摘要:
A receiver monitoring the transmissions of a packet processing device such as a wireless access point analyzes the monitored transmissions to estimate the probability of packet loss due to buffer overflow in the processing device. The loss probability can be estimated for individual packets to follow rapid changes in communication conditions. An indication of the estimated loss probability can be used to adapt the forward error correction (FEC) parameters that are used to generate the packets, thereby improving the reliability of data delivery to a receiver while optimizing the use of communication channel bandwidth.
摘要:
Described is an electro-optical apparatus and method for correcting myopia that includes at least one adaptive lens, a power source, and an eye tracker. The eye tracker includes an image sensor and a processor operatively connected to the adaptive lens and the image sensor. The processor is configured to receive electrical signals from the image sensor and to control the correction power of the adaptive lens to correct myopia, with the correction power dependent on a user's gaze distance and myopia prescription strength. A lower-power-consumption method of eye glint tracking is further described.
摘要:
Attributes are identified in media content. A classification value of the media content is computed based on the identified attributes. Thereafter, a fingerprint derived from the media content is stored or searched for based on the classification value of the media content.
摘要:
A value is computed for a feature in an instance of query content and compared to a threshold value. Based on the comparison, first and second bits in a hash value, which is derived from the query content feature, are determined. Conditional probability values are computed for the likelihood that quantized values of the first and the second bits equal corresponding quantized bit values of a target or reference feature value. The conditional probabilities are compared and a relative strength determined for the first and second bits, which directly corresponds to the conditional probability. The bit with the lowest bit strength is selected as the weakbit. The value of the weakbit is toggled to generate a variation of the query hash value. The query may be extended using the query hash value variation.
摘要:
Bit errors in packets of data that are communicated in a network such as a wireless network can be corrected by processes that do not require any overhead in the data such as conventional error-detection codes or redundant information such as conventional error-correction codes. A validation-set process compares corrupted data against values in a set of known valid values and selects one of the known valid values to replace the corrupted data. A consistency-check process uses data correlation characteristics of two or more parameters to determine if values obtained from a packet are consistent with one another. If not, values are changed to make them consistent.
摘要:
A method of processing a call request to a callee in a network telephony system is provided which includes mapping a hostname portion of a callee address to a canonical form of the hostname and determining a canonical form of a username portion of a callee address. The canonical form of the user identity of the callee is then used as an index to a user database to retrieve a callee database record. The callee database record is then used to determine call routing based on the retrieved callee database record, such as user location, preferences and policy data stored in the record. The method is generally performed by a signaling server in the network, such as a SIP proxy server. The signaling server can also provide security features such as caller authentication. A scalable signaling and routing architecture is also provided.