Abstract:
A system and method for improved search relevance using proximity boosting. A query for a web search is received from a user, via a network, wherein the query comprises a plurality of query tokens. One or more concepts are identified in the query wherein each of concepts comprises at least two query tokens. A relative concept strength is determined for each of the identified concepts. The query is then rewritten for submission to a search engine wherein for each of the one or more concepts, a syntax rule associated with the respective relative concept strength of the concept is applied to the query tokens comprising the concept such that the rewritten query represents the one or more concepts whereby the proximity of the one or more concepts in a search result returned by the search engine to the user in response to the rewritten query is boosted.
Abstract:
A problem checker architecture that monitors user progress during a problem-solving process and assists the user through the process (e.g., when requested) using common human methods of solving the problem. Assistance can be in the form of detecting errors during the process, and providing context-sensitive help information when the user gets stuck or makes a mistake. The problem checker can walk the user through the process of solving a math problem one step at a time allowing the user to learn to solve math problems according to a number of different methods. Rather than simply calculating and displaying the answer, the problem checker allows the user to attempt to solve math problems, providing direction only when asked and correction only when required. The problem checker can recognize multiple solution methods for many common math problems and guide the user to the solution via any of the methods.
Abstract:
A computer implemented method of performing projection based polynomial fitting. The method includes generating a plurality of sampling points as a function of variables. The method also includes forming a polynomial model template representative of the plurality of sampling points. According to embodiments of the present invention, the polynomial model template comprises at least one polynomial coefficient. The method further includes forming a low-rank matrix to approximate the polynomial coefficient.
Abstract:
A digital television system that includes an RF tuner, a transport stream demultiplexer, an audio decoder, a video decoder, a non-persistent memory, and at least one processor. The non-persistent memory is used to store audio and video packetized elementary stream (PES) packets demultiplexed by the transport stream demultiplexer based upon a broadcast signal received and demodulated by the RF tuner. During the process of decoding and presenting audio, video, and audio-video content on a display device of the television system, the at least one processor generates video records corresponding to each video PES packet and audio records corresponding to each audio PES packet. The video and audio records establish a one to one correspondence between each video PES packet and each audio PES packet and permits each video PES packet and each audio PES packet stored in the memory to be located, decoded, and re-displayed on the display device on the television system.
Abstract:
Systems, methods, and computer readable media are disclosed for discovering relationships between one or more content items and one or more users. The method of the present invention comprises retrieving one or more bookmarks and one or more tags associated with one or URLs generated by one or more users. One or more sets of related tags are generated according to a frequency with which the one or more retrieved tags co-occur within a given corpus of content items. The one or more URLs associated with the one or more identified sets of related tags are identified. The one or more users that generated bookmarks for the one or more sets of related URLs are identified. A recommendation is generated for one or more tags, URLs, and users in response to receiving a bookmark for a given URL through use of the related tags, URLs, and users.
Abstract:
A method and system for tracking physical route changes in an optical switching network. One embodiment comprises a method for detecting changes in physical routes of connections within an optical switching network. The method includes receiving an event message from a node of the optical switching network where the event message relates to an event at the node, applying a filtering function to the event message to determine whether the event message may be ignored, ignoring the event message if the event message does not pass the filtering function, and processing the event message if the event message passes the filtering function.
Abstract:
A system operating on a communication network for mapping service-level information comprising logical connections to physical-level information comprising working physical paths of the logical connections, where the physical-level information is obscured by activation of protect schemes within the communication network.
Abstract:
A system and method involving the compression of palette-based color images. Compression is based upon coding for boundaries that exist in the original uncompressed image, where such boundaries effectively define a character of binary color differentiation between next-adjacent color zones, which differentiation can be expressed as N and not N, where N is one of the colors in the color palette of the original image.
Abstract:
A computer-implemented method and apparatus for embedding hidden data in an audio signal. An audio signal is received in a base domain and then transformed into a non-base domain, such as cepstrum domain or LP residue domain. The statistical mean manipulation is employed on selected transform coefficients to embed hidden data. The introduced distortion is controlled by psychoacoustic model to ensure the imperceptibility of the embedded hidden data. Scrambling techniques can be plugged in to further increase the security of the data hiding system. The present new audio data hiding scheme provides transparent audio quality, sufficient embedding capacity, and high survivability over a wide range of common signal processing attacks.