Abstract:
Described herein are systems and methods for the generation and maintenance of language models. Language models are developed based at least in part on transaction data from one or more users. These transactions may include purchases and other interactions between one or more users and one or more online merchants. The language models may be associated with a particular user or group of users. Ongoing transactions may modify the language models. The language models may be used to recognize spoken input from the one or more users.
Abstract:
Described herein are systems, methods, and apparatus for determining audio context between an audio source and an audio sink and selecting signal profiles based at least in part on that audio context. The signal profiles may include noise cancellation which is configured to facilitate operation within the audio context. Audio context may include user-to-user and user-to-device communications.
Abstract:
Described herein are systems and methods for context-aware speech processing. A speech context is determined based on context data associated with a user uttering speech. The speech context and the speech uttered in that speech context may be used to build acoustic models for that speech context. An acoustic model for use in speech processing may be selected based on the determined speech context. A language model for use in speech processing may also be selected based on the determined speech context. Using the acoustic and language models, the speech may be processed to recognize the speech from the user.
Abstract:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
Abstract:
Provided is a fluoroboron compound which is highly safe and stable and is capable of forming a cyclic ether-fused ring by the intramolecular alkoxymethylation reaction, or a salt thereof. The compound can be synthesized by the intramolecular alkoxymethylation reaction of a fluoroboron compound represented by the formula (I) or a salt thereof in the presence of a metal catalyst. (wherein the moiety represented by the formula represents an aromatic ring; L represents a substituent such as a halogen atom; R represents a substituted or unsubstituted alkylene group having 1 or 2 carbon atoms; and M represents an alkali metal cation or the like, with the proviso that L and —R—OCH2BF3M are respectively located on contiguous carbon atoms on the aromatic ring, or in the case of a fused aromatic ring, on two carbon atoms adjacent to one carbon at the fused position).
Abstract:
While executing a game program, a game console determines that a user wishes to issue a voice command through a headset or other audio input/output device connected to the console. The game console switches the communication channel for the audio input/output device from the game program to a voice recognition engine without interrupting the execution of the game program on the console. The voice command is then forwarded from the audio input/output device to the voice recognition engine.
Abstract:
Incoming network data is processed according to a current hardware classification “engine” configuration. As data is propagated from a network interface to a host system, an activity of one or more components of the host system is monitored. If it is determined that a desired/optimal resource utilization of the host system and/or a desired/optimal network performance is not being achieved, the hardware classification “engine” configuration is dynamically modified.
Abstract:
Various approaches enable automatic communication generation based on patterned behavior in a particular context. For example, a computing device can monitor behavior of a user to determine patterns of communication behavior in certain situations. In response to detecting multiple occurrences of the certain situation, a computing device can prompt a user to perform an action corresponding to the pattern of behavior. In some embodiments, a set of speech models corresponding to a type of contact is generated. The speech models include language consistent with patterns of speech between a user and the type of contact. Based on context and on the contact, a message using language consistent with past communications between the user and contact is generated from a speech model associated with the type of contact.
Abstract:
It is to provide a method for removing a tin defect present on the surface of a glass substrate produced by a float process in a short time without the glass substrate surface being damaged regardless of the glass temperature. A method for removing a tin-containing foreign matter from the surface of glass, which comprises applying to the surface of a glass substrate produced by a float process a pulse laser beam having a transmittance of at least 70% through the glass substrate and having a pulse width, a wavelength and an energy density per unit area on the glass substrate surface which satisfy specific relations, to remove a tin-containing foreign matter present on the rear face opposite to the face irradiated with the pulse laser beam.
Abstract:
A method for controlling consumption of resources by a packet destination involves receiving a plurality of packets from a network, identifying the packet destination consuming greater than a pre-determined amount of resources to process the plurality of packets, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets to one of the plurality of temporary data structures as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures associated with the packet destination by the virtual serialization queue, wherein the number of packets is limited by an attack control parameter associated with the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.