Execution status of managed time series processing tasks may be tracked. Status of a time series processing task that operations on different portions of a time series may be respectively captured. A request for the status of one of the portions of the time series with respect to the time series processing task may be received. The status may be identified and returned. For failed tasks, a failure reason may be generated by the time series processing system and included in a response with a failure status.
A quantum computing service includes a quality of service (QoS) and out-of-band prioritization module. The QoS and out-of-band prioritization module enforces QoS guarantees for quantum tasks and quantum jobs submitted to the quantum computing service while allowing for processing of the quantum jobs and quantum tasks based on QoS guarantees and not necessarily in an order in which the quantum jobs or quantum tasks are received. Also, the QoS and out-of-band prioritization module determines updated priorities out-of-band based on quantum resource usage information for previously executed quantum tasks such that submittal of pending quantum tasks is not delayed in while update priorities are being determined.
3.
CERTIFICATE AUTHORITY SELECTION IN A CLOUD PROVIDER NETWORK
Techniques for certificate authority (CA) selection are described. A certificate management service of a cloud provider network receives a first request to generate a certificate from an electronic device, the first request including an indication of an identity of a user and an identification of a domain name to associate with the certificate. A CA selection policy applicable to the first request is identified, the CA selection policy including a CA selection rule. A CA to generate the certificate is identified by evaluating the CA selection rule, the CA selection rule associates at least a portion of the domain name with the CA. A second request to generate the certificate is sent to the identified CA. The certificate or an identification of the certificate from the CA is returned to the electronic device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
4.
CUSTOMIZED CROSS-PREMISE RESOURCE SELECTION FOR CONTAINERIZED APPLICATIONS
A container management service of a provider network causes a container of an application to be run using resources identified for the application at a premise external to the provider network. A condition under which a container of the application is to be run at a resource at a data center of the provider network is determined. In response to detecting that the condition has been satisfied, a container is run at a resource at a data center of the provider network
Various embodiments of apparatuses and methods for trusted and/or attested packet timestamping are described. In some embodiments, the disclosed system and methods include a reference timekeeper providing a reference clock to host computing devices. The host computing devices host compute instances using a first set of computing resources, and also contain isolated timing hardware utilizing a different set of computing resources. The isolated timing hardware sets a hardware clock based on a signal corresponding to the reference clock from the reference timekeeper. The isolated timing hardware then receives a packet from a particular compute instance, creates a timestamp for the packet based at least in part on the hardware clock, where the timestamp is outside the control of the compute instances, and sends the packet and the timestamp through a data network to transmit to a packet destination.
Systems and methods are provided for improved 3D garment draping simulation. A garment pattern may be obtained that includes a number of flat, 2D garment panels designated to be connected at seam lines. Triangulated versions of each of the 2D garment panels may then be positioned in 3D virtual space relative to a 3D model of a human body, such that one or more annotated points on each triangulated garment panel are aligned with a corresponding labelled point or region on the 3D body. A warped 3D garment mesh may then be generated by repeatedly applying geometric manipulations to the triangulated garment panels to connect their corresponding seam lines without causing collisions between the triangulated garment panels and the 3D body. This warped 3D garment may then be provided as input to a physics-based draping simulator.
Disclosed are systems and methods to deliver location restricted content to devices that do not have a location component, such as a Global Positioning System component. A location aware device may send to a content delivery service, location information determined by a location component of the location aware device and receive, from the content delivery service, an encrypted access token. The location aware device may then send the access token to a non-location aware device that is on a same local area network as the location aware device. The non-location aware device may provide the access token to the content delivery service along with a request for location restricted content. The content delivery service may use the access token provided by the non-location aware device to verify that the non-location aware device is within a defined area for which the requested location restricted content is allowed for presentation.
A semiconductor package can include a capacitance die. The package can have multiple dice (e.g., logic die, memory die) mounted on a substrate. Each die can include a power domain. The dice can be distributed on the substrate such that an extra space is present on the substrate between at least some of the dice. For example, an extra space may be present between two dice, at a corner of the substrate, or other locations. The extra space can disrupt a coplanarity of the semiconductor package. The capacitance die can be located in the extra space so as to establish the coplanarity with the other dice. The capacitance die can include a capacitor array electrically coupled to multiple power domains of the plurality of dice.
H01L 23/50 - Arrangements for conducting electric current to or from the solid state body in operation, e.g. leads or terminal arrangements for integrated circuit devices
H01L 25/16 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices the devices being of types provided for in two or more different main groups of groups , or in a single subclass of , , e.g. forming hybrid circuits
Systems, devices, and methods are provided for facet-based context-aware user interfaces. A system such as an online purchasing system may determine one or more intent contexts based at least in part on one or more user interactions with an online purchasing system associated with a first product. A list of substitute products may be determined based on the intent context and facets associated with the substitute products to provide for a diversity of dimensions along which a user can explore different products.
Disclosed herein are methods for evaluating the efficacy of an immunogenic composition by monitoring circulating tumor DNA. The disclosure also relates to methods for treating a subject having cancer.
Techniques for using a shared encoder and multiple different decoders for natural language understanding (NLU) tasks are described. The individual decoders are configured to perform different tasks using the output from one shared encoder. The decoders can process with respect to different domains and different languages. Using the shared encoder can reduce computation time during runtime. Using the shared encoder can reduce training costs (e.g., time and resources) when the system is updated to incorporate additional intents and entities. The system employs an attention mechanism to extract encoded representation data that can be used by the different decoders for its specific task.
Systems and methods, to efficiently prepare for live and stored file content, implement one or more warm inputs, which actively ingest and demux content, but do not actively decode the content until an input switch is commanded. Each warm input can cache a most recent instantaneous decoder refresh and subsequent reference frames (I-frames and P -frames). Upon an input switch being commanded, the subject input commences decoding of such preserved frames. The formerly-warm input then acts as a hot input (decoding every frame) until the input switch completes. The use of warm inputs, which avoid the decoding stage, reduces computational resource use, allows preparation of all inputs by default, and permits metrics, status reports, and thumbnails to be generated regarding non-active inputs.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/434 - Disassembling of a multiplex stream, e.g. demultiplexing audio and video streams or extraction of additional data from a video stream; Remultiplexing of multiplex streams; Extraction or processing of SI; Disassembling of packetised elementary stream
H04N 21/438 - Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving MPEG packets from an IP network
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to MPEG-4 scene graphs
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
A system and method for establishing and using quantum safe enclaves is described. In some embodiments, secure shared randomness is distributed between nodes, for example using quantum key distribution. The secured shared randomness is used to generate quantum safe network keys that enable quantum safe network links to be established between any of the nodes included in the quantum safe enclave. A network manager enforces policies that restrict communications between nodes of the quantum safe enclave to transmission via quantum safe network links. Such an arrangement protects communicated data from quantum enabled attacks that may compromise other forms of encryption.
14.
HYBRID SPACE-FIBER QUANTUM NETWORKS FOR WIDESPREAD ENTANGLEMENT DISTRIBUTION
A system and method for providing quantum entanglement using a hybrid space-fiber quantum network are described. The hybrid space-fiber quantum network includes a communications hub located proximate to an optical ground station and also includes an aerial entangled particle source, such as an entangled photon source attached to a satellite, drone, aircraft, etc. An atmospheric or free-space channel is used to distribute quantum entanglement between optical ground stations that are separated by geographic distances, via the aerial entangled particle source. Also, fiber optic links are connected to the communications hub located proximate to the optical ground station. The communications hub includes optical switches that enable any of the fiber optic links connected to the communications hub to receive or send distributed quantum entanglement to a remotely located recipient endpoint via the atmospheric or free-space channel.
15.
VOICE ADAPTATION USING SYNTHETIC SPEECH PROCESSING
A text-to-speech (TTS) system may be configured to imitate characteristics of a target voice based on a limited dataset. The TTS system may include a machine learning model pre-trained using a synthetic parallel dataset and fine-tuned using examples of the target voice. A TTS component trained using a large single-speaker dataset may be used to generate the synthetic parallel dataset based on a multi-speaker dataset. The synthetic parallel dataset may include target audio data representing speech in the multi-speaker dataset and predicted audio data generated by the TTS component based on transcripts of the speech. The machine learning model may be pre-trained using the synthetic parallel dataset and fine-tuned using audio data representing target voice speech and predicted audio generated by the TTS component based on transcripts of the target voice speech. The trained model may be used to modify synthetic speech to approximate the characteristics of the target speech.
A quantum computing monitoring system may receive a request from user describing an algorithm to be executed using classical and quantum computing resources and a metric to be monitored associated with execution of the algorithm at the quantum computing resources. In execution, the quantum computing monitoring system may cause measurements to be obtained from the quantum computing resources at individual steps of the execution of the algorithm at the quantum computing resources, and the metric to be determined based on the obtained measurements. The quantum computing monitoring system may evaluate the metric with respect to a threshold, and provide an alert to the user responsive to determining that the metric fails to satisfy the threshold. The quantum computing monitoring system may further perform an operation to modify the execution of the algorithm at the quantum computing resources as needed.
17.
ON-DEMAND CO-PROCESSING RESOURCES FOR QUANTUM COMPUTING
An algorithm execution management system of a provider network may receive a request from a user for executing an algorithm using different types of computing resources, including classical computing resources and quantum computing resources. The request may indicate a container that includes the algorithm code and dependencies such as libraries for executing the algorithm. The algorithm execution management system may first determine that the quantum computing resources are available to execute the algorithm, and then cause the classical computing resources to be provisioned. The algorithm execution management system may cause at least one portion of the algorithm to be executed at the classical computing resources using the container indicated by the user, and at least another portion of the algorithm to be executed at the quantum computing resources. The quantum task of the algorithm may be provided a priority during execution of the algorithm for using the quantum computing resources.
18.
QUANTUM COMPUTING PROGRAM COMPILATION USING CACHED COMPILED QUANTUM CIRCUIT FILES
A quantum computing service may store, in a cache, one or more compiled files of respective quantum functions included in one or more quantum computing programs received one or more customers. When the quantum computing service receives another quantum computing program, from the same or a different customer, the quantum computing service may determine whether the quantum computing program may include one or more of the quantum functions corresponding to the compiled files in the cache. If so, the quantum computing service may use the compiled files in the cache to compile the quantum computing program.
G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
19.
LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE
A host device may include an interconnect, a host memory, and a set of processor cores. A processor core may execute a VM assigned to a cryptographic key and may send a request to access a physical address in the host memory toward the interconnect. An enforcer device may receive the request and extract a key identifier from the request. The enforcer device may determine whether to allow the request to access the physical address via the interconnect based on the key identifier and a list of allowed keys stored on the enforcer device. If the enforcer device determines to not allow the request to access, the enforcer device may modify the physical address and/or the key identifier of the request.
A device is configured to detect multiple different wakewords. A device may operate a joint encoder that operates on audio data to determine encoded audio data. The device may operate multiple different decoders which process the encoded audio data to determine if a wakeword is detected. Each decoder may correspond to a different wakeword. The decoders may use fewer computing resources than the joint encoder, allowing for the device to more easily perform multiple wakeword processing. Enabling / disabling wakeword(s) may involve the reconfiguring of a wakeword detector to add / remove data for respective decoder(s).
A system may include a first acoustic event detection (AED) component configured to detect a predetermined set of acoustic events, and include a second AED component configured to detect custom acoustic events that a user configures a device to detect. The first and second AED components are configured to perform task-specific processing, and may receive as input the same acoustic feature data corresponding to audio data that potentially represents occurrence of one or more events. Based on processing by the first and second AED components, a device may output data indicating that one or more acoustic events occurred, where the acoustic events may be a predetermined acoustic event and/or a custom acoustic event.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
Systems and methods for contextual awareness in dynamic device groups are disclosed. For example, a dynamic device group may be generated while output of content is occurring. When a user provides user input to alter the output of the content, contextual data indicating the devices in the dynamic device group when the user input is received may be generated and utilized by an application to determine which devices are to receive a command to perform an action responsive to the user input.
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronizing decoder's clock; Client middleware
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
Systems and methods are described for a multi-tenant mode of a serverless code execution system. For instance, a method may include maintaining a set of execution environments, wherein each execution environment is associated with a serverless function, wherein the serverless function is associated with a software as a service (SaaS) provider that is a tenant of a cloud services provider, wherein the SaaS provider provides services to sub-tenants, wherein the set of execution environments are partitioned based on sub-tenants of the SaaS provider; receiving a call to execute a serverless function, wherein the call includes a serverless function identifier and a sub-tenant identifier; identifying a sub-tenant-specific execution environment of the set of execution environments that is associated with the sub-tenant; and in response to identifying the tenant-specific execution environment, invoking the serverless function on the sub-tenant-specific execution environment.
A system and method for providing quantum entanglement as a service are described. Intermediate nodes which may be located in trusted or trustless locations are used to distribute quantum entanglement to endpoints, such as endpoints of customers of a quantum entanglement distribution service. The distributed quantum entanglement provides a secure communication path that does not rely on trust placed in an infrastructure or software provider. To distribute the quantum entanglement, intermediate nodes comprising quantum memories are used. Joint measurements are performed on quantum particles of respective entangled quantum pairs received at the intermediate nodes without collapsing superposition states of the particles. This allows for the quantum entanglement to be extended across intermediate nodes while maintaining entanglement and superposition of the entangled quantum particles.
Disclosed are various embodiments for provisioning radio-based networks with locality rules. In one embodiment, at least one locality rule associated with an organization is accessed. The locality rule(s) require that at least a subset of network traffic for a radio-based network remain within a particular geographic area. The radio-based network includes a radio access network and an associated core network. A topology for the radio-based network is determined based at least in part on the locality rule(s). The radio-based network is provisioned or reconfigured for the organization to have the topology complying with the at least one locality rule.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 41/0897 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
H04L 43/20 - Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
26.
TECHNIQUES FOR PROVIDING A SEARCH INTERFACE WITHIN A CAROUSEL
Techniques are described herein for providing search features within a carousel. A request may be received to display a network page (e.g., user profile page). The carousel may present a subset of items of a set of items (e.g., items associated with user profile). User input indicating a scrolling action within the carousel can be received. In response, a user interface (UI) element associated with conducting a search may be presented in an expanded form overlaid atop the carousel. After a predefined period of time has elapsed, the user interface element may transition to a collapsed form. If the user interface element is selected, the user may be navigated to the end of the carousel where a statically-positioned presentation of the user interface element is presented. A search may be conducted from the statically-positioned presentation. The search may be performed against the set of items associated with the user profile.
Techniques are described for enabling users of a certificate management service to create certificate issuance policies that can be applied to certificate issuance requests across both public and private certificate authorities (CAs) and other certificate-related services. According to embodiments described herein, a certificate issuance policy includes one or more certificate issuance rules to be applied to requests associated with one or more specified user accounts or roles for certificate-related resources (e.g., public certificates, private certificates, etc.). The application of a certificate issuance rule can be conditioned on a particular request context (e.g., based on a user account or role associated with a request, a type of certificate requested, a subject name identified in the request, etc.) and can specify a wide range of actions to be performed on requests matching a rule (e.g., allowing or denying a request, modifying one or more parameters of the request, etc.).
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
28.
SYSTEMS FOR ENABLING ACCESS TO A SHIPPING BENEFIT FROM SELLER CONTENT
A seller provides customers with the ability to order items using shipping benefits associated with a separate fulfillment entity, such as an online store, by providing inventory to a designated fulfilment location. When a customer accesses the webpage, identifiers for the customer device and item are used to determine an estimated delivery time the separate fulfillment entity may provide, which may be presented in a widget or other type of element within the webpage. In response to input to the element, the customer may be presented with a prompt for authentication data, and after a successful authentication, the estimated delivery time may be updated based on a location of the authenticated customer. In response to input confirming the transaction, an order for the item is generated by the separate fulfillment entity and the customer may continue navigating the seller website.
Systems and methods are provided for management of network segments that cross geographic regions and/or other types of network divisions in a cloud-based network environment. A cloud-based network provider's geographically-dispersed network infrastructure may serve as the core of a client's private wide area network, and the client may define isolated segments to which other networks (virtual private clouds, virtual private networks, etc.) may be attached. The various segments may remain logically isolated from each other even when implemented across some or all of the same regions—and using the same physical and/or virtual routing components—as other segments of the same client and/or other clients.
A networking manager of an extension server of a virtualized computing service detects that a data link layer frame has been obtained at the extension server. The networking manager delivers at least a portion of contents of the frame to a compute instance running at the extension server in response to determining that a destination media access control (MAC) address of the frame matches a MAC address of a local-premise-access virtual network interface attached to the compute instance. The local-premise-access virtual network interface is not assigned an Internet Protocol (IP) address from a range of IP addresses managed by the virtualized computing service.
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to maintain a model of a fleet of vehicles and collect vehicle information from heterogenous vehicles included in the fleet, wherein the vehicles are configured with different in-vehicle communication configurations. The vehicle information extraction service automatically generates scheme packets for data collection to be sent to the heterogenous vehicles, wherein are formatted in accordance with the different respective in-vehicle communication configurations of the heterogenous vehicles, without the customer of the vehicle information extraction service having to account for these differences.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G08G 1/123 - Traffic control systems for road vehicles indicating the position of vehicles, e.g. scheduled vehicles
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/029 - Location-based management or tracking services
G08G 1/01 - Detecting movement of traffic to be counted or controlled
G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
32.
MACHINE LEARNING USING SERVERLESS COMPUTE ARCHITECTURE
A serverless computing system is configured to provide access to a machine learning model by at least associating an endpoint, comprising code that accesses the machine learning model, with an extension that interfaces between a serverless compute architecture and the endpoint. A request to perform an inference is received by the system and processed by using the serverless compute architecture to execute a compute function. The compute function cases the extension to interface with the endpoint to cause the machine learning model to perform the inference.
Idle periods may be for management actions at processing clusters for managed databases. A leader node of a processing cluster for a managed database may monitor a network endpoint at a proxy service associated with a database managed by the database service. An idle period for the database may be detected. A management action for the processing cluster may be determined to be performed during the detected idle period. The leader node may cause the determined management action to be performed.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 16/21 - Design, administration or maintenance of databases
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to optimize an amount of relevant vehicle sensor information extracted from vehicles by reducing instances of collection of redundant data. The vehicle information extraction service additionally, or alternatively, enables customers to maintain a model of a fleet of vehicles and determine number of the vehicles of the fleet in a certain partition to calculate a data reduction factor that will filter out sensor data. The vehicle information extraction service communicates the reduction factor to the vehicles in the geographical region using a vehicle scheme to indicate to the vehicles the probability with which the vehicle is to transmit a particular type of sensor data.
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G08G 1/123 - Traffic control systems for road vehicles indicating the position of vehicles, e.g. scheduled vehicles
G08G 1/00 - Traffic control systems for road vehicles
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 4/029 - Location-based management or tracking services
G08G 1/01 - Detecting movement of traffic to be counted or controlled
35.
FAST DATABASE SCALING UTILIZING A DECOUPLED STORAGE AND COMPUTE ARCHITECTURE
Techniques for fast online scaling of a database via a split architecture including decoupled storage and compute tiers in a database service are described. A cluster of database (DB) nodes is scaled to add a new DB node. The scaling includes determining a split for data of a first volume managed by an existing DB node. A second DB node is obtained, and the first volume is cloned according to a lightweight copy technique to yield a second volume for use by the second DB node. After the cloning, a set of database modifications are applied to the second volume based on modifications caused by database traffic received by the first DB node, involving the volume, during the cloning of the first volume. Each DB node may drop the portion of the volume that it does not need according to the split.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
36.
EXTENDING CLOUD-BASED VIRTUAL PRIVATE NETWORKS TO USER EQUIPMENT ON RADIO-BASED NETWORKS
Disclosed are various embodiments for extending cloud-based virtual private networks to user equipment on radio-based networks. In one embodiment, a request is received from a client device for service from a radio-based network. The client device is provided with access to a virtual private cloud network through the radio-based network in response to receiving the request from the client device for service from the radio-based network. Encapsulated network traffic is forwarded from the client device to the virtual private cloud network via a network link between the radio-based network and a cloud provider network that hosts one or more resources on the virtual private cloud network.
Techniques for building, validating, and utilizing custom database software in a shared management environment are described. A database customization service allows users to provide database installation files as part of a configuration to generate a custom database engine version. The creation of custom database engine versions may be governed by policy, and the database customization service may provide recommendations for creating custom database engine versions according to various criteria. The custom database engine version can be built, and its functionality and correctness verified. Users may launch database instances using these custom database engine versions that can be managed under a shared management scheme where both users and the database customization service can perform host-level management.
A PCR testing module (100) that includes a housing having a PCR machine (106) disposed therein; a sample input station (104) on the housing, wherein the sample input station is configured to receive a sample collection device (SCD) comprising a biological specimen sample provided by the patient; an SCD processing mechanism configured to transfer a lysed microportion of the biological specimen sample into a PCR sample tube (308, 507, 1104, 1204, 1302) attached to the SCD; at least one mechanism configured to separate the PCR sample tube (308, 507, 1104, 1204, 1302) from the SCD and transfer the PCR sample tube to the PCR machine (106); and a controller configured to (i) use the PCR machine (106) to conduct a PCR test on contents of the PCR sample tube (308, 507, 1104, 1204, 1302), and (ii) generate results of the PCR test.
A61B 10/00 - Other methods or instruments for diagnosis, e.g. for vaccination diagnosis; Sex determination; Ovulation-period determination; Throat striking implements
G01N 1/38 - Diluting, dispersing or mixing samples
G01N 35/04 - Automatic analysis not limited to methods or materials provided for in any single one of groups ; Handling materials therefor using a plurality of sample containers moved by a conveyor system past one or more treatment or analysis stations - Details of the conveyor system
G01N 35/00 - Automatic analysis not limited to methods or materials provided for in any single one of groups ; Handling materials therefor
Light weight ophthalmic lenses include a curved back lens attached to a curved front lens assembly having a functional element. An ophthalmic lens includes a curved front lens assembly and a curved back lens. The curved front lens assembly has an essentially constant thickness, forms an external world-side convex surface of the ophthalmic lens, and includes a functional element operable to modify an image of a real world scene viewed via the ophthalmic lens. The curved back lens forms an external user-side surface of the ophthalmic lens, has a world-side convex surface that is shaped complementary to and interfaced with the front lens assembly, and provides a prescribed vision correction.
Described herein are systems and techniques for implementing a third-party item tracking and payment system that enables a user to walk out without a manual checkout process. The techniques include receiving user identifying information associated with a payment account and conveying an identifier of the account to a management system of the retailer. Items, as selected by the user, are added to a virtual cart that is checked out automatically when the user exits the store and the third party system communicates the cart contents to the retailer for cost calculation and then instructs payment using the stored payment information without disrupting existing inventory and account management systems.
A quantum computing service includes a quantum circuit compilation module that uses received information about quantum processing units (QPUs) along with information about a quantum circuit to be compiled in order to generate an optimized ordered list of compilation passes to be performed to compile the quantum circuit for execution on a given QPU.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computers; Platforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
Described are systems and methods to determine one or more body dimensions of a body based on a processing of one or more two-dimensional images that include a representation of the body. Body dimensions include any length, circumference, etc., of any part of a body, such as shoulder circumference, chest circumference, waist circumference, hip circumference, inseam length, bicep circumference, leg circumference, etc.
Techniques for a distributed data processing application service in a cloud provider network are described. A virtual machine bundle is obtained, the virtual machine bundle including a copy of a memory and one or more registers of a paused virtual machine executing a distributed data processing application runtime. A request to launch a virtual machine to execute a distributed data processing application runtime is received, the request to launch the virtual machine including a bundle identifier that identifies the virtual machine bundle. The virtual machine is launched based at least in part on the virtual machine bundle. The virtual machine sends a message to register the virtual machine with a cluster of virtual machines.
Disclosed are various embodiments for a container execution environment. In one embodiment, a container is executed in a virtual machine instance running on a computing device. A container control plane is executed separately from the virtual machine instance in an off-load device operably coupled to the computing device via a hardware interconnect interface. The container is managed using the container control plane executing on the off-load device.
Translations between versions of data object schemas may be performed between data object producers and data object consumers. A request to update a data object may be an update according to an additional version of a schema applicable to the data object from an existing version of a schema. The data object may be provided by one component of a distributed system. A trigger event may be detected to send the data object to a different component of the distributed system. The data object may be translated from the additional version to the existing version and sent to the different component.
Disclosed are various embodiments for customer-defined capacity limit plans in communication networks. In one embodiment, a request for a service from a radio-based network is received from a first client device. A network function in the radio-based network is determined to be at a capacity limit. Service from the network function to a second client device to the network function is suspended in response to determining that the network function in the radio-based network is at the capacity limit and based at least in part on a rule set specific to the radio-based network. The first client device is provided access to the network function instead of the second client device.
H04W 48/00 - Access restriction; Network selection; Access point selection
H04L 47/76 - Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
H04L 47/74 - Admission control; Resource allocation measures in reaction to resource unavailability
H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS
H04L 47/80 - Actions related to the user profile or the type of traffic
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 43/20 - Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
Techniques for compressing a neural network model by mixing compression ratios (sparsity patterns) are described. The weight tensor of a neural network model is divided into weight groups. The pruning cost of compressing the weight values according to a compression ratio is determined for each weight group, and a pruning cost distribution for the compression ratio is generated from the pruning costs of the weight groups. A cost threshold can then be selected from the pruning cost distribution, and weight groups having a pruning cost below the selected cost threshold are compressed according to the compression ratio. The remaining weight groups can be compressed using one or more less aggressive compression ratios. The cost threshold can be adjusted to tune the overall sparsity and accuracy of the compressed neural network.
G06N 3/044 - Recurrent networks, e.g. Hopfield networks
G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
Extensible change control management for development and deployment of applications is described. A change control manager may register plugin components, including requester, approver and performer components, to process changes to a resource of a resource type, where registering is performed responsive to request(s) received via programmatic interface(s). Upon receiving a change request from the requester component, the change control manager may send the change request to the approver component to approve the change request and, responsive to notification of approval from the approver component, the change control manager may then send the change request to the performer component to implement the requested change. The change control manager and the various components each send and/or receive change requests encoded in a standardized schema for the resource type, the standardized schema independent of the implementation of the resource and the means of implementing changes to the resource by the performer component.
A computer system may receive a request that includes a requested weight quantity of an item and identifies the item. The computer system may use this information to lookup correlating information for the item. The correlating information may correlate item weight with item quantity. The computer system may use the correlating information and the weight quantity to determine a corresponding numerical quantity of the item. A visual indicator that represents the numerical quantity of the item may be presented in a user interface to provide context for how the requested weight quantity translates to the numerical quantity.
Technologies are disclosed for reconciliating payment transactions performed by a payment service provider. Instead of reconciling the payment transactions in a serial manner, a reconciliation service performs payment reconciliation in a distributed manner among different reconciliation processes within a service provider network such that payment reconciliation for payment transactions can be distributed between a number of different reconciliation processes. Remittance data received from a payment service provider and deposit data received by a financial institution may be used by the reconciliation processes to perform payment reconciliation. The payment reconciliation processes may be performed within a selected geographic region in order to satisfy different reconciliation requirements/regulations.
System and methods are provided for detecting, tracking, and managing outages of transaction processors. An indication is received indicating a potential outage associated with a transaction processor computer configured to process transactions of an online retail website. The indication can be received from a threshold monitoring service and/or from a machine-learning detection system. A computing service can be initiated to confirm and track the outage over time. An outage may include a number of situations in which the transaction processor fails to process transactions according to a set of predefined processing parameters. If the outage spans a particular time period, the service can perform a number of remedial actions (e.g., notifying an administrator of the outage, etc.).
A system for providing a geofence service is disclosed. The geofence service receives an encrypted geospatial index for a specified geofence based on application of a hash function to respective ones of a plurality of locations for the specified geofence in accordance with a secret key that is unknown to the geofence service. The geofence service stores the encrypted geospatial index to a data store according to a geofence identifier for the specified geofence. The geofence service receives an encrypted device location identifier generated based on application of the hash function to a representation of a current location of a user device in accordance with the secret key. The geofence service determines whether the user device is located in a location of the plurality of locations based on a query of the encrypted geospatial index according to the encrypted device location identifier.
Systems, devices, and methods are provided for secure multiparty computation (MPC) protocols. A first computing entity may send a first cryptographically protected data set to a server and a second computing entity may send a second cryptographically protected data set to the server. The server may lack access to plaintext versions of the data sets. The server may compare cryptographically protected data elements from the first and second data sets as part of a secure MPC protocol to determine certain information regarding the data sets, such as determining which data elements are included in both sets, and perform homomorphic computations according to a homomorphic encryption scheme. The server is accordingly able to determine an encrypted result.
A system is disclosed allowing a buyer to directly build a shopping cart(s) on a supplier's portal (such as website, applications) without initiating any shopping request from company's network or system (such as eProcurement system). A standard cXML document can be used to transmit a Punchout Order Message (POOM) address to a customer system where the POOM can be retrieved. Additionally, a buyer identifier (e.g., an email address) can be included in the cXML document so that the customer system can verify the buyer making purchases. An address is returned to the supplier's portal, which can be used by the buyer to complete the purchase. In one example, the address directs the buyer to log into the customer system to verify the purchase.
Systems and methods are provided to perform multiply-accumulate operations of reduced precision numbers in a systolic array. Each row of the systolic array can receive reduced inputs from a respective reducer. The reduced input can include a reduced input data element and/or a reduced weight. The systolic array may lack support for inputs with a first bit-length and the reducers may reduce the bit-length of a given input from the first bit-length to a second shorter bit-length and provide the reduced input to the array. In order to reduce the bit-length, the reducer may reduce the number of trailing bits of the input. Further, the systolic array can receive a reduced and rounded input. The systolic array can propagate the reduced input through the processing elements in the systolic array. Each processing element may include a multiplier and/or an adder to perform arithmetical operations based on the reduced input.
G06F 7/483 - Computations with numbers represented by a non-linear combination of denominational numbers, e.g. rational numbers, logarithmic number system or floating-point numbers
G06F 7/544 - Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using unspecified devices for evaluating functions by calculation
A satellite provides communication between user terminals (UTs) and ground stations that connect to other networks, such as the Internet. Because the satellite is within range of many UTs at any given time, many UTs are in contention to use an uplink to send upstream data to the satellite. This saturates a random-access channel (RACH) on the uplink. When a UT has data to uplink, it sends a short buffer data status (SBDS) message using the RACH. The minimal size of the SBDS facilitates use of a non-orthogonal multiple access uplink. Based on the SBDS, the satellite allocates a grant to the UT to use the uplink. Additional messages from the UT involving buffer status may be sent using the granted uplink. Unsolicited grants may be issued to the UT based on analysis of uplink and downlink traffic. If needed, the RACH may still be used to request additional grants.
A new type system may be added to a type registry for a data processing service. A request to add the new type system may be received that describes the new type system for a data store. The new type system may be used to perform a data processing job that accesses the data store to obtain or store data as a source or target data store.
A message-level policy implemented with for a message routing system may be used to mediate between a variety of message sources and message targets that receive and use messages. The message-level policy may allow fine grained message-by-message policy assessment that a message routing system policy may be able to provide. The message-level policy may furthermore interact with the message routing system policy to provide mechanisms to avoid accidental leakage of protected messages or spill-over to protected regions.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
59.
MAKING DECISIONS FOR PLACING DATA IN A MULTI-TENANT CACHE
Placement decisions may be made to place data in a multi-tenant cache. Usage of multi- tenant cache nodes for performing access requests may be obtained. Usage prediction techniques may be applied to the usage to determine placement decisions for data amongst the multi-tenant cache nodes. Placement actions for the data amongst at the multi-tenant cache nodes may be performed according to the placement decisions.
Systems and methods are described for rotating keys in a trust store to be used by a group of peer devices for secure communications between the peers in the group. In some examples, a service, such as an identify authority service, may make a determination that a set of peers that individually trust at least one public key from a group of public keys satisfies a set of conditions. As a result of the determination, the service may update the plurality of public keys by at least removing at least one public key from the group of public keys and indicate the updated plurality of public keys to at least one of the peers in the group. The service may remove the at least one public key from the group upon determining that less than a threshold number of peers in the group use the at least one public key.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
61.
INTERFACES FOR CREATING RADIO-BASED PRIVATE NETWORKS
Disclosed are various embodiments for interfaces for creating radio-based private networks. In one embodiment, a request is received via an interface to create a radio-based private network for a customer. The request indicates a quantity of wireless devices that will connect to the radio-based private network. A quantity of radio units to serve the radio-based private network is determined based at least in part on the quantity of wireless devices. The radio units are preconfigured to implement a radio access network for the radio-based private network. A shipment is initiated to the customer of the radio units that have been preconfigured. Resources in a cloud provider network are provisioned to function as a core network for the radio-based private network.
Techniques for automated alignment of image capture of physical ailments are described. A method of automated alignment of image capture of physical ailments includes determining an alignment class of a first image of an object using an alignment classifier executing on a user device, providing alignment instructions based on the alignment class and a reference image associated with the object using at least one machine learning model executing on the user device, obtaining an aligned image of the object after the user device has been repositioned relative to the object based on the alignment instructions, and sending the aligned image to an agent device via a telemedicine service of a provider network.
G16H 40/63 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for local operation
G16H 30/40 - ICT specially adapted for the handling or processing of medical images for processing medical images, e.g. editing
G16H 80/00 - ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
63.
STREAMING ANALYTICS USING A SERVERLESS COMPUTE SYSTEM
Systems and methods are described implementing streaming analytics on a serverless compute system. A user can specify a data stream against which analytics should be conducted, serverless functions to be used to conduct the analysis, and criteria for the analytics, such as windowing criteria and aggregation criteria. The windowing criteria can specify windows of items within the stream that should be collectively analyzed. The aggregation criteria can specify how to group items within each window during analysis. A poller device can read data items from the stream, window and group the items according to the windowing and aggregation criteria, and invoke serverless functions to conduct streaming analytics on the data items. The poller device can further maintain state between invocations.
Techniques for outputting interactive content and processing interactions with respect to the interactive content are described. While outputting requested content, a system may determine that interactive content is to be outputted. The system may determine output data including a first portion indicating that interactive content is going to be output and a second portion representing content corresponding to an item. The system may send the output data to the device. A user may interact with the output data, for example, by requesting performance of an action with respect to the item.
A speech processing system uses contextual data to determine the specific domains, subdomains, and applications appropriate for taking action in response to spoken commands and other utterances. The system can use signals and other contextual data associated with an utterance, such as location signals, content catalog data, data regarding historical usage patterns, data regarding content visually presented on a display screen of a computing device when an utterance was made, other data, or some combination thereof.
Techniques for utilizing memory for a neural network are described. For example, some techniques utilize a plurality of memory types to respond to a query from a neural network including a short-term memory to store fine-grained information for recent text of a document and receiving a first value in response, an episodic long-term memory to store information discarded from the short-term memory in a compressed form and receiving a second value in response, and a semantic long-term memory to store relevant facts per entity in the document.
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
67.
POLYMERASES FOR ISOTHERMAL NUCLEIC ACID AMPLIFICATION
Provided herein are recombinant polymerases that are suitable for nucleic acid amplification assays. The recombinant polymerases disclosed herein are useful in many recombinant DNA techniques, in particular nucleic acid amplification. Also provided herein are methods of producing the recombinant polymerases.
Applications on a mobile device, such as a mobile phone, sometimes enter an incorrect mode of operation wherein the correct user interface elements are not displayed. In order to ensure correct operation of the mobile device, the application can periodically transmit a state of the user interface elements being displayed to a cloud monitoring service that analyzes the state and compares it to a known state that should be displayed. If there is a discrepancy between the state of the mobile device according to the cloud monitoring service and the actual state captured by the mobile device, then the cloud monitoring service can transmit an action to perform by the application on the mobile device to correct the display of the user interface elements.
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
Devices and techniques are generally described for a speech processing routing architecture. First input data representing an input request may be received. First data including a semantic interpretation of the input request may be determined. Metadata of the first input data may be determined. The metadata may identify an entity associated with the input request. In some examples, a query may be sent to a first component. The query may include the metadata. In some examples, second data that identifies a first skill associated with the entity may be received from the first component. In various examples, the first skill may be selected for processing the first input data based at least in part on the first data and the second data.
Systems and methods for presence-based application invocation are disclosed. For example, presence of a personal device and/or user associated with a personal device is detected at a primary device. When account data associated with the personal device and the primary device correspond, checks are performed to determine if automatic invocation of an application associated with the personal device should be performed. Those checks include determining whether one or more conditions are satisfied, determining current usage of the application and/or the primary device indicates desirability to automatically invoke the application, and/or whether the application has been enabled for use on the primary device.
Provided herein are immunogenic compositions comprising tumor-specific neoantigen long peptides, tumor-specific neoantigen short peptides, and adjuvant, optionally a helper peptide, and optionally a tumor-specific peptide. The disclosure also provides methods of using these immunogenic compositions for treating cancer.
Techniques are described and relate to assigning peptides to peptide groups for vaccine development. In an example, a peptide property of a peptide is determined, where this peptide is from different peptides that are to be assigned to different groups of vaccine. A determination is also made that the peptide is to be assigned to a first group from the different groups based at least in part on the peptide property. The first group has a first group property that is based at least in part on peptide properties of first peptides to be assigned to the first group. The first group property is within a similarity range relative to a second group property of a second group from the different groups. Information is generated and indicates that the peptide is assigned to the first group.
Disclosed are various embodiments that provide distributed user plane functions for radio-based networks. In one embodiment, data is received from a client device connected to a radio access network of a radio-based network. The data is forwarded to a user plane component of a user plane function. The user plane component is implemented in a computing device of the radio access network. The data is processed by the user plane component. The data that has been processed is then routed to a data network.
A system and method to manage handover between wireless audio devices (such as earbuds) of primary responsibility for communicating with a third device such as a phone or tablet. A first wireless audio output device manages communications between a third device and a second wireless audio output device. The wireless audio output devices determine the signal quality of the connection between them. If that signal quality drops below a threshold, the wireless audio output devices determine the rate of change of that signal quality. If that quality is dropping rapidly, the wireless audio output devices check to see which has the better connection to the third device. If the second wireless audio output device has a better connection to the third device than that of the first wireless audio output device, then the wireless audio output devices can trigger a handover from the first wireless audio output device to the second wireless audio output device.
H04M 1/05 - Supports for telephone transmitters or receivers specially adapted for use on head, throat or breast
H04M 1/60 - Substation equipment, e.g. for use by subscribers including speech amplifiers
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
H04R 5/033 - Headphones for stereophonic communication
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Systems, methods, and computer-readable media are disclosed for ambient light sensing using light guides. In one embodiment, an example device may include a cover layer, a light guide, a light emitting diode disposed adjacent to an edge surface of the light guide, and an ambient light sensor disposed adjacent to the light emitting diode. The ambient light sensor may be configured to sense ambient light that propagates through the cover layer and the light guide.
Technologies directed to overlaid shared aperture array with improved total efficiency are described. One RF structure includes a first antenna with a first set of antenna elements disposed on a first plane of a support structure and a second antenna with a second set of antenna elements disposed on a second plane of the support structure. A set of parasitic antenna elements are disposed on the first plane. Two adjacent antenna elements, including one from the first plurality of antenna elements and another one from the plurality of parasitic antenna elements, are separated by the second distance.
H01Q 1/28 - Adaptation for use in or on aircraft, missiles, satellites, or balloons
H01Q 3/26 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system varying the distribution of energy across a radiating aperture
H01Q 5/42 - Imbricated or interleaved structures; Combined or electromagnetically coupled arrangements, e.g. comprising two or more non-connected fed radiating elements using two or more imbricated arrays
H01Q 21/06 - Arrays of individually energised antenna units similarly polarised and spaced apart
H01Q 21/24 - Combinations of antenna units polarised in different directions for transmitting or receiving circularly and elliptically polarised waves or waves linearly polarised in any direction
H01Q 25/00 - Antennas or antenna systems providing at least two radiating patterns
Provided herein are methods that utilize a CRISPR/Cas complex having collateral activity, one or more nucleases, one or more oligonucleotides and a fluorescent reporter. The methods disclosed herein can amplify a fluorescent signal when a target nucleic acid is present in a sample.
An indication of a set of premises between which network traffic is to be routed via a private fiber backbone of a provider network is obtained. Respective virtual routers are configured for a first premise and a second premise, and connectivity is established between the virtual routers and routing information sources at the premises. Contents of at least one network packet originating at the first premise are transmitted to the second premise via the private fiber backbone using routing information obtained at the virtual routers from the routing information source at the second premise.
Disclosed are various embodiments for extending cloud-based virtual private networks to radio-based networks. In one embodiment, a request from a client device to connect to a radio-based network is received. A virtual private cloud network of a cloud provider network to which the client device is permitted access is determined. The client device is provided with access to the virtual private cloud network through the radio-based network.
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/5003 - Managing SLA; Interaction between SLA and QoS
Techniques are described for efficiently distributing across multiple computing resources satisfiability modulo theories (SMT) queries expressed in propositional logic with string variables. As part of the computing-related services provided by a cloud provider network, many cloud providers also offer identity and access management services, which generally help users to control access and permissions to the services and resources (e.g., compute instances, storage resources, etc.) obtained by users via a cloud provider network. By using resource policies, for example, users can granularly control which identities are able to access specific resources associated with the users' accounts and how those identities can use the resources. The ability to efficiently distribute the analysis of SMT queries expressed in propositional logic with string variables among any number of separate computing resources (e.g., among separate processes, compute instances, containers, etc.) enables the efficient analysis of such policies.
To reduce the storage size of weight tensors and speed up loading of weight tensors from system memory, a compression technique can be employed to remove zero values from a weight tensor before storing the weight tensor in system memory. A sparsity threshold can be enforced to achieve a compression ratio target by forcing small weight values to zero during training. When the weight tensor is loaded from system memory, a direct memory access (DMA) engine with an in-line decompression unit can decompress the weight tensor on-the-fly. By performing the decompression in the DMA engine, expansion of the weight values back to the original weight tensor size can be carried out in parallel while other neural network computations are being performed by the processing unit.
Disclosed are various embodiments that provide customizable data-processing network functions for radio-based networks. In one embodiment, a data-processing network function is operated in a radio-based network for a customer. Input data is received from the customer to configure the data-processing network function to perform a customized function for the radio-based network. The data-processing network function is configured, in response to the input data, to perform the customized function when executed in the radio-based network.
A system comprising one or more computers implements a synthetic sensor service configured to deploy synthetic sensors to in-vehicle computing devices implementing an in- vehicle distributed computing environment. A synthetic sensor may be placed monolithically at a single computing device (e.g. ECU) in the vehicle, or may be modularly placed on multiple computing devices (e.g. multiple ECUs) of the vehicle that each have resources or inputs that the synthetic sensor requires. The modular components of the synthetic sensor may execute in a runtime environment of the in-vehicle distributed computing environment, such that the modular components function as a unified synthetic sensor even though they are placed on different computing devices of the vehicle (e.g. different ECUs).
A device includes a housing having a top, a bottom opposite the top, a front, and a back opposite the front. One or more microphones are oriented substantially towards the top. A first camera, a display, a loudspeaker, and an emitter are oriented substantially towards the front. A second camera, a projector, and a sensor are oriented substantially towards the bottom. The second camera and the sensor may include field of views that at least partially overlap with a projection area of the projector.
A physical space contains stationary objects that do not move overtime (e.g., a couch) and may have non-stationary objects that do move over time (e.g., people and pets). An autonomous mobile device (AMD) determines and uses an occupancy map of stationary objects to find a route from one point to another in a physical space. Non-stationary objects are detected and prevented from being incorrectly added to the occupancy map. Point cloud data is processed to determine first candidate objects. Image data is processed to determine second candidate objects. These candidate objects are associated with each other and their characteristics assessed to determine if the candidate objects are stationary or non-stationary. The occupancy map is updated with stationary obstacles. During navigation, the occupancy map may be used for route planning while the non-stationary objects are used for local avoidance.
Contextual data corresponding to previous search requests of a service provider's electronic catalog can be used to resolve voice-input search requests and present search results. Contextual data includes the previous search request that is input to a machine learning algorithm along with a present search request. The machine learning algorithm generates a score indicative of whether the present search request is a refinement of the previous search or a new search request. Once the search request is classified as a refinement or a new search, the search is processed to provide search results including available items from the service provider matching the search request.
Disclosed herein are methods for selecting tumor-specific neoantigens from a tumor of a subject that are suitable for subject-specific immunogenic compositions.
An optical detector system provides output to an optical tracking system to facilitate optical communications by tracking a beam of incoming light using a fast-steering mirror (FSM). The optical detector system comprises an array of optical photodetectors, such array comprising one or more quad cells. The incoming light passes through one or more optical elements to generate a specified beam shape, such as a bar or cross, on the array. The resulting output from the array is highly responsive to changes in position of the reshaped beam on the array. As a result, noise equivalent angle (NEA) of the optical detector system representing pointing error is substantially reduced. A reduction in NEA facilitates more precise alignment, allowing incoming light to be aligned to a smaller area. For example, the incoming light may be aligned to a single mode optical fiber connected to a receiver system.
G01S 3/785 - Systems for determining direction or deviation from predetermined direction using adjustment of orientation of directivity characteristics of a detector or detector system to give a desired condition of signal derived from that detector or detector system
G01B 11/27 - Measuring arrangements characterised by the use of optical techniques for testing the alignment of axes for testing the alignment of axes
H04B 10/112 - Line-of-sight transmission over an extended range
G02B 27/09 - Beam shaping, e.g. changing the cross-sectioned area, not otherwise provided for
H04B 10/118 - Arrangements specific to free-space transmission, i.e. transmission through air or vacuum specially adapted for satellite communication
Disclosed are systems, methods, and apparatus of an automated and self-service kiosk that allows customers to select inventory items available from the kiosk and walk or move away with selected inventory item(s) without having to process payment, identify the inventory item(s), or provide any other form of checkout. After a customer has picked one or more items and departed the kiosk, the picked items are determined and the customer charged for the items. For example, one or more of detected weight changes measured at the kiosk and/or images generated at the kiosk may be used to identify items picked by the customer from the kiosk.
The disclosure describes techniques for automatically pairing multiple source devices to a sink device in response to a single source device being paired to the source device. For instance, in response to a single source device being manually paired to wireless earbuds, the techniques may automatically pair other source devices that are associated with a common user account. In addition, this disclosure describes techniques for configuring a sink device to periodically broadcast advertisement messages indicating a current state of the sink device, which enables source devices that receive the advertisement message to determine whether to establish a connection with the sink device based on a current state of the sink device.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
This disclosure describes, in part, techniques for generating location information of an object along with a video that depicts the object. For instance, an electronic device may include a radar sensor that determines locations of the object. The electronic device may then store radar data representing at least the locations. Additionally, based on detecting an event, the electronic device may begin to generate image data representing the video. The electronic device may then analyze the radar data and the image data in order to determine that the object detected by the radar sensor includes the same object represented by the image data. As such, the electronic device may send the radar data and the image data to one or more computing devices. This way, a user device is able to display both the video depicting the object as well as the location information representing the motion of the object.
Systems, methods, and computer-readable media are disclosed for systems and methods for adaptive bitrate control for simultaneous content streaming. Example methods may include determining, by an adaptive bitrate controller, a first bits per pixel value associated with a first content stream at a device at a first timestamp, determining a second bits per pixel value associated with a second content stream at the device at the first timestamp, and generating a bits per pixel ranking using the first bits per pixel value and the second bits per pixel value. Some methods may include determining a bitrate improvement priority based at least in part on the bits per pixel ranking, and causing a request to improve a bitrate of the first content stream to be approved.
Characteristics of a user's movement are evaluated based on performance of activities by a user within a field of view of a camera. Video data representing performance of a series of movements by the user is acquired by the camera. Pose data is determined based on the video data, the pose data representing positions of the user's body while performing the movements. The pose data is compared to a set of existing videos that correspond to known errors to identify errors performed by the user. The errors may be used to generate scores for various characteristics of the user's movement. Based on the errors, exercises or other activities to improve the movement of the user may be determined and included in an output presented to the user.
Disclosed herein are methods for ranking tumor-specific neoantigens from a tumor of a subject that are suitable for subject-specific immunogenic compositions. Suitable tumor-specific neoantigens are tumor-specific neoantigens that are likely presented on the cell surface of the tumor, are likely to be immunogenic, are predicted to be expressed in sufficient amounts to elicit an immune response in the subject, optionally represent sufficient diversity across the tumor, and have relatively high manufacture feasibility. The present methods take a set of neoantigens (peptide vaccine candidates) and ranks the neoantigens in a way such that a group of top-ranked neoantigens simultaneously promotes cell-surface presentation of important neoantigens for Class I and Class II MHC molecules. The top-ranked neoantigens can then be further narrowed according manufacturability and/or other criteria.
A system comprising one or more computing devices implements a vehicle information extraction service. The vehicle information extraction service enables customers to provide access to proprietary encoding protocols used by the customers to communicate over a bus of a vehicle, wherein the proprietary protocols are used by the vehicle information extraction service to perform vehicle information monitoring, while at the same time protecting the confidentiality of the proprietary protocols from being accessed by third parties. Also, the vehicle information extraction service enables streaming of relevant vehicle information corresponding to customer defined event criteria without requiring non-relevant vehicle information to be streamed, which would consume considerable network resources.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 67/565 - Conversion or adaptation of application format or content
96.
SYSTEM FOR DISTRIBUTED TRANSFER OF UPLINK STATE DATA
A satellite provides communication between user terminals (UTs) and ground stations that connect to other networks, such as the Internet. Because the satellite is within range of many UTs at any given time, many UTs are in contention to use an uplink to send data to the satellite. Each satellite manages uplink contention by maintaining state data representative of the uplink resources allocated for use. As satellites move, handovers take place, transferring communication services from a first satellite to a second satellite. Before a handover, a first satellite sends state data to a UT. The second satellite is also informed about the UT. After the handover, the second satellite provides the UT with priority access to the uplink to send the state data to the second satellite. The second satellite uses the state data to resume management of the uplink, eliminating the need for time consuming link setup.
Disclosed herein are methods for predicting tumor-specific neoantigen MHC class I or MHC class II immunogenicity by jointly predicting MHC class I or MHC class II binding affinity and predicting the likelihood a tumor-specific neoantigen will be presented by a MHC class I or class II protein on a cell-surface.
Techniques for intent-based access control are described. A method of intent-based access control may include receiving, via a user interface of an intent-based governance service, one or more intent statements associated with user resources in a provider network, the one or more intent statements expressing at least one type of action allowed to be performed on the user resources, compiling the one or more intent statements into at least one access control policy, and associating the at least one access control policy with the user resources.
A speech-processing system may provide access to multiple virtual assistants via one or more voice-controlled devices. Each assistant may leverage language processing and language generation features of the speech-processing system, while handling different commands and/or providing access to different back applications. Different assistants may be available for use with a particular voice-controlled device based on time, location, the particular user, etc. The voice-controlled device may include components for facilitating user interaction with multiple assistants. For example, a multi-assistant component may facilitate enabling/disabling assistants, assigning gestures and/or wakewords, etc. The multi-assistant component may handle routing commands to a command processing subsystem corresponding to an assistant invoked by the command. The voice controlled device may further include observer components, each configured to monitor the voice-controlled device for invocations of a particular assistant.
Disclosed are various embodiments for managing computing capacity in radio-based networks and associated core networks. In one embodiment, it is determined that a set of computing hardware implementing a radio-based network for a customer has an excess capacity. At least one action is implemented to reallocate the excess capacity of the computing hardware.