- Canonsburg PA, US Hui Ding - Los Altos CA, US Norman Chang - Fremont CA, US
International Classification:
G06N 5/04 G06N 20/00 G06F 17/50
Abstract:
Machine assisted systems and methods for detecting unreliable circuit patterns are described. These systems and methods can use a machine learning classifier, that has been trained to recognize such circuit patterns, to detect the unreliable circuit patterns without requiring computationally expensive simulations of a circuit netlist which can be over a million devices (e.g. over a million FETs). The classifier, once trained, can recognize unreliable circuit patterns quickly and can be updated over time as new unreliable circuit patterns are discovered from simulations or other sources.
Providing A Start Trigger For A Live Video Broadcast
The present disclosure is directed toward systems and methods for providing a start trigger for a live video broadcast. In particular, in some embodiments the systems and methods described herein provide a live video stream received from a broadcaster client device to one or more viewer client devices. Additionally, the systems and methods described herein determine whether an audience satisfies a triggering event to provide the video stream to an audience of viewers. The systems and methods provide content for a wait screen in response to determining that the audience does not satisfy the triggering event, and provide the video stream in a live broadcast in response to determining that the audience does satisfy the triggering event.
Providing A Start Trigger For A Live Video Broadcast
The present disclosure is directed toward systems and methods for providing a start trigger for a live video broadcast. In particular, in some embodiments the systems and methods described herein provide a live video stream received from a broadcaster client device to one or more viewer client devices. Additionally, the systems and methods described herein determine whether an audience satisfies a triggering event to provide the video stream to an audience of viewers. The systems and methods provide content for a wait screen in response to determining that the audience does not satisfy the triggering event, and provide the video stream in a live broadcast in response to determining that the audience does satisfy the triggering event.
Applying User-Specified Permissions To Distribution Of Content Items To Social Networking System Users
- Menlo Park CA, US Thomas Frederick Dimson - Stanford CA, US Kevin York Systrom - San Francisco CA, US Hui Ding - Sunnyvale CA, US Michel Krieger - San Francisco CA, US
A social networking system user identifies one or more social networking system users authorized to present content items to the user via the social networking system (“authorized users”). When an additional user requests presentation of a content item to the user, the social networking system determines if the additional user is an authorized user. If the additional user is an authorized user, the content item is presented to the user. However, if the additional user is not an authorized user, the social networking system identifies the additional user to the user along with a request to identify the additional user as an authorized user. If the user identifies the additional user as an authorized user in response to the request, the content item is presented to the user.
Applying User-Specified Permissions To Distribution Of Content Items To Social Networking System Users
A social networking system user identifies one or more social networking system users authorized to present content items to the user via the social networking system (“authorized users”). When an additional user requests presentation of a content item to the user, the social networking system determines if the additional user is an authorized user. If the additional user is an authorized user, the content item is presented to the user. However, if the additional user is not an authorized user, the social networking system identifies the additional user to the user along with a request to identify the additional user as an authorized user. If the user identifies the additional user as an authorized user in response to the request, the content item is presented to the user.
Applying User-Specified Permissions To Distribution Of Content Items To Social Networking System Users
- Menlo Park CA, US Kevin York Systrom - San Francisco CA, US Ryan Jacob Gomba - San Francisco CA, US Michel Krieger - San Francisco CA, US Hui Ding - Sunnyvale CA, US Ian McIntyre Silber - San Jose CA, US Peter Xiu Deng - Los Altos Hills CA, US
International Classification:
H04L 12/18 H04L 29/06 H04L 29/08 G06F 17/30
Abstract:
A social networking system user identifies one or more social networking system users authorized to present content items to the user via the social networking system (“authorized users”). When an additional user requests presentation of a content item to the user, the social networking system determines if the additional user is an authorized user. If the additional user is an authorized user, the content item is presented to the user. However, if the additional user is not an authorized user, the social networking system identifies the additional user to the user along with a request to identify the additional user as an authorized user. If the user identifies the additional user as an authorized user in response to the request, the content item is presented to the user.
Presentation Of Content Item To Social Networking System Users Identified By A Social Networking System User
- Menlo Park CA, US Michel Krieger - San Francisco CA, US Christopher Cunningham - Sunnyvale CA, US Hui Ding - Sunnyvale CA, US
International Classification:
H04L 12/18 G06F 3/0484 G06F 17/30 G06F 3/0481
Abstract:
A social networking system user (“sending user”) identifies a content item to the social networking system and also identifies one or more additional social networking system users (“receiving users”) to be presented with a content item. The social networking system communicates the content item to client devices for presentation to the receiving users. An interface identifying the receiving users and a status associated with each receiving user is presented to the sending user. The status associated with a receiving user describes how the receiving user interacted with the content item, and may be updated to reflect subsequent interactions with the content item by a receiving user.
Applying User-Specified Permissions To Distribution Of Content Items To Social Networking System Users
- Menlo Park CA, US Kevin York Systrom - San Francisco CA, US Ryan Jacob Gomba - San Francisco CA, US Michel Krieger - San Francisco CA, US Hui Ding - Sunnyvale CA, US Ian Mc Intyre Silber - San Jose CA, US Peter Xiu Deng - Los Altos Hills CA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
A social networking system user identifies one or more social networking system users authorized to present content items to the user via the social networking system (“authorized users”). When an additional user requests presentation of a content item to the user, the social networking system determines if the additional user is an authorized user. If the additional user is an authorized user, the content item is presented to the user. However, if the additional user is not an authorized user, the social networking system identifies the additional user to the user along with a request to identify the additional user as an authorized user. If the user identifies the additional user as an authorized user in response to the request, the content item is presented to the user.
Senior Member of Consulting Staff at Cadence Design Systems
Location:
San Francisco Bay Area
Industry:
Computer Software
Work:
Cadence Design Systems since May 2011
Senior Member of Consulting Staff
Altos Design Automation Mar 2011 - May 2011
Senior R&D
Cadence Design Systems Jan 2003 - Mar 2011
Senior Member of Consulting Staff
celestry design technologies Feb 2002 - Jan 2003
R&D
infrastructure engineer at Instagram, Senior Software Engineer at Facebook
Location:
San Francisco Bay Area
Industry:
Information Services
Work:
Instagram since Dec 2012
infrastructure engineer
Facebook since Oct 2010
Senior Software Engineer
SAP Labs Aug 2008 - Oct 2010
Research Scientist
Google Jun 2007 - Sep 2007
Software Engineer Intern
Oracle Jun 2005 - Sep 2005
Software Engineer Intern
Education:
Northwestern University 2003 - 2008
Ph.D, Computer Engineering
Tsinghua University 1999 - 2003
B.S., Electronic Engineering