Abstract:
When attempting to establish a peer-to-peer connection, a computing device can quickly discover compatible devices, which are capable of exchanging content, and remember them. When a neighboring device is discovered during a scan, the computing device can determine whether the neighboring device is capable of sharing content. Once it is determine that the neighboring device can share content, the computing device can determine a history of previous connections with the neighboring device. The computing device can determine a priority for sharing content with neighboring device relative to other devices. The computing device can determine the priority based on the history of the neighboring device and the history of other devices so that the devices with a likelihood of new content receive a higher priority.
Abstract:
Aspects of the present disclosure relate to a vehicle for maneuvering a passenger to a destination autonomously. The vehicle includes one or more computing devices that receive a request for a vehicle from a client computing device. The request identifies a first location. The one or more computing devices also determine whether the first location is within a threshold outside of a service area of the vehicle. When the location is within the threshold distance outside of the service area of the vehicle, the one or more computing devices identify a second location within the service area of the vehicle where the vehicle is able to stop for a passenger and based on the first location. The one or more computing devices then provide a map and a marker identifying the position of the second location on the map for display on the client computing device.
Abstract:
Aspects of the present disclosure relate to a vehicle for maneuvering a passenger to a destination autonomously. The vehicle includes one or more computing devices that receive a request for a vehicle from a client computing device. The request identifies a first location. The one or more computing devices also determine whether the first location is within a threshold outside of a service area of the vehicle. When the location is within the threshold distance outside of the service area of the vehicle, the one or more computing devices identify a second location within the service area of the vehicle where the vehicle is able to stop for a passenger and based on the first location. The one or more computing devices then provide a map and a marker identifying the position of the second location on the map for display on the client computing device.
Abstract:
In one aspect, the present subject matter is directed to a computer-implemented method for removing transient objects to synthesize an unobstructed image. The method includes receiving a plurality of images from a user. A most common value at a same pixel of each image is determined to infer pixels associated with a background of the images. A composition is generated from the received images, wherein the composition includes one of the pixels associated with the background of the images in place of a pixel associated with a foreground of at least one of the images.
Abstract:
A computer-implemented technique can receive, at a computing device, a uniform resource locator (URL) for a web page and an image. A number of pixels corresponding to a desired resolution for encoding the image is determined and the image is converted to a modified image having the desired resolution. The technique can then generate a two-dimensional barcode by: (i) generating first data representative of the modified image, (ii) appending the first data to either an end of the URL to obtain a first modified URL or after a terminator bit of the two-dimensional barcode, (iii) generating second data representative of the second modified URL or the URL, and (iv) generating third data representative of an error correction code (ECC) based on the first data and the second data, wherein the two-dimensional barcode is generated based on the first data, the second data, and the third data.
Abstract:
A computer-implemented technique can receive, at a computing device, a uniform resource locator (URL) for a web page and an image. A number of pixels corresponding to a desired resolution for encoding the image is determined and the image is converted to a modified image having the desired resolution. The technique can then generate a two-dimensional barcode by: (i) generating first data representative of the modified image, (ii) appending the first data to either an end of the URL to obtain a first modified URL or after a terminator bit of the two-dimensional barcode, (iii) generating second data representative of the second modified URL or the URL, and (iv) generating third data representative of an error correction code (ECC) based on the first data and the second data, wherein the two-dimensional barcode is generated based on the first data, the second data, and the third data.
Abstract:
When attempting to establish a peer-to-peer connection, a computing device can quickly discover compatible devices, which are capable of exchanging content, and remember them. When a neighboring device is discovered during a scan, the computing device can determine whether the neighboring device is capable of sharing content. Once it is determine that the neighboring device can share content, the computing device can determine a history of previous connections with the neighboring device. The computing device can determine a priority for sharing content with neighboring device relative to other devices. The computing device can determine the priority based on the history of the neighboring device and the history of other devices so that the devices with a likelihood of new content receive a higher priority.
Abstract:
A computer-implemented technique can receive, at a computing device, a uniform resource locator (URL) for a web page and an image. A number of pixels corresponding to a desired resolution for encoding the image is determined and the image is converted to a modified image having the desired resolution. The technique can then generate a two-dimensional barcode by: (i) generating first data representative of the modified image, (ii) appending the first data to either an end of the URL to obtain a first modified URL or after a terminator bit of the two-dimensional barcode, (iii) generating second data representative of the second modified URL or the URL, and (iv) generating third data representative of an error correction code (ECC) based on the first data and the second data, wherein the two-dimensional barcode is generated based on the first data, the second data, and the third data.
Abstract:
When attempting to establish a peer-to-peer connection, a computing device can quickly discover compatible devices, which are capable of exchanging content, and remember them. When a neighboring device is discovered during a scan, the computing device can determine whether the neighboring device is capable of sharing content. Once it is determine that the neighboring device can share content, the computing device can determine a history of previous connections with the neighboring device. The computing device can determine a priority for sharing content with neighboring device relative to other devices. The computing device can determine the priority based on the history of the neighboring device and the history of other devices so that the devices with a likelihood of new content receive a higher priority.
Abstract:
A computer-implemented technique can receive, at a computing device, a uniform resource locator (URL) for a web page and a plurality of images. A number of pixels corresponding to a desired resolution for encoding the images determined and the images are converted to modified images having the desired resolution. The technique can then generate an animated two-dimensional barcode using a plurality of two-dimensional barcodes generated for the plurality of images, respectively. A specific two-dimensional barcode can be generated by: generating first data representative of the modified image and appending the first data to either an end of the URL to obtain a first modified URL or after a terminator bit of the two-dimensional barcode. The two-dimensional barcode can then be generated using the first and second data and third data representative of an error correction code (ECC) and that is based on the first data and the second data.