Automatic metatagging in images
    31.
    发明授权
    Automatic metatagging in images 有权
    图像中的自动元标记

    公开(公告)号:US09563643B2

    公开(公告)日:2017-02-07

    申请号:US14750678

    申请日:2015-06-25

    Abstract: Various systems and methods for implementing automatic image metatagging are described herein. A system for metatagging media content comprises a camera system; a user input module to receive user input from a user to capture media content via the camera system; a camera control module to: activate the camera system to capture a scene, and obtain an image with at least a portion of a face of the user; a user identification module to identify the user based on the image; and a metatagging module to tag the scene with the user as an author of the scene.

    Abstract translation: 本文描述了用于实现自动图像偏移的各种系统和方法。 一种用于跨媒体内容的系统包括相机系统; 用户输入模块,用于从用户接收用户输入以经由所述相机系统捕获媒体内容; 相机控制模块,用于:激活所述相机系统以拍摄场景,并且获取具有所述用户的脸部的至少一部分的图像; 用户识别模块,用于基于所述图像来识别所述用户; 以及用户作为场景的作者来标记场景的元标记模块。

    Disaggregated computing for distributed confidential computing environment

    公开(公告)号:US12229605B2

    公开(公告)日:2025-02-18

    申请号:US18538171

    申请日:2023-12-13

    Abstract: An apparatus to facilitate disaggregated computing for a distributed confidential computing environment is disclosed. The apparatus includes one or more processors to facilitate receiving a manifest corresponding to graph nodes representing regions of memory of a remote client machine, the graph nodes corresponding to a command buffer and to associated data structures and kernels of the command buffer used to initialize a hardware accelerator and execute the kernels, and the manifest indicating a destination memory location of each of the graph nodes and dependencies of each of the graph nodes; identifying, based on the manifest, the command buffer and the associated data structures to copy to the host memory; identifying, based on the manifest, the kernels to copy to local memory of the hardware accelerator; and patching addresses in the command buffer copied to the host memory with updated addresses of corresponding locations in the host memory.

    METHODOLOGY TO ENABLE HIGHLY RESPONSIVE GAMEPLAY IN CLOUD AND CLIENT GAMING

    公开(公告)号:US20240307773A1

    公开(公告)日:2024-09-19

    申请号:US18478201

    申请日:2023-09-29

    CPC classification number: A63F13/52 A63F2300/66

    Abstract: Described herein is a technique to enhance the responsiveness of gameplay for a 3D gaming application while maintaining the ability to enqueue multiple frames for processing on the GPU. Each frame or a set of workloads within a frame is submitted to the GPU with predication, such that the indicated rendering and resource manipulation commands are not actually performed if the predication condition is enabled. A low latency command can be submitted to the GPU via a copy engine command queue. The command will cause the copy engine to enable or disable predication for command buffers in the command queue. When predication for queued command buffers is enabled, command buffers for workloads that are not related to the workload that is generated in response to the user input are bypassed. High priority command buffers that include workloads generated in response to user input can then be executed immediately.

    Disaggregated computing for distributed confidential computing environment

    公开(公告)号:US11941457B2

    公开(公告)日:2024-03-26

    申请号:US17525143

    申请日:2021-11-12

    CPC classification number: G06F9/5083 G06F9/3814 G06F9/5027 G06T1/20 G06T1/60

    Abstract: An apparatus to facilitate disaggregated computing for a distributed confidential computing environment is disclosed. The apparatus includes a source remote direct memory access (RDMA) network interface controller (RNIC); a queue to store a data entry corresponding to an RDMA request between the source RNIC and a sink RNIC; a data buffer to store data for an RDMA transfer corresponding to the RDMA request, the RDMA transfer between the source RNIC and the sink RNIC; and a trusted execution environment (TEE) comprising an authentication tag controller to: initialize a first authentication tag calculated using a first key known between a source consumer generating the RDMA request and the source RNIC; associate the first authentication tag with the data entry as integrity verification; initialize a second authentication tag calculated using a second key; and associate the second authentication tag with the data buffer as integrity verification for the data buffer.

Patent Agency Ranking