Abstract:
The present disclosure relates to methods and apparatuses for forming a packaged application based on a selected subset of user-interface elements. One example method includes receiving a selection of a subset of user-interface elements of a packaged application at a device, determining data of the packaged application associated with execution of the subset of user-interface elements, and packaging the data to form another packaged application for executing the subset of user-interface elements.
Abstract:
Technologies are generally described for providing full-motion animation-as-a-service. In some examples, short motion-capture segments may be captured from user motion user interface devices and stored in a database. When a full-motion animation is desired, a start pose and a target pose may be provided, and a multiple-path, multiple-iteration search through the database may be used to assemble the full-motion animation. Motion retargeting may be used to further refine the assembled hill-motion animation.
Abstract:
Technologies are generally described for masking power usage of co-processors on field-programmable gate arrays. In some examples, one or more moat brick circuits may be implemented around a co-processor loaded on a held-programmable gate array (FPGA). The moat brick circuits may be configured to use negative feedback and/or noise to mask the power usage variations of the co-processor from other co-processors on the FPGA.
Abstract:
Technologies are generally provided for reactive loop sensing in multi-datacenter deployments. In some examples, tagged metrics from deployment elements on different datacenter or platform providers may be used by a stability module to generate a synthetic generalized deployment model that aliases multiple system elements into general state vectors. The state vectors may include a transfer vector on the border between each datacenter or platform, and the feedback from the metrics may cause the states of the datacenters/platforms to match the deployment's unobserved variables allowing stability analysis before failure. For example, the metrics may be associated with a portion of the deployment on one of the multiple datacenters. The stability analysis module may compare the received metrics with model metrics derived from a model of the multi-datacenter deployment to determine the stability of the deployment and/or adjust the model for increased stability.
Abstract:
Technologies may be generally described to provide viewer optimized compression of a model. In some examples, a computing device may receive a request to compress a master model for a viewer. The computing device may determine shape primitives of the master model through use of a shape primitive identification technique such as a random sample consensus (RANSAC) technique. The identified or determined shape primitives may be subtracted from the master model to determine residues of the master model. A processed model may be generated from the residues of the master model and the shape primitives. Visible subsets, visible based on a view cone of the viewer, of the residues and the shape primitives may be selected from the processed model, from which a compressed model may be generated. The processed model may then be used to generate a second view without redetermining the shape primitives.
Abstract:
Technologies are generally provided for employing a smart meter to monitor an energy-efficient appliance or upgrade associated with an incentive program and to apply the incentive program to a location associated with the appliance or upgrade. A power utility provider may provide an incentive such as on-bill financing or bill reduction for energy-efficient upgrades, purchases, or otherwise encouraged programs. The utility provider may detect operation of an energy-efficient device such as an appliance at a location through a smart meter and provide the incentive associated with the device to the address where the device is currently operated based on smart meter data. The utility provider may subsequently detect use of the device at a new location based on another smart meter detecting operation of the device at the new location and automatically provide the incentive to the new address upon detection of operation of the device at the new location.
Abstract:
Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-in-the-middle attacks. In some examples, the technology can include generating a session identifier; coordinating use of the session identifier by the two parties; finding an available secure communication channel to a third party; transmitting the session identifier to the third party via the available secure communication channel; receiving, via the available secure communication channel, a third party identifier and a session identifier-specific secret; sharing information about the received third party identifier; determining that the received third party identifier matches a third party identifier received by the second party; and using the session identifier-specific secret received with the matching third party identifier to generate a cryptographic key to secure communication between the two parties.
Abstract:
Technologies are generally provided to establish a secure connection between a wireless network access point and a wireless enabled device by sharing a secret key synthesized from one or more messages exchanged over power lines. Messages exchanged between devices within a location such as a household over power lines and/or with a power utility control center may be collected, for example, communication messages between a wireless enabled device and a smart meter or any other device. The wireless enabled device and a wireless network access point may synthesize a secret key from the collected messages and share the secret key to establish a secure wireless connection over a channel that is not secure.
Abstract:
Technologies are presented for POS surveying and incentivizing consumers through immediate feedback. A consumer may purchase a product with a label including a product identifier and a survey, which may include one or more response selection. The consumer may indicate a response to the survey by modifying a product identifier and/or exposing a supplemental identifier. The product identifier and survey response identifiers may be machine-readable identifiers such as a barcode or a QR code and scanned at POS. The product identification may be provided to a store's inventory system, and an incentive system may send instructions to the POS to provide the consumer with immediate incentive for their feedback. The survey response received by the incentive system may then be provided to a product manufacturer or brand manager's survey system.
Abstract:
Technologies are generally described for a system to process a collection of video recordings of a scene to extract and localize audio sources for the audio data. According to some examples, video recordings captured by mobile devices from different perspectives may be uploaded to a central database. Video segments capturing an overlapping portion of the scene at an overlapping time may be identified, and a relative location of each of the video capturing devices may be determined. Audio data for the video segments may be indexed with a sub-frame time reference and relative locations as a function of overlapping time. Using the indices that include the sub-frame time references and relative locations, audio sources for the audio data may be extracted and localized. The extracted audio sources may be transcribed and indexed to enable searching, and may be added back to each video recording as a separate audio channel.