摘要:
A processing system which acts as a participant in the collaborative dialogue is first trained using a training algorithm. The training algorithm computes, in conjunction with a current turn of the training dialogue, a task initiative index and a dialogue initiative index for a next turn of the dialogue, using cues observed during the current turn, probability assignments associated with the observed cues, and current values of the task initiative index and the dialogue initiative index. The algorithm then predicts a task initiative holder and a dialogue initiative holder for the next turn of the training dialogue, using the task initiative index and dialogue initiative index computed for the next turn. The probability assignments associated with the observed cues are adjusted if the predicted task and dialogue initiative holders do not agree with corresponding respective actual task and dialogue initiative holders for the next turn. The computing, predicting and adjusting operations are repeated for each of the turns of the training dialogue in order to determine appropriate probability assignments for a given set of cues. The processing system then uses the resulting probability assignments to predict initiative shifts in an actual dialogue in which the system acts as a participant.
摘要:
A system and method for a voice controlled video screen display system are provided. The voice controlled system is useful for providing "hands-free" navigation through various video screen displays such as the World Wide Web network and interactive television displays. During operation of the system, language models are provided from incoming data in applications such as the World Wide Web network.
摘要:
Handwriting recognition which is invariant with respect to translation, rotation and scale is achieved with a new feature signal, ratio of tangents, and a new application of the normalized curvature feature. Use of these features is optimized by augmenting the ratio of tangents with the sign of local curvature and weighing each feature signal with its relative discriminative power.
摘要:
In a system with a policy server, a first device able to communicate with the policy server and a second device able to communicate with the first device and unable to communicate with the policy server, the first device is to act as a policy proxy. The policy server may push to the first device a policy for the second device, and the first device may push the policy to the second device.
摘要:
A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device.
摘要:
A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer.
摘要:
The present disclosure describes a method for protecting real-time data exchanged between a mobile electronic device and a VPN gateway over a communications link. The method comprises: establishing a first VPN connection between the mobile electronic device and the VPN gateway through the communications link; establishing, while the first VPN connection is established, a second VPN connection between the mobile electronic device and the VPN gateway through the communications link; providing key information to at least one of the mobile electronic device or VPN gateway through the first VPN connection; and exchanging real-time data packets between the mobile electronic device and the VPN gateway through the second VPN connection, wherein the key information is for encrypting and decrypting the real-time data packets exchanged through the second VPN connection.
摘要:
A mobile device for the display of messages includes a message viewer application for displaying segments of the message received from a server. The message can include content that is encoded in a first encoding that is renderable for display on the device, and the same content encoded in a second encoding. On determination that the received portion of the message includes a first part comprising content encoded in a first encoding and is renderable for display, first displayable portion of the message content, the server is signalled to halt forwarding further segments of the message.
摘要:
A system and method for searching and retrieving certificates, which may be used in the processing of encoded messages. In one embodiment, all certificates related to an identified certificate are retrieved from the certificate servers automatically by the certificate synchronization application, where the related certificates comprise at least one of one or more CA certificates and one or more cross-certificates. Embodiments described herein facilitate at least partial automation of the downloading and establishment of certificate chains, thereby minimizing the need for users to manually search for individual certificates.
摘要:
System and methods for processing encoded messages at a message receiver are described. Encoded message processing is performed in multiple stages. In a first stage, a new received message is at least partially decoded by performing any decoding operations that require no user input and a resulting context object is stored in memory, before a user is notified that the new message has been received. When the user accesses the new message, any further required decoding operations are performed on the stored context object in a second stage of processing. The message can subsequently be displayed or otherwise processed relatively quickly, without repeating the first stage decoding operations. Decoding operations may include signature verification, decryption, other types of decoding, or some combination thereof.