Abstract:
In an aspect of the disclosure, a method, a computer-readable medium, and apparatus for operating a computational network are provided. The apparatus may obtain a set of navigational instructions describing a route to a destination. The apparatus may obtain first image data through a first camera that is oriented toward the route, the first image data depicting a first scene associated with the route. The apparatus may determine a first field of view associated with a user that is navigating the route to the destination based on a first sensor that is oriented toward the user. The apparatus may identify at least one salient object represented in the first scene based on the first field of view. The apparatus may output instructional information describing a first navigational instruction of the set of navigational instructions with reference to the at least one salient object.
Abstract:
Disclosed are techniques for wireless positioning. In an aspect, a first user equipment (UE) transmits a request to perform a UE-UE positioning procedure with a second UE, receives a radio resource configuration for the UE-UE positioning procedure, the radio resource configuration indicating first radio resources for transmitting positioning signals to the second UE and second radio resources for receiving positioning signals from the second UE, transmits one or more first positioning signals to the second UE on the first radio resources, receives one or more second positioning signals from the second UE on the second radio resources, and enables a distance between the first UE and the second UE to be estimated based on at least transmission times of the one or more first positioning signals and times of arrival (ToAs) of the one or more second positioning signals.
Abstract:
Methods, and computing devices implementing the methods, improve the efficiency and performance of a comprehensive behavioral monitoring and analysis system that is configured to predict whether a software application is causing undesirable or performance depredating behavior. The behavioral monitoring and analysis system may be configured to quickly and efficiently classify certain software applications as being benign by generating a behavior vector that characterizes the activities of the software application, determining whether the generated behavior vector includes a distinguishing behavior or behavioral clue identifying the software application as a trusted software application, and classifying the software application as benign in response to determining that the generated behavior vector includes a distinguishing behavior identifying the software application as a trusted software application.
Abstract:
Embodiments of the invention disclose methods, apparatuses, systems, and computer-readable media for taking and sharing pictures of objects of interest at an event or an occasion. A device implementing embodiments of the invention may enable a user to select objects of interest from a view displayed by a display unit coupled to the device. The device may also have pre-programmed objects including objects that the device detects. In addition, the device may detect people using the users' social networks by retrieving images from social networks like Facebook® and LinkedIn®.
Abstract:
Systems, methods, and devices of the various embodiments enable local visual identification and verification of robotic vehicles. Various embodiments may enable disambiguation of a robotic vehicle from among a plurality of robotic vehicles.