摘要:
Three-dimensional image data is generated. According to an example embodiment, three-dimensional depth information is estimated from a still image. A set of monocular images and their corresponding ground-truth depth maps are used to determine a relationship between monocular image features and the depth of image points. For different points in a particular image, the determined relationship is used together with local and global image features including monocular cues to determine relative depths of the points.
摘要:
Three-dimensional image data is generated. According to an example embodiment, three-dimensional depth information is estimated from a still image. A set of monocular images and their corresponding ground-truth depth maps are used to determine a relationship between monocular image features and the depth of image points. For different points in a particular image, the determined relationship is used together with local and global image features including monocular cues to determine relative depths of the points.
摘要:
Methods, systems, products and devices are implemented for editing video image frames. According to one such method, image content is embedded into video. A selection input is received for a candidate location in a video frame of the video. The candidate location is traced in subsequent video frames of the video by approximating three-dimensional camera motion between two frames using a model that compensates for camera rotations, camera translations and zooming, and by optimizing the approximation using statistical modeling of three-dimensional camera motion between video frames. Image content is embedded in the candidate location in the subsequent video frames of the video based upon the tracking thereof.
摘要:
Methods, systems, products and devices are implemented for editing video image frames. According to one such method, image content is embedded into video. A selection input is received for a candidate location in a video frame of the video. The candidate location is traced in subsequent video frames of the video by approximating three-dimensional camera motion between two frames using a model that compensates for camera rotations, camera translations and zooming, and by optimizing the approximation using statistical modeling of three-dimensional camera motion between video frames. Image content is embedded in the candidate location in the subsequent video frames of the video based upon the tracking thereof.
摘要:
A method for processing information fed by a user via an inputting means is provided. The method enables, firstly, receiving a set of directional elements via a user interface. The set of directional elements represent textual or non-textual information fed by the user. Secondly, the method enables interpreting the set of directional elements. The set of directional elements are identified as a combination of motion of the inputting means on the user interface and one or more inputs from the inputting means. Further, the method enables converting the directional elements into a sequence and translating the sequence into the textual or non-textual information using a mapping format. The mapping format corresponds to a predetermined mapping format or a new mapping format. Finally, the method enables rendering the textual or non-textual information on the user interface in the form of one or more symbols.
摘要:
Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some embodiments, a user of a cloud computing service that provides data storage may securely delete his stored set of data by acquiring elevated access privileges to the stored set of data, designating at least one most significant bit in at least one data block therein as a sentinel and recording its value and position, updating the value of the sentinels and thereby rendering the data unusable, and verifying the success of the operation by checking the new value of the sentinels against the original value. In some embodiments, the verification process may be repeated in order to ensure that the data has been rendered useless across all nodes of the remote cloud platform.
摘要:
The invention describes a method, firmware, and computer program product for generating one or more One Time Passwords (OTPs) for one or more applications. The firmware embedded in a computational device receives one or more registration details corresponding to an application from a user. Thereafter, the firmware generates a Dynamic Information Number (DIN) based on at least one of the registration details and an application identifier (SIID). The user registers with the application with the DIN and at least one of the registration details. Further, the user may access the application using an OTP generated by the firmware based on the DIN and the application identifier.
摘要:
The subject disclosure pertains to systems and methods for facilitating item retrieval and/or ranking. An original ranking of items can be modified and enhanced utilizing a Markov Random Field (MRF) approach based upon item similarity. Item similarity can be measured utilizing a variety of methods. An MRF similarity model can be generated by measuring of similarity between items. An original ranking of items can be obtained, where each document is evaluated independently based upon a query. For example, the original ranking can be obtained using a keyword search. The original ranking can be enhanced based upon similarity of items. For example, items that are deemed to be similar should have similar rankings. The MRF model can be used in conjunction with original rankings to adjust rankings to reflect item relationships.
摘要:
A method & system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs from the user, the correct information of the said captcha & the user's input is compared. If the user's input and the correct information of the captcha object matches then the user is authenticated as human, else the user is authenticated as not a human.
摘要:
Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted.