Abstract:
Techniques described herein generally relate to consolidating computation tasks associated with a plurality of virtual machines. In one embodiment, a method may include forming a pipeline having at least a first core and a second core after having detected a formation condition, identifying a first set of operations of a first virtual machine running on a first host device that are similar to a second set of operations of a second virtual machine running on a second host device, identifying a third set of operations of the first virtual machine that are similar to a fourth set of operations of the second virtual machine, dispatching the first set of operations and the second set of operations to the first core of the pipeline for execution, and dispatching the third set of operations and the fourth set of operations to the second core of the pipeline for execution.
Abstract:
Technologies are generally described for joint attention estimation using structured light patterns. In some examples, a structured light pattern including spatial and/or temporal variations may be projected onto an area that may contain one or more locations, objects, or personnel of interest. The spatial and/or temporal variations of the structured light pattern may encode identifiers for different regions within the area. When a video camera or other video capture device captures video data of a particular region within the area, the video data may include the structured light spatial and/or temporal variations that encode an identifier for the particular region. Subsequently, the encoded region identifier may be extracted from the video data, for example by the video capture device or a network center, and used to identify the region associated with the video data. Extracted region identifiers may be used to perform joint attention estimation in real-time.
Abstract:
In some examples, a method to defend against relay attacks includes recording a first representation of a motion signal associated with a mobile device. The first representation of the motion signal is obtained by remotely sensing the motion of the mobile device. The method also includes receiving data indicative of a second representation of the motion signal associated with the mobile device. The second representation of the motion signal is obtained by sensing the motion of the mobile device in-situ. The method also includes comparing the first representation of the motion signal with the second representation of the motion signal and verifying, based on the results of the comparison, that a relay attack is not present when the first representation of the motion signal is substantially similar to the second representation of the motion signal.
Abstract:
Technologies and implementations for encoding and storing data in a solid-state memory device with a reduced number of erasures using a simplified belief-propagation algorithm that includes a set of message-calculation rules that have a low computational complexity are generally disclosed. Additionally, technologies and implementations for decoding data and for error correction are generally disclosed.