Localized audio source extraction from video recordings
    231.
    发明授权
    Localized audio source extraction from video recordings 有权
    从录像中提取本地化音频源

    公开(公告)号:US09432720B2

    公开(公告)日:2016-08-30

    申请号:US14380698

    申请日:2013-12-09

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for a system to process a collection of video recordings of a scene to extract and localize audio sources for the audio data. According to some examples, video recordings captured by mobile devices from different perspectives may be uploaded to a central database. Video segments capturing an overlapping portion of the scene at an overlapping time may be identified, and a relative location of each of the video capturing devices may be determined. Audio data for the video segments may be indexed with a sub-frame time reference and relative locations as a function of overlapping time. Using the indices that include the sub-frame time references and relative locations, audio sources for the audio data may be extracted and localized. The extracted audio sources may be transcribed and indexed to enable searching, and may be added back to each video recording as a separate audio channel.

    Abstract translation: 通常描述用于系统处理场景的视频记录的集合以提取和定位音频数据的音频源的技术。 根据一些示例,移动设备从不同角度捕获的视频记录可以被上传到中央数据库。 可以识别在重叠时间捕获场景的重叠部分的视频段,并且可以确定每个视频捕获设备的相对位置。 用于视频段的音频数据可以用子帧时间参考和作为重叠时间的函数的相对位置进行索引。 使用包括子帧时间参考和相对位置的索引,可以提取和定位音频数据的音频源。 提取的音频源可以被转录和索引以使得能够进行搜索,并且可以作为单独的音频信道被添加回每个视频记录。

    SPECULATIVE ALLOCATION OF INSTANCES
    232.
    发明申请
    SPECULATIVE ALLOCATION OF INSTANCES 审中-公开
    实时分析

    公开(公告)号:US20160239906A1

    公开(公告)日:2016-08-18

    申请号:US14380571

    申请日:2013-08-27

    Inventor: Ezekiel Kruglick

    CPC classification number: G06Q30/08 G06F16/24578 G06Q30/0202

    Abstract: In one example embodiment, operations may include predicting winning bidders in an auction for computing resources; pre-placing machine images before the auction has been completed; booting-up at least a portion of the pre-placed machine images before the auction has been completed; and assigning a booted-up virtual machine to one of the predicted auction winners.

    Abstract translation: 在一个示例实施例中,操作可以包括在用于计算资源的拍卖中预测获胜投标者; 在拍卖完成之前预先放置机器图像; 在拍卖完成之前启动至少一部分预先放置的机器图像; 并将启动的虚拟机分配给预测的拍卖获胜者之一。

    Suppression of discovery of mobile devices in a wireless network
    233.
    发明授权
    Suppression of discovery of mobile devices in a wireless network 有权
    抑制在无线网络中发现移动设备

    公开(公告)号:US09398516B2

    公开(公告)日:2016-07-19

    申请号:US14506220

    申请日:2014-10-03

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for suppressing discovery of mobile devices in a wireless ubiquitous computing (ubicomp) network, reducing the number of network transmissions by devices in the network and reducing network congestion and prolonging battery life. A mobile device may add supplementary information to introductory beacons transmitted by the device that indicate no response is necessary from other devices participating in the network except for a coordinator of the network. The mobile device may transmit a malformed introductory beacon that will be ignored by other devices in the network except for the coordinator. The coordinator of the wireless network may detect the mobile device moving through the network and transmit a suppression signal to other devices in the network causing the devices to ignore the introductory beacons transmitted by the mobile device.

    Abstract translation: 通常描述技术来抑制在无线普遍计算(ubicomp)网络中的移动设备的发现,减少网络中设备的网络传输数量,并减少网络拥塞并延长电池寿命。 移动设备可以向设备发送的介绍性信标添加辅助信息,该信号指示除了网络的协调器之外,参与网络的其他设备不需要响应。 移动设备可以发送将被网络中除协调器之外的其他设备忽略的格式不正确的介绍性信标。 无线网络的协调器可以检测通过网络移动的移动设备,并将抑制信号发送到网络中的其他设备,使得设备忽略由移动设备发送的介绍性信标。

    Tree comparison to manage progressive data store switchover with assured performance

    公开(公告)号:US09390122B2

    公开(公告)日:2016-07-12

    申请号:US14796259

    申请日:2015-07-10

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally provided for progressive key value store switchover by evaluating a maturity of a migrated data store and allowing piecewise switching of substructure area query servicing from an origin data store to a destination data store. In some examples, abstractions of origin and destination tree structures may be compared to each other in order to generate an evaluation metric at substantially reduced performance evaluation load. The evaluation metric may target performance sampling while assuring a desired performance level with localized query servicing switchover. Piecewise data transfer may also be optionally enabled such that overall storage can be similar to the storage of a single data store copy while reducing an impact on existing data store services.

    Secure connection for wireless devices via network records
    235.
    发明授权
    Secure connection for wireless devices via network records 有权
    通过网络记录安全地连接无线设备

    公开(公告)号:US09374707B2

    公开(公告)日:2016-06-21

    申请号:US14372008

    申请日:2013-10-25

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for a system to establish a secure connection between a wireless device and another device or a recognized service using device network records. According to some examples, the wireless device may send an authentication request to initiate a communication session with another wireless or a recognized service. The authentication request may be encrypted with a first secret, or a hash, synthesized by the device based on the network records associated with the device. The device may be authenticated using the network's copy of the network records. The network may similarly authenticate the identity of the recognized service or other device. The network may synthesize a second secret based on the network records, and may provide the second secret to the recognized service or other device to enable a communication session secured by the second secret.

    Abstract translation: 一般来说,技术被描述为用于使用设备网络记录在无线设备与另一设备之间建立安全连接或识别服务的系统。 根据一些示例,无线设备可以发送认证请求以发起与另一无线或公认服务的通信会话。 可以使用基于与设备相关联的网络记录由设备合成的第一秘密或散列来加密认证请求。 可以使用网络的网络记录副本对设备进行身份验证。 网络可以类似地认证所识别的服务或其他设备的身份。 网络可以基于网络记录合成第二秘密,并且可以向识别的服务或其他设备提供第二秘密,以使得能够通过第二秘密保护的通信会话。

    Mitigation of path-based convergence attacks
    236.
    发明授权
    Mitigation of path-based convergence attacks 有权
    基于路径的融合攻击的缓解

    公开(公告)号:US09369477B2

    公开(公告)日:2016-06-14

    申请号:US14290883

    申请日:2014-05-29

    Inventor: Ezekiel Kruglick

    CPC classification number: H04L63/1416 H04L63/1466

    Abstract: Technologies are generally described for mitigation of a convergence attack in a network portion that includes multiple nodes interconnected by links in a closed configuration. In some examples, the attack may be detected by a detection module of an attack mitigation system in response to a determination that received average time to live (TTL) values of data packets are substantially decreased over the multiple nodes of the network portion. An identification module of the system may identify one or more potential attack links causing the attack, and generate a list from the potential attack links. The identification module may iterate the list across the potential attack links to gather traffic statistics of the network portion, and determine one or more attack links based on the traffic statistics. User-specific data traffic throttling to the attack links may then be enforced by a throttling module of the system to mitigate the attack.

    Abstract translation: 通常描述技术来减轻网络部分中的收敛攻击,该网络部分包括通过关闭配置中的链路互连的多个节点。 在一些示例中,攻击可以由攻击缓解系统的检测模块响应于在网络部分的多个节点上接收的平均生存时间(TTL)值大大降低的确定来检测攻击。 系统的识别模块可以识别导致攻击的一个或多个潜在攻击链接,并从潜在攻击链接生成列表。 识别模块可以通过潜在攻击链路迭代列表,以收集网络部分的流量统计信息,并根据流量统计确定一个或多个攻击链路。 因此,限制攻击链接的用户特定的数据流可以由系统的限制模块来实施,以减轻攻击。

    SMART POWER BACKGROUND TO VALIDATE USER

    公开(公告)号:US20160156651A1

    公开(公告)日:2016-06-02

    申请号:US15017982

    申请日:2016-02-08

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques.

    CONTENT SUGGESTION FOR POSTING ON COMMUNICATION NETWORK
    239.
    发明申请
    CONTENT SUGGESTION FOR POSTING ON COMMUNICATION NETWORK 有权
    用于通信网络的内容建议

    公开(公告)号:US20160142500A1

    公开(公告)日:2016-05-19

    申请号:US15002695

    申请日:2016-01-21

    Inventor: Ezekiel Kruglick

    CPC classification number: H04L67/22 H04L51/32 H04L67/306 H04W4/21

    Abstract: Technologies are presented for providing a suggestion list presenting options for posting information related to viewed content on a communication network. In some examples, a user may desire to contribute to posted content by adding comments and other relevant information. A system may identify one or more key terms included in the viewed content, and may compare the key terms with content, such as files, emails, websites, images and media content, on computing devices and web browser histories associated with the user to identify information that may be related to the viewed content. If the system identifies information related to the key terms of the viewed content, the system may present the identified information associated with key terms to the user, and may enable selection from a posting suggestion list for automatically posting.

    Abstract translation: 提供技术用于提供建议列表,其提供在通信网络上发布与观看内容有关的信息的选项。 在一些示例中,用户可能希望通过添加注释和其他相关信息来贡献发布的内容。 系统可以识别包括在所查看的内容中的一个或多个关键术语,并且可以将关键术语与与用户相关联的计算设备和网络浏览器历史上的内容(例如文件,电子邮件,网站,图像和媒体内容)进行比较以识别 可能与观看内容相关的信息。 如果系统识别与所查看的内容的关键术语有关的信息,则系统可以将与关键术语相关联的识别信息呈现给用户,并且可以使得能够从发布建议列表中进行选择以自动发布。

    Core affinity bitmask translation
    240.
    发明授权
    Core affinity bitmask translation 有权
    核心亲和位掩码转换

    公开(公告)号:US09311153B2

    公开(公告)日:2016-04-12

    申请号:US14124569

    申请日:2013-05-15

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F9/5044 G06F2209/502

    Abstract: Technologies are generally described for systems, methods, and devices related to core affinity bitmask translation. An example system may include first, second, third and fourth cores, and a dispatcher. The dispatcher may be configured to receive a first request where the first request include a core affinity bitmask and instructions. The core affinity bitmask can identify at least the first core and the second core. The dispatcher may be configured to determine a first affinity between the first core and the second core. The dispatcher may then identify the third core and the fourth core as having similar affinity to achieve a substantially similar performance. The dispatcher may also be configured to generate a second request that includes a translated core affinity bitmask. The translated core affinity bitmask may be effective to identify the third core and the fourth core as appropriate cores to execute the instructions.

    Abstract translation: 技术通常描述为与核心亲和位掩码转换相关的系统,方法和设备。 示例性系统可以包括第一,第二,第三和第四核以及调度器。 调度器可以被配置为接收第一请求,其中第一请求包括核心关联位掩码和指令。 核心相关位掩码可以至少识别第一核和第二核。 调度器可以被配置为确定第一核心和第二核心之间的第一亲和度。 然后,调度员可以将第三核心和第四核心识别为具有相似的亲和力以实现基本相似的性能。 调度器还可以被配置为生成包括翻译的核心相关位掩码的第二请求。 翻译的核心相关位掩码可以有效地将第三核和第四核确定为适当的核来执行指令。

Patent Agency Ranking