Month of February 2019 - Page Number 8

Showing 71 - 80 of 8,637 from February 2019
Browse Prior Art Database
  1. 71.
    Many devices allow users to speak a hotword to activate the device, e.g., a virtual assistant application, which then responds to the user command. With user permission, incoming speech data is analyzed to determine whether a hotword was uttered. First, coarse hotword detection is performed. If coarse detection...
    IPCOM000257597D | 2019-Feb-22
  2. 72.
    Participants in an audio or video call over a network often face problems such as being unable to hear or see each other. With user permission, speech data from the call is automatically analyzed by a classifier to identify whether call participants are facing a problem. If a problem is identified, a message...
    IPCOM000257596D | 2019-Feb-22
  3. 73.
    In response to a page refresh request from a user, a web browser application often requests and downloads a previously loaded page again, even when the amount of updated content is small. As a result, bandwidth and time is wasted. This disclosure describes use of page versioning techniques to reduce the amount of data...
    IPCOM000257595D | 2019-Feb-22
  4. 74.
    This disclosure describes smart scrolling functionality for a web browser such that the user experience for scrolling a web page is improved to aid the user in locating information within the page that is likely of interest for the task at hand. To infer the user's intent, the user's ongoing tasks and context are...
    IPCOM000257594D | 2019-Feb-22
  5. 75.
    Fuzzy testing or fuzzing is a technique for finding software vulnerabilities. Fuzzing works by feeding quasi-random, auto-generated input sequences to a target program and searching for failures. Fuzzers find inputs that trigger bugs; however, understanding those bugs is easier when extraneous data is removed to the...
    IPCOM000257593D | 2019-Feb-22
  6. 76.
    Automatic focusing by a camera involves actively scanning possible lens positions and choosing one that provides the sharpest image. Triggering too frequently can result in image frames captured during the process leading to an out-of-focus image. On the other hand, triggering less often can also lead to an...
    IPCOM000257592D | 2019-Feb-22
  7. 77.
    IPCOM000257591D | 2019-Feb-22
  8. 78.
    This memo defines several new ciphersuites for the Transport Layer Security (TLS) protocol to support certificateless, secure authentication using only a simple, low-entropy password. The exchange is called "TLS-PWD". The ciphersuites are all based on an authentication and key exchange protocol, named "dragonfly",...
    IPCOM000257590D | Original Publication Date: 2019-Feb-01
  9. 79.
    IPCOM000257589D | 2019-Feb-21
  10. 80.
    The social media adoption rate continues to grow at a staggering pace and has become part of the fabric of everyday life around the world. The proliferation of social media and mobile technology applications has spawned a new space for innovating and building new things that will have a direct impact on improving...
    IPCOM000257588D | 2019-Feb-21