Abstract:
A method for speech recognition is provided. Generally, a first signal is generated from a first microphone. The first signal is transformed to coefficients. The coefficients from the first signal are inputted to a multiple channel noise rejection device. A second signal is generated from a second microphone. The second signal is transformed to coefficients. The coefficients from the second signal are inputted to the multiple channel noise rejection device. Coefficients from the multiple channel noise rejection device, which are dependent on coefficients from the first signal and coefficients from the second signal, are provided to an acoustic model selector. Acoustic model hypotheses are chosen based on the coefficients from the multiple channel noise rejection device.
Abstract:
Apparatus and techniques for awakening bus circuitry from an inactive state as needed are described. The bus circuitry forms part of a computer system and is placed in the inactive state (i.e., shut down) when not needed so as to conserve power. The bus circuitry is associated with a bus and can be awakened out of the inactive state when certain bus events, including resume, connect or disconnect, occur on the bus. The invention is particularly advantageous for computing devices (e.g., portable computers, desktop computers, server computers) where it is desirous to shut down bus circuitry as well as other circuitry (e.g., microprocessor) when not needed so as to reduce power consumption.
Abstract:
A method and an apparatus for improved duration modeling of phonemes in a speech synthesis system are provided. According to one aspect, text is received into a processor of a speech synthesis system. The received text is processed using a sum-of-products phoneme duration model that is used in either the formant method or the concatenative method of speech generation. The phoneme duration model, which is used along with a phoneme pitch model, is produced by developing a non-exponential functional transformation form for use with a generalized additive model. The non-exponential functional transformation form comprises a root sinusoidal transformation that is controlled in response to a minimum phoneme duration and a maximum phoneme duration. The minimum and maximum phoneme durations are observed in training data. The received text is processed by specifying at least one of a number of contextual factors for the generalized additive model. An inverse of the non-exponential functional transformation is applied to duration observations, or training data. Coefficients are generated for use with the generalized additive model. The generalized additive model comprising the coefficients is applied to at least one phoneme of the received text resulting in the generation of at least one phoneme having a duration. An acoustic sequence is generated comprising speech signals that are representative of the received text.
Abstract:
A method and apparatus for configuring a computer. One embodiment of the invention combines all of the prior art control panels related to networking into a consolidated Network Setup Control Panel. In addition, the invention provides for computer configuration by scripting. The configuration may be for a type of system setting or for network configurations and protocols. Through scripting, a computer may be configured locally or remotely on a network. One embodiment of the invention provides for a centralized database or Configuration Library consisting of collected data relating to available configuration settings. This database is not limited to configuration information and can be used as a general database containing information the user desires to store. To modify a configuration by scripting, the invention provides for a Scripting Interface consisting of a Scripting Server and Scripting Plug-In. The Scripting Server receives the script forwarded from a user or network administrator, parses the script and determines the appropriate Scripting Plug-In to forward the desired action to. The Scripting Plug-In receives the commands and executes the appropriate actions to modify the configuration as directed.
Abstract:
A new behavior in a graphical user interface allows the user to open and close enclosures, while dragging an object. When the user pauses, gestures, or rolls over a hot spot on top of an icon or text representing a closed enclosure, a temporary window for the closed enclosure is nullsprung opennull to allow the user to browse inside the enclosure and possible open another enclosure contained within the temporary window. This process can be carried on throughout a hierarchy of windows as the user browses for a destination window for the drag operation. All of the temporary windows except the destination are closed when the mouse button is released, signaling the end of a drag. The user may close sprung open windows by simply moving the cursor out of the sprung open window, or by making some other gesture. If an enclosure to be sprung open was previously open on the desktop, the previously opened window may zoom over to the current mouse position, and then return to its original position when the user mouse is out of the window.
Abstract:
An improved retention mechanism having corresponding retention features is provided herein. The mechanism may include a pair of spring arm retention features in a connector receptacle engageable with a corresponding pair of recessed retention features in a connector tab and backup spring members for reducing stress within the spring arms during insertion of the tab and/or lubricating members for lubricating the retention mechanism. The backup spring is positioned adjacent an outer-facing surface or extends laterally outward from the spring arms so that deflection of the spring arms displaces the backup spring reducing stresses within each arm and/or increasing the retention force on the connector tab. The backup spring may include any or all of a bent portion of an bracket or arm, a wire, a loop, a complementary spring arm, dual backup springs, elastomeric members, compression springs and lubricating members. Methods of use and assembly such retention mechanisms are also provided.
Abstract:
An improved retention mechanism having corresponding retention features is provided herein. The mechanism may include a pair of spring arm retention features in a connector receptacle engageable with a corresponding pair of recessed retention features in a connector tab and backup spring members for reducing stress within the spring arms during insertion of the tab and/or lubricating members for lubricating the retention mechanism. The backup spring is positioned adjacent an outer-facing surface or extends laterally outward from the spring arms so that deflection of the spring arms displaces the backup spring reducing stresses within each arm and/or increasing the retention force on the. The backup spring may include any or all of a bent portion of an bracket or arm, a wire, a loop, a complementary spring arm, dual backup springs, elastomeric members, compression springs and lubricating members. Methods of use and assembly such retention mechanisms are also provided.
Abstract:
Systems and methods for directing pickup of media content by way of user input are disclosed. These systems and methods enable desired media content to be more effectively acquired. The user input can be locally provided or remotely provided. The systems and methods for directing pickup of media content are particularly suitable for video conferencing systems. The media content being directed is, for example, video or audio.
Abstract:
Colors are specified within the individual glyphs of a font by means of an indirect approach which employs multiple tables. The data values for individual pixels of a glyph identify entries in an index table, which pertains to a subset of all available colors. The entries in the index table map to a complete set of colors that are specified in a color table. As a result of this structure, the amount of data that is required to specify the individual pixels of a glyph can be minimized to the number of bits required to distinguish the colors within that glyph. The specification of all available colors within a single table permits that table to be shared among various resources, including bitmap fonts and outline fonts.
Abstract:
Internet location objects are created and displayed as icons in a graphical user interface (GUI) environment. Internet location objects may be manipulated by the user in similar fashion as other GUI objects, e.g., files, folders, aliases, etc. When an object is dragged from within an application into a system window, a drag object describing what is being dragged in passed from the application to the operating system. An application may be aware of Internet location objects and, when an object is dragged from within the application into the system window, may specify that the object being dragged is a URL. Alternatively, the application may be unaware of or not support Internet locations but support generic text drag-and-drop, in which case the application, instead of specifying a nullURL drag flavor,null specifies a nulltext drag flavornull as part of the drag object. Depending on the drag flavor, the file manager either causes an Internet location object (URL drag flavor) to be created directly or intelligently parses a text string that has been dragged and dropped onto the user desktop to determine is the text string is likely a URL (text drag flavor). If a text string specified as part of a text flavor drag object is found to likely be a URL, then an Internet location object is created. Otherwise, a different behavior is followed, e.g., a nullclippingnull object or other object may be created. When the user nullopensnull an Internet location object, a browser or other assigned program is launched and retrieves the resource identified by the URL stored as part of the Internet location object. The resource may be located remotely or may be located on the local user machine. In particular, a URL can refer to resources that are not nullon the netnull (and which do not represent cached net resources). For example, URLs can be used to refer to files or directories on hard drives attached to a user machine independently of whether the machine is or has ever been attached to a network. URLs can thus serve a function very similar to aliases.