Abstract:
Systems and methods for processing acoustic speech signals which utilize the wavelet transform (and alternatively, the Fourier transform) as a fundamental tool. The method essentially involves “synchrosqueezing” spectral component data obtained by performing a wavelet transform (or Fourier transform) on digitized speech signals. In one aspect, spectral components of the synchrosqueezed plane are dynamically tracked via a K-means clustering algorithm. The amplitude, frequency and bandwidth of each of the components are, thus, extracted. The cepstrum generated from this information is referred to as “K-mean Wastrum.” In another aspect, the result of the K-mean clustering process is further processed to limit the set of primary components to formants. The resulting features are referred to as “formant-based wastrum.” Formants are interpolated in unvoiced regions and the contribution of unvoiced turbulent part of the spectrum are added. This method requires adequate formant tracking. The resulting robust formant extraction has a number of applications in speech processing and analysis including vocal tract normalization.
Abstract:
Systems and methods for multi-modal messaging that enable a user to compose, send and retrieve messages, such as SMS, MMS, IM or ordinary e-mail messages, for example, using one or more I/O (input/output) modalities (e.g., speech I/O and/or GUI I/O). A method for composing messages combines the advantages of a multi-modal interface (e.g., grammar-based speech and touchscreen or similar input devices) and message templates, which allows a user to construct a message with significantly less effort in a fraction of the time required by conventional methods. The user can dictate his/her messages using speech and/or GUI input, for example, based on a library of message templates which can be personalized by the user to fit his/her social interaction needs.
Abstract:
Embodiments of the invention provide methods and systems for using policy enforcement for securing open devices and networks. The method includes accessing, by a policy enforcer, a plurality of policies configured to enforce network integrity and monitoring programs and/or services running on a device. The method further includes based on at least one of the plurality of policies, comparing the programs and/or services running on the device against the programs and/or services allowed by the at least one of the plurality of policies, and based on the comparison, determining that the device is running at least one program and/or service disallowed by the at least one policy. Further, the method includes in response, prohibiting access of the device to the network.
Abstract:
Methods, systems, and machine-readable media are disclosed for initiating communications between entities operating in disparate environments and/or with different base protocols. According to one embodiment, a method for initiating a communication can comprise receiving a request from the first entity to initiate communications. An initiation message can be generated and formatted in a base protocol of the second entity. The base protocol of the second entity can be different from a base protocol of the first entity. The initiation message can be sent to the second entity to cause the second entity to initiate communications with a third entity in the base protocol of the second entity.
Abstract:
Systems, methods, and machine-readable media are disclosed for providing customization to routing of messages in a system where routing is based on stored addresses, such as, for example, a Session Initiation Protocol (SIP) system, to pass through a firewall. In one embodiment, a method of providing customized routing of messages to pass through a firewall can comprise receiving a message from an initiating agent to a target communication identifier at a system for signaling between endpoints. The system can have one or more stored network addresses for each of a plurality of communication identifiers. One or more network addresses for the target endpoint can be determined from the stored network addresses associated to the communication identifier. One or more policies can be applied to the one or more network addresses for the target communication identifier to route the message through the firewall.
Abstract:
In a method for correlating charges in a service layer and a network layer, first charging data is determined for a service layer based on content or a service purchased for a user. Second charging data for a network layer is determined based on transmission for the content or service. The first and second charging data, with any respective metadata, are correlated in order to generate a single bill for the user. This bill may be for the transmission as well as the purchase of the content or service. In the correlation, charges for the network layer and/or the service layer may be changed based on the correlation. For example, duplicative charges such as charging for the content and the traffic used to download the content may be correlated and one of the charges may be changed or removed.
Abstract:
Methods, systems, and machine-readable media are disclosed for improving the efficiency of policy enforcement. According to one embodiment, a method for improving efficiency during enforcement of a policy can comprise determining a topology for the policy. A plurality of equivalent topologies for the policy can then be determined. A cost function can be applied to each of the plurality of equivalent topologies and one of the plurality of equivalent topologies can be selected based on the cost function.
Abstract:
Embodiments of the invention provide methods and systems for implementing service level advertisement distribution. The method includes receiving a service request from a requesting device, intercepting, by an advertisement application running on the requesting device, the service request, and presenting an advertisement offer including an advertisement. The advertisement offer includes an associated reduced rate offer for the requested service. The method further includes presenting the advertisement to the requesting device, and in response to accepting the advertisement offer, verifying that the requestor has received, viewed, and/or listened to the advertisement. Further, the method includes presenting the requested service at the associated reduced rate.
Abstract:
Embodiments of the invention provide methods and systems for implementing service level consolidated user information management. According to one embodiment, a method comprises intercepting, at a policy enforcer, a manipulation request of data. The method may further include analyzing the request to determine which data the manipulation request is associated with and, based on that analysis, selecting a policy from a plurality of policies. Furthermore, the method may execute the selected policy. The policy may be configured to direct the policy enforcer to allow the manipulation request to pass through to the associated destination data system to process the request, delegate processing of the manipulation request to at least one of a plurality of data systems, or process the manipulation request by the policy enforcer.
Abstract:
Methods and systems are provided for forwarding a media streaming session from one node to another node while the session is in progress. A streaming server may store data sent between nodes in the session. When one node is forwarded to a new node, the stored data may be used to transition to the new node with little or no interruption in data sent between nodes in the session. A user interface may allow a user to set preferences and control other aspects of the session forwarding features.