摘要:
Provided are techniques in which a document accompanying a service is acquired, a natural language analysis is performed on the acquired document, a determination is made from the results of the natural language analysis whether an item defined in the access control policy is found in the acquired document and, when the item defined in the access control policy is found in the acquired document, the access control policy is referenced and access to the service controlled accordingly.
摘要:
An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are provided in which the information processing device includes: an input unit for receiving a first password and a specified location from a user; a mode setting unit for switching to a restricted mode restricting at least some of the functions of the information processing device in response to receiving the first password and location; and a releasing unit for releasing the restricted mode on condition that the information processing device has reached the specified location.
摘要:
An embodiment of the present invention provides a computer-implemented method for displaying one or more augmented reality (AR) objects on a transparent display device, comprising: associating data of one or more transparent areas corresponding to one or more real objects with a first layer for seeing one or more real objects on the transparent display device, wherein the data has information on a location and shape of the one or more real objects on the transparent display device, associating one or more AR objects with a second layer for displaying one or more AR objects on the transparent display device; and overlaying the first layer with the second layer to display the one or more AR objects on the transparent display device, wherein the one or more real objects are seen through the one or more transparent areas on the transparent display device by transparent area the transparent display device.
摘要:
A computer supports an operation by an operator of a target device. The computer stores a first topology indicating dependency relationship of a plurality of device types including a device type of the target device. The computer generates a second topology indicating dependency relationship of a plurality of devices including the target device, by performing, based on the first topology, a topology discovery for the plurality of devices. Each of the plurality of devices has any one of the plurality of device types. The computer provides an operation sequence of the plurality of devices to the operator. The operation sequence is generated based on the second topology.
摘要:
An object of the present invention is to process the speech of a particular speaker. The present invention provides a technique for collecting speech, analyzing the collected speech to extract the features of the speech, grouping the speech, or text corresponding to the speech, on the basis of the extracted features, presenting the result of the grouping to a user, and when one or more of the groups is selected by the user, enhancing, or reducing or cancelling the speech of a speaker associated with the selected group.
摘要:
Provided are techniques in which a document accompanying a service is acquired, a natural language analysis is per on the acquired document, a determination is made from the results of the natural language analysis whether an item defined in the access control policy is found in the acquired document and, when the item defined in the access control policy is found in the acquired document, the access control policy is referenced and access to the service controlled accordingly.
摘要:
A computer supports an operation by an operator of a target device. The computer stores a first topology indicating dependency relationship of a plurality of device types including a device type of the target device. The computer generates a second topology indicating dependency relationship of a plurality of devices including the target device, by performing, based on the first topology, a topology discovery for the plurality of devices. Each of the plurality of devices has any one of the plurality of device types. The computer provides an operation sequence of the plurality of devices to the operator. The operation sequence is generated based on the second topology.
摘要:
An embodiment of the present invention provides a computer-implemented method for displaying one or more augmented reality (AR) objects on a transparent display device, comprising: associating data of one or more transparent areas corresponding to one or more real objects with a first layer for seeing one or more real objects on the transparent display device, wherein the data has information on a location and shape of the one or more real objects on the transparent display device, associating one or more AR objects with a second layer for displaying one or more AR objects on the transparent display device; and overlaying the first layer with the second layer to display the one or more AR objects on the transparent display device, wherein the one or more real objects are seen through the one or more transparent areas on the transparent display device by transparent area the transparent display device.
摘要:
Provided are techniques in which a document accompanying a service is acquired, a natural language analysis is performed on the acquired document, a determination is made from the results of the natural language analysis whether an item defined in the access control policy is found in the acquired document and, when the item defined in the access control policy is found in the acquired document, the access control policy is referenced and access to the service controlled accordingly.
摘要:
Provided are techniques in which a document accompanying a service is acquired, a natural language analysis is per on the acquired document, a determination is made from the results of the natural language analysis whether an item defined in the access control policy is found in the acquired document and, when the item defined in the access control policy is found in the acquired document, the access control policy is referenced and access to the service controlled accordingly.