摘要:
Systems, devices and methods are described including receiving multiple two-dimensional (2D) images of a scene, using the 2D images to determine three-dimensional (3D) information associated with the scene, and determining a user viewing angle with respect to a display. The 3D information and the user viewing angle may then be used to present a generated image on the display. If the user moves with respect to the display then a correspondingly new user viewing angle may be determined and, using the 3D information and the new user viewing angle, a different generated image may be displayed.
摘要:
A database system and a method of optimizing cross-database query. The database system includes a plurality of databases. At least two of the databases are stored with one or more data collections composed of tables with the same structure. A federated view of the data collection is created on each of the databases. A request routing layer for routing, in response to a query request crossing the data collections, the query request crossing the data collections to one of the at least two databases according to a predetermined routing rule, so as to query by using the federated view of the database.
摘要:
A luminaire includes a heat spreader; a heat sink; an LED light source; a power supply; an electrical supply line having a first end connected to the power supply, and a second end connected to a plug-in connector; and, an optic securely retained relative to the heat spreader or heat sink. An accessory kit includes a first pre-wired jumper including a pair of insulated electrical wires having a first plug-in connector electrically connected at one end and an Edison base electrically connected at the other end; and/or, a second pre-wired jumper including a pair of insulated electrical wires having a second plug-in connector electrically connected at one end and unconnected wire ends at the other end. The plug-in connector of the first pre-wired jumper and the second pre-wired jumper are each configured to electrically engage with the plug-in connector of the electrical supply line.
摘要:
In accordance with some embodiments, wireless devices may automatically form ad hoc networks to enable more efficient sharing of media between the devices and in some cases more efficient facial recognition of captured media. In some embodiments, automatic story development may be implemented at the local level without involving backend servers.
摘要:
A message is stored and processed by an untrusted third party by generating a codeword using a selected one of a set of error correcting codes (ECC). The selected ECC depends on a weight rate of the block, and each codeword satisfies a minimum distance criterion with respect to the codewords of all possible ECCs and all possible weight rates. Each symbol of the codeword is modifying explicitly, randomly and independently according to parameters of a channel to obtain a randomized codeword. Then, an encoded result of an operation performed on the randomized codeword by the untrusted third party is decoded.
摘要:
An oil mist filter is provided with a housing, a shell, a filtering assembly and a sucking mechanism which are disposed in the housing and the cover, and a filtering cylinder mounted outside the shell. The arrangement of the filtering space, the sucking space and the oil-collecting chamber inside the housing, and the interior of the shell being in communication of the filtering cylinder, changes the flow direction of the oil mist, so that the oil mist is guided to and discharged out of the filtering cylinder.
摘要:
A distributed inter-domain constraints-based routing technique is provided herein. A problem solving request is sent to nodes in a plurality of network domains that have a potential path between a source node and the destination node. The problem solving request includes one or more constraints associated with a routing function for traffic between the source node and destination node. Local path solutions are generated at nodes in domains that receive the problem solving request, where the local path solutions representing possible paths from a previous neighbor network domain to a next neighbor network domain that satisfy the one or more constraints. Based on the local path solutions, a determination is made as to whether there is at least one path from the source node to the destination node that satisfies the one or more constraints.
摘要:
Parameters of a hidden Markov model (HMM) are determined by a server based on an observation sequence stored at a client, wherein the client has a decryption key and an encryption key of an additively homomorphic cryptosystem, and the server has only the encryption key. The server initializes parameters of the HMM and updates the parameters iteratively until a difference between a probability of the observation sequence of a current iteration and a probability of the observation sequence of a previous iteration is above a threshold, wherein, for each iteration, the parameters are updated based on an encrypted conditional joint probability of each pair of states given the observation sequence and the parameters of the HMM, wherein the encrypted conditional probability is determining in an encrypted domain using a secure multiparty computation (SMC) between the server and the client.
摘要:
A system and a method for determining a result of applying a function to signals is disclosed. The function is a polynomial function including monomials, in which the first signal in a first power forming a first part of the monomial and the second signal in a second power forming a second part of the monomial, wherein the first part of the monomial encrypted with a key is a first encrypted signal, and the second part of the monomial encrypted with the key is a second encrypted signal, comprising the steps of transmitting a first input signal encrypted with a second public key to the second processor, wherein the first input signal includes the first encrypted signal, transmitting a second input signal encrypted with a first public key to the first processor, wherein the second input signal includes a product of the first encrypted signal and the second encrypted signal.