Abstract:
The disclosure is directed to clustering a stream of data points. An aspect receives the stream of data points, determines a plurality of cluster centroids, divides the plurality of cluster centroids among a plurality of threads and/or processors, assigns a portion of the stream of data points to each of the plurality of threads and/or processors, and combines a plurality of clusters generated by the plurality of threads and/or processors to generate a global universe of clusters. An aspect assigns a portion of the stream of data points to each of a plurality of threads and/or processors, wherein each of the plurality of threads and/or processors determines one or more cluster centroids and generates one or more clusters around the one or more cluster centroids, and combines the one or more clusters from each of the plurality of threads and/or processors to generate a global universe of clusters.
Abstract:
The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance).
Abstract:
The disclosure relates to various distance metrics that may quantify semantic and syntactic relationships between devices. More particularly, a first grammar associated with a first device and a second grammar associated with a second device may each comprise a symbol sequence that re-expresses one or more sequenced data items and one or more rules that represent a repeated pattern in the symbol sequence. Accordingly, one or more distance metrics that quantify a similarity between the first grammar and the second grammar may be calculated according to a comparison between the rules in the first grammar and the rules in the second grammar such that a relationship between the first device and the second device can be determined according to the one or more distance metrics.
Abstract:
The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance).
Abstract:
An aspect of the disclosure is directed to transmitting a reduced stream of encoded video frames. An original stream of encoded video frames is analyzed, a plurality of frames are removed without re-encoding encoded video frames to generate the reduced stream of encoded video frames, and the reduced stream and metadata describing the plurality of removed frames are transmitted. An aspect of the disclosure is directed to creating a new version of an original stream of encoded video frames from a reduced stream of encoded video frames. The reduced stream of encoded video frames is received, the plurality of removed frames is identified based on metadata related to the reduced stream, a plurality of replacement frames are generated, and the plurality of replacement frames are added to the reduced stream of encoded video frames to recreate the new version of the original stream of encoded video frames.
Abstract:
An aspect of the disclosure is directed to transmitting a reduced stream of encoded video frames. An original stream of encoded video frames is analyzed, a plurality of frames are removed without re-encoding encoded video frames to generate the reduced stream of encoded video frames, and the reduced stream and metadata describing the plurality of removed frames are transmitted. An aspect of the disclosure is directed to creating a new version of an original stream of encoded video frames from a reduced stream of encoded video frames. The reduced stream of encoded video frames is received, the plurality of removed frames is identified based on metadata related to the reduced stream, a plurality of replacement frames are generated, and the plurality of replacement frames are added to the reduced stream of encoded video frames to recreate the new version of the original stream of encoded video frames.
Abstract:
The present disclosure generally relates to systems and methods for establishing and maintaining communication between two or more communication devices coupled to communication networks. Some specific aspects relate to communication between a plurality of communication devices each of which is coupled to a respective network. Other aspects relate to establishing such communication by way of contact lists maintained and facilitated on systems coupled to the networks. Users of multiple communication networks, such as VoIP, PSTN and wireless, employ multiple communication devices to communicate with their contacts. For example, a VoIP enabled computer is necessary to access contacts on a VoIP network and a mobile or cellular telephone is used to access contacts on wireless and PSTN networks. A contact list, stored on one communication device, in some instances, cannot be accessed from another communication device. For example, a contact list stored in a VoIP enabled computer cannot be accessed from PSTN or wireless phone devices. Various embodiments described herein provide a convenient solution that can integrate contacts stored on different communication devices and make them accessible from a single device.
Abstract:
The disclosure is related to confirming an identity of a first user of a first user device. An aspect includes receiving a request to confirm the identity of the first user, determining whether or not there is a relationship between the first user or the first user device and a second user of a second user device or the second user device based on a first list of user interactions associated with the first user device and a second list of user interactions associated with the second user device, and confirming the identity of the first user based on determining that there is a relationship between the first user or the first user device and the second user or the second user device.
Abstract:
The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance).
Abstract:
Methods and systems are disclosed for incrementally sharing increasing amounts of information between two or more user devices. An aspect detects a second user device that is proximate a first user device, receives first log data from the second user device, determines whether the first user device and the second user device interacted with each other during a first period of time based on the first log data, assigns a first trust level to the second user device based on the first log data, wherein the second log data is more private than the first log data, determines whether the first user device and the second user device interacted with each other during a second period of time based on the received second log data, and assigns a second trust level to the second user device based on the second log data.