Abstract: Disclosed herein is a system and method for searching or processing queries for searching for documents contained in a domain specific knowledge base. The system takes a query and generates from the query a modified version of the query by passing the query through one or more filters in a query processor. The query processor adds or removes terms from the query. The query processor can add or recognize that two words that appear to be separate words actually identify a specific software entity or can determine that a number appearing in a query is not just a number but refers to a specific version or a number relevant to the specific problem.
Abstract: A gesture detection and recognition technique is described. In one example, a sequence of data items relating to the motion of a gesturing user is received. A selected set of data items from the sequence are tested against pre-learned threshold values, to determine a probability of the sequence representing a certain gesture. If the probability is greater than a predetermined value, then the gesture is detected, and an action taken. In examples, the tests are performed by a trained decision tree classifier. In another example, the sequence of data items can be compared to pre-learned templates, and the similarity between them determined. If the similarity for a template exceeds a threshold, a likelihood value associated with a future time for a gesture associated with that template is updated. Then, when the future time is reached, the gesture is detected if the likelihood value is greater than a predefined value.
Type:
Application
Filed:
March 4, 2011
Publication date:
September 6, 2012
Applicant:
Mirosoft Corporation
Inventors:
Sebastian Nowozin, Pushmeet Kohli, Jamie Daniel Joseph Shotton
Abstract: A computer implemented method comprising receiving a connection, determining a credit status of the source of the connection, setting a response delay time length corresponding to the credit status of the source, and waiting the response delay time length before sending a response. A hacker or malicious user using a source may make use of the fact a server application adds a delay to negative responses to equate a time delay with a negative response and therefore drop a connection upon discovering a time delay. A tarpitting component may discourage or defeat such hacker or malicious user behavior by storing the identity of the source and adding the delay to negative responsive to subsequent connections from the source.