摘要:
The present invention concerns methods and apparatus for identifying and assigning meaning to words not recognized by a vocabulary or grammar of a speech recognition system. In an embodiment of the invention, the word may be in an acoustic vocabulary of the speech recognition system, but may be unrecognized by an embedded grammar of a language model of the speech recognition system. In another embodiment of the invention, the word may not be recognized by any vocabulary associated with the speech recognition system. In embodiments of the invention, at least one hypothesis is generated for an utterance not recognized by the speech recognition system. If the at least one hypothesis meets at least one predetermined criterion, a sword or more corresponding to the at least one hypothesis is added to the vocabulary of the speech recognition system. In other embodiments of the invention, before adding the word to the vocabulary of the speech recognition system, the at least one hypothesis may be presented to the user of the speech recognition system to determine if that is what the used intended when the user spoke.
摘要:
A method, an apparatus and an article of manufacture for masking a message on an electronic device. The method includes receiving a message on an electronic device, determining if a message category label is included in the message, mapping the message category to a corresponding masking format if a message category label is included in the message, extracting the content of the message to generate a message category if a message category label is not included in the message, wherein each message category generated corresponds to a masking format, and masking the message on the electronic device by transforming the message into the masking format that corresponds to the message category for the message.
摘要:
A method for separating a dividable computer device into multiple sub-computers may include receiving, by the dividable computer device, a command to separate a sub-computer from the dividable computer device. The method may also include detecting by the dividable computer device separation of the sub-computer and reconfiguring the dividable computer device for operation without the separated sub-computer in response to each sub-computer being separated.
摘要:
A method is described for use with automatic speech recognition using discriminative criteria for speaker adaptation. An adaptation evaluation is performed of speech recognition performance data for speech recognition system users. Adaptation candidate users are identified based on the adaptation evaluation for whom an adaptation process is likely to improve system performance.
摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
Methods and system for facilitating multi-dimensional personal heating and cooling. User information is used as a mean to configure the temperature in a surrounding environment, thereby facilitating comfort for a user and, in the case wherein multiple users are accessing an area, classifying the area into a number of regions and maintaining each region at a different temperature and guiding the users to desired regions.
摘要:
Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters.
摘要:
Techniques are disclosed for facilitating coordination of user activities in accordance with information processing systems and, more particularly, to techniques for managing encounters with persons using such information processing systems. For example, a method for facilitating user coordination of one or more activities comprises the following steps. User personal preference input for managing an encounter with at least one other person is accepted. Input of at least one user schedule entry is received. Schedule entries of the at least one other person are evaluated and it is automatically determined whether there is an overlap between the at least one user schedule entry and the schedule entries of the at least one other person. A response to a determined overlap is automatically determined. The user personal preference input may comprise an indication of whether the user wishes to avoid an encounter with the at least one other person or coordinate an encounter with the at least one other person.
摘要:
A multiple audio/video data stream simulation method and system. A computing system receives first audio and/or video data streams. The first audio and/or video data streams include data associated with a first person and a second person. The computing system monitors the first audio and/or video data streams. The computing system identifies emotional attributes comprised by the first audio and/or video data streams. The computing system generates second audio and/or video data streams associated with the first audio and/or video data streams. The second audio and/or video data streams include the first audio and/or video data streams data without the emotional attributes. The computing system stores the second audio and/or video data streams.
摘要:
A method, system, and computer program product for operating a web browser in an open browsing mode and a private browsing mode. The method may include calculating, by a computer processor, a privacy probability that a website contains information sensitive to the user. The privacy probability may be based, at least in part, on historical use of the private browsing mode by the user. The method may also include comparing the privacy probability to a privacy threshold and automatically switching the browser from the open browsing mode to the private browsing mode for the website if the privacy probability is greater than the privacy threshold.