Abstract:
A graph storage and processing system is provided. The system includes a scalable, distributed, fault-tolerant, in-memory graph storage device for storing base graph data representative of graphs. The system further includes a real-time, in memory graph storage device for storing update graph data representative of graph updates for the graphs with respect to a time threshold. The system also includes an in-memory graph sampler for sampling the base graph data to generate sampled portions of the graphs and for storing the sampled portions of the graph. The system additionally includes a query manager for providing a query interface between applications and the system and for forming graph data representative of a complete graph from at least the base graph data and the update graph data, if any. The system also includes a graph computer for processing the sampled portions using batch-type computations to generate approximate results for graph-based queries.
Abstract:
Systems and methods for recognizing a face are disclosed and includes receiving images of faces; generating feature vectors of the images; generating clusters of feature vectors each with a centroids or a cluster representative; for a query to search for a face, generating corresponding feature vectors for the face and comparing the feature vector with the centroids of all clusters; for clusters above a similarity threshold, comparing cluster members with the corresponding feature vector; and indicating as matching candidates for cluster members with similarity above a threshold.
Abstract:
A method for running application software for a mobile device by virtualizing a mobile device operating system (OS); running a virtual instance of the mobile device OS with the application software on a server on the cloud; and rendering on the server and sending a display image for the mobile device screen to be displayed on the mobile device.
Abstract:
Systems and methods for recognizing a face are disclosed and includes receiving images of faces; generating feature vectors of the images; generating clusters of feature vectors each with a centroids or a cluster representative; for a query to search for a face, generating corresponding feature vectors for the face and comparing the feature vector with the centroids of all clusters; for clusters above a similarity threshold, comparing cluster members with the corresponding feature vector; and indicating as matching candidates for cluster members with similarity above a threshold.
Abstract:
A method for running application software for a mobile device by virtualizing a mobile device operating system (OS); running a virtual instance of the mobile device OS with the application software on a server on the cloud; and rendering on the server and sending a display image for the mobile device screen to be displayed on the mobile device.
Abstract:
Methods and systems for executing an application include extending a container orchestration system application programming interface (API) to handle objects that specify components of an application. An application representation is executed using the extended container orchestration system API, including the instantiation of one or more services that define a data stream path from a sensor to a device.
Abstract:
Systems and methods are provided for increasing accuracy of video analytics tasks in real-time by acquiring a video using video cameras, and identifying fluctuations in the accuracy of video analytics applications across consecutive frames of the video. The identified fluctuations are quantified based on an average relative difference of true-positive detection counts across consecutive frames. Fluctuations in accuracy are reduced by applying transfer learning to a deep learning model initially trained using images, and retraining the deep learning model using video frames. A quality of object detections is determined based on an amount of track-ids assigned by a tracker across different video frames. Optimization of the reduction of fluctuations includes iteratively repeating the identifying, the quantifying, the reducing, and the determining the quality of object detections until a threshold is reached. Model predictions for each frame in the video are generated using the retrained deep learning model.
Abstract:
Methods and systems for managing communications include identifying a system condition in a distributed computing system comprising a first microservice in communication with a second microservice. A communications method is identified responsive to the identified system condition using a reinforcement learning model that associates communication methods with system conditions. The identified communications method is implemented for communications between the first microservice and the second microservice, such that the first microservice and the second microservice use the identified communications method to transmit data.
Abstract:
Methods and systems for video analysis and response include detecting face images within video streams. Noisy images are filtered from the detected face images. Batches of the remaining detected face images are clustered to generate mini-clusters, constrained by temporal locality. The mini-clusters are globally clustered to generate merged clusters formed of face images for respective people, using camera-chain information to constrain a set of the video streams being considered. Analytics are performed on the merged clusters to identify a tracked individual's movements through an environment. A response is performed to the tracked individual's movements.
Abstract:
Methods and systems for managing access include detecting a person within a region of interest in a video stream. It is determined that a clear image of the person's face is not available within the region of interest. Tracking information of the person is matched to historical face tracking information for the person in a previously captured frame. The person's face from the previously captured video frame is matched to an authentication list, responsive to detecting the person within the region of interest, to determine that the detected person is unauthorized for access. A response to the determination that the detected person is unauthorized for access is performed.