Abstract:
Briefly, embodiments of methods and/or systems of generating preference indices for contiguous portions of digital images are disclosed. For one embodiment, as an example, parameters of a neural network may be developed to generate object labels for digital images. The developed parameters may be transferred to a neural network utilized to generate signal sample value levels corresponding to preference indices for contiguous portions of digital images.
Abstract:
One or more methods and/or techniques for media queuing are provided herein. A user, of a client device, may search for a media item (e.g., a movie, video, and/or TV show). The media item may be provided by one or more content providers (e.g., businesses that provide media items in one or more formats, such as for rental, purchase, download, pickup, etc.). Responsive to the media item being of interest to the user, one or more media queuing options may be presented to the user. The media queuing options may correspond to one or more formats and/or one or more content providers (e.g., rental from a first content provider; purchase from a second content provider; etc). Responsive to the user invoking a media queuing option, the media item may be queued for consumption by the user.
Abstract:
The present teaching relates to continuing a user session of an application from one device to another device. Information related to a first user session of a first application installed on a first device is received. The first user session information may indicate content and content presentation provided via the first application. A request, based on a pre-defined URL, for the first session information is received from a second device. Responsive to the request, the information related to the first user session is provided to the second device so that a second user session of a second application at the second device provides the same content in the same presentation as in the first user session. The first and second user sessions both may be associated with a same specific user identity, and the first and second applications have at least one common function.
Abstract:
A user is authenticated based on feature data of a target such as a body-part or other object obtained by a touchscreen of a computing device. When the user positions the target to interact with the touchscreen, interaction data is gathered. Feature data of the target is determined from the gathered interaction data. The feature data is used to identify one or more of the target and the user. Various actions are executed based on the identification and authentication of the user.
Abstract:
A method and system for remote altering static video content in real time. The method includes encountering one or more synchronization markers embedded in a video. The video includes the static video content that plays on an electronic device. The method also includes contacting a content server along with a plurality of user parameters. The method further includes receiving streamed content for the video from the content server. The streamed content is determined based on the plurality of user parameters and a set of rules. Further, the method includes adding the streamed content to the static video content at the one or more synchronization markers. Moreover, the method includes rendering a hybrid video to a user. The hybrid video includes the streamed content and the static video content. The system includes an electronic device, communication interface, memory, and processor.
Abstract:
Complex devices, software systems, and/or networks may comprise one or more subsystems that perform periodic tasks. A first task may be assigned a first execution frequency and a second task may be assigned a second execution frequency that is not an alias of the first execution frequency (e.g., assignment of execution intervals that are non-overlapping harmonics of each other, such as non-repeating frequencies). A first resource utilization by the first task may be distinguished from a second resource utilization of the second task based upon the first resource utilization corresponding to resource utilization (e.g., network usage, processor usage, power consumption, user access, etc.) associated with the first execution frequency and the second resource utilization corresponding to resource utilization associated with the second execution frequency. Thus, resource utilization of individual tasks of various subsystems and/or networks may be determined.
Abstract:
The present disclosure relates to improving the performance of computer systems and/or platforms programmed to work in concert with messaging systems for mail triaging. Disclosed are computer systems and methods for enabling a sender of a message to classify a message addressed to the recipient's inbox prior to sending the message based on triaging settings set by the recipient. Message triaging can include applying a recipient created flag to the message, categorizing the message according to a category preset by the recipient and/or instructing the message to be delivered to a specific folder(s) in the recipient's inbox based on folder instructions set by the recipient. The message sender is capable of classifying the message according to classifications the recipient has designated, whereby upon delivery of the message, the message is delivered and displayed in the recipient's inbox according to the recipient's settings that were selected by the sender.
Abstract:
Disclosed are systems and methods for automatically deleting messages from a recipient's inbox. The disclosed systems and methods provide the ability for automatic actions to be taken on delivered messages based on a passage of time. This enables a sender of messages, email service provider and/or email platform to exert control over sent messages to limit the number and type of operations that may be performed on such messages. For example, operations such as saving, forwarding, printing, copying, or otherwise duplicating the message and/or message data can be prohibited and all together rendered impossible. The disclosed systems and methods enables the purging of messages and associated message data from a recipient's inbox at a certain specified time, after the passage of a pre-determined amount of time, or upon the detection of a specified event.
Abstract:
A first image, associated with a first tag, and/or other images may be presented to a user. A user behavior of the user in regards to the first image may reduce or increase a quality score of the first image. A quality metric of the first image may be determined, and may be used to decrease or increase the quality score of the first image. A rank may be assigned to the first image based upon the modified quality score. The first image may be provided to users based upon the rank.
Abstract:
When a server receives a request for an information payload from a remote device, the server may determine the device's type and identify an optionally-installable application that can be used to access the information payload on devices of that type. When the optionally-installable application is not installed on the remote device, the server may store a identifier for the remote device and send the device a redirection message via which the device can obtain and install the application. Subsequently, when the server receives an installation indication from the application executing on a remote device, the server may identify the device as having recently been redirected to install the application and store or update a record indicating that an application-installation event occurred.