Institution
Apple Inc.
Company•Herzliya, Israel•
About: Apple Inc. is a company organization based out in Herzliya, Israel. It is known for research contribution in the topics: Signal & User interface. The organization has 15687 authors who have published 22600 publications receiving 624507 citations. The organization is also known as: Apple Computer, Inc. & Apple Computer Inc.
Topics: Signal, User interface, Wireless, Pixel, Graphical user interface
Papers published on a yearly basis
Papers
More filters
•
27 Aug 2015TL;DR: In this paper, a speaker identification system for virtual assistants is presented, in which a speaker profile is generated for each user based on the speaker profile for a predetermined user and contextual information is used to verify results produced by the speaker identification process.
Abstract: Systems and processes for generating a speaker profile for use in performing speaker identification for a virtual assistant are provided. One example process can include receiving an audio input including user speech and determining whether a speaker of the user speech is a predetermined user based on a speaker profile for the predetermined user. In response to determining that the speaker of the user speech is the predetermined user, the user speech can be added to the speaker profile and operation of the virtual assistant can be triggered. In response to determining that the speaker of the user speech is not the predetermined user, the user speech can be added to an alternate speaker profile and operation of the virtual assistant may not be triggered. In some examples, contextual information can be used to verify results produced by the speaker identification process.
142 citations
•
25 Jul 2008TL;DR: In this article, the authors describe a system and methods for activating a mobile device for use with a service provider using a signed activation ticket that uniquely corresponds to the combination of the device and SIM card and that is securely stored on the mobile device.
Abstract: Systems and methods for activating a mobile device for use with a service provider are described. In one exemplary method, a mobile device having a currently inserted SIM card may be prepared for activation using a signing process in which an activation server generates a signed activation ticket that uniquely corresponds to the combination of the device and SIM card, and that is securely stored on the mobile device. In another exemplary method the mobile device may be activated in an activation process in which the device verifies an activation ticket against information specific to the device and SIM card, and initiates activation when the verification of the activation ticket is successful.
141 citations
•
17 Dec 1996TL;DR: In this paper, an application program opens an update container, and the procedure searches down the chain until it finds the ultimate target container, then creates in-memory structures for providing access to the objects and value data represented in such container.
Abstract: Methods and data structures which permit information to be stored as objects in target containers and update containers. A target container defines a first state of the information, and the update container, which can point to the target container, identifies changes to the information in the first state which would be sufficient to update the first information state to a second information state. Update containers may be nested to any depth. When an application program opens an update container, the procedure searches down the chain until it finds the ultimate target container. It then creates in-memory structures for providing access to the objects and value data represented in such container. The procedure then works its way back up the chain, performing the changes on the in-memory structure, which are called for in each of the update containers. New modifications made after this process is complete, are recorded in memory, and when committed, are written out into a new update container which references the container that the application program originally opened. The changes which are identified in an update container, if they represent modifications to an object in an underlying container, refer to that object logically rather than physically. Multiple concurrent (parallel) updaters are supported, since more than one update container can refer to the same target container. Thus each updater has an independent view of the information being updated. The mechanism facilitates reconciliation of concurrent updates since it maintains a record of the changes made.
141 citations
•
06 Jun 1995
TL;DR: In this paper, a cache memory is used to store data pertaining to one object in a designated memory location, such as cache memory, and then the data for a subsequent object is compared with the stored data, and the area of intersection between the two objects is determined.
Abstract: Objects in an image are rendered in a manner which dynamically avoids the rendering of obscured objects. Data pertaining to one object is stored in a designated memory location, such as a cache memory. Data for a subsequent object is compared with the stored data, and the area of intersection between the two objects is determined. This area of intersection is subtracted from the first object, and the data for the second object is added to the memory. As the memory is filled, the data for the oldest object is removed and the object is rendered. After all objects in the list have been processed in this manner, those which remain in the memory are also rendered, and removed from the memory. At each step of the process, the portions of an object which are obscured by later-generated objects are eliminated, and thereby unnecessary rendering of obscured objects is avoided.
141 citations
•
25 Jan 2008TL;DR: In this article, the location information associated with the media items can be used to examine and distribute media items to mobile devices based on the location of the media device, which can be examined and distributed to those devices whose proximate area includes the location.
Abstract: Media items can be distributed to mobile devices based on the location of the media device. The media items can be associated with location information, which can be examined and distributed to those devices whose proximate area includes the location information associated with the media items.
141 citations
Authors
Showing all 15698 results
Name | H-index | Papers | Citations |
---|---|---|---|
David E. Goldberg | 109 | 520 | 172426 |
Ruslan Salakhutdinov | 107 | 410 | 115921 |
Arogyaswami Paulraj | 97 | 476 | 41068 |
Eric Johnson | 95 | 312 | 47738 |
Donald A. Norman | 93 | 292 | 71226 |
Jim Gray | 92 | 265 | 50987 |
Imran Chaudhri | 90 | 327 | 31488 |
Ji-Guang Zhang | 83 | 286 | 28461 |
Scott Forstall | 82 | 184 | 20386 |
Carlos Guestrin | 79 | 221 | 50821 |
Michael Thompson | 76 | 911 | 28151 |
Gerard Medioni | 72 | 443 | 24378 |
Stephen O. Lemay | 72 | 288 | 18601 |
Paul Dourish | 69 | 202 | 26715 |
Bas Ording | 68 | 175 | 25774 |