Abstract:
Computationally implemented methods and systems include registering one or more first augmentations that were shown to a user through a first augmented view of a first actual scene, the one or more first augmentations having been shown at least at end of a segment of time, detecting, following the showing of the one or more first augmentations up to the end of the segment of time, one or more user behaviors of the user that when detected as occurring infers user's interest in seeing the one or more first augmentations; and displaying, in response at least in part to said detecting, one or more second augmentations through a second augmented view of the first actual scene or of a second actual scene, the one or more second augmentations to be displayed being based, at least in part, on the registering of the one or more first augmentations. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The mobile device may continuously and/or automatically scan the environment for tags without being specifically directed at a particular tag. The mobile device may be adapted to scan for audio tags, radio frequency tags, and/or image tags. The mobile device may be configured to scan for and identify tags within the user environment that satisfy a user preference. The mobile device may perform an action in response to identifying a tag that satisfies a user preference. The mobile device may be configured to scan for a wide variety of tags, including tags in the form of quick response codes, steganographic content, audio watermarks, audio outside of a human audible range, radio frequency identification tags, long wavelength identification tags, near field communication tags, and/or a Memory Spot device.
Abstract:
Disclosed herein are example embodiments for unoccupied flying vehicle (UFV) location assurance. For certain example embodiments, at least one machine, such as a UFV, may: (i) obtain one or more satellite positioning system (SPS) coordinates corresponding to at least an apparent location of at least one UFV; or (ii) perform at least one analysis that uses at least one or more SPS coordinates and at least one assurance token. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Disclosed herein are example embodiments for unoccupied flying vehicle (UFV) location confirmance. For certain example embodiments, at least one machine, such as a UFV, may: (i) obtain at least one indication of at least one location of a UFV; or (ii) attempt to counter at least one attack against a location determination for the UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Disclosed herein are example embodiments for collision targeting for hazard handling. For certain example embodiments, at least one machine, such as a base station, may: (i) ascertain at least one target for at least one collision to include an unoccupied flying vehicle (UFV); or (ii) transmit at least one command to execute at least one maneuver to divert a UFV at least toward at least one target to induce at least one collision to include the UFV and the at least one target. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Computationally implemented methods and systems include obtaining visual data of an actual view of a scene from a real environment, determining whether activity-inferring data that infers at least initial occurrence of one or more user activities associated with the scene from the real environment have at least been acquired, and presenting, in response at least in part to determining that the activity-inferring data have at least been acquired, an augmented view of the scene from the real environment, the augmented view including one or more augmentations that have been included into the augmented view based, at least in part, on the activity-inferring data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring one or more first augmentations for inclusion in a first augmented view of a first scene, displaying the first augmented view including the one or more first augmentations, and transmitting augmentation data associated with the one or more first augmentations to facilitate remote display of one or more second augmentations in a second augmented view of a second scene, the second scene having one or more visual items that are also included in the first scene. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Disclosed herein are example embodiments for inter-vehicle communication for hazard handling with an unoccupied flying vehicle (UFV). For certain example embodiments, at least one machine may: (i) receive one or more flight attributes from a remote UFV, with the one or more flight attributes indicative of one or more flight characteristics of the remote UFV; or (ii) adjust a flight path of a UFV based at least partially on one or more flight attributes received from a remote UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Systems and methods for viewing dynamically customized audio-visual content are described. In some implementations, a process may include providing at least one selection signal indicative of a viewer preference, receiving a dynamically customized audio-visual content including an audio-visual core portion having at least one revised content portion customized in accordance with the at least one selection signal, displaying the dynamically-customized audio-visual content; and providing a consideration for the dynamically-customized audio-visual content.
Abstract:
Disclosed herein are example embodiments for automated hazard handling routine activation. For certain example embodiments, at least one machine, such as an unoccupied flying vehicle (UFV), may: (i) detect at least one motivation to activate at least one automated hazard handling routine of the UFV; or (ii) activate at least one automated hazard handling routine of the UFV based at least partially on at least one motivation. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.