Abstract:
Methods for obfuscating an image of a subject in a captured media are disclosed. For example, a method receives a communication from an endpoint device of a subject indicating that the image of the subject is to be obfuscated in a captured media. The communication may include a feature set associated with the subject, where the feature set contains facial features of the subject and motion information associated with the subject. The method then detects the image of the subject in the captured media. For example, the image of the subject is detected by matching the facial features of the subject to the image of the subject in the captured media and matching the motion information associated with the subject to a trajectory of the image of the subject in the captured media. The method then obfuscates the image of the subject in the captured media.
Abstract:
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.
Abstract:
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.
Abstract:
Distributed computing task costing is disclosed. Costing can be employed to determine if a task will be passed to a distributed computing cluster including mobile devices. Costing can include determining a base cost value predicated on a selectable level of utility to a user of a burdened device, a base time value related to completing the task without the use of the cluster, determining a delay cost, and any monetary costs associated with performing the task without the use of the cluster. Costing can further include demining a relief cost that can include the selectable level of utility, a relief time value related to completing the task with the cluster, the delay cost, an incentive cost based on the sum across a set of relief devices and their corresponding parameters for cluster participation, and any remaining monetary costs borne by the burdened device. Where the base cost value and relief cost value satisfies conditions, a task can be divided into subtasks that can be distributed to the cluster to accomplish the task in a distributed computing environment.
Abstract:
Methods, apparatus, systems to determine a distributed content storage scheme are disclosed. Example methods to store a content file include generating, with a processor remote from a first client device storing content shares of the content file, a first content share storage scheme identifying a second client device to which a first subset of a first combination of the content shares is to be distributed for storage when a first client device is coupled to a first local area network. The method further includes generating, with the processor, a second content share storage scheme identifying a third client device to which a first subset of a second combination of the content shares is to be distributed for storage when the first client device is coupled to a second local area network.
Abstract:
Distributed computing task costing is disclosed. Costing can be employed to determine if a task will be passed to a distributed computing cluster including mobile devices. Costing can include determining a base cost value predicated on a selectable level of utility to a user of a burdened device, a base time value related to completing the task without the use of the cluster, determining a delay cost, and any monetary costs associated with performing the task without the use of the cluster. Costing can further include demining a relief cost that can include the selectable level of utility, a relief time value related to completing the task with the cluster, the delay cost, an incentive cost based on the sum across a set of relief devices and their corresponding parameters for cluster participation, and any remaining monetary costs borne by the burdened device. Where the base cost value and relief cost value satisfies conditions, a task can be divided into subtasks that can be distributed to the cluster to accomplish the task in a distributed computing environment.