Abstract:
A method of capturing photographs or videos and associated metadata. The method comprises capturing a photograph or video using a mobile camera device at a shooting location and encompassing a shooting area, identifying a shooting area using positional and orientational detectors of the mobile camera device and known camera properties and recording a definition of the shooting area, and sending the captured photograph or video to a server system. Either at the mobile camera device or at the server system, the presence of peer mobile devices within the shooting area is identified using positional information reported by those peer mobile devices, and the captured photograph or video is tagged with identities associated with those peer mobile devices.
Abstract:
A dialog manager for a spoken dialog system includes a computer, a processor, and memory, comprising: a decision module for selecting a path from a plurality of alternative paths for a given call, wherein each path implements one of a plurality of strategies for a call flow; and a weighting module for weighting the path selection decision, wherein the weighting module is operatively connected to a probability estimator for estimating a probability value that a given path of the plurality of paths is the best performing path, wherein incoming calls are directed to each of the alternative paths selected by the decision module.
Abstract:
A system and method are disclosed which may include receiving an activation request from a first subscriber device at a communication convergence platform; identifying a service provider associated the first subscriber device; composing a service activation request compatible with a communication protocol for the identified service provider; and transmitting the service activation request from the platform to the identified service provider.
Abstract:
Systems, methods, devices, and non-transitory computer-readable media for depth-based image tag generation are described. The disclosed technology may access images stored in an image repository. The images may comprise a first image. Using image processing techniques, a first object and a second object in the first image may be detected. Using machine-learning models, a first tag associated with the first object and a second tag associated with the second object may be identified. Using the machine-learning models, a first depth value associated with the first object and a second depth value associated with the second object may be determined. Based on the first depth value and the second depth value, a spatial relationship between the first object and the second object may be determined. Metadata associated with the first image may be generated. The metadata may indicate the spatial relationship between the first object and the second object.
Abstract:
Systems, methods, devices, and non-transitory computer-readable media for automatic web flow execution are described. The disclosed technology may access flow model data comprising information associated with steps of a web flow. Based on the flow model data, the steps of the web flow may be mapped to application programming interface (API) interactions with a client computing device. Requests may be received from a first client computing device during a session associated with the of the web flow. The requests may be based at least in part on the API interactions. Resources associated with the requests may be accessed. State data associated with the resources requested by the first client computing device during the web flow may be updated. Furthermore, responses comprising links associated with execution of at least one of the one or more steps of the web flow may be sent to the first client computing device.
Abstract:
A computer implemented method and system for secure initial secret delivery for collocated containers with shared resources techniques is disclosed. The method comprises providing an application type identifier and a token for accessing a secrets management service; creating asynchronously, a plurality of collocated containers with shared resources; initiating a request for a creation for an initial secret; validating the request, requesting an identity for the collocated containers; validating the identity; starting an application instance; and using the initial secret to retrieve other secrets for the application instance.
Abstract:
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed. The method comprises determining whether a connection slot is available for a received call request; executing the call when a connection slot is available; processing the call request when a connection slot is not available, where processing comprises: determining a priority level for the request; when the determined priority level is a low priority, putting the request in a queue for later processing; and when the determined priority level is a high priority, when a low priority call is in progress, performing the steps of: canceling the in-progress low priority call; placing the cancelled low priority call in a queue for later processing; and executing the high priority call; and when no low priority call is in progress, placing the high priority call request in the queue.
Abstract:
A method and system for establishing network connectivity with a device is disclosed. A connectivity platform detects a plurality of networks. A network policy of each of the plurality of networks is determined. A signal quality of each of the plurality of networks is determined. The network policy and the signal quality of each of the plurality of networks is analyzed. A connection is established between the device and the first network of the plurality of networks based on the analysis of the network policy and the signal quality of each of the plurality of networks.
Abstract:
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed. The method comprises receiving an image; in response to receiving the image, generating a depth map of the image; removing non-geographic features from the depth map; generating a topographic map based on the depth map; modifying the topographic map to represent each pixel by height differential; and comparing the modified topographic map to a modified global topographic map to determine a location of the image.
Abstract:
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed. The method comprises receiving an image; in response to receiving the image, generating a depth map of the image; removing non-geographic features from the depth map; generating a topographic map based on the depth map; modifying the topographic map to represent each pixel by height differential; and comparing the modified topographic map to a modified global topographic map to determine a location of the image.