Abstract:
A method for variable length coding an ordered series of digital signals, e.g., of quantized transform coefficients of a block of image data with a most likely-to-occur amplitude, e.g., O, and at least one other amplitude, e.g., 1, to form a set of codewords. The method includes establishing a breakpoint (301) along the ordering to define a first contiguous region and a second contiguous region, such that clusters of consecutive signals of any value other than the most likely-to-occur value occur mostly in the first contiguous region. The method includes encoding the signals in the first region using a first region encoding method (303) suitable for encoding clusters; and encoding the signals in the second region using a second region encoding method (305). The first region and second region encoding methods include variable length codes such that relatively short codewords are formed to represent relatively more likely-to-occur sequences.
Abstract:
A method for variable length coding an ordered series of digital signals, e.g., of quantized transform coefficients of a block of image data with a most likely-to-occur amplitude, e.g., 0, and at least one other amplitude, e.g., 1, to form a set of codewords. The method includes establishing a breakpoint along the ordering to define a first contiguous region and a second contiguous region, such that clusters of consecutive signals of any value other than the most likely-to-occur value occur mostly in the first contiguous region. The method includes encoding the signals in the first region using a first region encoding method suitable for encoding clusters; and encoding the signals in the second region using a second region encoding method. The first region and second region encoding methods include variable length codes such that relatively short codewords are formed to represent relatively more likely-to-occur sequences.
Abstract:
In one embodiment, a method includes accessing first data describing online activities of a user and accessing second data describing online activities of each of one or more content publishers. The method includes, based at least in part on the first data and the second data, determining one or more similarities between the user and each of the content publishers. The method includes, based at least in part on one or more of the similarities, selecting each of one or more of the content publishers as a key influencer for the user and selecting particular content published by a particular one of the key influencers for summary and delivery to the user. The method includes generating a summary of the particular content and automatically delivering to the user the particular content and the summary.
Abstract:
In one embodiment, a method comprises generating and displaying to a user a user selection interface, the user selection interface representing a plurality of content selection vectors extending from its origin and mapped to respectively distinct media attributes within a prescribed attribute type; detecting a user input that extends from the origin toward at least one of the content selection vectors and that identifies a selected position within the user selection interface; displaying to the user an updated user selection interface representing a corresponding updated origin at the selected position and representing a plurality of updated content selection vectors having a determined relation to the at least one content selection vector; and selecting and displaying at least one identifier for a corresponding video content element having the corresponding media attribute having a highest correlation with the at least one content selection vector relative to the selected position from the origin.
Abstract:
In one embodiment, a method comprises identifying, in a network, user selection preferences of an identified user having accessed the network, the identifying based on an accumulation of user selection inputs executed by the identified user, the user selection inputs accumulated relative to input options presented to the user and identifying respective available network items; classifying, by an apparatus in the network, the identified user into one of multiple user affinity categories relative to an advertisement campaign for a targeted product, the classifying based on determining whether one of the user selection inputs represents a view gesture of the user having viewed the targeted product; and selecting an advertisement asset for delivery to the identified user based on the classifying of the identified user into the one user affinity category.
Abstract:
Coding quantized transform coefficients as occur in image compression includes, for a subset of coefficient amplitude values coding by a first method corresponding to each amplitude of the subset, events of a run of zero or more zero-valued coefficients ending in the single non-zero amplitude, coding by a second method events of a run of zero or more zero-valued coefficients ending in any single non-zero amplitude not in the subset, and coding by a third method the amplitude values of the concatenation of the non-zero amplitude not in the subset. The coding methods produce variable length codewords. The method is suitable for series that have scattered non-zero-valued coefficients.
Abstract:
Coding quantized transform coefficients as occur in image compression combines a position coding method to code the position of clusters of consecutive non-zero-value coefficients with an amplitude coding method to code the amplitudes of a concatenation of a plurality of the clusters. The amplitude coding method exploits that runs of amplitude 1 coefficients are more likely in the clusters than runs of other coefficient amplitudes.
Abstract:
Data is stored using multiple selected network nodes in a network based on encoding of the data info multiple distinct encoded data units according to a prescribed encoding operation. The secure encoding operation generates a first prescribed number of encoded data units, whereas merely a second prescribed number of the encoded data units are necessary for recovery of the original data, the second prescribed number being less than the first prescribed number. The encoded data units are distributed among selected network nodes in a network, where any one network node receives less than the second prescribed number to ensure security. A requesting node recovers the original data by requesting the second prescribed number of encoded data units from among the network nodes having stored the respective encoded data units.
Abstract:
A network has network nodes for storage of respective copies of a data file. One of the network nodes has a corresponding unique locality control object for the copies of the data file. The locality control object provides authority for the one network node to control storing and modifying any of the copies of the data file. The other network nodes lacking the locality control object must obtain permission from the one network node before modifying any one of the copies of the data file. The network nodes also can negotiate for passing the locality control object from the one network node to another one of the network nodes based on determined locality attributes associated with the copies of the data file.
Abstract:
In one embodiment, a method includes recording a sequence of online activities of a first user. The online activities include online consumption of online content by the first user. The method includes constructing a path based on the sequence of online activities of the first user. The path includes a sequence of online activity points that each correspond to one of the online activities in the sequence of online activities of the first user, and the path enables a second user to experience personally for themselves at least an approximation of the sequence of online activities of the first user. The method includes communicating the path for traversal of a portion of the path by the second user.