摘要:
Disclosed is a method, a system and a computer program product for text-to-speech synthesis. The computer program product comprises a computer useable medium including a computer readable program, where the computer readable program when executed on the computer causes the computer to operate in accordance with a text-to-speech synthesis function by operations that include, responsive to at least one phrase represented as recorded human speech to be employed in synthesizing speech, labeling the phrase according to a symbolic categorization of prosodic phenomena; and constructing a data structure that includes word/prosody-categories and word/prosody-category sequences for the phrase, and that further includes information pertaining to a phone sequence associated with the constituent word or word sequence for the phrase.
摘要:
High-sensitivity fluid detection devices and more particularly to devices for alleviating toilet water leaks into the bowl and for detecting overflows from the flush tank or the bowl.
摘要:
The present invention concerns methods and apparatus for identifying and assigning meaning to words not recognized by a vocabulary or grammar of a speech recognition system. In an embodiment of the invention, the word may be in an acoustic vocabulary of the speech recognition system, but may be unrecognized by an embedded grammar of a language model of the speech recognition system. In another embodiment of the invention, the word may not be recognized by any vocabulary associated with the speech recognition system. In embodiments of the invention, at least one hypothesis is generated for an utterance not recognized by the speech recognition system. If the at least one hypothesis meets at least one predetermined criterion, a sword or more corresponding to the at least one hypothesis is added to the vocabulary of the speech recognition system. In other embodiments of the invention, before adding the word to the vocabulary of the speech recognition system, the at least one hypothesis may be presented to the user of the speech recognition system to determine if that is what the used intended when the user spoke.
摘要:
A machine, system and method for user-guided teaching of deictic references and referent objects of deictic references to a conversational system. The machine includes a system bus for communicating data and control signals received from the conversational system to the computer system, a data and control bus for connecting devices and sensors in the machine, a bridge module for connecting the data and control bus to the system bus, respective machine subsystems coupled to the data and control bus, the respective machine subsystems having a respective user interface for receiving a deictic reference from a user, a memory coupled to the system bus for storing deictic references and objects of the deictic references learned by the conversational system and a central processing unit coupled to the system bus for executing the deictic references with respect to the objects of the deictic references learned.
摘要:
A method, an apparatus and an article of manufacture for detecting an event storm in a networked environment. The method includes receiving a plurality of events via a plurality of probes in a networked environment, each of the plurality of probes monitoring a monitored information technology (IT) element, aggregating the plurality of events received into an event set, and correlating the plurality of events in the event set to determine whether the plurality of events are part of an event storm by determining if the plurality of events in the event set meet one or more event storm criteria.
摘要:
A method of automating patching of a computer system includes determining whether a computer patch is available for a computer system of a customer, determining a patch management policy of the customer, determining a patch window of the customer based on the determined patch management policy, and directing application of the computer patch to the computer system at the determined patch window.
摘要:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
In accordance with one aspect of the embodiments of this invention there is a method to initiate remote managed infrastructure services for a customer infrastructure site. The method includes, in response to an inquiry from a potential customer, provisioning the potential customer with a remote managed infrastructure services software client; using the provisioned software client, performing an automated process to detect specifics of a customer information technology infrastructure; in response to the customer confirming the detected specifics of customer information technology infrastructure, configuring a remote managed infrastructure service to monitor and manage all or a subset of the detected and confirmed customer information technology infrastructure.
摘要:
The present invention provides a system and method for provisioning Cloud services by establishing a Cloud services catalog using a Cloud service bus within a Cloud computing environment. In one embodiment, there is a Cloud services catalog manager configured to connect a plurality of Clouds in a Cloud computing environment; maintain a catalog of integrated Cloud services from the plurality of connected Clouds; and display an index of the integrated services on a user interface. Using this system and method will allow for multiple disparate services, offered by different partners, across unrelated, physically distinct Clouds to be presented as an index of integrated services.
摘要:
Systems and methods are provided for processing and executing commands in automated systems. For example, command processing systems and methods are provided which can automatically determine, evaluate or otherwise predict consequences of execution of misrecognized or misinterpreted user commands in automated systems and thus prevent undesirable or dangerous consequences that can result from execution of misrecognized/misinterpreted commands.