-
公开(公告)号:US11356712B2
公开(公告)日:2022-06-07
申请号:US17301514
申请日:2021-04-05
IPC分类号: H04N21/218 , H04N21/2183 , H04N21/845 , H04L65/80 , H04L65/60 , H04L65/612
摘要: A method executed by a processing system of an edge router deployed in a content distribution network includes receiving a request from an endpoint device for a first file, determining that a portion of the first file is not stored in a cache of the edge router, determining that the cache is at a capacity threshold, selecting a second file to evict from the cache, wherein the second file is one of a plurality of files stored in the cache, wherein each file of the plurality of files is scheduled to be evicted from the cache when a threshold period of time has passed since a last request for the each file was received by the edge router, and wherein the threshold period of time associated with the second file is scheduled to expire soonest among all of the plurality of files, and evicting the second file from the cache.
-
公开(公告)号:US09679194B2
公开(公告)日:2017-06-13
申请号:US14334157
申请日:2014-07-17
发明人: Moo-Ryong Ra , Seungjoon Lee , Emiliano Miluzzo , Eric Zavesky
CPC分类号: G06T5/002 , G06F17/3028 , G06K9/00255 , G06K9/00268 , G06K9/00275 , G06K9/00288 , G06K9/46 , G06K9/52 , G06K9/6201 , G06K9/6215 , G06K9/6247 , G06T7/20 , G06T7/73 , G06T11/60 , G06T2207/30201 , G06T2207/30241
摘要: Methods for obfuscating an image of a subject in a captured media are disclosed. For example, a method receives a communication from an endpoint device of a subject indicating that the image of the subject is to be obfuscated in a captured media. The communication may include a feature set associated with the subject, where the feature set contains facial features of the subject and motion information associated with the subject. The method then detects the image of the subject in the captured media. For example, the image of the subject is detected by matching the facial features of the subject to the image of the subject in the captured media and matching the motion information associated with the subject to a trajectory of the image of the subject in the captured media. The method then obfuscates the image of the subject in the captured media.
-
公开(公告)号:US10740198B2
公开(公告)日:2020-08-11
申请号:US15387770
申请日:2016-12-22
发明人: Rajesh Panta , Moo-Ryong Ra , Saurabh Bagchi , Subrata Mitra
摘要: A reconstruction may be divided into a set of partial operations and scheduled in parallel using a distributed protocol which overlays a reduction tree to aggregate the results. In addition, a scheduling algorithm called multiple partial parallel repair is introduced for handling concurrent failures. Multiple reconstructions may be coordinated in parallel while working to minimize the conflict for shared resources.
-
公开(公告)号:US20190174186A1
公开(公告)日:2019-06-06
申请号:US16238129
申请日:2019-01-02
发明人: Shuai Hao , Bo Han , Moo-Ryong Ra
IPC分类号: H04N21/442 , H04N21/462 , G06K9/00
摘要: Aspects of the subject disclosure may include, for example, a method including detecting attention by a user to a presentation displayed at an audiovisual presentation device. A real-time image of the user is obtained and stored local to the audiovisual presentation device. The image is analyzed to determine a presence in the image of a facial feature of the user; the device determines, based on the presence of the facial feature, whether the user is attentive to the presentation. When the user is not attentive to the presentation, a procedure is initiated at the audiovisual presentation device to reduce resource consumption by the device; the procedure can include continuing the presentation at a video quality level lower than at the beginning of the presentation, reducing a brightness of the display, continuing the presentation with only the audio portion, and discontinuing the presentation. Other embodiments are disclosed.
-
公开(公告)号:US20160019415A1
公开(公告)日:2016-01-21
申请号:US14334157
申请日:2014-07-17
发明人: Moo-Ryong Ra , Seungjoon Lee , Emiliano Miluzzo , Eric Zavesky
CPC分类号: G06T5/002 , G06F17/3028 , G06K9/00255 , G06K9/00268 , G06K9/00275 , G06K9/00288 , G06K9/46 , G06K9/52 , G06K9/6201 , G06K9/6215 , G06K9/6247 , G06T7/20 , G06T7/73 , G06T11/60 , G06T2207/30201 , G06T2207/30241
摘要: Methods for obfuscating an image of a subject in a captured media are disclosed. For example, a method receives a communication from an endpoint device of a subject indicating that the image of the subject is to be obfuscated in a captured media. The communication may include a feature set associated with the subject, where the feature set contains facial features of the subject and motion information associated with the subject. The method then detects the image of the subject in the captured media. For example, the image of the subject is detected by matching the facial features of the subject to the image of the subject in the captured media and matching the motion information associated with the subject to a trajectory of the image of the subject in the captured media. The method then obfuscates the image of the subject in the captured media.
摘要翻译: 公开了用于在捕获的介质中模糊对象的图像的方法。 例如,一种方法从被摄体的端点设备接收到指示要在被捕获的媒体中被模糊化的对象的图像的通信。 通信可以包括与被摄体相关联的特征集,其中特征集合包含对象的面部特征和与被摄体相关联的运动信息。 然后,该方法在捕获的介质中检测被摄体的图像。 例如,通过将被摄体的面部特征与捕获的媒体中的被摄体的图像进行匹配来检测被摄体的图像,并将与被摄体相关联的运动信息与拍摄的媒体中的被摄体的图像的轨迹相匹配 。 然后,该方法在捕获的媒体中模糊对象的图像。
-
公开(公告)号:US20210409342A1
公开(公告)日:2021-12-30
申请号:US17473117
申请日:2021-09-13
发明人: Moo-Ryong Ra , Hee Won Lee
IPC分类号: H04L12/911 , H04L29/08 , H04L12/24
摘要: A system may dynamically provision an underlying storage implementation for cloud storage, such as cloud block storage services. They system allows for deferral of the storage provisioning process to the time at which a tenant actually requests a storage space.
-
公开(公告)号:US20210227264A1
公开(公告)日:2021-07-22
申请号:US17301514
申请日:2021-04-05
IPC分类号: H04N21/2183 , H04N21/845 , H04L29/06
摘要: A method executed by a processing system of an edge router deployed in a content distribution network includes receiving a request from an endpoint device for a first file, determining that a portion of the first file is not stored in a cache of the edge router, determining that the cache is at a capacity threshold, selecting a second file to evict from the cache, wherein the second file is one of a plurality of files stored in the cache, wherein each file of the plurality of files is scheduled to be evicted from the cache when a threshold period of time has passed since a last request for the each file was received by the edge router, and wherein the threshold period of time associated with the second file is scheduled to expire soonest among all of the plurality of files, and evicting the second file from the cache.
-
公开(公告)号:US20180181471A1
公开(公告)日:2018-06-28
申请号:US15387770
申请日:2016-12-22
发明人: Rajesh Panta , Moo-Ryong Ra , Saurabh Bagchi , Subrata Mitra
摘要: A reconstruction may be divided into a set of partial operations and scheduled in parallel using a distributed protocol which overlays a reduction tree to aggregate the results. In addition, a scheduling algorithm called multiple partial parallel repair is introduced for handling concurrent failures. Multiple reconstructions may be coordinated in parallel while working to minimize the conflict for shared resources.
-
公开(公告)号:US20200211162A1
公开(公告)日:2020-07-02
申请号:US16817673
申请日:2020-03-13
发明人: Moo-Ryong Ra , Seungjoon Lee , Emiliano Miluzzo , Eric Zavesky
IPC分类号: G06T5/00 , G06K9/62 , G06K9/00 , G06T7/73 , G06F16/51 , G06T11/60 , G06K9/52 , G06T7/20 , G06K9/46
摘要: Obfuscating a human or other subject in digital media preserves privacy. A user of a smartphone, for example, may enable a flag for obscuring her face in digital photos or movies. When any device captures digital media, the user's smartphone transmits the flag for receipt. The device capturing the digital media is thus informed of the user's desire to obscure her face or even entire image. The device capturing the digital media may thus perform an obscuration in response to the flag.
-
公开(公告)号:US10289448B2
公开(公告)日:2019-05-14
申请号:US15257378
申请日:2016-09-06
发明人: Moo-Ryong Ra , Rajesh Krishna Panta , Tian Lan , Shijing Li
摘要: A traffic management mechanism can employ a two-tiered approach for managing background traffic based on prioritizing tasks by remaining time flexibility then scheduling prioritized tasks using linear programming.
-
-
-
-
-
-
-
-
-