- Canonsburg PA, US Hui Ding - Los Altos CA, US Norman Chang - Fremont CA, US
International Classification:
G06N 5/04 G06N 20/00 G06F 17/50
Abstract:
Machine assisted systems and methods for detecting unreliable circuit patterns are described. These systems and methods can use a machine learning classifier, that has been trained to recognize such circuit patterns, to detect the unreliable circuit patterns without requiring computationally expensive simulations of a circuit netlist which can be over a million devices (e.g. over a million FETs). The classifier, once trained, can recognize unreliable circuit patterns quickly and can be updated over time as new unreliable circuit patterns are discovered from simulations or other sources.
Providing A Start Trigger For A Live Video Broadcast
The present disclosure is directed toward systems and methods for providing a start trigger for a live video broadcast. In particular, in some embodiments the systems and methods described herein provide a live video stream received from a broadcaster client device to one or more viewer client devices. Additionally, the systems and methods described herein determine whether an audience satisfies a triggering event to provide the video stream to an audience of viewers. The systems and methods provide content for a wait screen in response to determining that the audience does not satisfy the triggering event, and provide the video stream in a live broadcast in response to determining that the audience does satisfy the triggering event.
Providing A Start Trigger For A Live Video Broadcast
The present disclosure is directed toward systems and methods for providing a start trigger for a live video broadcast. In particular, in some embodiments the systems and methods described herein provide a live video stream received from a broadcaster client device to one or more viewer client devices. Additionally, the systems and methods described herein determine whether an audience satisfies a triggering event to provide the video stream to an audience of viewers. The systems and methods provide content for a wait screen in response to determining that the audience does not satisfy the triggering event, and provide the video stream in a live broadcast in response to determining that the audience does satisfy the triggering event.
Applying User-Specified Permissions To Distribution Of Content Items To Social Networking System Users
- Menlo Park CA, US Thomas Frederick Dimson - Stanford CA, US Kevin York Systrom - San Francisco CA, US Hui Ding - Sunnyvale CA, US Michel Krieger - San Francisco CA, US
A social networking system user identifies one or more social networking system users authorized to present content items to the user via the social networking system (“authorized users”). When an additional user requests presentation of a content item to the user, the social networking system determines if the additional user is an authorized user. If the additional user is an authorized user, the content item is presented to the user. However, if the additional user is not an authorized user, the social networking system identifies the additional user to the user along with a request to identify the additional user as an authorized user. If the user identifies the additional user as an authorized user in response to the request, the content item is presented to the user.
Suggesting Recipients For Content Items Presented Through A Social Networking System
- Menlo park CA, US Thomas Frederick Dimson - Stanford CA, US Kevin York Systrom - San Francisco CA, US Hui Ding - Sunnyvale CA, US Michel Krieger - San Francisco CA, US
International Classification:
H04L 29/06 H04L 29/08 G06F 17/30 G06F 3/0484
Abstract:
A social networking system identifies one or more additional users to be presented with a content item to a user presenting the content item (“sending user”). Information maintained by the social networking system and describing prior interaction between the sending user and various additional users is retrieved. Based on the prior interaction between the sending user and the additional users, one or more additional users are identified to the sending user as potential recipients for the content item. For example, a frequency of interaction between the user and additional users, affinity between the user and various additional users, or other suitable information is used to identify potential recipients of the content item.