-
公开(公告)号:US12189599B2
公开(公告)日:2025-01-07
申请号:US17028920
申请日:2020-09-22
Applicant: Apple Inc.
Inventor: Albert Antony , Francesco Rossi , Guillaume Tartavel , Xiaojin Shi , Marco Zuliani
Abstract: The subject technology provides a framework for evaluating activation functions of a neural network using lookup tables. In order to provide lookup table based activation functions with a desired precision within hardware constraints for the lookup tables, multiple lookup tables for each activation function can be provided. Each of the multiple lookup tables may correspond to a respective subrange of input values, within a full range of input values for the activation function.
-
公开(公告)号:US20240403119A1
公开(公告)日:2024-12-05
申请号:US18581097
申请日:2024-02-19
Applicant: Apple Inc.
Inventor: Francesco Rossi , Marco Zuliani
IPC: G06F9/50
Abstract: A method may include accessing a data processing architecture associated with a neural network to determine dependencies between intermediate data layers of the neural network; obtaining dimensions of the intermediate data layers in the neural network; calculating a minimum number of data storage portions for executing the neural network based on the dependencies; determining a memory allocation size for each respective data storage portion of the data storage portions based on the dimensions and dependencies; allocating memory on a storage device for each data storage portion in accordance with its respective determined memory allocation size.
-
公开(公告)号:US11468338B2
公开(公告)日:2022-10-11
申请号:US16262809
申请日:2019-01-30
Applicant: Apple Inc.
Inventor: Francesco Rossi , Cecile M. Foret , Gaurav Kapoor , Kit-Man Wan , Umesh S. Vaishampayan , Etienne Belanger , Albert Antony , Alexey Marinichev , Marco Zuliani , Xiaojin Shi
Abstract: The subject technology provides receiving a neural network (NN) model to be executed on a target platform, the NN model including multiple layers that include operations and some of the operations being executable on multiple processors of the target platform. The subject technology further sorts the operations from the multiple layers in a particular order based at least in part on grouping the operations that are executable by a particular processor of the multiple processors. The subject technology determines, based at least in part on a cost of transferring the operations between the multiple processors, an assignment of one of the multiple processors for each of the sorted operations of each of the layers in a manner that minimizes a total cost of executing the operations. Further, for each layer of the NN model, the subject technology includes an annotation to indicate the processor assigned for each of the operations.
-
公开(公告)号:US20210073589A1
公开(公告)日:2021-03-11
申请号:US16821315
申请日:2020-03-17
Applicant: Apple Inc.
Inventor: Atila Orhon , Marco Zuliani , Vignesh Jagadeesh
Abstract: Training a network for image processing with temporal consistency includes obtaining un-annotated frames from a video feed. A pretrained network is applied to the first frame of first frame set comprising a plurality of frames to obtain a first prediction, wherein the pretrained network is pretrained for a first image processing task. A current version of the pretrained network is applied to each frame of the first frame set to obtain a first prediction. A content loss term is determined, based on the first prediction and a current prediction for the frame, based on the current network. A temporal consistency loss term is also determined based on a determined consistency of pixels within each frame of the first frame set. The pretrained network may be refined based on the content loss term and the temporal term to obtain a refined network.
-
公开(公告)号:US10523894B2
公开(公告)日:2019-12-31
申请号:US15266460
申请日:2016-09-15
Applicant: Apple Inc.
Inventor: Brett Keating , Vincent Wong , Todd Sachs , Claus Molgaard , Michael Rousson , Elliott Harris , Justin Titi , Karl Hsu , Jeff Brasket , Marco Zuliani
Abstract: Systems and methods for improving automatic selection of keeper images from a commonly captured set of images are described. A combination of image type identification and image quality metrics may be used to identify one or more images in the set as keeper images. Image type identification may be used to categorize the captured images into, for example, three or more categories. The categories may include portrait, action, or “other.” Depending on the category identified, the images may be analyzed differently to identify keeper images. For portrait images, an operation may be used to identify the best set of faces. For action images, the set may be divided into sections such that keeper images selected from each section tell the story of the action. For the “other” category, the images may be analyzed such that those having higher quality metrics for an identified region of interest are selected.
-
公开(公告)号:US10318721B2
公开(公告)日:2019-06-11
申请号:US15168275
申请日:2016-05-31
Applicant: Apple Inc.
Inventor: Vinay Sharma , Marco Zuliani
Abstract: Managing a secure session includes detecting a login event at an electronic device using a first login method to initiate a secure session, capturing an initial image at a same time as the login event, capturing initial sensor data at the same time as the login event, monitoring for changes in the sensor data during the secure session, maintaining the secure session based on the initial sensor data and the monitored changes from the initial sensor data, and during the secure session, permitting access to the electronic device using reidentification.
-
7.
公开(公告)号:US20190096441A1
公开(公告)日:2019-03-28
申请号:US16199645
申请日:2018-11-26
Applicant: Apple Inc.
Inventor: Claus Molgaard , Brett M. Keating , George E. Williams , Marco Zuliani , Vincent Y. Wong , Frank Doepke , Ethan J. Tira-Thompson
Abstract: The invention relates to systems, methods, and computer readable media for responding to a user snapshot request by capturing anticipatory pre-snapshot image data as well as post-snapshot image data. The captured information may be used, depending upon the embodiment, to create archival image information and image presentation information that is both useful and pleasing to a user. The captured information may automatically be trimmed or edited to facilitate creating an enhanced image, such as a moving still image. Varying embodiments of the invention offer techniques for trimming and editing based upon the following: exposure, brightness, focus, white balance, detected motion of the camera, substantive image analysis, detected sound, image metadata, and/or any combination of the foregoing.
-
公开(公告)号:US09686539B1
公开(公告)日:2017-06-20
申请号:US15180048
申请日:2016-06-12
Applicant: Apple Inc.
Inventor: Marco Zuliani , Claus Molgaard , Paul M. Hubel
CPC classification number: H04N17/002 , G06T7/004 , G06T7/85 , G06T2207/10012 , G06T2207/30168 , G06T2207/30201 , H04N5/247 , H04N13/239 , H04N13/246
Abstract: Systems, methods, and computer readable media for calibrating two cameras (image capture units) using a non-standard, and initially unknown, calibration object are described. More particularly, an iterative approach to determine the structure and pose of an target object in an unconstrained environment are disclosed. The target object may be any of a number of predetermined objects such as a specific three dimensional (3D) shape, a specific type of animal (e.g., dogs), or the face of an arbitrary human. Virtually any object whose structure may be expressed in terms of a relatively low dimensional parametrized model may be used as a target object. The identified object (i.e., its pose and shape) may be used as input to a bundle adjustment operation resulting in camera calibration.
-
公开(公告)号:US20170091439A1
公开(公告)日:2017-03-30
申请号:US15168275
申请日:2016-05-31
Applicant: Apple Inc.
Inventor: Vinay Sharma , Marco Zuliani
CPC classification number: G06F21/40 , G06F21/32 , H04L63/0861 , H04W12/06
Abstract: Managing a secure session includes detecting a login event at an electronic device using a first login method to initiate a secure session, capturing an initial image at a same time as the login event, capturing initial sensor data at the same time as the login event, monitoring for changes in the sensor data during the secure session, maintaining the secure session based on the initial sensor data and the monitored changes from the initial sensor data, and during the secure session, permitting access to the electronic device using reidentification.
-
公开(公告)号:US20240283632A1
公开(公告)日:2024-08-22
申请号:US18421778
申请日:2024-01-24
Applicant: Apple Inc.
Inventor: Rehan Rishi , Fabian K. Boemer , Karl Tarbe , Brandon J. Van Ryswyk , Marco Zuliani , Abhishek (APS) Bhowmick , Tancrède Lepoint
Abstract: A computing device sends a request for location-based information (LBI) to a server, where the request includes first address information indicative of a geographic area (e.g., where the computing device is located), and an encrypted version of second address information that specifies a sub-region of the geographic area. The second address information is encrypted by a first key not accessible to the server. The first address information is used to select a subset of the LBI stored on the server. The server then performs a privacy protocol such as Private Information Retrieval on the selected subset using the encrypted second address information. This produces an encrypted version of the requested LBI without the server having access to information indicating which item of LBI was requested. The encrypted version of the particular item of LBI is returned to the computing device, where it can be decrypted using a second key.
-
-
-
-
-
-
-
-
-