摘要:
Laser diode mode techniques are described. In one or more implementations, one or more laser diodes of a computing device are caused to operate below a lasing threshold to illuminate at least part of a physical surroundings of the computing device. One or more images of the illuminated physical surroundings are captured by a camera of the computing device and one or more inputs are recognized from the captured one or more images for interaction with a user interface displayed by the computing device.
摘要:
Technology for detecting a change in a configuration position of one or more elements in an illumination system is described. A light source generates an illumination signal, and an element of the system directs a portion of the light of the signal back to a light detector. In one example, the portion of light is reflected back to the light detector. By monitoring an output signal of the light detector based on the directed light, control circuitry can detect that a position of an element of the system has changed. In one example, an off-the-shelf integrated circuit laser diode package including a monitor photodiode can be used with a reflective element. In one example, the reflective element is a tilted optical element. Changes can be detected in the configuration of one or more optical elements of the illumination system which are outside the laser diode package.
摘要:
A method for constructing a 3D representation of a subject comprises capturing, with a camera, a 2D image of the subject. The method further comprises scanning a modulated illumination beam over the subject to illuminate, one at a time, a plurality of target regions of the subject, and measuring a modulation aspect of light from the illumination beam reflected from each of the target regions. A moving-mirror beam scanner is used to scan the illumination beam, and a photodetector is used to measure the modulation aspect. The method further comprises computing a depth aspect based on the modulation aspect measured for each of the target regions, and associating the depth aspect with a corresponding pixel of the 2D image.
摘要:
The claimed subject matter relates to various architectures that can, inter alia, facilitate creation of a synch file as well as facilitate interpretation of the synch file. Both creation and interpretation can be accomplished in conjunction with an original media asset. The synch file can include transformation commands that can operate on a presentation of the asset rather than upon the asset itself. Accordingly, what is actually perceived by a content consumer during a presentation of the asset need not be exactly what the asset creator fixed in a tangible medium. Rather, the content consumer can observe a derivative media presentation based upon interpretation of the synch file.
摘要:
The claimed subject matter relates to a first architecture that can create an intensity map based upon intensity scores, and to a second architecture that can provide intensity scores and can request and receive the intensity map. Intensity scores can relate to an approval or a level of satisfaction of a current location of a user and can be conveniently provided, in some cases with a single keystroke (e.g., 0-9 from a conventional cell phone keypad) by, say, mobile device users. Numerous intensity scores can be received and aggregated to produce an intensity map of a given area or region. Portions of the intensity map can be provided to requesting devices, potentially filtered based upon a variety of criteria. As a result, the intensity map can provide in substantially real-time a visual indication of locations or entities that might be interesting to explore.
摘要:
Techniques are provided for determining a physical presence setting. First information is received indicating whether a physical token of a user is detected with respect to a device associated with the user. The physical presence setting for the user with respect to the device is determined in accordance with the first information.
摘要:
Techniques are provided for determining distance to an object in a depth camera's field of view. The techniques may include raster scanning light over the object and detecting reflected light from the object. One or more distances to the object may be determined based on the reflected image. A 3D mapping of the object may be generated. The distance(s) to the object may be determined based on times-of-flight between transmitting the light from a light source in the camera to receiving the reflected image from the object. Raster scanning the light may include raster scanning a pattern into the field of view. Determining the distance(s) to the object may include determining spatial differences between a reflected image of the pattern that is received at the camera and a reference pattern.
摘要:
A panoramic camera design that is lower cost, robust, stable and more user friendly than prior art designs. The camera design makes use of a unified molded structure of optical material to house a mirror, aligned sensor, and lens assembly. The unified molded structure of the camera keeps the sensed optical path enclosed to minimize dust and user's fingers and maintain optical alignment.
摘要:
Facilities are provided for adapting the user interface functionality of devices based on a configuration of the user interface components. In various embodiments, a facility includes a communication device that provides switchable user interface functionality by receiving a user interface component, detecting a type associated with the user interface component, recognizing the type associated with the user interface component, and loading user interface functionality associated with the recognized type. A communication device can be a part of a communication system that includes the communication device and a user interface component removably attached thereto.
摘要:
Techniques are provided for authenticating a phone or other device for a user. A phone or other device is provided to the user. A personal identification number is provided to the user. The personal identification number is used to authenticate the phone or other device in the network for the user.