The techniques disclosed herein mitigate stochasticity when controlling a mechanical system with artificial intelligence (AI) agents. In some configurations, AI agents are created using data generated by a machine learning model. Stochasticity is segmented temporally into near term and long term, and different strategies are used to address stochasticity in the different timeframes. For example, long term stochasticity may be addressed with changes to the reward function used to train the model. Short term stochasticity may be addressed by applying a margin to the output of an AI agent. Example margins include window averaging, clamps, and statistical process control bounds. In one configuration, AI agents are regression brains that are generated from setpoints inferred by the model from environmental states. The limitations inherent to fitting a regression line to this data may result in some predicted setpoints being outside of an allowed range.
G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
Systems and methods are provided for reusing and retraining an image recognition model for video analytics. The image recognition model is used for inferring a. frame of video data, that is captured at edge devices. The edge devices periodically or under predetermined conditions transmits a captured frame of video data, to perform inferencing. The disclosed technology is directed to select an image recognition model from a model store for reusing or for retraining. A model selector uses a. gating network model to determine ranked candidate models for validation. The validation includes iterations of retraining the image recognition model and stopping the iteration when a rate of improving accuracy by retraining becomes smaller than the previous iteration step. Retraining a model includes generating reference data using a teacher model and retraining the model using the reference data. Integrating reuse and retraining of models enables improvement in accuracy and efficiency.
G06V 10/778 - Active pattern-learning, e.g. online learning of image or video features
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G06V 10/70 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning
A method for processing a stream of input images is provided. The method includes receiving a stream of input images, and applying a digital effect to the stream of input images. The digital effect is one or more from the group of: a pan, a tilt, or a zoom, of the stream of input images. The method further includes selecting an analytical projection type, from a plurality of analytical projection types, that maps pixels of the input stream of images to projected pixels of a modified stream of images, generating the modified stream of images, using the selected analytical projection type, thereby correcting a geometric distortion within the stream of input images, while applying the digital effect, and displaying the modified stream of images.
Disclosed is the differential application of scalars to compensate pixel degradation. Input image data is associated with a commanded luminance at each of a plurality of pixels. A degradation value is determined for each pixel. Based on the degradation value, an elevated drive current is determined to produce commanded luminance at the pixel. A required scalar is determined for each pixel to hold the elevated drive current from exceeding a drive current threshold. An applied scalar for each pixel is determined for each pixel to be applied to the elevated drive current. For at least some pixels, the applied scalar for a first pixel is based at least on [1] the required scalar of a second pixel and [2] a spatial relationship between the first pixel and the second pixel. Applied scalars are then used to output corrected imagery.
G09G 3/3208 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix using controlled light sources using electroluminescent panels semiconductive, e.g. using light-emitting diodes [LED] organic, e.g. using organic light-emitting diodes [OLED]
G09G 3/20 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix
The described technology provides high latency query optimization method including receiving a data request from a client, the data request directed to data stored in a plurality of data shards, determining a set of operating parameters of the data shards for retrieving data from the plurality of shards, determining a chunking factor based on the set of operating parameters, dividing the data request into a plurality of API requests based on the chunking factor, each of the API requests directed to a portion of the plurality of data shards, and communicating the plurality of API requests in parallel to a source API configured to perform data queries on the plurality of data shards.
Verifiable attribute maps that maintain references to identities and attribute information associated with the identities are disclosed. A verifiable attribute map is maintained by a ledger database that provides tamper-resistant/evident capabilities for tables (comprising the map) thereof. For instance, when a materialized view of the database is generated, the database provides a digest representative of a state thereof to computing devices that access the map for the attribute information. When the database receives a request from a device to access the map, the digest is received along therewith. The database is validated based on the digest to determine whether the database has been tampered with since the provision of the digest. Responsive to a successful validation, the database provides access in accordance with the request. When attribute information in the map is updated, the database subsequently generates a new digest, which is provided to the computing device.
Execution of a process using a select platform-specific process application is provided, including identifying, from a set of received inputs, a collection of selection input parameter values uniquely associated in memory with a select platform-specific process application among different platform-specific process applications configured to implement a process of a process type, identifying a process population template associated in memory with the select platform-specific process application, the process population template identifying data input fields accepted as inputs to the select platform-specific process application, receiving, from a uniform user interface, a set of user inputs, and executing the process population template. The executing includes modifying the set of user inputs to generate modified inputs of a form consistent with the data input fields accepted as inputs to the select platform-specific process application and executing the select platform-specific process application based on the modified inputs.
In various examples there is a computer-implemented method comprising accessing a pool of examples. The method obtains a query set comprising a plurality of held out examples in a plurality of classes. For each example in the pool, the method assigns a weight to the example and initializes the weight using a default or random value. The method accesses a constrained optimization problem. The constrained optimization is solved using a projected gradient ascent or descent, the solving resulting in optimal weights resulting in an optimal performance of a few-shot classifier on the query set, where the few-shot classifier is trained using the examples from the pool weighted by the optimal weights. The method selects, using the optimal weights, an example per class from the pool, and stores the selected examples.
The techniques disclosed herein enable utilizing a full range of setpoint values to control a mechanical system. A machine learning model is trained with states collected from the mechanical system. Some of the states may have little to no variation, limiting exploration of possible setpoint values when training the model. To enable a more thorough exploration of possible setpoint values, the states are augmented with a fluctuating delta value that is derived from a fixed setpoint value. For example, a delta outside air temperature may be computed by subtracting outside air temperature, which fluctuates, from a fixed chilled water setpoint. A method of moments computation converts delta values inferred by the model back into absolute values. The absolute values are used to compute a regression equation that is usable by the mechanical system to compute a setpoint action for a given set of input states.
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
G05B 15/02 - Systems controlled by a computer electric
Systems and methods for inferring and notifying an end user about reduced availability of a target user or group of target users in a time range of interest. For instance, the reduced availability service includes components for collecting calendar event information and calendar settings information corresponding to a calendar of a target user, generating an interval graph data structure based on the collected calendar information, determining working hours for the target user, identifying periods of time where reduced availability is determined in the target user's calendar, and generating a notification of the target user's reduced availability for alerting the end user.
A method comprising: sampling a temporal causal graph from a temporal graph distribution specifying probabilities of directed causal edges between different variables of a feature vector at a present time step, and from one variable at a preceding time step to another variables at the present time step. Based on this there are identified: a present parent which is a cause of the selected variable in the present time step, and a preceding parent which is a cause of the selected variable from the preceding time step. The method then comprises: inputting a value of each identified present and preceding parent into a respective encoder, resulting in a respective embedding of each of the present and preceding parents; combining the embeddings of the present and preceding parents, resulting in a combined embedding; inputting the combined embedding into a decoder, resulting in a reconstructed value of the selected variable.
A method for rendering digital inking is presented. The method comprises receiving inking input at a local application window, and locally processing the received inking input to generate preliminary inking imagery for presentation in the local application window. Parameters of the received inking input are uploaded to a remote client for remote processing to generate finalized inking imagery. The preliminary inking imagery is updated based on the finalized inking imagery.
G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
14.
ROUND ROBIN ARBITRATION USING RANDOM ACCESS MEMORY
A circuit performs a method of arbitrating requests between multiple requestors. The method includes accessing, via an arbitration processor, a requestor random access memory (RRAM) having multiple entries. Each entry corresponds to a requestor and includes a valid field indicating whether or not the requestor is requesting. One of the multiple entries is selected in a round robin manner as a function of a value in the valid field indicative of the corresponding requestor requesting. The corresponding requestor requesting arbitration is notified.
G06F 13/16 - Handling requests for interconnection or transfer for access to memory bus
G06F 13/366 - Handling requests for interconnection or transfer for access to common bus or bus system with centralised access control using a centralised polling arbiter
The present disclosure relates to methods and systems for providing a neural graphical model. The methods and systems generate a neural view of the neural graphical model for a domain. The input data is generated from the domain and includes generic input data. The input data also includes a combination of different data types of input data. The neural view of the neural graphical model represents the functions of the different features of the domain using a neural network. The functions are learned for the features of the domain using a dependency structure of an input graph for the input data and the neural network. The methods and systems use the neural graphical model to perform inference tasks. The methods and systems also use the neural graphical model to perform sampling tasks.
The present disclosure relates to methods and systems for providing a neural graphical model. The methods and systems generate a neural view of the neural graphical model for input data. The neural view of the neural graphical model represents the functions of the different features of the domain using a neural network. The functions are learned for the features of the domain using a dependency structure of an input graph for the input data using neural network training for the neural view. The methods and systems use the neural graphical model to perform inference tasks. The methods and systems also use the neural graphical model to perform sampling tasks.
Techniques for generating a gallery view of tiles for in-area participants who are participating in an online meeting are disclosed. A video stream is accessed, where this stream includes an area view of an area in which an in-area participant is located. This area view comprises pixels representative of the area and pixels representative of the in-area participant. The pixels representative of the in-area participant are identified. A field of view of the in-area participant is generated. A tile of the in-area participant is generated based on the field of view. This tile is then displayed while the area view is not displayed.
Systems and methods are provided for interactively highlighting a region as pixel data on a screen and automatically retrieving context data associated with content of the highlighted region for contextual notetaking. The highlighted region includes at least a part of one or more windows and one or more applications associated with the one or more windows. The disclosed technology determines a context associated with content of the highlighted region and automatically retrieves context data that are contextually relevant to the content. Notes data are generated based on an aggregate of the highlighted content, window-specific context data, application-specific context data, and user-specific context data. A notetaking application retrieves stored the notes data from a notes database and displays the notes data for recall and for use. The contextual notetaking enables the user reducing a burden of performing manual operations for notetaking and utilizing notes that are enriched relevant data by context.
Files uploaded to a cloud storage medium are considered. The files may include a mixture of files known to be malicious and known to be benign. The files are clustered using similarity of file features, e.g., based on distance in a feature space. File clusters may then be used to determine a threat status of an unknown file (a file whose threat status is unknown initially). A feature of the unknown file in the feature space is determined, and a distance in the feature space between the file and a file cluster is calculated. The distance between the unknown file and the file cluster is used to determine whether or not to perform a deep scan on the unknown file. If such a need is identified, and the deep scan indicates the unknown file is malicious, a cybersecurity action is triggered.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
A method comprising: sampling a first causal graph from a first graph distribution modelling causation between variables in a feature vector, and sampling a second causal graph from a second graph distribution modelling presence of possible confounders, a confounder being an unobserved cause of both of two variables. The method further comprises: identifying a parent variable which is a cause of a selected variable according to the first causal graph, and which together with the selected variable forms a confounded pair having a respective confounder being a cause of both according to the second causal graph. A machine learning model encodes the parent to give a first embedding, and encodes information on the confounded pair give a second embedding. The embeddings are combined and then decoded to give a reconstructed value. This mechanism may be used in training the model or in treatment effect estimation.
G16H 20/00 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
G16H 50/30 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for individual health risk assessment
Techniques are described for streaming (e.g., low-latency streaming) of media content by performing sender-based adaptive bit rate control operations. The operations can include streaming a media stream to a streaming client. While streaming the media stream, an outgoing queue of buffered streaming content to be sent to the streaming client can be monitored. When a step down condition is satisfied, based at least in part on the monitoring, a switch can be made to a lower bit rate media stream for streaming to the streaming client. When a step up condition is satisfied, based at least in part on the monitoring, a switch can be made to a higher bit rate media stream for streaming to the streaming client. The operations are performed without receiving any quality feedback from the streaming client and without measuring bandwidth of the network channel.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
H04N 21/238 - Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
H04N 21/2381 - Adapting the multiplex stream to a specific network, e.g. an IP [Internet Protocol] network
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
Methods, systems, and computer programs are presented for generating a usage model for predicting user commands in an app. One method includes receiving model information from client devices. The model is obtained at each client device by training a machine-learning program with app usage data. The server generates synthetic data using the models from the client devices. A machine-learning program is trained using the synthetic data to obtain a global model, which receives as input information about recent commands entered on the app and generates an output with a prediction for the next command expected to be received by the app. The information of the global model is transmitted to a first client device, and the app provides at least one command option in the app user interface based on a prediction, generated by the global model, of the next command expected.
A debugging tool identifies the smallest subset of an input sequence or rationales that influenced a neural language model to generate an output sequence. The debugging tool uses the rationales to understand why the model made its predictions and in particular, the particular input tokens that had the most impact on the output sequence. In the case of erroneous output, the rationales are used to alter the input sequence to avoid the error or to tailor a new training dataset to retrain the model to improve its performance.
The present disclosure provides methods and apparatuses for providing timing recommendation of server decommissioning in a cloud service platform. Multi-modal data associated with decommissioning-decision made to a target server in the cloud service platform may be obtained. A maintenance cost curve of the target server and at least one of a server additional value curve of the target server and a replacement server cost line of a replacement server may be generated based on the multi-modal data. Decommissioning timing recommendation of the target server may be determined according to the maintenance cost curve and at least one of the server additional value curve and thereplacement server cost line.
The present disclosure proposes a method, apparatus and computer program product for autonomous quota management for shared resources. A quota change request may be received, the quota change request indicating a requirement to increase or decrease a quota for a shared resource of a user. A scenario corresponding to the quota change request may be identified. A set of rules for the scenario may be obtained. A decision on the quota change request may be made with the set of rules. The quota for the shared resource of the user may be managed based on the decision. The present disclosure also proposes an autonomous quota management system comprising a decision module, an execution module and a data support module.
Computing devices and methods for adjusting a driving signal for a haptic trackpad are disclosed. In one example, a computing device comprises a trackpad that comprises a printed circuit board. An accelerometer is affixed to the printed circuit board and a haptic actuator is coupled to the trackpad. A memory stores instructions executable by a processor to drive the haptic actuator to cause a first trackpad acceleration. The accelerometer measures the first trackpad acceleration, and an acceleration variance is determined by comparing the first trackpad acceleration to a target acceleration. The acceleration variance is used to adjust a driving signal for the haptic actuator to an adjusted driving signal. The haptic actuator is driven with the adjusted driving signal to cause a second trackpad acceleration different from the first trackpad acceleration.
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G06F 3/044 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by capacitive means
G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
The present disclosure relates to utilizing a buffer management system to efficiently manage and deallocate memory buffers utilized by multiple processing roles on computer hardware devices. For example, the buffer management system utilizes distributed decentralized memory buffer monitoring in connection with augmented buffer pointers to deallocate memory buffers accurately and efficiently. In this manner, the buffer management system provides an efficient approach for multiple processing roles to consume source data stored in a memory buffer and to deallocate the buffer only after all roles have finished using it.
A decryption key is recovered that is utilized to decrypt an encrypted resource. One or more location attribute policy (LAP) servers determine whether a user attempting to access a resource has the necessary attributes to access the resource and is in a valid location in which the user is required to be to access the resource. The attributes and location are defined by a policy assigned to the resource. To verify that the user has the required attributes, the LAP server(s) request a cryptographic proof from the user that proves that the user has the required attributes. Upon validating the proof, a first portion of the decryption key is released. The LAP server(s) release a second portion of the decryption key after verifying that the user is in the required location. The LAP server(s) generate the decryption key based on the released portions.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Technology is disclosed for programmatically determining, for a segment of a meeting recording, a user-specific adaptive playback speed, and generating a time-stretched segment playable at the adaptive playback speed. The adaptive playback speed is faster or slower than a default playback speed of the meeting recording. To determine the adaptive playback speed, this disclosure provides technologies to determine a playback data feature based on user-meeting data. The adaptive playback is generated based on the playback data feature. The segment is time-stretched to the adaptive playback speed to generate an updated meeting recording including the segment that is time-stretched and playable at the adaptive playback speed. In this manner, an updated meeting recording, specific to a user, and playable at an adaptive playback speed based on user-meeting data may reduce bandwidth associated with user's manually editing videos or rewinding playback, while improving user experience.
G11B 27/28 - Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information detectable on the record carrier by using information signals recorded by the same method as the main recording
The techniques disclosed herein enable systems to reduce the time required to terminate a set of microservices for an application while ensuring high availability and preventing request failures. This is accomplished through a termination manager which retrieves request queues for the microservices to analyze outstanding requests that require processing prior to termination. Based on the outstanding requests, the termination manager constructs call graphs for each request. The call graphs capture the operational flow of the associated request by defining a sequence of microservices whose functionality is invoked by the request. From an initial analysis, the termination manager can determine that some of the microservices do not appear in the call graphs, indicating that the microservices are not needed to process the outstanding requests. Accordingly, the unneeded microservices are terminated. As requests are processed by the remaining microservices, the termination manager gradually terminates the remaining microservices based on the call graphs.
Static analysis of a code base is expanded beyond finding faults to also find code instances where a particular fault could have occurred but did not. A conformance count reflects code portions that satisfy a specified coding rule per static analysis, and a nonconformance count reflects code portions that do not satisfy the coding rule. Various metrics computed from the conformance count and nonconformance count drive software development quality assessments. For example, bugs or bug categories may be prioritized for developer attention, static analysis tools are evaluated based on the metrics, to reduce noise by eliminating low-value bug alerts. Particular areas of expertise of developers and developer groups are objectively identified. Source code editors are enhanced to provide specific recommendations in context. Other quality enhancements are also provided.
The present disclosure describes near-eye display systems including an array of projectors and a one-dimensional exit pupil expander. The array of projectors can be arranged along a first dimension and can output image light towards an input coupler within a waveguide that provides one-dimensional exit pupil expansion. In some implementations, arrays of monochromatic projectors are implemented and arranged in offset columns. The input coupler in-couples the image light from the array of projectors into a TIR path within the waveguide. Different optical elements, including diffractive and reflective optics, may be implemented as the input coupler. The image light travels within the waveguide until it interacts with an output coupler. Upon interaction with the output coupler, the image light is expanded in a second dimension transverse to the first dimension and is coupled out of the waveguide.
A machine learning model trained with a triplet loss function classifies input strings into one of multiple hierarchical categories. The machine learning model is pre-trained using masking language modeling on a corpus of unlabeled strings. The machine learning module includes an attention-based bi-directional transformer layer. Following initial training, the machine learning model is refined by additional training with a loss function that includes cross-entropy loss and triplet loss. This provides a deep learning solution to classify input strings into one or more hierarchical categories. Embeddings generated from inputs to the machine learning model capture language similarities that can be visualized in a cartesian plane where strings with similar meanings are grouped together.
A head-wearable display device includes a display panel to emit display light. An optical array panel is positioned along an optical path of the display light emitted by the display panel, and configured to redirect the display light toward an eyebox. An eye tracking system estimates a current pupil position of a user eye relative to the head-wearable display device. An actuator translates a position of the optical array panel relative to the display panel to move a position of the eyebox toward the current pupil position of the user eye.
G02B 26/08 - Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
35.
NON-DISRUPTIVE SERVICING OF COMPONENTS OF A USER MODE PROCESS
Examples of the present disclosure describe systems and methods for the non-disruptive servicing of components of a user mode process. In examples, a user mode process comprises multiple components, each encapsulating a distinct piece of functionality. A replacement component is loaded and initialized. The replacement component is validated to ensure that the required dependencies of the replacement component are satisfied by the other components of the user mode process. The component to be serviced and the components having dependencies on the component to be serviced are suspended to enable a snapshot of the runtime state of the component to be serviced to be captured. The runtime state is copied to the replacement component and the components having dependencies on the component to be serviced are updated to reference the replacement component. The replacement component is executed and the suspended components are resumed. The component to be serviced is unloaded.
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
36.
BACKGROUND UPGRADE MIGRATION DETERMINATION AND IMPLEMENTATION
Migration of a user of a computing device to accept an updated version of a software feature to the exclusion of a prior version of the software feature is implemented without user friction. Telemetry data corresponding to use of the updated version and of the prior version is stored. The telemetry data is evaluated utilizing a trained machine learning model trained using external telemetry data with respect to use of the updated version and to use of the prior version. A migration acceptance value indicative of whether the user will accept use of the updated version to exclusion of the prior version is calculated. The migration acceptance value is compared to a threshold value determined by the trained model. If the migration acceptance value exceeds the threshold value, the prior version is excluded from the user profile.
A radiofrequency trap component system includes a resonant LC circuit including a capacitive element and an inductive element, wherein the inductive element includes primary inductor rings positioned in proximity to a modulation ring. The radio frequency trap component system further includes a radiofrequency noise detector configured to detect a noise level of radiofrequency noise interacting with an electromagnetic radiofrequency noise recipient in a computing device and controller circuitry communicatively coupled to the radiofrequency noise detector and configured to determine that the detected noise level satisfies an interference condition and to tune a radiofrequency bandwidth at which the resonant LC circuit resonates by modulating electrical current supplied to the modulation ring of the inductive element in the resonant LC circuit, based at least on determining that the detected noise level satisfies the interference condition.
Examples of the present disclosure describe systems and methods for non-disruptively hibernating and resuming a guest environment using a network virtual service client. In examples, when a guest environment is hibernated, a network virtual service client provides an instruction to a virtual network interface card to set the device power state of the virtual network interface card to a low power state. The network virtual service client disables the communication channels used by the network virtual service client and saves the operating state of the virtual network interface card. When the guest environment is resumed, the network virtual service client provides an instruction to set the device power state of the virtual network interface card to a full power state. The network virtual service client reenables the communication channels used by the network virtual service client and restores the operating state of the virtual network interface card.
According to the implementation of the present disclosure, a solution for parsing the hierarchical relationship of elements in an image is provided. According to the solution, the second element in the first element is determined based on a feature(s) of the input image and the first element in the input image. The third element in the second element is detected based on the feature and the second element. The first element, the second element and the third element correspond to corresponding regions in the input image. Based on the determination of the second element and the detection result of the third element, a hierarchy indicating the relationship between elements in the input image is determined. In this way, the hierarchy of elements in the image can be obtained without post-processing.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
A system and method for rendering a plurality of user interface (UI) components of a UI screen based on a priority order is conducted by receiving a request to load the UI screen, each component of the UI screen being associated with a priority order, creating a data structure for rendering the UI components in accordance with the priority order, the data structure including a list of the UI components in an order in which they should be rendered, generating an event for rendering a first UI component in the data structure, receiving an indication that the first UI component has been rendered, responsive to receiving the indication that the first UI component has been rendered, moving to a next UI component in the list to render and continuing with the rendering of the UI components in accordance with the list until all UI components in the list have been rendered.
Systems are configured to obtain streaming audio data comprising language utterances, continuously decode the streaming audio data in order to generate decoded streaming audio data and determine whether a linguistic boundary exists within an initial segment of decoded streaming audio data. When a linguistic boundary is determined to exist, the systems apply a punctuation at the linguistic boundary and output a first portion of the initial segment of the streaming audio data ending at the linguistic boundary while refraining from outputting a second portion of the initial segment which is located temporally subsequent to the first portion of the initial segment. Systems are also configured to delay the output until predetermined punctuation validation processes have been performed.
The disclosed technology is generally directed to detecting terminology understanding mismatch candidates. In one example of the technology, input content is received. Topics associated with the input content are identified. For each identified topic, topic information that corresponds to the identified topic is obtained. People associated with the input content are identified. For each identified person, person information that corresponds to the identified person is obtained. Based on the obtained topic information and the obtained person information, for each identified person: a level of proficiency of the identified person in each of the identified topics is determined. For each of the identified topics, whether the determined level of proficiency of the identified person meets a threshold that is associated with the identified topic is evaluated. For each determined level of proficiency that does not meet the threshold that is associated with the identified topic, a remedy is suggested.
The present disclosure relates to utilizing a real-time event data reporting system that makes real-time and near-real-time monitoring and reporting possible in edge devices. For example, in various instances, the real-time event data reporting system embeds services within traditional event data collectors of edge devices to obtain, organize, and publish event data for local computing devices in real time utilizing in-memory storage. Additionally, the real-time event data reporting system further processes the published event data to generate aggregated data that is persisted to a persistence storage. In this manner, the real-time reporting system efficiently and accurately provides event data reports to client devices with processed metric data in real time, or in near-real time when utilizing additional fallback safeguards. Indeed, the real-time reporting system provides a highly available, fault-tolerant, distributed, scalable, and efficient mechanism for collecting and managing various metrics from services in edge or cloud environments.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A general methodology is presented for optimizing a value at risk (VaR) associated with an allocation of objects (i.e., a strategy) having variable performance and loss characteristics. For purposes of illustration, investment strategies prescribing a portfolio of items from a set of candidates with unknown and generally correlated joint losses are discussed. The framework is based on approximating the VaR using nonparametric estimates of the portfolio loss density and, using mathematical insights, an efficient approach to computing the VaR gradient with respect to the strategy. The approach also allows inclusion of constraints on the strategy (e.g. a maximum fraction per item) and allows the VaR optimization problem to be solved using optimization techniques such as sequential quadratic programming.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/0635 - Risk analysis of enterprise or organisation activities
G06Q 30/0202 - Market predictions or forecasting for commercial activities
G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
A computing system including one or more processing devices that train an oversubscription reinforcement learner at least in part by receiving computing resource usage trajectories. At the oversubscription reinforcement learner, the training further includes generating prototypes based at least in part on the computing resource usage trajectories. The training further includes, based at least in part on the prototypes, generating an oversubscription rate. The training further includes outputting a prototype feedback query and/or an oversubscription rate feedback query. The training further includes receiving a prototype feedback input and/or an oversubscription rate feedback input. Based at least in part on the computing resource usage trajectories, the prototypes, and the prototype feedback input and/or the oversubscription rate feedback input, the training further includes computing an objective function value and training the oversubscription reinforcement learner based at least in part on the objective function value.
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
Technologies for document evaluation and identification of shared textual substrings between documents are described herein. Documents are evaluated and organized according to textual elements within the documents. A suffix index is generated from a reference document. The suffix index is used to identify common substrings of text within query documents using variable evaluation windows within the query documents. Indications of overlapping textual information between the reference document and query documents is generated as an output.
Embodiments of the present disclosure include systems and methods for providing a hierarchical programming model for Al hardware. A system includes a set of lower-level control threads. The system also includes a higher-level control thread configured to receive a command from a. device, generate a set of commands based on the command, and provide the set of commands to a subset of the set of lower-level control threads. A lower-level control thread in the subset of the set of lower-level control threads is configured to instruct, based on a particular command in the set of commands, a subset of a plurality of processing threads to perform a set of operations.
Recycling information is associated with objects through the use of molecular tags. The recycling information may describe the type of material that the object is made from as well as provide instructions for recycling. The molecular tags may be polynucleotides or other types of molecules including inorganic molecules. The molecular tags may be embedded within the object or attached to the surface of the object. At the end of the object's life, the molecular tags are read and the recycling information is used to appropriately recycle the object.
Generally discussed herein are devices, systems, and methods for machine learning (ML) modeling of a system that operates on a multivector object. A method includes receiving, by an ML model, the multivector object as an input that represents a state of the multivector system. The method includes operating, by the ML model and using a Clifford layer that includes neurons that implement a multivector kernel, on the multivector input to generate a multivector output that represents the state of the multivector system responsive to the multivector input.
This document relates to employing tongue gestures to control a computing device, and training machine learning models to detect tongue gestures. One example relates to a method or technique that can include receiving one or more motion signals from an inertial sensor. The method or technique can also include detecting a tongue gesture based at least on the one or more motion signals, and outputting the tongue gesture.
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G06F 3/0346 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
51.
INTERLEAVED MACHINE INSTRUCTION PLACEMENT IN MEMORY
Solutions for improving parallelization of computer programs interleave machine instruction placement in memory. A compiler decomposes a software loop in stages to interleave instructions such that, for contiguous sets of instructions having some minimum length (e.g., each set has at least two to four instructions), instructions within a set have no dependency on prior instructions within that set. This enables the compiled program to be more fully parallelized – for example, either by a superscalar processor executing the compiled program, or by the compiler turning each set of instructions into a very long instruction word (VLIW) - to automatically benefit from the disclosed interleaving of instructions that eliminates dependencies.
A method of assisting a user with the discovery of program features is provided. The method includes detecting a selection of a data structure within a user interface, determining a contextual parameter based on the selected data structure, the contextual parameter associated with a modifiable feature of the selected data structure, determining options for generating program code configured to modify the modifiable feature are available based on the contextual parameter and a predefined inferential relationship between the contextual parameter and the modifiable feature of the selected data structure, and prompting the user in the user interface with information indicating that the determined options for generating the program code are accessible in the user interface.
A camera system comprises a lamp configured to emit light, a lamp driver configured to energize the lamp, an image-sensor array configured to acquire image data, a lenslet array, and an image engine. The lenslet array comprises a plurality of lenslets arranged laterally over the image-sensor array and configured to focus the light, reflected from a subject, onto the image-sensor array. The image engine is configured to receive the image data from the image-sensor array, resolve the image data into a plurality of component images, and return an enhanced image based on the plurality of component images, the enhanced image having enhanced spatial resolution relative to any of the component images.
H04N 23/951 - Computational photography systems, e.g. light-field imaging systems by using two or more images to influence resolution, frame rate or aspect ratio
H04N 23/56 - Cameras or camera modules comprising electronic image sensors; Control thereof provided with illuminating means
H04N 23/55 - Optical parts specially adapted for electronic image sensors; Mounting thereof
H04N 23/957 - Light-field or plenoptic cameras or camera modules
H04N 13/00 - PICTORIAL COMMUNICATION, e.g. TELEVISION - Details thereof
Providing memory prefetch instructions with completion notifications in processor-based devices is disclosed. In this regard, an instruction set architecture (ISA) of a processor-based device provides a memory prefetch instruction that, when executed by a processor of a processor-based device, causes the processor to perform a memory prefetch operation by asynchronously retrieving a memory block from the system memory based on the memory address, and storing the memory block in a cache memory of the processor-based device. In response to completing the memory prefetch operation, the processor then notifies an executing software process that the memory prefetch operation is complete. Based on the notification, the executing software process may ensure that any subsequent memory access requests are not attempted until the memory prefetch operation is complete.
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
A connector for an electronic device is disclosed. The connector includes a housing. The housing includes a leading surface. The leading surface forms a plug opening and a fulcrum spaced away from the plug opening. The connector includes an electronic plug extending through the plug opening away from the leading surface of the housing. The connector includes a pivot providing the electronic plug a range of angular adjustment relative to the leading surface of the housing. The connector includes a bias mechanism biasing the electronic plug to a default position within the range of angular adjustment.
A data processing system implements detecting that a first user device associated with a first user has added a first sponsored content item to a host electronic document by adding a first reference to the first sponsored content item to the host electronic document. The first sponsored content item is stored separately in a memory of a cloud-based service from the host electronic document. The data processing system further implements determining that the first user has permission to share the first sponsored content item with other users of the cloud-based service, generating sponsor information to associate the sponsored content item with the host electronic document to permit users having access to the host electronic document to access the sponsored content item, and storing the sponsor information in a sponsored access datastore.
A computing device includes a first display-supporting frame rotatably coupled to a second display-supporting frame along a hinge axis via a hinge assembly comprising a central spine extending parallel to the hinge axis. A flexible display is supported by the first display-supporting frame and the second display-supporting frame. A spine cover plate extends over the central spine and is moveably coupled to the hinge assembly for translation relative to the central spine as the first display-supporting frame is rotated relative to the second display-supporting frame.
Embodiments of the present disclosure include techniques for a package and process for semiconductor dies. An interconnect bridge includes first conductors that electrically connect two or more semiconductor die. The interconnect bridge includes second conductors between opposite surfaces. A substrate of the interconnect bridge is removed to expose conductors of an interconnect layer that are electrically coupled to connections to the first and second semiconductor dies in a region of overlap between the semiconductor dies and interface bridge.
H01L 23/538 - Arrangements for conducting electric current within the device in operation from one component to another the interconnection structure between a plurality of semiconductor chips being formed on, or in, insulating substrates
59.
SYSTEMS AND METHODS FOR RAY TRACING ACCELERATION STRUCTURE LEVEL OF DETAIL PROCESSING
Systems and methods for ray tracing acceleration structure level of detail processing are described. An example graphics processing system is to retrieve a first level of detail value for a sub-tree from a level of detail residency map corresponding to a bounding volume hierarchy of objects. The graphics processing system is to determine a second level of detail value for the sub-tree. The graphics processing system is to select a final level of detail value for the sub-tree based on a comparison between the first level of detail value for the sub-tree and the second level of detail value for the sub-tree. The graphics processing system is to, based on the final level of detail value for the sub-tree, select child nodes in an acceleration structure tree and trace the selected child nodes.
Embodiments of the present disclosure include techniques for a package and process for semiconductor dies. An interconnect bridge (130) includes first conductors (135) that electrically connect two or more semiconductor die (110, 111). The interconnect bridge (130) includes second conductors 136) between opposite surfaces. A substrate of the interconnect bridge is removed to expose conductors of an interconnect layer that are electrically coupled to connections to the first and second semiconductor dies in a region of overlap (131, 132) between the semiconductor dies (110, 111) and interconnect bridge (130).
H01L 23/538 - Arrangements for conducting electric current within the device in operation from one component to another the interconnection structure between a plurality of semiconductor chips being formed on, or in, insulating substrates
A method for high availability routing of a communication is provided. A broadcast routing message that includes a voice termination identifier is received from a communication service. Based upon the broadcast routing message, a secondary path for routing communications to an endpoint of the communication service associated with the voice termination identifier is identified. The secondary path provides an alternative route around a primary route over a packet-switched network to the communication service. An indication to setup a call to the endpoint. A metric for the primary route for the call through the service provider network connection that does not meet a defined condition is identified. In response to identifying that the metric for the primary route for the call through the service provider network connection does not meet the defined condition, the call is routed using the secondary path to the endpoint through the communication service.
Systems and methods for shape prediction for digital inking applications include training a shape prediction model to predict complete shapes based digital ink data defining unfinished shapes. During use, digital ink data representing an unfinished shape is input to a digital inking application and displayed in a canvas area of the application. The digital ink data is also provided to the shape prediction model as input. The shape prediction model generates a shape prediction based on the digital ink data. The shape prediction is displayed in the canvas area. When a second input is received indicating acceptance of the shape prediction, the digital ink forming the unfinished shape is replaced with digital ink forming a predicted complete shape.
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
G06F 40/109 - Font handling; Temporal or kinetic typography
G06F 40/171 - Editing, e.g. inserting or deleting by use of digital ink
G06F 40/274 - Converting codes to words; Guess-ahead of partial word inputs
G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
63.
ACTIVE ISOLATION ENHANCEMENT FOR MULTI-MODE ANTENNA SYSTEM
Examples are disclosed that relate to controlling an electronic device including a multi-mode antenna system. In a first operating mode, a radio signal is transmitted via a first antenna, a second antenna is actively de-tuned the while receiving a reflected radio signal thereby increasing isolation between the first and second antennas, an object is detected based at least on the reflected radio signal and the multi-mode antenna system is switched to operation in a second operating mode. In the second operating mode, a first remote radio signal transmitted by a remote antenna of a remote electronic device is received, via the first antenna, a second remote radio signal transmitted by the remote antenna is received via the second antenna, and a position of the remote electronic device is determined based at least on a phase difference between the first remote radio signal and the second remote radio signal.
The present disclosure relates to systems, methods, and computer-readable media for identifying anomalies of failure events on a cloud computing system and determining cross-component and cross-layer correlation between change events that occur on the cloud computing system and the failure events associated with the anomalies. In particular, this disclosure describes a system that receives telemetry related to change events and failure events across any number of computing layers of a distributed computing environment (e.g., a cloud computing system) and detects anomalies based on counts of failure events that are manifested over discrete periods of time. Based on these detected anomalies, the anomaly correlation system can determine cross-layer and cross-component correlations between selective change events and the detected anomalies of failure events. The anomaly correlation system may further generate and provide recommendations related to mitigating or otherwise addressing the anomalies based on the determined correlations.
Embodiments of the disclosure provide a solution for generating images from texts based on prompts. A text encoder encodes an input text into a text embedding, and projects, by use of a prompt text embedding and a prompt image embedding as the baseline, the text embedding of the input text into an image embedding semantically correlated with the input text. A conversion network converts the image embedding into a latent embedding in a latent space of the image generator, and the image generator generates an image semantically correlated with the input text based on the latent embedding carrying semantic information. Accordingly, the solution can generate from the text containing semantics an image having corresponding semantics, and the quality of the generated image is also improved.
The present disclosure relates to methods and systems for improving user experiences of an application. The methods and systems receive biological feedback of the user as the user interacts with an application and adapts the application's behavior in response to detecting a user's instantaneous reaction in response to interactions with the application. The methods and systems use a machine learning model to compare the user's current state based on the biological feedback received to known states to determine the user's instantaneous reaction to interactions with the application. The methods and systems provide feedback with a user experience classification of the user's interactions with the application.
G16H 20/70 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to mental therapies, e.g. psychological therapy or autogenous training
G16H 40/63 - ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for local operation
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
A computer-implemented method of generating a security language query from a user input query includes receiving, at a computer system, an input security hunting user query indicating a user intention; selecting, using a trained machine learning model and based on the input security hunting query, an example user security hunting query and corresponding example security language query; generating, using the trained machine learning model, query metadata from the input security hunting query; generating a prompt, the prompt comprising: the input security hunting user query; the selected example user security hunting query and the corresponding example security language query; and the generated query metadata; inputting the prompt to a large language model; receiving a security language query from the large language model corresponding to the input security hunting query reflective of the user intention.
A recovery instruction pertaining to a resource is detected. The recovery instruction is matched with a delete instruction that caused the resource to enter a soft-deleted. A mismatch between a first user account associated with the recovery instruction and a second user account associated with the delete instruction is determined. A mitigation action is performed based on determining the mismatch between the first user account and the second user account.
A computing device is provided, including a processor that receives a network graph. The processor further receives a specification of a network traffic control heuristic for a network traffic routing problem over the network graph. The processor further constructs a gap maximization problem that has, as a maximization target, a difference between an exact solution to the network traffic routing problem and a heuristic solution generated using the network traffic control heuristic. The processor further generates a Lagrange multiplier formulation of the gap maximization problem. At a convex solver, the processor further computes an estimated maximum gap as an estimated solution to the Lagrange multiplier formulation of the gap maximization problem. The processor further performs a network traffic control action based at least in part on the estimated maximum gap.
Aspects of the present disclosure relate to creating a long note from one or more short notes made in a source document. A long note is a separate document created by the system to capture each of the one or more short notes and related source content from the source document and compiles them in one place for independent review and modification. The long note captures the connection between the short note and the source document with source content such as the related text, images, or other source content within the source document to which the short note is directed. The long note may be created independently of a user request, such that the entry of a short note into the source document initiates the creation of the long note.
An image-processing technique is described herein for removing a visual effect (118, 120) in a face region of an image (116) caused, at least in part, by screen illumination provided by an electronic screen (108). The technique can perform this removal without advance knowledge of the nature of the screen illumination provided by the electronic screen. The technique improves the quality of the image and also protects the privacy of a user by removing the visual effect in the face region that may reveal the characteristics of display information presented on the electronic screen. In some implementations, the technique first adjusts a face region of the image, and then adjusts other regions in the image for consistency with the face region. In some implementations, the technique is applied by a videoconferencing application, and is performed by a local computing device.
A method may include first executing an operation of an application using a function call of a first version of a package of the application; first detecting, by the application, an error in the first executing; in response to the first detecting, second executing the operation of the application using a function call of a second version of the package of the application; second detecting, by the application, that no error occurred during the second executing; and in response to the second detecting, electronically logging an error with respect to the function call of the first version of the package.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
73.
ENHANCED INTEGRATION OF SPREADSHEETS WITH EXTERNAL ENVIRONMENTS
An enhanced integration of spreadsheet environments and external environments is disclosed herein that allows users to enter non-native statements directly into the cells of a worksheet so that external resources can be applied with respect to their values. In addition, a security model is disclosed whereby external functions referenced in the cells of a worksheet are executed in the context of a runtime environment that is secured apart from the spreadsheet application that hosts the worksheet. Various enhancements to the user experience are also disclosed that allow users to enter non-native statements in line with respect to the functional syntax that forms the basis of spreadsheet formulas.
A data processing system implements scalable, secure, and reliable targeted release (TR) deployments of updates in cloud-based service. The TR deployment framework is provided that solves the technical problem of facilitating deployment of updates to targeted release customers. TR customers are associated with pre-deployment requirements (PDRs) associated with accreditation and/or validation tasks that must be completed before the update may be deployed to the customer base of the TR customers. A subset of the TR customer base is provided with segregated access to complete these accreditation tasks and/or validation tasks before the update is provided to the remainder of the userbase of the TR customer. This approach ensures that the industry standards and/or customer requirements are met before the update is deployed to the entire userbase of the TR customer.
A method for friction reduction during professional network expansion is implemented via a computing system including a processor. The method includes executing, via a network, an enterprise application on a remote computing system operated by a user associated with an enterprise and surfacing a professional networking UI on a display of the remote computing system during execution of the enterprise application. The method includes generating parameters that are representative of a connection between the user and each suggested professional contact based on enterprise-level data corresponding to the user and each suggested professional contact and generating friction-reducing UI elements for each suggested professional contact based on the generated parameters. The method includes receiving, via the professional networking UI, user input including a command to open a contact connection page corresponding to one of the suggested professional contacts and surfacing the corresponding contact connection page including the generated friction-reducing UI elements.
G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
G06F 9/451 - Execution arrangements for user interfaces
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
76.
NETWORK MANAGEMENT ENGINE FOR A CLOUD COMPUTING SYSTEM
Methods, systems, and computer storage media for providing a network conflict management service that is associated with a network management engine of a cloud computing system. In operation, cross-premises networking information is accessed at a cross-premises networking information database. The cross-premises networking information comprises on-premise network extension data associated with managing and routing on-premise networks and a cloud-provider network. Networking information for a first network is retrieved from the cross-premise networking information database. The networking information of the first network is compared to networking information of a second network, the networking information of the second network (e.g., networking information associated with a request to create the second network). Based on comparing the networking information of the first network to the networking information of the second network, a determination is made that a network conflict exists. Based determining that the network conflict exists, a notification of the network conflict is communicated.
H04L 41/0873 - Checking configuration conflicts between network elements
H04L 61/2521 - Translation architectures other than single NAT servers
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0853 - Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
Data-at-rest protection for virtual machines includes operating a data protection component within a first privilege context of a guest partition, and operating a guest operating system (OS) within a second privilege context of the guest partition. The data protection component participates in data input/output operations of the guest OS. Based on a data output operation of the guest OS, the data protection component applies a first data protection operation to first data associated with the data output operation; and initiates storage of a first result of the first data protection operation to a data storage device. Based a data input operation of the guest OS, the data protection component applies a second data protection operation to second data associated with the data input operation; and, based on applying the second data protection operation to the second data, communicates an outcome of the data input operation to the guest OS.
The disclosure herein describes generating input key-standard key mappings for a form. A set of input key-value pairs are received, and a subset of candidate form types are determined from a set of form types using the input key-value pairs. A set of standard keys associated with the determined subset of candidate form types are obtained. A set of input key-standard key pairs are generated using the set of input key-value pairs and the obtained set of standard keys and the set of input key-standard key pairs are narrowed using a narrowing rule. Ranking scores for each input key-standard key pair of the narrowed set of input key-standard key pairs are generated. Each input key of the set of input key-vale pairs is mapped to a standard key of the set of standard keys using at least the generated ranking scores of the narrowed set of input key-standard key pairs.
Example solutions for multi-stage 8-bit floating point (FP8) matrix multiplication with format conversion, that benefit computation efficiency of matrix multiplication operations by a processor, include: copying data values in FP8 format from global memory to shared memory; loading thread block tiles of FP8 data values from the shared memory into a set of registers; converting each of the multiple FP8 data values in the set of registers to 16-bit floating point (FP16) data values; submitting the FP16 data values to the tensor core; and performing, with the tensor core, matrix multiply accumulate computations.
The techniques disclosed herein implement an improved format for transmitting call stacks (referred to herein as stacks) from machines to a stack analysis service. Moreover, the techniques implement an improved way for the stack analysis service to represent the large number of stacks. The improved format enables the collection of a large number of stacks (e.g., millions or even trillions of stacks) to be more efficient. The improved representation of a large number of stacks enables the analysis to be more efficient. Consequently, the techniques described herein reduce the carbon footprint for an organization that operates a group of machines because less network, storage, and/or processing resources are needed to collect and analyze a large number of stacks.
An autocompletion feature for a command line interface communicates directly with the shell to obtain candidates to complete a partially-formed CLI command. A terminal emulator generates autocompletion request sequences that are intercepted by a custom shell script integrated with the shell. The custom shell script uses its own autocompletion engine and a CLI command repository with the most current and historical versions of the CLI command structure to obtain autocompletion candidates. In this manner, the shell may be hosted in a remote device or in a separate execution environment without impacting the device hosting the terminal emulator for updates to the CLI command structure.
The execution-time reporting of telemetry of execution of a software program. Subscribers submit subscriptions to telemetry of the software program. As each subscription is received, the telemetry scope of the subscription is evaluated to determine what portion of an object model is to be augmented. The augmented portion will include portion(s) related to the scope of telemetry subscribed to in the subscription. Thereafter, that portion of the object model is indeed augmented as execution of the computer program proceeds further. Subsequently, telemetry reports are generated for a subscription based on the interpretation of a defined subscription-specific portion of the object model.
Computing an image depicting a face having an expression with wrinkles is described. A 3D polygon mesh model of a face has a non-neutral expression. A tension map is computed from the 3D polygon mesh model. A neutral texture, a compressed wrinkle texture and an expanded wrinkle texture are computed or obtained from a library. The neutral texture comprises a map of the first face with a neutral expression. The compressed wrinkle texture is a map of the first face formed by aggregating maps of the first face with different expressions using the tension map, and the expanded wrinkle texture comprises a map of the first face formed by aggregating maps of the first face with different expressions using the tension map. A graphics engine may be used to apply the wrinkle textures to the 3D model according to the tension map; and render the image from the 3D model.
Computerized systems and methods are provided for automatically causing a visually-deemphasized effect to be applied to a portion of the graphical user interface (GUI) that excludes a GUI element of a computer application determined to be in a user-attention state. A user-attention state may correspond to a computer state associated with a GUI element that indicates that the GUI element on a screen has or should have a user's attention. GUI elements presented using a visually-deemphasized effect are presented in a visually altered manner, such as blurred, grayscale, or otherwise visually modified. Embodiments include monitoring and classifying user data and user activity associated with a GUI element. Based on the classification, the GUI element is determined to be in the user-attention state to cause the visually-deemphasized effect to be applied to a portion of the GUI that excludes the first GUI element.
Generally discussed herein are devices, systems, and methods for cloud resource security. A method can include receiving, at a monitor device and from a first cloud resource of cloud resources hosted by a cloud provider, a request for a token that uniquely identifies the first cloud resource, the request indicating a destination that is a metadata server. The method can include comparing, based on entries in an application programming interface (API) access log, the cloud provider associated with the first cloud resource and a cloud provider associated with the metadata server. The method can include responsive to the cloud provider of the first cloud resource being different from the cloud provider of the metadata server performing a security mitigation action. The claims define a technology whereby a DNS receives a request from a terminal to establish a VPN tunnel to an identified node.
An application management platform remotely manages a computing device. A request is received to update a configuration of the computing device. It is determined that the computing device is executing a security layer that restricts execution of code on the computing device to an explicit list of software. A script is dynamically selected that fulfills the request to update the configuration of the computing device. The script is signed with a certificate of the application management platform. The script is sent to the computing device. The security layer is configured to allow execution of scripts signed with the certificate of the application management platform, thereby allowing the computing device to execute the script while the security layer is executing.
Historic context data is automatically associated with particular pieces of source code by retrieval data structures. Ephemeral information is preserved, such as how a piece of code originated operationally and was changed over time, which research sources informed the code's origination and changes, and why particular changes in the code were made. Code may be rolled back to an earlier version based on parameters such as whether code had been refactored, or results of testing or static analysis. Rollback goes beyond editor undo actions, and a developer need not specify a timestamp or a version number. Developer documentation burdens are reduced, developer understanding is increased, and code quality is enhanced, by providing ready access to the code's software development context history data. Some actions made possible include highlighting code that was generated automatically by autocompletion or otherwise, highlighting refactored code, and highlighting pasted code, among other actions.
According to implementations of the subject matter described herein, a solution for temporal supersampling of frames is provided. According to the solution, pixels of a target frame are classified into a plurality of pixel categories. A blending weight map for a reference frame of the target frame is determined at least based on a result of the classifying, the blending weight map indicating importance degrees of pixels of the reference frame in blending. The target frame is blended with the reference frame based on the blending weight map, to obtain a supersampled frame corresponding to the target frame. Through this solution, a more stable and accurate supersampling result can be achieved.
A peak detector comprises multiple small-size amplitude detection circuits coupled in parallel to signal inputs at which a signal is received from a VCO. Each amplitude detection circuit generates a voltage on an output, indicating a voltage peak or amplitude of a first signal input and a second signal input (specifically, differential output of VCO). At a given time, only one small-size amplitude detection circuit is activated to load VCO, reducing the impact on LC resonant frequency. The plurality of small-size detection circuits work sequentially, and an automatic averaging of their outputs can significantly improve the peak detector fluctuation (caused by process variation and device mismatch) compared to each single small-size amplitude detection circuit.
H03L 5/00 - Automatic control of voltage, current, or power
G01R 19/04 - Measuring peak values of ac or of pulses
H03L 7/099 - Automatic control of frequency or phase; Synchronisation using a reference signal applied to a frequency- or phase-locked loop - Details of the phase-locked loop concerning mainly the controlled oscillator of the loop
A system and method for loading a user interface (UI) component of a UI screen on an as needed basis is conducted by examining a list of UI components included in the UI screen to identify a UI component having an associated replacement component, the replacement component imitating an appearance of the UI component but offering fewer functionalities than the UI component. The replacement component is then loaded in place of the UI component, before user interactions with the UI screen are examined to determine when the UI component is likely to be used. Responsive to determining that UI component is likely to be used in the near future, the replacement component is replaced with the UI component in the UI screen.
The present disclosure relates to methods and systems for detecting the links for webpages presented by users through screen sharing during an online meeting. The methods and systems post the links for the webpages in the meeting chat in near real time during the online meeting. The links for the webpages are available for access in the meeting chat during the online meeting and after the online meeting finishes.
A storage drive assembly is provided. The storage drive assembly includes a storage drive sized and shaped for insertion into a slot within a chassis, a latching mechanism coupled to a first end of the storage drive, the latching mechanism including an actuation component actuable to transition the latching mechanism from a locked state in which the latching mechanism restricts displacement of the storage drive relative to the chassis to an unlocked state in which the latching mechanism enables displacement of the storage drive assembly relative to the chassis, and a drive secure cover plate adapted to removably mate with the latching mechanism in the locked state, the mated drive secure cover plate preventing physical access to the actuation component.
The present disclosure relates to a four-dimensional (4D) recommendation system for training and implementing a 4D recommendation model to provide health-related recommendation for an individual that is a subject of a volumetric capture performed by a calibrated multi-camera system. In particular, the 4D recommendation system may capture 4D data objects including time-series three-dimensional models and associated annotations and generate a knowledge base including a collection of 4D data objects stored thereon. An input 4D data object may be obtained and compared to the collection of 4D data objects to determine one or more recommendations for the input 4D data object related to the health status of the individual.
G16H 20/30 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to physical therapies or activities, e.g. physiotherapy, acupressure or exercising
G16H 50/50 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for simulation or modelling of medical disorders
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
94.
CONFIGURATION AND AUTHENTICATION OF ENTERPRISE MOBILE NETWORK RADIO UNIT
A service provider implements an enterprise mobile network radio unit providing enterprise customers with facilities to connect enterprise-provided white box radio unit hardware to public cloud-based network infrastructure to implement private wireless connectivity across a range of service types. The public infrastructure is provided by the service provider to support a universal enterprise mobile network operating over cellular frequencies including Citizens Broadband Radio Service (CBRS) in the 3.5 GHz range. The enterprise mobile network radio unit includes a portal having a user interface that enables enterprise customers to manage their individual private cellular networks and a radio registration entity that interfaces with the enterprise-provided hardware. The radio registration entity points the radios to appropriate functions in the universal enterprise mobile network and collects information from the radios to enable connectivity between the enterprise-provided radios and a core network of the universal enterprise mobile network.
A service provider implements an enterprise mobile network delivery system providing enterprise customers with facilities to connect enterprise-provided white box radio unit hardware to public cloud-based network infrastructure to implement private wireless connectivity across a range of service types. The public infrastructure is provided by the service provider to support a universal enterprise mobile network operating over cellular frequencies including Citizens Broadband Radio Service (CBRS) in the 3.5 GHz range. The enterprise mobile network delivery system includes a portal having a user interface that enables enterprise customers to manage their individual private cellular networks and a radio registration entity that interfaces with the enterprise-provided hardware. The radio registration entity points the radios to appropriate functions in the universal enterprise mobile network and collects information from the radios to enable connectivity between the enterprise-provided radios and a core network of the universal enterprise mobile network.
This disclosure provides a machine learning technique to predict a protein characteristic. A first training set is created that includes, for multiple proteins, a target feature, protein sequences, and other information about the proteins. A first machine learning model is trained and then used to identify which of the features are relevant as determined by feature importance or causal relationships to the target feature. A second training set is created with only the relevant features. Embeddings generated from the protein sequences are also added to the second training set. The second training set is used to train a second machine learning model. The first and second machine learning models may be any type of regressors. Once trained, the second machine learning model is used to predict a value for the target feature for an uncharacterized protein. The model of this disclosure provides 91% accuracy in predicting an ileal digestibility score.
G16H 20/60 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to nutrition control, e.g. diets
97.
CONTROLLING ELECTRICAL POWER FLOWING FROM A BATTERY
Examples are disclosed that relate to controlling power from a battery. One example provides a power management system for a computing device having a battery powering a processing unit. The power management system comprises a controller. The controller is configured to receive a RSOC of the battery and compute a current limit value based at least on the RSOC. The power management system further comprises a power channel including a first-stage regulator having a current limiter. The current limiter is configured to dynamically limit, to the current value, a current flowing from the battery to the processing unit. The power channel further includes a second-stage regulator configured to detect the voltage droop on the first-stage output voltage and lower a second-stage output voltage by an amount in response to the voltage droop meeting a droop threshold condition. The second-stage output voltage is configured to power the processing unit.
Methods, systems and computer program products are provided for granular secure user access to private resources. Increased granularity of security policies for user access may reduce security threats to resources. Security policies indicating user access to secure resources may be based on various combinations of user identities, client-side process (e.g., sub-process) identities, device identities, device types, device locations, resource access types, intelligent access (e.g., selective traffic routing), etc. For example, a security policy may indicate user A, using computing device B executing process C with process signature S (e.g., a signing signature thumbprint, etc.) may access private resource D. A process identity may be indicated by at least one of a process name, a code signing signature, a thumbprint, a process version, or a process publisher. Resource access security policy determinations and/or enforcement may be performed by security clients and/or security engines (e.g., SASE providing ZTNA).
Systems and methods are provided for training and using a novel unified language foundation model. An encoder-decoder natural language model is obtained and various training data is obtained and used for training. The training process integrates a combination of replaced token detection, corrupted span reconstruction, and disentangled attention methodologies to produce a unified encoder-decoder model. The trained model is trained for performing both natural language understanding (NLU) tasks and natural language generation (NLG) tasks. Attention applied to the model is applied discretely to segmented chunks of encoded data during processing to improve the efficiency of applying attention by the model.
A system provides adaptive adjustments of perspective views for improving detail awareness for users associated with target entities of a virtual environment. A system can generate customized three-dimensional 3D views for each individual user participating in a communication session. The system can generate customized three-dimensional views for each individual user without making modifications to a 3D model of a virtual environment so a 3D environment can be maintained while each participant may have adjusted angles and positions for various virtual objects. The system can adaptively adjust an angle or position for entities in a viewing perspective or change a dimension of a perspective view for a target entity. The adjustments can be according to each viewer's point of view to maximize detail awareness for each participant of a communication session. These adjustments can be made while at the same time, maintaining attendees arranged in a specific spatial relationship without changes.