set. A central processing unit may generate a convex polygonal clip from a two-dimensional polygon. The central processing unit may calculate a clipping plane for a convex polygonal clip based on an edge of the convex polygonal clip. A graphics processor may apply the convex polygonal clip in a pixel shader. | 03-10-2016 |
20160070887 | MEDIA DECODING CONTROL WITH HARDWARE-PROTECTED DIGITAL RIGHTS MANAGEMENT - Innovations in the area of hardware-protected digital rights management (“DRM”) systems are presented. For example, a hardware-protected DRM system includes a trusted layer and untrusted layer. In the untrusted layer, a control module receives source media data that includes encrypted media data. The control module processes metadata about the media data. The metadata, possibly exposed by a module in the trusted layer, is not opaque within the untrusted layer. In the trusted layer, using key data, a module decrypts encrypted media data, which can be the encrypted media data from the source media data or a transcrypted version thereof. A module in the trusted layer decodes the decrypted media data. A host decoder in the untrusted layer uses the metadata to manage at least some aspects of the decoding, rendering and display in the trusted layer, without exposure of decrypted media data or key data within the untrusted layer. | 03-10-2016 |
20160070555 | AUTOMATED TENANT UPGRADES FOR MULTI-TENANT SERVICES - Automated tenant upgrades are provided for moving tenants in a multi-tenant service from a source scale unit to a target scale unit. Before real tenants are moved, test tenants are moved and the target scale unit health is monitored. Monitoring simulates user activity in the test tenants to look for problems with the target scale unit. If no significant problems are detected after moving the test tenants, real tenants are upgraded in batches. Target scale unit monitoring continues while real tenants are being upgraded and problems reported by real tenants already upgraded to the target scale unit are also considered when assessing the target scale unit health. If a significant problem occurs, tenant upgrades are paused until the issue is resolved. Automated tenant upgrades improve usability of a multi-tenant service by minimizing the service disruptions due to upgrade problems while providing cost effective upgrades to the latest builds. | 03-10-2016 |
20160062955 | OPERATING SYSTEM SUPPORT FOR LOCATION CARDS - Innovations in the area of presentation of location-related actions and location information are presented. For example, an application calls an operating system to generate a location card. The location card can show a map of a location as well as additional information about the location and one or more action indicators. With an action indicator, a user can launch an application to perform an action related to the location immediately and directly from the location card. Depending on usage scenario, an application can specify different actions to be represented with action indicators in a location card. At the same time, location cards supported by the operating system provide a consistent way to expose location information and location-related actions to users. | 03-03-2016 |
20160062932 | Universal Serial Bus Emulation Layer - A universal serial bus stack may use an emulation layer to grant a non-universal serial bus device access to universal serial bus drivers and applications. The universal serial bus stack may exchange a device communication at an emulation layer. The universal serial bus stack may translate between a universal serial bus communication and the device communication at the emulation layer, and then may exchange the universal serial bus communication at a universal serial bus client interface. | 03-03-2016 |
20160062616 | SEMANTIC CARD VIEW - Architecture that enables a card interaction model that can present cards in different ways. When a user performs tasks, new stacked cards (one card on top of another card) corresponding to those tasks open in a left pane over the top of a background canvas (a card overlay of the underlying canvas). Users can scroll through the card stack of the card overlay to retrieve previous cards. Additionally, in an alternative viewing mode, a user can interact with the card overlay via an interactive affordance (an interactive object made available to facilitate a potential action) to enable viewing (e.g., an overview) of the cards in a side-by-side card overlay manner to further enable the opening and quick navigation to one of the previous cards. The architecture has applicability to mapping systems where searches range over many different geographical sites. | 03-03-2016 |
20160061617 | PROVIDING IN-NAVIGATION SEARCH RESULTS THAT REDUCE ROUTE DISRUPTION - Systems and methods disclosed herein may include providing search results. A route offset may be determined, where the route offset at least in part defines a search area for a route. A search result may be received from a point-of-interest (POI) search within the search area. The search result may include a set of POIs associated with a POI category. The set of POIs in the search result may be ranked based at least in part on route disruption criteria. The route disruption criteria for a given one of the POIs may measure additional travel if the route is changed to include the given POI. One or more of the ranked set of POIs may be presented. A selection of the POI category and a mode of transportation for the route may be received. The mode of transportation may include one of driving, bicycling, traveling by public transportation, or walking. | 03-03-2016 |
20160057572 | GEO-FENCING NOTIFICATIONS SUBSCRIPTIONS - Systems and methods disclosed herein may include processing geo-fence related notifications. A current location of a computing device may be determined and a plurality of geo-fences accessible by the computing device may be scanned. Upon detecting the current location is within at least one of the plurality of geo-fences, at least one notification associated with the at least one geo-fence may be acquired. The at least one notification may be displayed at a display of the computing device. The current location may be within a threshold distance of a point of interest, and the at least one notification may provide information about the point of interest. The at least one notification may include a consumer review about the point of interest. | 02-25-2016 |
20160056994 | Diagnosing Network Misconfiguration Externally - In one embodiment, a network service client | 02-25-2016 |
20160055240 | ORPHANED UTTERANCE DETECTION SYSTEM AND METHOD - An orphan detector. The orphan detector processes out-of-domain utterances from a targeted language understanding dialog system to determine whether the out-of-domain utterance expresses a specific intent to have the targeted language understanding dialog system to take a certain action where fallback processing, such as performing a generic web search, is unlikely to be satisfied by web searches. Such utterances are referred to as orphans because they are not appropriately handled by any of the task domains or fallback processing. The orphan detector distinguishes orphans from web search queries and other out-of-domain utterances by focusing primarily on the structure of the utterance rather than the content. Orphans detected by the orphan detector may be used both online and offline to improve user experiences with targeted language understanding dialog systems. The orphan detector may also be used to mine structurally similar queries or sentences from the web search engine query logs. | 02-25-2016 |
20160050294 | DISTRIBUTED WORKLOAD REASSIGNMENT FOLLOWING COMMUNICATION FAILURE - A generation identifier is employed with various systems and methods in order to identify situations where a workload has been reassigned to a new node and where a workload is still being processed by an old node during a failure between nodes. A master node may assign a workload to a worker node. The worker node sends a request to access target data. The request may be associated with a generation identifier and workload identifier that identifies the node and workload. At some point, a failure occurs between the master node and worker node. The master node reassigns the workload to another worker node. The new worker node accesses the target data with a different generation identifier, indicating to the storage system that the workload has been reassigned. The old worker node receives an indication from the storage system that the workload has been reassigned and stops processing the workload. | 02-18-2016 |
20160050101 | Real-Time Network Monitoring and Alerting - In one embodiment, a real-time data analysis system | 02-18-2016 |
20160048221 | COLOR CONTROL - The description relates to color information. One example can include a computing device having a display and a digital stylus configured to capture colors from an operating environment. The digital stylus can be configured to wirelessly communicate data relating to an individual color from the operating environment to the computing device. The computing device can be configured to identify a context of the communicated individual color and to control the computing device based upon the individual color and the context. | 02-18-2016 |
20160043909 | Hierarchical Subscription Management - Embodiments of the invention provide a subscription management service that allows an organization create unique offers, plans, and subscriptions. The resources are created under organizational subscriptions in a hierarchical manner. Each subscriber is a sub-organization of the level above it and can independently manage its services. Administrators for each subscriber at each level can define their sub-organizations. Each subscriber can install their own organizational services as long as those services are supported by the subscription. Subscribers may create their own organizational plans, such as defining how services are packaged and offered to other sub-organizations and end users. For example, a reseller may create service packages at different price levels and offer those to tenants. Administrators may create organizational subscriptions that are managed by subscribers. | 02-11-2016 |
20160041882 | SAFE DATA ACCESS FOLLOWING STORAGE FAILURE - A request identifier is employed with various systems and methods in order to enable an application to pause execution during a failure and subsequently resume execution and communication with a storage system once the failure is resolved. An application residing on a node may attempt to access target data on a storage system. The application sends a request to access the target data. The request may be associated with a request identifier that identifies the application. When the storage system experiences a failure, the application receives a failure notification. The application pauses execution as a result of the notification. When the node reestablishes a connection to the storage system, the application resumes execution using the same request identifier. If the resume request is granted, the application is guaranteed that the target data was not modified during the failure. | 02-11-2016 |
20160041589 | PROGRESSIVE HINGE - The description relates to devices, such as computing devices that have hinged portions. One example can include a first portion that includes an electronic component and is electrically connected by electrical conductors to a second portion that includes a second electronic component. This example can also include a two axis hinge assembly rotatably securing the first and second portions. The two axis hinge assembly can include a directional locking mechanism on a first axis of rotation such that when operated in one rotational direction the first axis has less resistance to rotation than a second axis. When operated in an opposite rotational direction the first axis has more resistance to rotation than the second axis. | 02-11-2016 |
20160021197 | Self-Extending Cloud - Embodiments of the invention provide the capability to combine service installation and service registration in a cloud system. This process reduces the installation of a multi-tenant service into a single-step process. For example, a cloud system admin may simply install the new service and registration is accomplished automatically as part of the installation. | 01-21-2016 |
20160019237 | REVERSE IP DATABASES USING DATA INDICATIVE OF USER LOCATION - Architecture that improves the quality of RevIP databases using search engine query logs and other location information sources and finds IP addresses that share multiple locations (indicative of large Internet gateways). A ground truth dataset is generated with mappings of IP addresses to locations and IP ranges to locations which are known to be correct. Additionally, the architecture can determine which types of queries and SERP page blocks (page sections) are location aware. Location information can be extracted from user queries and the most-frequently-used locations aggregated per IP address. Dominant locations can be aggregated, mapped to existing RevIP database IP address ranges and replaced. The updated RevIP database can be evaluated against the ground truth dataset. RevIP IP address ranges can be split and combined to improve the overall performance of the RevIP database. | 01-21-2016 |
20150379296 | Large Scale Network System Upgrade - In one embodiment, a network file management system | 12-31-2015 |
20150379074 | IDENTIFICATION OF INTENTS FROM QUERY REFORMULATIONS IN SEARCH - Architecture that enables the grouping of the same or highly similar intents that are discovered through query reformulation, identifies single intent sessions, and then performs classification of the queries within the single session to determine a change in intent. Queries in a search session that are reformulations of an original query are identified, and the reformulations are distinguished from queries that are issued in a similar sequence to the original query, but cover a completely unrelated intent. When given a user query, a set of accurate and appropriate reformulations are determined, and then used. Additionally, the reformulations can be displayed in accordance with an auto-suggestion technology while the user is still typing, and the reformulations can be displayed when the result screen is displayed as related searches (“Related Searches”). The reformulations can also be used when issuing the query to the search engine. | 12-31-2015 |
20150378972 | INTELLIGENT CONFLICT DETECTION AND SEMANTIC EXPRESSION OF DOCUMENT EDITS - An intelligent conflict detection system. The system provides semantic expression of edits and history-aware conflict detection in a large-scale service allowing multiple users to simultaneously work with the same document, which may result in conflicting edits. When submitted, changes to a version of a document are compared to all versions of the document created since the document was sourced. Edits to documents are expressed as intents describing the changes in terms of an action and object of that action based on a characteristic of the data being edited. Comparing the intent of current edits against the historical intent of the edits made in prior versions originating from the same source document allows the system to intelligently assess whether the edits are in conflict. History-aware semantic analysis results in users being prompted less frequently to resolve conflicts, which improves the user experience. | 12-31-2015 |
20150378710 | Patching Auto-Stop - In one embodiment, a patch application system | 12-31-2015 |
20150373012 | Integrated APIs and UIs for Consuming Services across Different Distributed Networks - User interface integration across multiple clouds is achieved by hosting UI extensions for different services in the same browser window. The UI extensions are initialized by a shell with any necessary security context for the corresponding cloud. The shell provides versioning so that the newest version of the UI is presented to users for all versions of a service. A connector in a local cloud provides translation between APIs across different clouds. | 12-24-2015 |
20150371439 | Addiing Custom Content To Mapping Applications - Digital maps can be composed of a series of image tiles that are selected based on the context of the map to be presented. Independently hosted tiles can comprise additional details that can be added to the map. A manifest can be created that describes the layers of map details composed of such independently hosted tiles. Externally referable mechanisms can, based on the manifest and map context, select tiles, from among the independently hosted tiles, that correspond to map tiles being displayed to a user. Subsequently, the mechanisms can instruct a browser, as specified in the manifest, to combine the map tiles and the independently hosted tiles to generate a more detailed map. Alternatively, customized mechanisms can generate map detail tiles in real-time, based on an exported map context. Also, controls instantiated by the browser can render three-dimensional images based on the combined map tiles. | 12-24-2015 |
20150370825 | SCALABLE EVENTUAL CONSISTENCY SYSTEM USING LOGICAL DOCUMENT JOURNALING - A scalable eventual consistency system. The system uses logical document journaling to provide eventual consistency across partitions in a large-scale service. The system allows for transactional edits to massively interconnected graphs of documents documents through parallelization without sacrificing linear scalability. The system separates the authority for edits from the replicated storage allowing efficient transactions and linear scalability. All document writes are written to document-specific partitions in a journal where they are queued until the changes are propagated to view-based partitions of a store. By continually checking the journal and attempting to replicate any pending document writes to the store, the system provides eventual consistency without complicated synchronization mechanisms. The system models membership and containment relationships between documents in manner allowing document writes ultimately impacting more than one document to be efficiently handled through the journal as an edit to a single document. | 12-24-2015 |
20150370767 | CONSISTENT VIEWS OF PARTITIONED DATA IN EVENTUALLY CONSISTENT SYSTEMS - A consistent user view system. The system incorporates any changes made by a user in any views shown to that user even when the changes have not propagated to the partitions supplying the view. The system separates the authority for edits from the replicated storage allowing efficient transactions and linear scalability. Documents are read from view-based partitions of a store. Document writes are written to a document-specific partition in a journal and applied to the store. The system stores a copy of pending changes in a user-specific partition. When a user requests a view, the system checks that user's cache for any pending changes applicable to the view. If any applicable changes are found, the changes are applied before showing the view to the user. Pending changes that have been successfully applied to the store are trimmed from the user-specific partition to free up resources. | 12-24-2015 |
20150370674 | TENANT PROVISIONING FOR TESTING A PRODUCTION MULTI-TENANT SERVICE - A tenant provisioning system. The system allows users to request creation of test tenants for a multi-tenant service targeting specific infrastructure resources and automated bulk creation of test tenants. Test tenants created by the system are clearly identified as test tenants to prevent test tenants from being misreported by business intelligence systems providing information about the multi-tenant service. Automated provisioning of test tenants on a regular schedule provides a mechanism for monitoring the operation of the multi-tenant service. Further, the ability to provision a test tenant in specific infrastructure resources allows comprehensive operational testing of most or all infrastructure resources, as well as targeted testing of individual infrastructure resources. The system may provide test tenants with an expiration allowing automatic removal of out-of-date test tenants. The system reduces the costs and errors inherent with the manual creation of test tenants. | 12-24-2015 |
20150364128 | HYPER-STRUCTURE RECURRENT NEURAL NETWORKS FOR TEXT-TO-SPEECH - The technology relates to converting text to speech utilizing recurrent neural networks (RNNs). The recurrent neural networks may be implemented as multiple modules for determining properties of the text. In embodiments, a part-of-speech RNN module, letter-to-sound RNN module, a linguistic prosody tagger RNN module, and a context awareness and semantic mining RNN module may all be utilized. The properties from the RNN modules are processed by a hyper-structure RNN module that determine the phonetic properties of the input text based on the outputs of the other RNN modules. The hyper-structure RNN module may generate a generation sequence that is capable of being converting to audible speech by a speech synthesizer. The generation sequence may also be optimized by a global optimization module prior to being synthesized into audible speech. | 12-17-2015 |
20150364127 | ADVANCED RECURRENT NEURAL NETWORK BASED LETTER-TO-SOUND - The technology relates to performing letter-to-sound conversion utilizing recurrent neural networks (RNNs). The RNNs may be implemented as RNN modules for letter-to-sound conversion. The RNN modules receive text input and convert the text to corresponding phonemes. In determining the corresponding phonemes, the RNN modules may analyze the letters of the text and the letters surrounding the text being analyzed. The RNN modules may also analyze the letters of the text in reverse order. The RNN modules may also receive contextual information about the input text. The letter-to-sound conversion may then also be based on the contextual information that is received. The determined phonemes may be utilized to generate synthesized speech from the input text. | 12-17-2015 |
20150363473 | DIRECT ANSWER TRIGGERING IN SEARCH - Architecture comprising a framework for direct answer triggering, a step-by-step answer, and the user interface that facilitates the architecture. Generally, the architecture can comprise an answer datastore that stores an answer index of answer data, and a triggering component configured to invoke answer data in response to processing of a query that triggers a direct answer in a search results page. The triggering component can be configured to send an answer triggering message to the answer datastore and receive the answer data based on the answer triggering message. | 12-17-2015 |
20150363393 | DIALOG STATE TRACKING USING WEB-STYLE RANKING AND MULTIPLE LANGUAGE UNDERSTANDING ENGINES - A dialog state tracking system. One aspect of the system is the use of multiple utterance decoders and/or multiple spoken language understanding (SLU) engines generating competing results that improve the likelihood that the correct dialog state is available to the system and provide additional features for scoring dialog state hypotheses. An additional aspect is training a SLU engine and a dialog state scorer/ranker DSR engine using different subsets from a single annotated training data set. A further aspect is training multiple SLU/DSR engine pairs from inverted subsets of the annotated training data set. Another aspect is web-style dialog state ranking based on dialog state features using discriminative models with automatically generated feature conjunctions. Yet another aspect is using multiple parameter sets with each ranking engine and averaging the rankings. Each aspect independently improves dialog state tracking accuracy and may be combined in various combinations for greater improvement. | 12-17-2015 |
20150363365 | ACCESSIBILITY DETECTION OF CONTENT PROPERTIES THROUGH TACTILE INTERACTIONS - One or more tactile effects may be mapped to application user interface elements, formatting properties, and document structure and applied to a display comprising tactile capabilities (e.g., deformable screens, vibrations, static charges, heat, etc.). Formatting, structure, and user interface elements may be mapped to different screen variations that may be felt by a visually impaired user. A visually impaired user may be able to utilize his/her sense of touch to more easily comprehend formatting and structure of a document, as well as to have greater confidence to author professional and consistently formatted and structured documents. A tactile effect may be applied to a location of a displayed user interface element, formatting property, or document structure, or may be applied to a designated area of the display. | 12-17-2015 |
20150362956 | RADIUS HINGE - The description relates to devices, such as computing devices that have hinged portions. One example can include a display portion that includes a display screen and an input portion that includes an input device. This example can also include a radius hinge assembly rotatably securing the first and second portions. The radius hinge assembly can be configured to provide a curvilinear articulation that allows 360 degrees of relative rotation between the first and second portions. | 12-17-2015 |
20150361696 | FLEXIBLE DISPLAY COMPUTING DEVICE - The description relates to devices, such as computing devices that have hinged portions. One example can include a first portion and a second portion and a flexible display secured to the first and second portions. This example can also include a hinge assembly rotatably securing the first and second portions. The hinge assembly can be fixedly secured to the second portion and movably secured to the first portion such that a length of the hinge assembly can change when the first portion and second portion are rotated relative to one another. | 12-17-2015 |
20150356368 | ENTRANCE DETECTION FROM STREET-LEVEL IMAGERY - Architecture that detects entrances on building facades. In a first stage, scene geometry is exploited and the multi-dimensional problem is reduced down to a one-dimensional (1D) problem. Entrance hypotheses are generated by considering pairs of locations along lines exhibiting strong gradients in the transverse direction. In a second stage, a rich set of discriminative image features for entrances is explored according to constructed designs, specifically focusing on properties such as symmetry and color consistency, for example. Classifiers (e.g., random forest) are utilized to perform automatic feature selection and entrance classification. In another stage, a joint model is formulated in three dimensions (3D) for entrances on a given facade, which enables the exploitation of physical constraints between different entrances on the same facade in a systematic manner to prune false positives, and thereby select an optimum set of entrances on a given facade. | 12-10-2015 |
20150356199 | CLICK-THROUGH-BASED CROSS-VIEW LEARNING FOR INTERNET SEARCHES - The description relates to click-through-based cross-view learning for internet searches. One implementation includes determining distances among textual queries and/or visual images in a click-through-based structured latent subspace. Given new content, results can be sorted based on the distances in the click-through-based structured latent subspace. | 12-10-2015 |
20150356088 | TILE-BASED GEOCODER - A geocoding architecture that generates and associates one or more tile documents with geocoded tiles. When connected entities are defined, the connected entity attributes are collected in a single tile document so that tile-document terms are attributes of all connected entities. These terms later serve as keys that enable search for tiles relevant for a given query. Entity documents are created that are an aggregation of entity attributes. Like the entity document, the tile document serves as an aggregator for all the geospatial entities within a pre-determined surface area. Search is then performed on the content of tile and entity documents. | 12-10-2015 |
20150355826 | ENABLING USER INTERACTIONS WITH VIDEO SEGMENTS - Embodiments described herein enable user interaction with a video segment. A hit-zone file, which includes hit-zone data, is produced and stored for a video segment, wherein the hit-zone data corresponds to spatial regions that define hit-zones for hidden objects included in the video segment. The hit-zone file is provided to a computing system so that when the computing system displays the video segment the hit-zone file adds hit-zones for the hidden objects included in the video segment. The hit-zone file is produced separate from the video segment. Each of the hit-zones is defined by a different portion of the hit-zone data and corresponds to a different one of the hidden objects included in the video segment. The spatial regions that define the hit-zones for hidden objects are not visible to a user of the computing system that views the video segment with the hit-zones added. | 12-10-2015 |
20150350340 | MANAGEMENT OF HEADLESS HARDWARE IN DATA CENTER - A data center controller that maintains operation of at least one of its constituent headless hardware devices. An example of a headless hardware device may be server, or a server blade. The data center controller identifies that a particular headless hardware device has an unmanaged state, which means the headless hardware device is non-bootable without further code. In response, the data center controller decides which of one or more operational supplements are to be installed on the headless hardware device. The one or more operational supplements are sufficient at least to transition the headless hardware device from an unmanaged state to a managed state, thus allowing the headless hardware device to complete the boot process. The operational supplement(s) might include a management interface through which the data center controller might provide further management instructions to the headless hardware device. | 12-03-2015 |
20150349509 | BATTERY ISOLATION CIRCUIT - Various embodiments relating to a battery isolation circuit for disconnecting a battery from a load are disclosed. In one embodiment, a battery isolation circuit includes a power switch, a protection circuit module (PCM), and a drive diverter. The power switch may be operatively intermediate a battery and a load. The PCM may be operatively connected to the power switch. The PCM may be configured to selectively drive the power switch to electrically connect the battery to the load. The drive diverter may be configured to interrupt the PCM from driving the power switch in order to electrically disconnect the battery from the load in response to activation of a user-operable switch. | 12-03-2015 |
20150348269 | OBJECT ORIENTATION ESTIMATION - The description relates to estimating object orientation. One example includes determining a first estimate of object orientation using a first technique and image data. In this example, a second estimate of the object orientation can be determined using a second technique and the image data. The first estimate can be corrected with the second estimate to generate a corrected object orientation estimate which can be output. | 12-03-2015 |
20150348132 | COMPETITIVE ADVERTISING TARGETING - Methods, computer systems, and computer-storage media are provided for targeting advertising. Competitive advertising is an important aspect of advertising. To be effective, various influential factors of businesses may be evaluated to identify influence areas such that advertisers can easily identify areas that are susceptible to influence and those that may not be as susceptible. Once identified, bid adjustments may be made to each area such that advertisers are targeting areas with a higher return on investment. | 12-03-2015 |
20150347979 | SOCIAL CALENDAR EVENT SHARING - Social calendar event sharing is described. An event associated with a personal calendar can be shared as a link to a subscription to the event. One instance of the event details can be managed by a social calendar event sharing service that receives the event details, stores the event details associated with the personal calendar of the event organizer, and generates the link. The link can be used by anyone to access the event details and add the event their own personal calendars. The event details are provided as a subscription to the event so that an update to the event can be propagated to the subscribers that have added the event to their calendars. | 12-03-2015 |
20150347846 | TRACKING USING SENSOR DATA - Tracking using sensor data is described, for example, where a plurality of machine learning predictors are used to predict a plurality of complementary, or diverse, parameter values of a process describing how the sensor data arises. In various examples a selector selects which of the predicted values are to be used, for example, to control a computing device. In some examples the tracked parameter values are pose of a moving camera or pose of an object moving in the field of view of a static camera; in some examples the tracked parameter values are of a 3D model of a hand or other articulated or deformable entity. The machine learning predictors have been trained in series, with training examples being reweighted after training an individual predictor, to favour training examples on which the set of predictors already trained performs poorly. | 12-03-2015 |
20150347775 | Seamless Upgrade for Network System - In one embodiment, a network system may be upgraded without losing access to write privileges to a network file | 12-03-2015 |
20150347629 | DISTANCE QUERIES ON MASSIVE NETWORKS - Distance query techniques are provided that are robust to network structure, scale to large and massive networks, and are fast, straightforward, and efficient. A hierarchical hub labeling (HHL) technique is described to determine a distance between two nodes or vertices on a network. The HHL technique provides indexing by ordering vertices by importance, then transforming the ordering into an index, which enables fast exact shortest-path distance queries. The index may be compressed without sacrificing its correctness. | 12-03-2015 |
20150347625 | ESTIMATING INFLUENCE USING SKETCHES - A graph that includes multiple nodes and edges is received. Multiple instances of the graph are generated by randomly instantiating the edges according to either a binary independent cascade model or a randomized edge length independent cascade model. Where the binary independent cascade model is used, combined reachability sketches are generated for each node across all instances of the graph. Where the randomized edge length independent cascade model is used, combined all-distances sketches are generated for each node across all instances of the graph. Depending on which model is used, the combined reachability or all-distances sketches are used to estimate the influence of nodes in the graph or to estimate a subset of nodes from a graph of a specified size with a maximum influence using a greedy algorithm. | 12-03-2015 |
20150347586 | CALENDAR EVENT PERIPHERAL VIEW - Techniques are disclosed for enhancing the presentation of calendar items by providing a calendar event peripheral view of relevant event-related information with a detailed view of a calendar item. The relevant event-related information may be determined by using the item information, such as date and time and location of an event, to gather information from a wide variety of sources, including at least one of an associated calendar of the user and accessible information feeds. | 12-03-2015 |
20150347458 | VISIBILITY OF A POINT OF INTEREST BASED ON ENVIRONMENTAL CONDITIONS - Architecture having an algorithm that computes visible structures for a user within a distance defined by one or more environmental conditions. An environmental condition such as reduced visibility due to a weather condition such as rain, fog, etc., can be used to define a radius about the user in which possible points of interest (POIs) can be identified as viewable based on current weather visibility data. The altitude of the user is considered when identifying the possible POIs. The user is more likely capable of viewing other structures as POIs when the user is at a higher altitude. If the user is known to be standing on a ridge overlooking a city, this information can be processed by the algorithm to then show more POIs relative to this elevated user location than if the user was at approximately zero altitude. A sight map is generated based on these considerations. | 12-03-2015 |
20150347269 | EMULATION-BASED EXPRESSION EVALUATION FOR DIAGNOSTIC TOOLS - Systems, methods and computer program products are described that enable a diagnostic tool, such as a debugger, to evaluate an expression based on the state of a target program process where the expression to be evaluated includes a call to a first function that exists in the target program process but where evaluation of such first function requires evaluation of a second function that does not exist in the target program process. For an expression such as this, the diagnostic tool emulates execution of the first function within a process other than the target program process, such as within the diagnostic tool process. In other embodiments, the emulation capability of the diagnostic tool is leveraged to enable a user thereof to simulate a modification of the target program process without making actual changes to the target program process. | 12-03-2015 |
20150347120 | TECHNIQUES TO ISOLATING A PORTION OF AN ONLINE COMPUTING SERVICE - Techniques to isolating a portion of an online computing service are described. The following description may refer to the isolated portion as a deployment unit configured with a complete build of the online computing service. In one embodiment, after applying one or more changes to the complete build, the deployment unit may be used for testing these changes using end-to-end tests. In another embodiment, the deployment unit may be dedicated to a specific group of tenants that require at least some isolation from other tenants. Other embodiments are described and claimed. | 12-03-2015 |
20150347103 | MULTIPHASED PROFILE GUIDED OPTIMIZATION - Multiphased profile guided optimization optimizes executable code based on data collected during multiple training runs of a training executable. In multiphased profile guided optimization, multiple sets of profiling data are collected where each set of profiling data is associated with a program phase and a particular training run. Program phases include but are not limited to different program features, startup, steady state and shutdown. The program features can run concurrently. Priority of the phases can be specified. | 12-03-2015 |
20150346784 | INTEGRATED VAPOR CHAMBER FOR THERMAL MANAGEMENT OF COMPUTING DEVICES - A vapor chamber may be integrated with one or more components of a computing device to provide thermal management. The vapor chamber may include upper and lower portions forming the vapor chamber, and an annular space between the upper and lower portions that includes a fluid. The vapor chamber may be configured to absorb heat from a heat source of the computing device. Subsequently, the uniform heat transfer may enable the external surfaces of the computing device to achieve substantially isothermal external surface conditions, which may maximize a power dissipation of the computing device for a given ambient temperature ensuring a temperature of the computing device remains at or below safe limits while in use. | 12-03-2015 |
20150346417 | SWITCHABLE BACKLIGHT UNIT - Embodiments for a backlight unit are provided. In one example, a backlight unit comprises a light guide configured to receive light at a first light interface located at an end of the light guide and output light via a second light interface located at a face of the light guide, and a plurality of light sources configured to inject light into the light guide at the first light interface. The example backlight unit also comprises a graded index film configured to receive light from the second light interface of the light guide, homogenize received light that is incident on the graded index film from within a range of acceptance angles and not homogenize light incident on the graded index film from outside of the range of acceptance angles, and direct the homogenized light toward an eye box. | 12-03-2015 |
20150346007 | Detecting Anomalies Based on an Analysis of Input and Output Energies - An analysis system is described herein for detecting anomalies within an environment based on a consideration of resources supplied to, and then used by, resource consumption devices within the environment. For instance, in one implementation, the analysis system may detect leaks of natural gas in a data processing environment based on a consideration of discrepancies in the amounts of gas supplied to the resource consumption devices, relative to the amounts of energy produced by the resource consumption devices, as a result of the use of the gas. In addition, or alternatively, the analysis system may detect abnormal degradation of the resource consumption devices within the data processing environment, such as its fuel cells or generators. That degradation may be attributable to intrinsic failures associated with the fuel cells or generators, and/or to the nature of the loads that have been applied to the fuel cells or generators. | 12-03-2015 |
20150343313 | USER ENFORCEMENT REPUTATION SCORING ALGORITHM & AUTOMATED DECISIONING AND ENFORCEMENT SYSTEM FOR NON-EVIDENCE SUPPORTED COMMUNICATIONS MISCONDUCT - A method of determining an enforcement reputation of a first user of a multi-player computer-based game includes collecting values for a plurality of parameters each indicative of a first user's ability to report unacceptable conduct of other users who have participated in one or more game sessions with the first user and indicative of a likelihood that the first user has participated in unacceptable conduct. An enforcement accuracy score and an enforcement risk score are assigned to the first user based on the values of the plurality of parameters collected for the first user. The accuracy score reflects the first user's ability to report unacceptable conduct of the other users and the enforcement risk score reflects the likelihood that the first user has participated in unacceptable conduct. | 12-03-2015 |
20150342477 | DYNAMIC OPERATION OF OPTICAL HEART RATE SENSORS - An optical heart rate sensor includes an optical source configured to illuminate one or more blood vessels through a user's skin, an optical sensor configured to measure reflected illumination from the blood vessels, and one or more energy storage cells. A controller operates the optical source and optical sensor at a first rate of energy consumption during a first condition, and operates the optical source and optical sensor at a second rate of energy consumption during a second condition. | 12-03-2015 |
20150342067 | FRICTION HINGE FOR TABLET COMPUTERS - Technologies are generally described for a kickstand or similar support device connection mechanism in conjunction with computing devices. A substantially constant gap may be maintained between the kickstand and the device enclosure across the hinge rotation spectrum allowing the hinge and/or the kickstand to be level with the device enclosure. The connection mechanism may support various usage loads and rotation angles up to about 180 degrees, as well as allow for low force opening to a first position. | 11-26-2015 |
20150341652 | RE-ENCODING IMAGE SETS USING FREQUENCY-DOMAIN DIFFERENCES - Approaches to re-encoding image sets using frequency-domain differences, along with corresponding approaches to reversing the re-encoding of the image sets. For example, a re-encoding tool computes frequency-domain differences between (a) quantized coefficients for a block from encoded data in a first format and (b) quantized coefficients for a prediction of the block. The re-encoding tool entropy codes the frequency-domain differences, producing encoded data in a second format for the compressed images. Such re-encoding can significantly reduce storage cost for previously compressed images, compared to the storage cost for the previously compressed images in the first format, without hurting image quality. Subsequently, the previously compressed images in the first format can be recovered from the encoded data in the second format. Or, the encoded data in the second format can be decoded to reconstruct the images. | 11-26-2015 |
20150341591 | Automatically Curating Video to Fit Display Time - Various other embodiments enable a processing device to receive at least a first set of images from a capture device. In some cases, the first set of images is a video clip captured using a first frame rate over a first duration of time. In some embodiments, the processing device analyzes the first set of images to determine one or more properties associated with the images. Based upon the determined properties, some embodiments modify and playback the first set of images at a second frame rate over a second duration of time. | 11-26-2015 |
20150341572 | Automatic Insertion of Video into a Photo Story - Various embodiments provide a capture device, e.g., a camera, that is configured to have multiple capture modes including an image capture mode and a video capture mode. The capture device can be set to the image capture mode in which images or photos are periodically, automatically captured. Upon detection of a particular event, such as an audibly detectable event, the capture device automatically triggers the video capture mode and begins to capture video. After a period of time, the capture device can transition back to the image capture mode. Transition to the image capture mode can occur in various ways, e.g., after passage of a period of time, after the audibly detectable event terminates or attenuates, by way of user input and the like. In some embodiments, the capture device can be embodied as a wearable camera that is worn by a user. | 11-26-2015 |
20150341559 | Thumbnail Editing - Various embodiments enable a capture device to capture at least one high resolution image and generate a low resolution image based on the high resolution image. Some embodiments transfer an associated low resolution image file to a second device prior to transferring the corresponding associated high resolution image file. In some cases, the low resolution image can be analyzed to determine one or more properties associated with the low resolution image. Processing decisions associated with the high resolution image can then be based on the property or properties of the low resolution image. | 11-26-2015 |
20150341463 | CLIENT-SIDE FLIGHT VERSION ACQUISITION - One or more techniques and/or systems are provided for client-side flight version acquisition. For example, a client-side deployment component, hosted on a client device, may identify an application package available for retrieval (e.g., a shopping application package) from a remote source. A flight description for the application package may be evaluated using a user authorized client context (e.g., a gender and age of a user) to identify a qualifying flight version of the application package (e.g., a teenage female version of the shopping application package). The flight version may be acquired from the remote source, and may be deployed on the client device. Performing client-side flight version selection and acquisition may improve privacy of user data (e.g., by maintaining the client context on the client device) and may offload processing from the remote source (e.g., an app distribution service that may service a plethora of client devices). | 11-26-2015 |
20150341372 | IDENTIFYING SUSPECTED MALWARE FILES AND SITES BASED ON PRESENCE IN KNOWN MALICIOUS ENVIRONMENT - Disclosed herein is a system and method for identifying potential sources of malicious activity as well as identifying potentially malicious files that originated from suspected malicious sources. Using an anchor event and telemetry data from devices known to have been infected by malicious activity similar events in the telemetry data between two devices can be identified. These satellite events are then used to identify other files that may have been deposited by the satellite event such that those files can be highlighted to a malware researcher. Additionally, the malware protection may be updated based on this analysis to label an associated site with the satellite event as a malicious site such that the site may be blocked or quarantined. | 11-26-2015 |
20150341346 | Bifurcated Authentication Token Techniques - Bifurcated authentication token techniques are described in which sign-on credentials are separated from corresponding privilege data for resources. During client authentication, a determination is made regarding whether a service provider is configured to support bifurcated authentication token techniques. If the techniques are supported, a lightweight token is issued to the client and corresponding privilege data is stored separately from the token in a centralized authentication database. If a service provider does not support bifurcated authentication token techniques, a traditional, combined authentication token that includes privilege data is issued to the client. The lightweight token contains identity information and a reference to the privilege data, but does not contain the actual privilege data. Therefore, the lightweight cookie token alone is not sufficient to gain access to corresponding resources. Moreover, privileges associated with a lightweight token may be revoked or altered without having to change or invalidate the lightweight token itself. | 11-26-2015 |
20150339841 | LAYOUT ANIMATION PANEL - Layout animation that automatically plays in response to a change in layout on UI platforms that typically require animations to be defined prior to the layout being calculated is provided. Developers are enabled to specify how one or more elements should animate via animation values that are relative to an unknown initial layout and an unknown final layout. When a property change event that triggers animation of an element occurs, the initial layout and the final layout of the element and its child elements are calculated. The animations are then scheduled to interpolate the changes in layout. | 11-26-2015 |
20150339267 | GUIDES ON A CONTENT GENERATION SYSTEM - User inputs are received on a visual display, when a user is generating visual content. The user inputs trigger guide functionality, and guides are displayed to guide the user in creating the visual content. | 11-26-2015 |
20150339154 | FRAMEWORK FOR AUTHORING DATA LOADERS AND DATA SAVERS - Implementing static loaders and savers for the transfer of local and distributed data containers to and from storage systems can be difficult because there are so many different configurations of output formats, data containers and storage systems. Described herein is an extensible componentized data transfer framework for performant and scalable authoring of data loaders and data savers. Abstracted local and distributed workflows drive selection of plug-ins that can be composed by the framework into particular local or distributed scenario loaders and savers. Reusability and code sparsity are maximized. | 11-26-2015 |
20150338943 | INTER-DISPLAY COMMUNICATION - Embodiments are disclosed that relate to electrostatic communication among displays. For example, one disclosed embodiment provides a multi-touch display comprising a display stack having a display surface and one or more side surfaces bounding the display surface, a touch sensing layer comprising a plurality of transmit electrodes positioned opposite a plurality of receive electrodes, the touch sensing layer spanning the display surface and bending to extend along at least a portion of the one or more side surfaces of the display, and a controller configured to suppress driving the plurality of transmit electrodes of the touch sensing layer for an interval, and during that interval, receive configuration information from a transmit electrode of a touch sensing layer in a side surface of an adjacent display. | 11-26-2015 |
20150338916 | FINGER TRACKING - The description relates to smart rings. One example can include a finger band configured to accommodate a user's finger. This example can also include a set of pressure sensors positioned on an inner surface of the finger band and configured to sense changes to tendons of the user's finger as pressure differentials and to output associated signals. The example can further include a gesture component configured to interpret the signals from the set of pressure sensors to identify individual actions performed by the user's finger. | 11-26-2015 |
20150334564 | TRANSPARENT TWO-FACTOR AUTHENTICATION VIA MOBILE COMMUNICATION DEVICE - Two-factor authentication can be provided transparently to a user by virtue of proof information available at a mobile communication device. For example, after an access request for a service is sent, an authentication code can be intercepted from a responsive incoming message. The technologies can incorporate a cost proof as part of a cost optimization. Other features such as obfuscation and separate channels can be incorporated into the technologies to provide a superior user experience while implementing superior security. | 11-19-2015 |
20150332672 | Knowledge Source Personalization To Improve Language Models - Systems and methods are provided for improving language models for speech recognition by personalizing knowledge sources utilized by the language models to specific users or user-population characteristics. A knowledge source, such as a knowledge graph, is personalized for a particular user by mapping entities or user actions from usage history for the user, such as query logs, to the knowledge source. The personalized knowledge source may be used to build a personal language model by training a language model with queries corresponding to entities or entity pairs that appear in usage history. In some embodiments, a personalized knowledge source for a specific user can be extended based on personalized knowledge sources of similar users. | 11-19-2015 |
20150332670 | Language Modeling For Conversational Understanding Domains Using Semantic Web Resources - Systems and methods are provided for training language models using in-domain-like data collected automatically from one or more data sources. The data sources (such as text data or user-interactional data) are mined for specific types of data, including data related to style, content, and probability of relevance, which are then used for language model training. In one embodiment, a language model is trained from features extracted from a knowledge graph modified into a probabilistic graph, where entity popularities are represented and the popularity information is obtained from data sources related to the knowledge. Embodiments of language models trained from this data are particularly suitable for domain-specific conversational understanding tasks where natural language is used, such as user interaction with a game console or a personal assistant application on personal device. | 11-19-2015 |
20150332489 | FAST SOLVING FOR LOOP CLOSURE - The subject disclosure is generally directed towards a relatively fast and accurate technology that corrects mobile device (e.g., mobile robot) mapping data into corrected map data based upon detection of loop closure. A variation of stochastic gradient descent (with constraints in a deterministic order) may be used in a first correction phase to provide an updated graph in a relatively fast manner by operating in a relative state space. A graph-based variant of Gauss-Seidel that operates in a global state space may be used in a later phase to refine the updated graph into a more exact graph. | 11-19-2015 |
20150332334 | PERSONALIZED GROUP COUPONS AND OFFERS WITH USER EXPERIENCE - A user experience (UX) that enables viewing and identification of other people in the user network of friends, that received a group coupon, and the participation status of the friends. The UX enables the user to chat with the people in the user's network of friends about a specific coupon that was received, enables the creation of a group of friends and the adding of another friend with high density friendship of shared common interests and/or location based on specific offer content, enables granularity on a sub-group of friends based on joint interests, the controlled exposure to the user that received the group coupon offer, the identity of other users in his group that got this coupon offer, controlled exposure to the user that received the group coupon offer, the identity of other users in his group that committed to buy the coupon, and if the group will redeem the coupon. | 11-19-2015 |
20150331950 | GENERATING DISTINCT ENTITY NAMES TO FACILITATE ENTITY DISAMBIGUATION - Computer-readable media, computer systems, and computing methods for facilitating generation of entity names for entities are provided. The method includes determining a set of previously submitted queries that are associated with an entity. The most frequently used query within the set of previously submitted queries associated with the entity can be identified and, thereafter, designated as the entity name for the entity. The entity name can distinguish the entity from other entities. Such an entity name can be provided for presentation to a user, for example, as a related search suggestion via a search results page. | 11-19-2015 |
20150331929 | NATURAL LANGUAGE IMAGE SEARCH - Natural language image search is described, for example, whereby natural language queries may be used to retrieve images from a store of images automatically tagged with image tags being concepts of an ontology (which may comprise a hierarchy of concepts). In various examples, a natural language query is mapped to one or more of a plurality of image tags, and the mapped query is used for retrieval. In various examples, the query is mapped by computing one or more distance measures between the query and the image tags, the distance measures being computed with respect to the ontology and/or with respect to a semantic space of words computed from a natural language corpus. In examples, the image tags may be associated with bounding boxes of objects depicted in the images, and a user may navigate the store of images by selecting a bounding box and/or an image. | 11-19-2015 |
20150331857 | DATABASE MIGRATION - A migration framework includes a migration status data store that stores the migration status of a variety of different databases that are being migrated. A migration manager monitors the migration status of the different databases and invokes migration scripts to perform migration steps on the various databases, based upon their migration status. As the migration steps are completed, a status update component updates the migration status of the various databases that are being migrated. | 11-19-2015 |
20150331838 | DESCRIBING DATA TRANSFORMATIONS USING MARKUP LANGUAGE EXTENSIONS - Markup language inputs are received for generating a markup language description of an item to be rendered. The markup language inputs include in-line metadata describing a transformation to be performed on a data item before it is rendered. The markup language description, including the in-line metadata describing the transformation, is generated and presented for transformation and rendering. | 11-19-2015 |
20150331727 | CODE SERVICE FOR LANGUAGE-INDEPENDENT DISPATCH - Disclosed herein are systems, methods, and software to enhance the interoperability of components written in different programming languages. In an implementation, a code service receives a request message communicated by an application component via a message interface in an application environment that is at a layer above a target environment. The request message includes a request to invoke a target component available in the target environment and programmed in a language different from that of the application component. In response to the request, the service identifies at least a service component associated with invoking the target component in the target environment. The service component is executed to invoke the target component via a component interface. | 11-19-2015 |
20150331701 | INTERACTIVE VIEWER OF INTERMEDIATE REPRESENTATIONS OF CLIENT SIDE CODE - An interactive intermediate representation (IR) viewer displays a view of the intermediate representation of client side code during a just-in-time compilation of the client side code in a live environment. The interactive IR viewer allows a developer to request the intermediate representation generated during one or more of the phases of the JIT compilation of the client side code. Modifications may be made to the intermediate representation before executable code is generated. The analysis of the intermediate representation during the live environment provides a developer with insight as to how the executable code is being compiled so that improvements may be made to improve the performance of the client side code. | 11-19-2015 |
20150331673 | Contextual Focus-Agnostic Parsing-Validated Alternatives Information - Parsing-validated alternatives information (PVAI) is acquired from inactive software development contexts and displayed in the current context to help developers understand how changes to an artifact will impact other contexts. A PVAI request occurs at user request or proactively, in a stand-alone tool or an integrated development environment. PVAI is obtained and acquired from active and inactive contexts, unified, and displayed with corresponding context IDs. PVAI provides parsing-validated information for identifier autocompletion, parameter selection, class or object member selection, routine references, and software construct declarations. Development contexts have dimensions such as target platform, lifecycle configuration, target operating system, graphics processing configuration, numeric processing configuration, IDE project, and licensing configuration. Development context candidates for PVAI acquisition are determined from user preferences and by exclusion of unrealized contexts. PVAI acquisition cost is reduced by reusing computational results in another context. PVAI code can be distributed and/or run in the background. | 11-19-2015 |
20150331578 | ACTIVE SUMMARIES IN USER INTERFACES TO COLLABORATION SERVICES - Disclosed herein are systems, methods, and software to enhance the user experience with collaboration services. In at least one implementation, the presentation of a user interface to a collaboration service is enhanced by identifying collaboration sites associated with a user and identifying events that occurred with respect to the collaboration sites. Active summaries are then surfaced in the user interface that correspond to the collaboration sites associated with the user. In addition, active elements are surfaced in the active summaries that are indicative of at least the events that occurred with respect to the collaboration sites associated with the user. | 11-19-2015 |
20150331463 | Power Management Contracts for Accessory Devices - Power management contracts for accessory devices are described. In one or more implementations, a power management contract is established for a system including a host computing device and an accessory device based at least in part upon power exchange conditions observed for the system. The power management contracts define operating constraints for power exchange between components of the system, including at least a power exchange direction and current limits. The host computing device and accessory devices are each configured to renegotiate the power management contract to dynamically change operating constraints in “real-time.” Additionally, different power management contracts may be associated with identifying data corresponding to different types of accessory devices. | 11-19-2015 |
20150331461 | Computing Device having a Spectrally Selective Radiation Emission Device - A computing device having a spectrally selective radiation emission device is described. In one or more implementations, an apparatus includes a housing, one or more electrical components disposed within the housing, and a spectrally selective radiation emission device. The one or more electrical components are configured to generate heat during operation. The spectrally selective radiation emission device is disposed on the housing and configured to emit radiation when heated by the one or more electrical components at one or more wavelengths of electromagnetic energy and reflect radiation at one or more other wavelengths of electromagnetic energy. | 11-19-2015 |
20150331416 | PROGRAM SYNTHESIS FOR ROBOTIC TASKS - Robotic task program synthesis embodiments are presented that generally synthesize a robotic task program based on received examples of repositioning tasks. In one implementation, the exemplary repositioning tasks are human demonstrations of object manipulation in an actual or displayed robot workspace. A domain specific language (DSL) designed for object repositioning tasks is employed for the robotic control program. In general, candidate robotic task programs are generated from the example tasks. Each candidate program includes instructions for causing the robot to reposition objects, and represents a different permutation of instructions consistent with the received example tasks. The candidate programs are ranked, and whenever the top ranking program accomplishes the repositioning specified in each example task, it is designated as the synthesized robotic task program. | 11-19-2015 |
20150331415 | ROBOTIC TASK DEMONSTRATION INTERFACE - Robotic task demonstration interface embodiments are presented that generally employ a user interface to synthesize a robotic control program based on user demonstrations of object repositioning tasks, where the user manipulates objects in a displayed workspace to indicate what tasks that it is desired for a robot to perform on objects in the actual workspace associated with the robot. For example, this can involve a user repositioning objects displayed on a touch screen of a tablet computer. The configuration of the displayed workspace can be changed and additional repositioning examples performed. A robotic control program is synthesized for instructing the robot to perform the tasks indicated in the object repositioning demonstrations. The resulting learned robotic control program can be executed virtually for validation purposes, before applying it to the robot. | 11-19-2015 |
20150327068 | DISTRIBUTING CONTENT IN MANAGED WIRELESS DISTRIBUTION NETWORKS - Multiple portions of protected content to host on a device are identified by the device, the multiple portions including one or more portions of each of one or more pieces of protected content. The multiple portions are obtained and stored on the device. The device is one of multiple devices in a managed wireless distribution network that allows portions of protected content to be transferred among the multiple devices via multiple wireless networks hosted by various ones of the multiple devices, and the device is configured to store portions of protected content that can be consumed by a user of the device only if the user of the device has permission to consume the protected content. Participation of the device in the managed wireless distribution network can also be identified, and a reward generated based on the participation of the device in the managed wireless distribution network. | 11-12-2015 |
20150327015 | LOCATION TRACKING BASED ON OVERLAPPING GEO-FENCES - A system for controlling a device to track the location of the device is provided. The system identifies an initial location of the device. The system then identifies a plurality of areas having different sizes. Each area encompasses the identified location. For each of the areas, the system registers the area with a location provider to receive a notification when the location provider detects that the device has left the area. Upon receiving a notification that the device has left an area, the system may repeat the process of identifying the location and the areas and registering the areas to continue tracking the location of the device. | 11-12-2015 |
20150326799 | REDUCING CAMERA INTERFERENCE USING IMAGE ANALYSIS - Various embodiments relating to reducing camera interference are disclosed. In one embodiment, an infrared image of a scene may be received from a camera that emits infrared light. An interference condition likely to degrade infrared performance of one or more proximate infrared devices may be recognized. Responsive to recognizing the interference condition, an instruction to mitigate the interference condition may be output. | 11-12-2015 |
20150326644 | TRAVELING MAP-REDUCE ARCHITECTURE - A “traveling” map-reduce operation with full context that can skip between data stores and devices. The “traveling” aspect means the map-reduce operation request can be communicated to specific agents to operate on local data of the agents. The traveling map-reduce operation protects privacy and avoids leakage of user private data. The traveling map-reduce operation can run over long periods of time and work on data stores which are not always connected (offline). The architecture employs a context free online controller and a set of on-premise (on device) agents that reside in the data store (device). | 11-12-2015 |
20150326577 | ACCELERATED APPLICATION AUTHENTICATION AND CONTENT DELIVERY - A samples service is configured to provide accelerated application authentication and content delivery. A proof of identity of a client application is exchanged with credentials that are used to authenticate the client application to a content provider. Samples of documents from the content provider are selected based on a contextual information of the client application to provide it with customized content. Static data associated with the samples are provided instead of dynamic data that is resource intensive to generate. | 11-12-2015 |
20150326457 | FINE-GRAINED NETWORK MONITORING - In some cases, a network monitoring system may determine an operating or health condition of a node or connection link in a network (e.g., a datacenter network) by preparing an encapsulated data packet according to a tunneling protocol. Depending on a result of routing the encapsulated data packet, the network monitoring system determines whether the node or connection link is functioning normally or is experiencing an issue such as overloading or malfunctioning. | 11-12-2015 |
20150325236 | CONTEXT SPECIFIC LANGUAGE MODEL SCALE FACTORS - The customization of recognition of speech utilizing context-specific language model scale factors is provided. Training audio may be received from a source in a training phase. The received training audio may be recognized utilizing acoustic and language models being combined utilizing static scale factors. A comparison may then be made of the recognition results to a transcription of the training audio. The recognition results may include one or more hypotheses for recognizing speech. Context specific scale factors may then be generated based on the comparison. The context specific scale factors may then be applied for use in the speech recognition of audio signals in an application phase. | 11-12-2015 |
20150325235 | Language Model Optimization For In-Domain Application - Systems and methods are provided for optimizing language models for in-domain applications through an iterative, joint-modeling approach that expresses training material as alternative representations of higher-level tokens, such as named entities and carrier phrases. From a first language model, an in-domain training corpus may be represented as a set of alternative parses of tokens. Statistical information determined from these parsed representations may be used to produce a second (or updated) language model, which is further optimized for the domain. The second language model may be used to determine another alternative parsed representation of the corpus for a next iteration, and the statistical information determined from this representation may be used to produce a third (or further updated) language model. Through each iteration, a language model may be determined that is further optimized for the domain. | 11-12-2015 |
20150324846 | USING CARD-LINKED OFFER DATA TO DETECT USER INTERESTS - Aspects of the present invention utilize card-linked offer data to determine a user's interests. In one aspect, the card-linked offer data is analyzed by a card-linked offer system to determine user interests. The user interests are then transferred to other applications, such as a search engine or advertising system, that use the interest information to select relevant content. In another aspect, the card-linked offer data is transferred to other applications that use the data to determine user interests. The card-linked offer data may be combined with other information, such as a user's browsing history, search history, social network posts, and such, to determine a user's interest. | 11-12-2015 |
20150324601 | Managed Wireless Distribution Network - A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi networks). Each device in the managed wireless distribution network can host at least one wireless network and/or join at least one wireless network. Content in the managed wireless distribution network is protected so that the content cannot be consumed unless permission to consume the content is obtained. Devices can host portions of protected content regardless of whether they can consume the protected content, and can obtain portions of protected content via the wireless networks of the managed wireless distribution network without having to access a content service over the Internet. | 11-12-2015 |
20150324556 | CONTENT DELIVERY PRIORITIZATION IN MANAGED WIRELESS DISTRIBUTION NETWORKS - A managed wireless distribution network includes multiple devices that communicate with one another via multiple wireless networks (e.g., multiple Wi-Fi networks). Each device in the managed wireless distribution network can host at least one wireless network and/or join at least one wireless network. Content in the managed wireless distribution network is protected so that the content cannot be consumed unless permission to consume the content is obtained. Devices can host portions of protected content regardless of whether they can consume the protected content, and can obtain portions of protected content via the wireless networks of the managed wireless distribution network without having to access a content service over the Internet. | 11-12-2015 |
20150324555 | CONTENT DISCOVERY IN MANAGED WIRELESS DISTRIBUTION NETWORKS - A content store is maintained in a device, the device being one of multiple devices in a managed wireless distribution network that allows portions of protected content to be transferred among the multiple devices via multiple wireless networks hosted by various ones of the multiple devices. The content store is configured to maintain portions of protected content that can be consumed by a user of the device only if the user of the device is licensed to consume the protected content. An indication of portions of protected content stored in the content store is provided to each of a set of the multiple devices or to a network management service. Routes to portions of content in the managed wireless distribution network can be identified by the network management service or the multiple devices. | 11-12-2015 |
20150324099 | Connecting Current User Activities with Related Stored Media Collections - A Media Presentation System (MPS) identifies a user's current activity and then attempts to deliver one or more media items that are relevant to the user's current activity. In other words, those media items are determined to exhibit a pattern of previous user activity that matches the user's current activity. In one case, the MPS may determine that the user is engaged in a communication system with another user, using a communication system, such as a video communication system. In response, the MPS can present media items that pertain to the two users in the course of their communication session. For instance, at least some of the media items may have been captured in previous communication sessions between the two users. | 11-12-2015 |
20150323992 | SCULPTED DISPLAYS FOR CLICKABLE USER INTERACTIONS - Systems and methods are disclosed of a touch screen display wherein the surface of the touch screen display comprises a sculpted and/or contoured portion. The sculpted/contoured portion gives a user a tactile sense of a portion of the touch screen where commands may be actuated and/or data may be selected. The touch screen display may further be in communication with a physical switch where additional pressure by the user may be used to actuated a command associated with a selected portion of the display. Such a switch may be a piezo structure or other type of physical switch that may also be incorporated into a smart device/controller. Other embodiments may comprise haptic and/or audio feedback upon detection of the user's presence at a desired part of the touch screen display. | 11-12-2015 |
20150323646 | LOCATION ERROR RADIUS DETERMINATION - A system and method determining an error radius reflecting the accuracy of a calculated position of a processing device is provided. A data structure includes an error radius mapped to a scaled geographic area or “tile” comprising an area in which a calculated position may be determined. The data structure may include a plurality of first fields identifying a scaled geographic area based on a global projection reference system, and a plurality of second fields identifying, for each of the first fields, a position error radius associated with a scaled geographic area and level. For any calculation of an inferred position based on beacon observations, a rapid lookup of the corresponding scaled area including the new inferred position in the data structure returns an error radius for the new inferred position. | 11-12-2015 |
20150319234 | LOAD BALANCING SCALABLE STORAGE UTILIZING OPTIMIZATION MODULES - A method includes determining that a trigger condition of a triggered optimization module of a plurality of optimization modules is met and optimizing scalable storage based on an optimization routine. The optimization routine includes providing a plurality of candidate operations and for a selected optimization module of the plurality of optimization modules that has a higher priority than the triggered optimization module, removing a candidate operation from the plurality of candidate operations that would diminish a modeled state of the scalable storage for the selected optimization module. The optimization routine also includes determining at least one operation of the plurality of candidate operations that would improve the modeled state of the scalable storage for the triggered optimization module and updating the modeled state of the scalable storage to model executing the at least one operation. The method further includes executing the at least one operation. | 11-05-2015 |
20150319176 | Client-Side Integration Framework of Services - Systems and methods for providing client-side integration of apps and services is provided. An integration framework execution upon a computing device provides integration of various apps, applications, services, sensors and the like. Upon receiving a request for a service, the integration framework accesses a registry of a plurality of services of a respective plurality of providers registered with the integration framework. Each of the services is registered with the integration framework is associated with a trust level of a hierarchy of trust levels. The integration framework iteratively searches the registry for a provider of the requested service according to the hierarchy of trust levels, beginning with the most trusted level of the trust levels to the less trusted trust level until a provider of the requested service is found or until all levels of the hierarchy are searched without finding a provider of the requested service. | 11-05-2015 |
20150318870 | VARIABLE WIDTH ERROR CORRECTION - Variable width error correction is described. A memory controller can determine, from a memory address, what type of error correction is to be applied for the address region of that memory address and can generate commands for the memory device. An amount of error correction metadata associated with that address region may vary depending on the spatial location of the address region. In some cases, two translations may be performed: one by a processor using information set up by an operating system and another by the memory controller (or the memory device). In other cases, a single translation may be performed, for example by a processor using information set up by the operating system, which can determine the variable error correction during translation of a virtual address region to a real physical address region. | 11-05-2015 |
20150317582 | OPTIMIZING TASK RECOMMENDATIONS IN CONTEXT-AWARE MOBILE CROWDSOURCING - A “Context-Aware Crowdsourced Task Optimizer” provides various processes to optimize task recommendations for workers in mobile crowdsourcing scenarios by automatically identifying and recommending bundles of tasks compatible with workers' contexts (e.g., worker history, present or expected locations, travel paths, working hours, skill sets, capabilities of worker's mobile computing devices, etc.). The Context-Aware Crowdsourced Task Optimizer bundles tasks to both maximize expected numbers of completed tasks and to dynamically price tasks to maximize the system's utility, which is a function of task values and task completion rates. Advantageously, the resulting task identification and recommendation process incentivizes individual workers to perform more tasks in a shorter time period, thereby helping tasks to complete faster, even with smaller budgets. While such optimization problems are NP-hard, the Context-Aware Crowdsourced Task Optimizer exploits monotonicity and submodularity of various objective functions to provide computationally feasible task identification and recommendation algorithms with tight optimality bounds. | 11-05-2015 |
20150317510 | RATING PHOTOS FOR TASKS BASED ON CONTENT AND ADJACENT SIGNALS - Technologies for selecting a representative subset of images from a set of images, the selecting based at least in part on rating the images in the set based on task, Image, and/or adjacent information. An Indication of the task may be embodied in a query provided by a user. The task may indicate the user's intended use of the subset of images. The set of images may be grouped into one or more clusters that are based on technical attributes of the images in the set, and/or technical attributes indicated by the task. Adjacent information may be obtained from sources that are generally unrelated or indirectly related to the images in the set. Technical attributes such as face quality, face frequency, and relationship are based on facial recognition functionality that detects faces and their features in an image, and that calculates information such as a face signature that, across the images in the set, uniquely identifies an entity that the face represents, and that determines facial expressions such as smiling, sad, and neutral. | 11-05-2015 |
20150317389 | Learning Multimedia Semantics from Large-Scale Unstructured Data - Systems and methods for learning topic models from unstructured data and applying the learned topic models to recognize semantics for new data items are described herein. In at least one embodiment, a corpus of multimedia data items associated with a set of labels may be processed to generate a refined corpus of multimedia data items associated with the set of labels. Such processing may include arranging the multimedia data items in clusters based on similarities of extracted multimedia features and generating intra-cluster and inter-cluster features. The intra-cluster and the inter-cluster features may be used for removing multimedia data items from the corpus to generate the refined corpus. The refined corpus may be used for training topic models for identifying labels. The resulting models may be stored and subsequently used for identifying semantics of a multimedia data item input by a user. | 11-05-2015 |
20150317334 | SPARSE DATATABLE DATA STRUCTURE - A sparse dataset structure is created by creating column vectors for one or more columns in a dataset that have at least one significant value. Each column vector includes data values for columns of the dataset. Each column vector that is a sparse column vector includes a look-up index array and a value array. Entries in the look-up index array represent columns. The value array includes values for a row in a column. Each entry in the value array points to a row entry in the look-up index array. A side structure includes a row index and a column index. The row index includes a location for an entry for each row where entries point to a location in the column index that identifies a column that has a first significant entry for a row. Alternatively a sparse dataset could be constructed with sparse rows. | 11-05-2015 |
20150317327 | Hierarchical Index Based Compression - Computer-readable media, systems, and methods for hierarchical index based compression are described. In embodiments, a hierarchical data log or key-value pair based data log, such as a JSON log, is received and a tree-structured index (index tree) is recursively constructed. In one embodiment, the log comprises search-engine user interaction information. Structural information of the log is preserved by the index tree structure; for example, each node of the log has a corresponding index-tree node. Frequently repeating keys, values, and correlated key-value pairs may be stored in the index-tree node, which may be indexed using multiple levels of detail including a raw-string level for raw string representations of the node, a first level for indexing keys and common values, and a second level for indexing correlated key-value pairs. The index tree may be used to compress rows of the data log and also used to decompress and restore the log. | 11-05-2015 |
20150317313 | SEARCHING LOCALLY DEFINED ENTITIES - A user can select a name of an entity such as a character in a book. In response to the selection, the passages of the book are processed using entity frequency and passage length to determine passages that are relevant to the entity. These relevant passages are processed to determine which of the relevant passages are descriptive and are most likely to help a user understand the entity by identifying characteristics of helpful passages such as words that indicate particular actions, words that are associated with biographical information, or the location of the passage in the book. The most descriptive passages can be shown to the user on the computing device that he is using to view the book. | 11-05-2015 |
20150312694 | HRTF PERSONALIZATION BASED ON ANTHROPOMETRIC FEATURES - The derivation of personalized HRTFs for a human subject based on the anthropometric feature parameters of the human subject involves obtaining multiple anthropometric feature parameters and multiple HRTFs of multiple training subjects. Subsequently, multiple anthropometric feature parameters of a human subject are acquired. A representation of the statistical relationship between the plurality of anthropometric feature parameters of the human subject and a subset of the multiple anthropometric feature parameters belonging to the plurality of training subjects is determined. The representation of the statistical relationship is then applied to the multiple HRTFs of the plurality of training subjects to obtain a set of personalized HRTFs for the human subject. | 10-29-2015 |
20150312652 | AUTOMATIC GENERATION OF VIDEOS VIA A SEGMENT LIST - A system and method are disclosed for automatically generating a highlight reel of video content. Segments from a segment list may be associated with, or indexed to, corresponding sequences from a video of an event for which the segment list is prepared. Thereafter, also using the segment list, segments may be scored using a variety of predefined criteria to come up with segments which are likely to be of greatest interest to a particular user. The video sequences associated with the highest scored segments are used as the video highlight reel. | 10-29-2015 |
20150312375 | PRE-FETCHING GRID BLOCKS BY USER INTENT - Disclosed herein are systems, methods, and software to enhance user experiences with online services and hosted content. In at least one implementation, an initial user interaction with a user interface to a local model of content is detected. The local model of the content comprises an initial portion of the content downloaded to the local model. A subsequent user interaction with the user interface to the local model of the content is predicted based at least in part on the initial user interaction. A subsequent portion of the content is then identified for downloading to the local model of the content in anticipation of the subsequent user interaction occurring. The subsequent portion is identified based at least in part on the subsequent user interaction. | 10-29-2015 |
20150312325 | ENHANCED RELIABILITY FOR CLIENT-BASED WEB SERVICES - Disclosed herein are systems, methods, and software for providing enhanced reliability for web services. In an implementation, a proxy service supports web services provided by a client application to at least an online service. While the client application is temporarily disconnected from the proxy service, the proxy service monitors for web services activity to occur in association with the web services provided by the client application to at least the online service. In response to the client application reconnecting to the proxy service after having been temporarily disconnected from the proxy service, the proxy service communicates activity information to the client application indicative at least of whether or not to query the online service with respect to the web services activity. | 10-29-2015 |
20150311013 | INCREASING YIELD WITH TACTILE BUTTON GAP ADJUSTMENT - Embodiments of the disclosure optimize yield of a product having one or more switch assemblies and improve impact robustness of the product without sacrificing tactile feel. Based on failure limits of a gap in the switch assembly during manufacturing, a single size for a shim is calculated. The shim is selectively inserted into the switch assembly based on the gap to maximize the switch assembly yield while minimizing cost. In some examples, a bracket is designed for the switch assemblies. The bracket has datum surfaces in three dimensions and a beam tuned to absorb energy during an impact event to prevent switch failure. | 10-29-2015 |
20150310862 | DEEP LEARNING FOR SEMANTIC PARSING INCLUDING SEMANTIC UTTERANCE CLASSIFICATION - One or more aspects of the subject disclosure are directed towards performing a semantic parsing task, such as classifying text corresponding to a spoken utterance into a class. Feature data representative of input data is provided to a semantic parsing mechanism that uses a deep model trained at least in part via unsupervised learning using unlabeled data. For example, if used in a classification task, a classifier may use an associated deep neural network that is trained to have an embeddings layer corresponding to at least one of words, phrases, or sentences. The layers are learned from unlabeled data, such as query click log data. | 10-29-2015 |
20150310858 | SHARED HIDDEN LAYER COMBINATION FOR SPEECH RECOGNITION SYSTEMS - Providing a framework for merging automatic speech recognition (ASR) systems having a shared deep neural network (DNN) feature transformation is provided. A received utterance may be evaluated to generate a DNN-derived feature from the top hidden layer of a DNN. The top hidden layer output may then be utilized to generate a network including a bottleneck layer and an output layer. Weights representing a feature dimension reduction may then be extracted between the top hidden layer and the bottleneck layer. Scores may then be generated and combined to merge the ASR systems which share the DNN feature transformation. | 10-29-2015 |
20150310614 | COLLABORATIVE ALIGNMENT OF IMAGES - Techniques for aligning images are disclosed. The frames might have been captured by a video camera on a hand held device, as one example. Collaboratively aligning related frames of image data is taught. Collaborative alignment determines a correspondence between pixels in pairs of the frames of image data, as well as a confidence in that correspondence. A coordinate system (or transformation) is assigned to each of the frames that is consistent with the correspondences between each of the frame pairs. The confidence in the respective correspondences may be used to provide a weighting to a correspondence when assigning the coordinate systems. Outlying frames may be discarded, and the process repeated for a robust solution. | 10-29-2015 |
20150310529 | WEB-BEHAVIOR-AUGMENTED RECOMMENDATIONS - One or more web-behavior-augmented recommendation servers augment catalog interaction data between consumers and a catalog of products with collected online web behavior data associated with individual users. The online web behavior data represents online web behavior of the each consumer outside of the catalog of products and can improve the accuracy of product recommendations, which then be presented to an individual consumer via a computer user interface. | 10-29-2015 |
20150310472 | MANAGEMENT OF ON-DEMAND CONTENT - Various embodiments relating to managing content sharing and consumption are disclosed. In one embodiment, a consumer may be issued a lifetime license for a content item. In response to issuing the lifetime license to the consumer one or more share credits may be issued to the consumer. A request to consume a requested content item on a temporary basis may be received from the consumer. A temporary digital authorization usable by the consumer to consume the requested content item on a temporary basis may be issued to the consumer in exchange for a share credit. | 10-29-2015 |
20150310343 | REAL TIME INTERACTIVE PREDICTION - Providing predictive data predicting data values for a historical dataset. The method facilitates improving the accuracy of the predictive data by identifying for a user, and allowing the user to select ancillary datasets that can be evaluated, using a predictive evaluation, together with a historical dataset to improve the accuracy of the predictive data. A user interface is provided to a user. The user interface identifies one or more ancillary datasets. The ancillary datasets are identified to the user based on the ancillary datasets meeting a threshold condition to a historical dataset. The ancillary datasets are selectable by the user in the user interface. User input is received at the user interface selecting one or more of the ancillary datasets. A predictive dataset is displayed to the user. The predictive dataset is determined by predictive evaluation of the historical dataset and the one or more selected ancillary datasets. | 10-29-2015 |
20150310263 | FACIAL EXPRESSION TRACKING - The description relates to facial tracking. One example can include an orientation structure configured to position the wearable device relative to a user's face. The example can also include a camera secured by the orientation structure parallel to or at a low angle to the user's face to capture images across the user's face. The example can further include a processor configured to receive the images and to map the images to parameters associated with an avatar model. | 10-29-2015 |
20150310261 | CREATION OF REPRESENTATIVE CONTENT BASED ON FACIAL ANALYSIS - Technologies for analyzing various features detected in a face detected in an image. Such features may include at least the eyes, eyebrows, node, and mouth of a face. Such analyzing may include scoring aspects of these features. Such scores may be weighted. The analysis may be used to determine expressions and/or poses of the face, as well as indicate if the face is smiling, frowning, or neutral. An overall quality score for the face may also be determined and provided based on the aforementioned analysis as well as whether or not the face is near an edge of the image or cut-off in the image. Finally, a face signature may be determined that uniquely identifies the face, at least within the scope of the analyzed features. Such face signatures may be used to detect a similar face in other images. | 10-29-2015 |
20150310213 | ADJUSTMENT OF PROTECTION BASED ON PREDICTION AND WARNING OF MALWARE-PRONE ACTIVITY - Disclosed herein is a system and method for a system and method for determining whether the protection level of a protection system is appropriate for the way the user of a computing system is using the device. The protection system monitors the user's activity while they are using the various applications on the device. The protection system identifies an activity record that is the most similar to the user's activity and compares the current protection level with the associated record's protection level. The protection system may change the protection level when the user's protection level and the associated record's protection level are different. | 10-29-2015 |
20150310102 | GENERATING UNWEIGHTED SAMPLES FROM WEIGHTED FEATURES - Weighted features associated with a document are scaled using scales to generate a set of unweighted elements for each scale. A sketch is generated for each scale by sampling the unweighted elements generated for the scale. The scales are chosen based on a selected cutoff factor so that documents that have a similarity that is less than the cutoff factor might have no scales in common, while documents that have a similarity that is greater than the cutoff factor will have at sufficiently many but at least one scale in common. The similarity of these documents can be estimated using the sketches associated with each of the documents for the common scales. | 10-29-2015 |
20150310092 | ATTRIBUTE HISTOGRAMS FOR PROVIDING DATA ACCESS - Systems, methods, and computer-readable storage media are provided for providing a view into a mass of data when the number of items that make up the mass is very large. A request for display of information about a subset of data items contained within the corpus that have a specified characteristic is received. A quantity of data items comprising the subset is determined. It also is determined whether the quantity exceeds a threshold. If the quantity does not exceed the threshold, the requested information is presented. If, however, the quantity of data items comprising the subset exceeds the threshold, a view of the data items comprising the subset is provided that includes at least one distribution graph (e.g., histogram) generated in view of a certain measure, each distribution graph showing a visual representation of the data items comprising the subset organized by a particular attribute. | 10-29-2015 |
20150310073 | FINDING PATTERNS IN A KNOWLEDGE BASE TO COMPOSE TABLE ANSWERS - In general, the knowledge base table composer embodiments described herein provide table answers to keyword queries against one or more knowledge bases. Highly relevant patterns in a knowledge base are found for user-given keyword queries. These patterns are used to compose table answers. To this end, a knowledge base is modeled as a directed graph called a knowledge graph, where nodes represent entities in the knowledge base and edges represent the relationships among them. Each node/edge is labeled with a type and text. A pattern that is an aggregation of subtrees which contain all keywords in the texts and have the same structure and types on node/edges is sought. Patterns that are relevant to a query for a class can be found using a set of scoring functions. Furthermore, path-based indexes and various query-processing procedures can be employed to speed up processing. | 10-29-2015 |
20150310055 | USING LINEAGE TO INFER DATA QUALITY ISSUES - Identifying data quality along a data flow. A method includes identifying quality metadata for two or more datasets. The quality metadata defines one or more of quality of a data source, accuracy of a dataset, completeness of a dataset, freshness of a dataset, or relevance of a dataset. At least some of the metadata is based on results of operations along a data flow. Based on the metadata, the method includes creating one or more quality indexes for the datasets. The one or more quality indexes include a characterization of quality of two or more datasets. | 10-29-2015 |
20150310040 | GROUPING AND RANKING IMAGES BASED ON FACIAL RECOGNITION DATA - Technologies for grouping images, and ranking the images and the groupings, based on entities shown in the images. Images may be grouped based on faces shown in the images. Different images with faces that indicate the same entity (e.g., Adam) may be automatically grouped together. Different images with faces that indicate the same multiple entities (e.g., the people in my family) may also be automatically grouped together. Such automatic grouping may be based on facial recognition technologies. Further, images and groups of images may be automatically ranked based on the faces shown and entities represented. Such rankings may also be influenced by adjacent data that indicates family and friends and the like, and that can be used to identify such entities in the images. | 10-29-2015 |
20150309915 | CALL CHAIN INTERVAL RESOURCE IMPACT AGGREGATION DIFFERENCING - Embodiments profile usage of memory and other resource. Stack traces have lifespans, resource impacts, and constituent call chains. Aggregation unifies shared call chains and sums resource impacts after assigning traces to snapshot sets based on trace lifespans and user-defined snapshot request timestamps. | 10-29-2015 |
20150309911 | USER EXPERIENCE DIAGNOSTICS WITH ACTIONABLE INSIGHTS - The performance of computer system responses to user requests is measured and evaluated in the context of physical computing resource operation. Diagnostic information related to computer system performance is selectively provided based the measured performance and physical computing resource operation. | 10-29-2015 |
20150309579 | LOW-LATENCY GESTURE DETECTION - Low-latency gesture detection is described, for example, to compute a gesture class from a live stream of image frames of a user making a gesture, for example, as part of a natural user interface controlling a game system or other system. In examples, machine learning components are trained to learn gesture primitives and at test time, are able to detect gestures using the learned primitives, in a fast, accurate manner. For example, a gesture primitive is a latent (unobserved) variable describing features of a subset of frames from a sequence of frames depicting a gesture. For example, the subset of frames has many fewer frames than a sequence of frames depicting a complete gesture. In various examples gesture primitives are learnt from instance level features computed by aggregating frame level features to capture temporal structure. In examples frame level features comprise body position and body part articulation state features. | 10-29-2015 |
20150309547 | LOAD SCHEDULING IN MULTI-BATTERY DEVICES - Various embodiments provide techniques and devices for scheduling power loads in devices having multiple batteries. Loads are characterized based on the power required to serve them. Loads are then assigned to batteries in response to the type of load and relative monitored characteristics of the batteries. The monitored battery characteristics can change over time. In some embodiments, stored profile information of the batteries can also be used in scheduling loads. In further embodiments, estimated workloads can also be used to schedule loads. | 10-29-2015 |
20150309544 | ARTICULATED SCREEN COVER FOR ACCOMMODATING OBJECTS - A cover for a mobile computing device is described. The cover comprises two or more hinges so constructed that the hinges are substantially rigid when in-plane and flexible when out-of-plane. The cover includes segments made of a rigid material disposed between the hinges, The cover, when swiveled to the back side of the computing device, forms a contour around an object such as a stylus to secure the object to the back side of the computing device when the object is present. The cover becomes substantially flat and parallel to the back side of the computing device when the object is absent. | 10-29-2015 |
20150306500 | ARTIST-DIRECTED VOLUMETRIC DYNAMIC VIRTUAL CAMERAS - A volumetric dynamic virtual camera system employs a radial basis function (RBF) component that can utilize non-uniform training datasets that are blended to provide interpolated camera parameters during application runtime based on a player's position within virtual volumes in a 3D space. During application development, an artist or developer can interactively author cameras that are finely tuned to appear just right and which provide the training data for runtime. The RBF component blends the training data during runtime as the player's position within the volume changes to produce camera parameters that the camera system uses to capture scenes for rendering on a display device. The result is an overall camera system that lets authors very quickly develop film-quality cameras that appear and behave more like fully dynamic cameras having significant intelligence. The cameras are volumetric because they can exist in all the virtual spaces exposed by the application. | 10-29-2015 |
20150304733 | INTELLIGENT ROUTING OF NOTIFICATIONS TO GROUPED DEVICES - A system and method are disclosed for enhancing a linear broadcast of a network television program by automatically displaying alerts over the linear broadcast relating to web content determined to be of interest to the linear broadcast or user. The alert may include a link such that, once actioned upon, web content may be presented to the user in addition to the linear broadcast or in the place of the linear broadcast. | 10-22-2015 |
20150304560 | Interactively Stylizing Camera Motion - The subject disclosure is directed towards modifying the apparent camera path from an existing video into a modified, stylized video. Camera motion parameters such as horizontal and vertical translation, rotation and zoom may be individually modified, including by an equalizer-like set of interactive controls. Camera motion parameters also may be set by loading preset data, such as motion data acquired from another video clip. | 10-22-2015 |
20150304420 | FUNCTIONAL PROGRAMMING IN DISTRIBUTED COMPUTING - Disclosed herein are systems and methods for executing programs written in functional style. A distributed computing system receives a program that expresses computation upon one or more sets of distributed key-value pairs (DKVs) and one or more global variables (GVs). The system distributes an assembly that includes at least a compiled binary of the program to the nodes of a computing cluster, with different portions of the DKVs being stored across the plurality of nodes of the computing cluster. The system causes execution of the assembly by each of the plurality of nodes of the computing cluster, the ones of the plurality of nodes executing the assembly using the different portions of the one or more DKVs stored thereon. | 10-22-2015 |
20150304165 | Session-based Device Configuration - Techniques for session-based device configuration are described. According to one or more implementations, various settings of a wireless device are configured to optimize device performance while participating in a communication session via a wireless network. The settings, for instance, are configured dynamically and on a per-session basis. | 10-22-2015 |
20150302570 | DEPTH SENSOR CALIBRATION AND PER-PIXEL CORRECTION - Various technologies described herein pertain to correction of an input depth image captured by a depth sensor. The input depth image can include pixels, and the pixels can have respective depth values in the input depth image. Moreover, per-pixel correction values for the pixels can be determined utilizing depth calibration data for a non-linear error model calibrated for the depth sensor. The per-pixel correction values can be determined based on portions of the depth calibration data respectively corresponding to the pixels and the depth values. The per-pixel correction values can be applied to the depth values to generate a corrected depth image. Further, the corrected depth image can be output. | 10-22-2015 |
20150302334 | QUICK DRAFTS OF ITEMS IN A PRIMARY WORK QUEUE - Techniques disclosed herein facilitate the use of the primary work queue within an information management application as a centralized access point for creating and viewing multiple types of new draft items such as a note, to-do, or message item. An information management application can receive a new item request through its user interface and initiate a new draft item in response to the new item request. A view of new draft item can then be surfaced in a primary work queue of the information management application. The item type of the new draft item may be different than other item types in the primary work queue. | 10-22-2015 |
20150302317 | NON-GREEDY MACHINE LEARNING FOR HIGH ACCURACY - Non-greedy machine learning for high accuracy is described, for example, where one or more random decision trees are trained for gesture recognition in order to control a computing-based device. In various examples, a random decision tree or directed acyclic graph (DAG) is grown using a greedy process and is then post-processed to recalculate, in a non-greedy process, leaf node parameters and split function parameters of internal nodes of the graph. In various examples the very large number of options to be assessed by the non-greedy process is reduced by using a constrained objective function. In examples the constrained objective function takes into account a binary code denoting decisions at split nodes of the tree or DAG. In examples, resulting trained decision trees are more compact and have improved generalization and accuracy. | 10-22-2015 |
20150302196 | Local System Health Assessment - Techniques for local system health assessment are described. In at least some embodiments, a health assessment can be performed by an isolated security environment that resides locally on a system without requiring a network connection and/or access to a remote attestation service. In at least some embodiments, a health assessment ascertains whether modules that reside on a system have been altered such that the modules may be considered unsafe. For example, a known safe list is generated that includes measurements of known safe versions of modules that may be compared to current measurements of the modules to determine whether the modules have been altered. Health policies may be employed to specify various rules and parameters for performing system health assessments. | 10-22-2015 |
20150302158 | VIDEO-BASED PULSE MEASUREMENT - Aspects of the subject disclosure are directed towards a video-based pulse/heart rate system that may use motion data to reduce or eliminate the effects of motion on pulse detection. Signal quality may be computed from (e.g., transformed) video signal data, such as by providing video signal feature data to a trained classifier that provides a measure of the quality of pulse information in each signal. Based upon the signal quality data, corresponding waveforms may be processed to select one for extracting pulse information therefrom. Heart rate data may be computed from the extracted pulse information, which may be smoothed into a heart rate value for a time window based upon confidence and/or prior heart rate data. | 10-22-2015 |
20150302112 | Generating Probabilistic Transition Data - Systems and methods are presented for generating a transition graph from check-in data for determining probabilistic transitions of a user from an origin (location) to a destination. Check-in data for a plurality of users is obtained. The check-in data is organized and analyzed to determine a set of transition tuples for each of the plurality of users. These transition tuples are aggregated and used to generate a transition graph comprising a plurality of nodes and edges. Each node corresponds to a location and each edge indicates a transition from an origin node to a destination node and is associated with a likelihood of a user transitioning from the origin node to the destination node. | 10-22-2015 |
20150302051 | DATA FILTERING TO FIT SELECTED VISUALIZATION TYPE - A mechanism to visualize data to a user in a sufficient manner. The user selects a visualization type to visualize a selected subset of a data model. To fit the data well into a visualization of that visualization type, the system then evaluates the user selections of the visualization type of the subset of data against the rule set. Based on the evaluation, the system determines that the subset of data overpopulates the visualization type. In some embodiments, the system further identifies one or more filters to apply to the subset of data which would decrease the population of data within the virtualization type. Then, a visualization of the selected visualization type is to be displayed using at least one of the one or more identified filter. | 10-22-2015 |
20150301987 | MULTIPLE MONITOR DATA ENTRY - A data entry document is obtained. Information related to the data entry document is displayed on one display device, and a data entry portion of the data entry document is displayed on one or more other display devices. The related information can be from the data entry document, itself, of other information. | 10-22-2015 |
20150301952 | MULTIPLEXED MEMORY FOR SEGMENTS AND PAGES - Disclosed herein are systems and methods for paging to a direct segment maintained by a multiplexed TLB. The multiplexed TLB defines a direct segment to directly map a virtual address range to a physical address range, which increases the reach of the multiplexed TLB. A partition code is maintained in the multiplexed TLB to indicate usage of the direct segment by an associated process. A management process, such as a system pager, uses the unused part of the direct segment for storing paged data. As the process continues to use more of the direct segment, paged data stored in the previously unused part of the direct segment can be evicted from memory or moved elsewhere in memory so that the process can continue to use the direct segment. | 10-22-2015 |
20150301898 | CONDITIONAL SAVING OF INPUT DATA - This document relates to preserving input data. One example includes obtaining a request that a service perform processing on input data to produce an output representation of the input data. This example also includes applying criteria to the request, and preserving the input data responsive to determining that the criteria are met. | 10-22-2015 |
20150297999 | GAME PROGRESSION USING RETRIEVED PARTIAL USER DATA - A system that contains multiple game servers that have a non-user specific unused state, and a user-specific game state. When the game server is providing a game service on the other hand, the game server first obtains the user data for the user and game that is to be initiated. Accordingly, the game servers may be thought of as a bank of game servers, any one of which being potentially utilizable for incoming game requests. Once the game session is completed, the user data for the gamer may be deleted, and the game server goes back into the pool of available generic game servers. The user data is downloaded from a user data store, and may be quite limited to perhaps just that portion of the user data that relates to the game to be played. | 10-22-2015 |
20150297998 | HYPERLINK INITIATION OF GAME SESSIONS - A hyperlinked resource identifier that is selectable to allow a player to engage in a game session having a particular game state. The resource identifier has appropriate game session information embedded therein, such that when the resource identifier is selected, a game participation request, and the associated session information, is dispatched to an assignment server associated with the resource identifier. The assignment server assigns a game server to fulfill the request. For instance, the game server might be a game server that is already executing the game if the session information identifies an already existing game, or may be any appropriate game server if the game has not yet begun. The session information might identify any information suitable for defining the gaming experience of the session. | 10-22-2015 |
20150297140 | USER STRESS DETECTION AND MITIGATION - Embodiments for responding to user stress are provided. In one embodiment, a method performed on a computing device comprises detecting a contact area size on a mouse in communication with the computing device, assessing a user stress level based on the contact area size, and outputting an indication of the user stress level. | 10-22-2015 |
20150296215 | FRAME ENCODING USING HINTS - Embodiments are directed to encoding frames in response to supplemental encoding instructions, to providing encoding information for frames and to compiling software code that includes encoding hints. In one embodiment, in response to accessing frame information associated with a frame, a computer system interprets the frame information as being a supplemental encoding instruction for encoding a specified portion of the frame. The computer system then encodes the frame so that the specified portion of the frame is encoded in accordance with the supplemental encoding instruction. | 10-15-2015 |
20150296049 | BATTERY EFFICIENT SYNCHRONIZATION OF COMMUNICATIONS USING A TOKEN BUCKET - Systems and methods for email synchronization may include a computing device with a token bucket. The token bucket allows for temporary storage of tokens, each token authorizing a synchronization of at least one email application running on the computing device. The device may determine a frequency of received email communications associated with an email account managed by the at least one email application and hosted by an email server. The determining may be based on one or more characteristics associated with the token bucket. The determined frequency may be compared with a threshold value. When the determined frequency is equal to or lower than the threshold value, a push communication channel may be established with the email server, the push communication channel for receiving server-initiated email push communications. The at least one email application may be synchronized with the email account by receiving push communications using the push communication channel. | 10-15-2015 |
20150293922 | PERFORMING GRAPH OPERATIONS USING HISTORIC INVERSE PROBABILITY ESTIMATORS - Historic inverse probability estimators are created for a graph based on all-distance sketches associated with each node of the graph. The historic inverse probability estimators include adjusted weights for each node. Graph operations such as closeness centrality are estimated using the historic inverse probability estimators. The historic inverse probability estimators can also be applied to element streams and can be used to estimate a number of unique elements in received in the element stream. | 10-15-2015 |
20150293709 | FINE-GRAINED BANDWIDTH PROVISIONING IN A MEMORY CONTROLLER - Systems and methods for applying a fine-grained QoS logic are provided. The system may include a memory controller, the memory controller configured to receive memory access requests from a plurality of masters via a bus fabric. The memory controller determines the priority class of each of the plurality of masters, and further determines the amount of memory data bus bandwidth consumed by each master on the memory data bus. Based on the priority class assigned to each of the masters and the amount of memory data bus bandwidth consumed by each master, the memory controller applies a fine-grained QoS logic to compute a schedule for the memory requests. Based on this schedule, the memory controller converts the memory requests to memory commands, sends the memory commands to a memory device via a memory command bus, and receives a response from the memory device via a memory data bus. | 10-15-2015 |
20150293273 | LAMINATED DIFFUSER - Embodiments for optical diffusion devices are provided. In one example, an optical diffusion device comprises a first optical element including a first diffusing surface, a second optical element including a second diffusing surface, and an adhesive layer optically coupling the first diffusing surface to the second diffusing surface. | 10-15-2015 |
20150290540 | POSITIONING A CAMERA VIDEO OVERLAY ON GAMEPLAY VIDEO - A gaming console composites a camera video overlay on gameplay video for broadcasting such that the gameplay area that is rendered by the gaming console is not obscured, even when the camera video overlay is composited on the gameplay video for broadcasting. The gaming console or a companion device of the gaming console can also allow a user to specify placement of the camera video overlay on the gameplay video for broadcasting, permitting the user to choose the portion of the gameplay video for broadcasting that is obscured by the camera video overlay. | 10-15-2015 |
20150288965 | ADAPTIVE QUANTIZATION FOR VIDEO RATE CONTROL - According to a first aspect of the innovations described herein video encoding, such as game video encoding, is improved with a goal to generate substantially constant video quality and the average target bitrate within a desired tolerance, which improves an overall user experience on video playback. An adaptive solution uses intelligent bias on bit allocation and quantization decisions, locally within a frame and globally across different frames, based on a current quality level and within an allowed bitrate variable tolerance. Bit allocation is increased on high complexity frames and redundant bits are avoided, which might have been wasted for static scenes and low complexity aspects. Statistics can be used from the encoding process. The solution can address similar video coding quality problems for video game recording on a variety of gaming platforms. | 10-08-2015 |
20150288955 | TIME-OF-FLIGHT PHASE-OFFSET CALIBRATION - A method to calibrate an imaging array of a time-of-flight depth camera includes the act of modulating emission from a light source of the camera while synchronously biasing the imaging array. In this method, the modulated emission reflects from a compact reflector positioned a known distance from the camera and passes through an optical diffuser en route to the imaging array. For each pixel of the imaging array, a correction term is stored, which brings the output from that pixel into agreement with the actual distance between the camera and the compact reflector. | 10-08-2015 |
20150288866 | MULTI-CAMERA VIEW SELECTION - Techniques for automatically selecting from amongst a plurality of camera views available in a multi-camera system. In an aspect, one or more metrics are calculated for a plurality of camera views. The metrics may be used to identify one or more of the camera views as fulfilling a condition, in response to which a particular one of the camera views may be selected for display. For example, in a “select-better-view” strategy, the camera view associated with a more optimal image (e.g., better lighting, or absence of occlusion) is selected for display. In a “flag-diagnostic-view” strategy, the camera view associated with a less optimal image is displayed, e.g., to indicate that a particular camera may require user attention. Specific techniques for calculating metrics are further disclosed. | 10-08-2015 |
20150288857 | MOUNT THAT FACILITATES POSITIONING AND ORIENTING A MOBILE COMPUTING DEVICE - Described herein are various technologies pertaining to positioning and/or orienting a mobile computing device through utilization of a mount. The mobile computing device uses internal sensors to generate control signals, wherein a control signal indicates a direction of movement of the mobile computing device and a velocity of the movement. The control signals are transmitted to the mount, which positions and/or orients the mobile computing device according to the direction of the movement and the velocity of the movement indicated in the control signal. | 10-08-2015 |
20150288698 | EVOLVING RULE BASED CONTACT EXCHANGE - Methods and systems are described for managing a user's contact data which use evolving sequential sets of rules where the applicability of each set depends upon adherence or proper application of a prior set. In an embodiment, an initial set of restrictions are generated based on input from a first user, the restrictions relating to contact made by a second user to the first user. These initial restrictions are subsequently modified in response to the second user contacting the first user based on the contact made and a characteristic of the contact. The methods may apply to any form of contact between the first and second users and in an embodiment applies to contact made by the second user to a cellular telephone number belonging to the first user. | 10-08-2015 |
20150288061 | CAPACITIVELY-COUPLED ISOLATOR ASSEMBLY - An isolator assembly includes a capacitively-coupled isolator assembly. In some implementations, the capacitively-coupled isolator element may provide multi-band isolation by having an electrically-floating conductive coupling element with a length that is ½ or ¼ of a carrier wavelength. In other implementations, multiple capacitively-coupled elements may be employed to achieve multi-band isolation. | 10-08-2015 |
20150287040 | SYSTEM ENFORCED TWO-PARTY VERIFICATION PROCESS IN CUSTOMER SUPPORT WORKFLOW - A system-enforced two party verification process is described. An action to be taken on a resource is permitted when that resource is tagged with a same code by both a service vendor and the customer to whom the resource is associated. The system issues the code to the service vendor and relies on the service vendor to provide the code to the customer. The system then permits the action to be taken on the resource or automatically causes the action to be taken upon receipt of the code being applied by the customer to the same resource as previously indicated by the service vendor. | 10-08-2015 |
20150286897 | AUTOMATED TECHNIQUES FOR PHOTO UPLOAD AND SELECTION - Methods, systems, and computer program products are provided that determine the merit of a given captured image, and apply an intelligent policy to the uploading of the image. An image may be captured by an image capturing device of a user. A merit score is determined for the captured image. The merit score indicates a predicted value of the captured image to the user. An access policy is assigned to the captured image based on the determined merit score. Access to the captured image is enabled based on the assigned access policy. For instance, the captured image may be deleted, may be automatically uploaded to a server over a fee-free network connection only, may be uploaded to the server over any available network connection, may be uploaded at a reduced image resolution, and/or may be uploaded at full image resolution, depending on the access policy. | 10-08-2015 |
20150286747 | ENTITY AND ATTRIBUTE RESOLUTION IN CONVERSATIONAL APPLICATIONS - User input expressed as text may be analyzed for determining a type of response, such as an application response, and/or determining a type of task that is requested by the user input. Entity representations may be identified, classified and/or or tagged based on a type of response, type of task and/or a set of entity types. A surface form of an entity, ambiguous entity representation and/or other type of expression within the user input may be resolved, normalized and/or mapped to a normalized value. Normalizing entities and/or entity attributes may involve using a set of normalization rules, a lookup table, one or more machined learned methods, and/or an entity normalization index that associates entities with alternate surface forms derived from web corpora. The normalized value may be used to construct a request to a structured knowledge source and/or an application. | 10-08-2015 |
20150286723 | IDENTIFYING DOMINANT ENTITY CATEGORIES - Systems, methods, and computer-readable storage media are provided for identifying dominant entity categories associated with target entities. A target entity is received and plural data sources are utilized to determine entity categories of which the target entity is a member and an initial confidence score for each of the entity categories. Each initial confidence score represents the likelihood that the associated entity category is a dominant category for the target entity. At least one data source includes information pertaining to plural entities arranged in a graph-based ontology that includes identifiers of respective entity categories of which the subject entities are members. Graph-based confidence score propagation is then utilized to incorporate information regarding entities determined to be related to the target entity and accolades associated with the target entity to alter the initial confidence scores provided for various entity categories of which the target entity is a member. | 10-08-2015 |
20150286698 | REACTIVE DIGITAL PERSONAL ASSISTANT - Techniques are described herein that are capable of providing a reactive digital personal assistant. A reactive digital assistant is a digital assistant that is capable of having a reaction. For instance, the reaction may be provided visually and/or audibly. The reaction may be specified by personal assistant logic on a device that provides the digital personal assistant, by an application on the device that communicates with the personal assistant logic, or by a Web service with which the application communicates. The personal assistant logic may retrieve media representation(s) that correspond to the reaction from a store on the device, or the application may retrieve the media representation(s) from the Web service. The personal assistant logic may notify the application of a status of the digital personal assistant once the media representation(s) are retrieved. | 10-08-2015 |
20150286691 | DATA VIEW EXPOSURE MECHANISMS - The use of a data view component to expose data to a user interface element display logic component. The data exposed by the data view component is from a data set within the data cache. The data view component is able to expose that data due to a binding with the data set. The data view component may improve the user experience by exposing a default data set (such as a null data set) until the requested data set is available, expose only the latest requested data set when there are multiple requests, quickly switch bindings from one data set to another, and/or safely release the binding once the user interface element display logic component ceases to exist. | 10-08-2015 |
20150286685 | REFERENCE RESOLUTION - Methods, computer systems, and computer-storage media are provided for reference resolution. The present invention seeks to resolve entities in conversational search. To enable a more natural conversational search interaction, referential expressions such as pronouns are handled in queries. A component keeps track of previous queries and performs reference resolution based on an entity in the previous query and reformulates the query using an identifier for the referenced entity. Reference resolution may be performed for pronouns, plural pronouns, partial names, across domains, and on any device or platform. | 10-08-2015 |
20150286629 | NAMED ENTITY RECOGNITION - Named entity recognition is described, for example, to detect an instance of a named entity in a web page and classify the named entity as being an organization or other predefined class. In various examples, named entity recognition results are used to augment text from which the named entity was recognized; the augmentation may comprise information retrieval results about the named entity mention. In various embodiments, labeled training sentences in many different languages and for many different classes, are obtained to train machine learning components of a multi-lingual, multi-class, named entity recognition system. In examples, labeled training sentences are obtained from at least two sources, a first source using a multi-lingual or monolingual corpus of inter-linked documents and a second source using machine translation training data. In examples, labeled training sentences from the two sources are selectively sampled for training the named entity recognition system. | 10-08-2015 |