G06F9/4862

MULTIMODAL ENTITY AND COREFERENCE RESOLUTION FOR ASSISTANT SYSTEMS

In one embodiment, a method includes receiving, at a client system, an audio input, where the audio input comprises a coreference to a target object, accessing visual data from one or more camera associated with the client system, where the visual data comprises images portraying one or more objects, resolving the coreference to the target object from among the one or more objects, resoling the target object to a specific entity, and providing, at the client system, a response to the audio input, where the response comprises information about the specific entity.

SYSTEM AND METHOD FOR MIGRATING AN AGENT SERVER TO AN AGENT CLIENT DEVICE
20180248944 · 2018-08-30 · ·

In a network of mobile agents, data integrity can be improved by providing an agent server that can migrate between devices operating in the region of interest (ROI). The agent server distributes agent clients onto devices in the ROI and provides agent server services to the agent clients, including receiving and storing data from the agents. When the agent server device is to leave the ROI, the agent server can migrate to any device executing an agent client and continue to provide the agent server services, including data collection and aggregation, from the device to which the agent server has migrated.

MULTI-AGENT PLAN RECOGNITION
20180217908 · 2018-08-02 ·

Techniques for solving a multi-agent plan recognition problem are provided. In one example, a computer-implemented method comprises transforming, by a device operatively coupled to a processor, a problem model and an at least partially ordered sequence of observations into an artificial intelligence planning problem through a transform algorithm. The problem model can comprises a domain description from a plurality of agents and a durative action. Furthermore, at least one of the observations of the at least partially ordered sequence of observations can be a condition that changes over time. The computer-implemented method further comprises determining, by the device, plan information using an artificial intelligence planner on the artificial intelligence planning problem. The computer-implemented method further comprises translating, by the device, the plan information into information indicative of a solution to the artificial intelligence planning problem.

MULTI-AGENT PLAN RECOGNITION
20180217909 · 2018-08-02 ·

Techniques for solving a multi-agent plan recognition problem are provided. In one example, a computer-implemented method comprises transforming, by a device operatively coupled to a processor, a problem model and an at least partially ordered sequence of observations into an artificial intelligence planning problem through a transform algorithm. The problem model can comprises a domain description from a plurality of agents and a durative action. Furthermore, at least one of the observations of the at least partially ordered sequence of observations can be a condition that changes over time. The computer-implemented method further comprises determining, by the device, plan information using an artificial intelligence planner on the artificial intelligence planning problem. The computer-implemented method further comprises translating, by the device, the plan information into information indicative of a solution to the artificial intelligence planning problem.

Electronic devices, methods, and systems for restricting non-essential services from foreground applications

An electronic device includes one or more sensors detecting an energy storage level of an energy storage device falling below a predefined threshold. A location detector and a motion detector determine whether the electronic device is positioned at a location trusted by an authorized user or whether the electronic device is being transported by a mode of transport trusted by the authorized user. The one or more processors identify foreground applications operating on the electronic device and non-essential services associated with the foreground applications. The one or more processors restrict the non-essential services from occurring when the energy storage level of the energy storage device is below the predefined threshold unless the electronic device is positioned at the trusted location or is being transported by the trusted mode of transport.

Highly available distributed queue using replicated messages

Methods and systems for implementing a highly available distributed queue using replicated messages are disclosed. An enqueue request is received from a client at a particular queue host of a plurality of queue hosts. The enqueue request comprises a message and a replica count greater than one. One or more copies of a replication request are sent from the particular queue host to one or more additional queue hosts. The replication request comprises the message. The quantity of copies of the replication request is determined based at least in part on the replica count. An initial replica of the message is enqueued at the particular queue host. One or more additional replicas of the message are enqueued at the one or more additional queue hosts. A quantity of the one or more additional replicas is determined based at least in part on the replica count.

Virtual machine migration into the cloud

The migration of virtual machines internal to a cloud computing environment. The cloud maintains the replicas for virtual machines that could be migrated. The cloud also is aware of location of user data for each of the virtual machines. The replica together with the user data, represents the virtual machine state. If migration to the cloud computing environment is to occur for any given virtual machine, the cloud computing environment correlates the replica with the user data for that virtual machine, and then uses the correlation to instantiate the virtual machine in the cloud.

Elastic offload of prebuilt traffic management system component virtual machines

Embodiments are directed towards employing a traffic management system (TMS) that is enabled to deploy component virtual machines (CVM) to the cloud to perform tasks of the TMS. In some embodiments, a TMS may be employed with one or more CVMs. In at least one embodiment, the TMS may maintain an image of each CVM. Each CVM may be configured to perform one or more tasks, to operate in specific cloud infrastructures, or the like. The TMS may deploy one or more CVMs locally and/or to one or more public and/or private clouds. In some embodiments, deployment of the CVMs may be based on a type of task to be performed, anticipated resource utilization, customer policies, or the like. The deployment of the CVMs may be dynamically updated based on monitored usage patterns, task completions, customer policies, or the like.

METHOD OF TRANSFERRING SETTINGS OF A MOTOR-OPERATED DOOR SYSTEM
20180106094 · 2018-04-19 ·

The present disclosure relates to a method of transferring settings of a motor-operated door system, wherein, in said method, at least one property of a door is transferred to a mobile end device, at least one property of a drive that drives the door is transferred to the mobile end device, settings for the combination of the properties of the door and the drive are requested from a database via the mobile end device, settings for the combination of the door and the drive are sent from the database to the mobile end device, and the settings received by the mobile end device are transferred to the drive of the door system.

COMPUTER INSTRUCTION PROCESSING METHOD, COPROCESSOR, AND SYSTEM

Embodiments of the present application disclose a computer instruction processing method, a coprocessor, and a system. The computer instruction processing method includes: receiving, by a coprocessor, a first instruction set migrated by a central processing unit CPU; acquiring, according to the first instruction set that is applicable to the CPU for execution, a second instruction set for execution in the coprocessor; and executing binary codes in the second instruction set. In this way, the coprocessor that executes the second instruction set substitutes for the CPU that executes the first instruction set, CPU load is reduced, and usage of the coprocessor is improved.