摘要:
It is known to represent a square block of an image which has a maximum horizontal or vertical extension N as N vectors each representing one column or row, and encode it using an N×N discrete cosine transform matrix. We introduce a technique which transforms an input vector, or array, representing a portion of an arbitrarily-shaped object block in which the maximum horizontal or vertical extension is at most N, by adding to it additional padding elements, to produce a vector or array which can be encoded using an N×N discrete cosine transform. The padding maximises the number of transformed elements which are zero. We propose encoding arbitrarily-shaped objects based on this padding technique.
摘要:
It is known to represent a square block of an image which has a maximum horizontal or vertical extension N as N vectors each representing one column or row, and encode it using an N×N discrete cosine transform matrix. We introduce a technique which transforms an input vector, or array, representing a portion of an arbitrarily-shaped object block in which the maximum horizontal or vertical extension is at most N, by adding to it additional padding elements, to produce a vector or array which can be encoded using an N×N discrete cosine transform. The padding maximises the number of transformed elements which are zero. We propose encoding arbitrarily-shaped objects based on this padding technique.
摘要:
A video encoding system performs packetization of FGS/PFGS encoded video bitstreams by selecting encoded bitstream segments for packetization based on an estimated total contribution to distortion reduction associated with each encoded bitstream segment. The selected bitstream segments are then packetized according to a packet-independence packetization strategy that minimizes inter-packet dependency.
摘要:
Using location-independent names to identify content, a service for mapping endpoint requests to requested content. Content requested by an endpoint of the network is mapped to a dynamic “swarm” of server, peer, or other endpoints capable of supporting the content download. Content names are mapped to a dynamically generated content swarm, presenting a current set of hosts, which can provide the requested content. Optionally, varying degrees of explicit visibility into routing paths and the performance tradeoffs between those routing paths is supported. Based on a set of class of service parameters for a given request for content, a host can initiate route selection based on class of service parameters, predicated on routing metrics maintained by the network by cooperating endpoints and/or network routers.
摘要:
A multi-party security protocol that incorporates biometric-based authentication and withstands attacks against any single party (e.g., mobile phone, cloud, or the user). The protocol involves the function split between mobile and cloud and the mechanisms to chain-hold the secrets. A key generation mechanisms binds secrets to a specific device or URL (uniform resource locator) by adding salt to a master credential. An inline CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) handling mechanism uses the same sensor modality as the authentication process, which not only improves the usability, but also facilitates the authentication process. This architecture further enhances existing overall system security (e.g., handling untrusted or compromised cloud service, phone being lost, impersonation, etc.) and also improves the usability by automatically handling the CAPTCHA.
摘要:
Described is a technology by which a gesture made with a source device (e.g., a cellular telephone), such as a throwing or pointing motion, is used to automatically set up a connection with another device to which the gesture is directed. Audio signals output during the gesture, e.g., such as at the start and end of the gesture, are detected by candidate (listening) devices. The device having the least time difference between detection of the start and end signals is the device that is generally best aligned with the throwing or pointing motion, and thus may be selected as the target device. Once selected, a connection such as a network connection may be set up between the source device and the target device for further communication, such as for application data exchange.
摘要:
A multi-party security protocol that incorporates biometric-based authentication and withstands attacks against any single party (e.g., mobile phone, cloud, or the user). The protocol involves the function split between mobile and cloud and the mechanisms to chain-hold the secrets. A key generation mechanisms binds secrets to a specific device or URL (uniform resource locator) by adding salt to a master credential. An inline CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) handling mechanism uses the same sensor modality as the authentication process, which not only improves the usability, but also facilitates the authentication process. This architecture further enhances existing overall system security (e.g., handling untrusted or compromised cloud service, phone being lost, impersonation, etc.) and also improves the usability by automatically handling the CAPTCHA.
摘要:
Kinship between electronic files among personal networked devices may be ascertained between the files by determining an operational relationship between the files and with a similarity measurement.
摘要:
Described is a technology, such as implemented as social networking groupware application designed for mobile device users, that provides a data mashup service for various data types, including location dependent and mobility-aware data such as GPS location and surrounding maps. A mobile user may track the location and maps of roaming friends at runtime. To this end, a client device joins a squad of client devices that are each capable of communicating with one another over a wireless local area network (WLAN) connection. When in a squad, the client can obtain data for use as mashup information from other client devices in the squad over the WLAN connection (inter-squad). This may include intra-squad data that was obtained from a service based on information that the service received from another squad, e.g., over a WWAN connection.
摘要:
Described is a technology by which a gesture made with a source device (e.g., a cellular telephone), such as a throwing or pointing motion, is used to automatically set up a connection with another device to which the gesture is directed. Audio signals output during the gesture, e.g., such as at the start and end of the gesture, are detected by candidate (listening) devices. The device having the least time difference between detection of the start and end signals is the device that is generally best aligned with the throwing or pointing motion, and thus may be selected as the target device. Once selected, a connection such as a network connection may be set up between the source device and the target device for further communication, such as for application data exchange.