1. Technical Field
This invention relates to handheld computing devices. More particularly, the invention concerns a handheld computing device operable to automatically detect cues describing the device's environment and user actions performed with the device learn which cues and cue combinations are relevant to predict user actions, and then in response to occurrence of the relevant cues, predictively implementing the appropriate user action or configuring the device in anticipation of user action.
2. Description of Related Art
For many years, portable computers have been getting smaller and smaller. Tremendous growth in the wireless industry has produced reliable convenient, and nearly commonplace mobile devices such as cell phones, personal digital assistants (PDAs), global positioning system (GPS) units, etc. To produce a truly usable portable computer, the principle size-limiting component has been the keyboard.
To input data on a portable computer without a standard keyboard, people have developed a number of solutions. One such approach has been to use keyboards with less keys (“reduced-key keyboard”). Some reduced keyboards have used a 3-by-4 array of keys, like the layout of a touch-tone telephone.
As a completely different approach: some small devices employ a digitizing surface to receive users' handwriting. This approach permits users to write naturally, albeit in a small area as permitted by the size of the portable computer. Based upon the user's contact with the digitizing surface, handwriting recognition algorithms analyze the geometric characteristics of the users entry to determine each character or word.
As still another approach for inputting data using small devices without a full-sized keyboard, there are touch-sensitive panels on which some type of keyboard overlay has been printed, or a touch-sensitive screen with a keyboard overlay displayed. The user employs a finger or a stylus to interact with the panel or display screen in the area associated with the desired key or letter.
Aside from data entry, some portable computers recruit these technologies so that users can perform functions beyond data entry, such as operating menus, configuring application programs and hardware, issuing commands, and other GUI functions. These functions may further require different hardware or software devices such as designated pushbuttons, touch screen operated menu areas, rocker switches, hand-operated cursors, and the like.
Despite the absence of normal user interfaces like a full-size keyboard and mouse, then, the foregoing technologies make it quite feasible for users to fully interact with a portable computer of reduced size. Although feasible, this user-machine interaction is unavoidably burdened with greater potential delay, error, and difficulty of use, owing to the small sized user interface. Consequently, designers are continually searching for new technologies to make the interface more rapid, accurate, and natural.
Broadly, an operating sequence manages a handheld computing to automatically detect cues describing the device's environment and user actions performed with the device, learn which cues and cue combinations are relevant to predict user actions, and then in response to occurrence of the relevant cues, predictively implementing the appropriate user action or configuring the device in anticipation of user action.
The teachings of this disclosure may be implemented as a method, apparatus, logic circuit, signal bearing medium, or a combination of these, This disclosure provides a number of other advantages and benefits which should be apparent from the following description.
Introduction
One aspect of this disclosure concerns user entry of information into a system with an input device. A scheme is provided in which an entire word that a user wants to enter is predicted after the user enters a specific symbol, such as a space character. If the user presses an ambiguous key thereafter rather than accept the prediction, the selection list is reordered. For example, a user enters the phrase “Lets run to school. Better yet, lets drive to “. . . ”” After the user presses the space, after first entering the second occurrence of the word “to,” the system predicts that the user is going to enter the word “school” based on the context in which the user has entered that word in the past. Other predictions may be available if the user had previously entered text with the same context (for example, “to work” “to camp”). These predictions are presented if the user presses the “next” key; the key specified for scrolling through the list. Should the user enter an ambiguous key after the space, then a word list is reordered to give precedence to the words that match context. For example, if the user presses the ambiguous key that contains the letters ‘a’, ‘b’, and ‘c’, the word “camp” is given precedence in the list.
The disclosed system can also make predictions on other forms of context, such as the person to whom the message is sent, the person writing the message, the day of the week the time of the week, etc. In another embodiment, rather than explicitly define the context parameters, such as sender/recipient/email/SMS/reply/forward/new email etc, the system is passed a series of parameters by the device which may or may not be relevant and the system learns which of the parameters are relevant for prediction and which ones are not. In other embodiments, prediction may go beyond words and predict phrases. Prediction also may depend on grammar, semantics etc. Other embodiments contemplate anticipation of user actions, as well as words and phrases, such as a user action in connection with menu items, or a user action in connection with form filling. In further embodiments, the knowledge gained from user patterns can be uploaded/downloaded and/or served from a server allowing this information to be shared between devices and applications.
Discussion
For purposes of the discussion herein, with regard to the contextual completion of words, the term ‘Next Word Prediction’ (NWP) includes, inter alia:
Predictions are made when the context in the current message matches the context in text the user previously entered. The concept of context can be very general. Context can mean the nature of the text entered. Context can also be combined with other contexts, such as, for example:
Finally, the prediction system might not know what the most important factors are for context, e.g. are they:
A further embodiment starts with a very broad set of possible factors and performs on-the-fly factor analysis of the user behavior to determine the most effective factor to include as context. This system does more than adapt to user behavior based on a priori specified factors, such as text, recipient, author, day, that are recorded, but is also intelligent enough to determine which factors are most important and emphasize those. This allows for better prediction.
Another example of prediction is based upon time of day. For example, when entering a message “let's meet for” at lunchtime, the word “lunch” is automatically predicted as the next word in the phrase. Later in the day the word “dinner” is predicted. The phrases stored also can have time of day associated with them as one of their attributes. This can be used to decide which phrases are relevant when the user is entering text.
Prediction of User Actions
Prediction can also be applied to other concepts as well, such as menus and user actions. When a user clicks a menu, the context module is provided with a keyword for that menu as the preceding context word. The context module then produces the entries previously selected from that menu because they are in the context database as entries preceded by that keyword, and those words can be re-ordered to the top of the menu. When a menu entry is selected, the context module then automatically notes it as having occurred with the menu tag as context for re-ordering to the front next time.
For example, when the user clicks the “Edit” menu, the context module is provided “Edit:” as context. If the last time a user clicked “Edit” the user chose “Find,” then “Find” is shown at the front of the menu. If the user moves past that to “Replace,” then a use of “Replace” in the context of “Edit:” is marked, so that the next time the user selects the “Edit” menu, “Replace” becomes the first entry, followed by “Find” and the other less-frequently used entries.
Note that for cell phones with limited screen space, moving commonly used entries to the front of a menu can make them immediately visible when they otherwise are not visible without scrolling.
In one embodiment, learning is used, in simple case context and reorder, to predict the next macro-level user interface (UI) behavior the user is expected to perform. Instead of reordering menus based on past usage, the normal menu format is superseded entirely by reordering immediate options for the next state/application the user is expected to go to, and the most likely option can be performed automatically, if desired.
For example, consider the situation where the system knows that whenever a user is in the settings mode on the phone, and they are choosing an input method or language, they are very likely to move next to their favorite messaging application. Then, instead of presenting the user with the normal menu tree to get to the messaging application, the system:
The last option would be “go to standard menu tree.” This way, the user is presented with the most likely next end state, rather than the most likely behavior directly from here, which in a normal phone would be going back to the menu tree. The user does not have to navigate a menu tree at all, but rather has one click (or no click) to go to the next task.
Additional embodiments apply to contexts that, for example pose any of the following questions:
Form filling is another useful function, which may be performed by the disclosed system. Context sensitivity by field attribute, e.g. date only predicts months, day switches to numeric mode etc. This can similarly be applied to form input. The browser or other form-input software, can provide the prompt for the input cell as context for text entry of the cell. Thus, for example, when a form prompts for “Name:” the user's name is available with few to no keystrokes, and other names he might fill in on forms are also made easier to enter,
Implementation of Contextual Word Prediction into Tegic T9 Technology
As one example, next word prediction according to the present disclosure may be applied to Tegic Corporation's T9® technology. Broadly, T9 technology combines the groups of letters found on each key of an input device, e.g. each phone key, with a fast-access dictionary of words, and recognizes what a user wants to input as text as he types. T9 technology offers the most commonly-used word for every key sequence entered by default and then lets the user access other choices with one or more presses of the NEXT or space key. Some basic features of Tegic's T9technology are described in the following references which are incorporated by reference: U.S. Pat. Nos. 6,011,554 and 5,818,437.
The following discussion makes numerous citations to “T9 ”technology and “T9” systems. Although T9 is a trademark, and certain products and earlier patents contain features marked under this mark, the present disclosure's citations to “T9” refer to represent a novel implementation of technology, and namely, the introduction of certain new features in the context of existing T9 technology. Accordingly, “T9” is not used as a reference to admitted prior art.
Another optional component includes one or more sensors 55, similarly coupled to the CPU 100. The sensors 55 may include some or all of the following: infrared and/or visible light meters, accelerometers, touch or pressure sensors, GPS engines, Carbon Dioxide sensors; temperature measuring devices sound measuring equipment, and any other equipment to determine the magnitude, pattern, frequency, nature, or other characteristics of any measurable physical properties that may be indicative of the environment in which the user is operating the device. Appropriate interface circuitry is included in the sensors 55 or CPU 100 or between them, with some examples including one or more analog-to-digital converters, amplifiers: multiplexers, etc. The various sensors 55 may be integrated into the device 101, located externally and coupled to the device 101 removably coupled to the device 101, or a combination of these or other options.
The user input 54 comprises a keyboard, telephone or other style keypad, soft keyboard, screen overlay keyboard, mouse, trackball, handwriting digitizing surface, or any other means for the user to communicate input into the machine 101. Without any intended limitation, the ensuing discussion uses an example where the input device 54 is a keyboard. In this embodiment, the processor 100 receives inputs from the keyboard, and manages all output to the display and speaker. The processor 100 is coupled to digital data storage 104. The storage 104 includes a combination of temporary storage media, such as random access memory (RAM), and permanent storage media, such as read-only memory (ROM), floppy disks, hard disks, or CD-ROMs. The storage 104 contains all software routines necessary to govern system operation. In one example, the memory contains an operating system 106, disambiguating software 108, associated filtering of ambiguous text entry software and/or extending and interpreting software 110, and a contextual database 116, the latter of which is discussed in additional detail below. The memory also includes a vocabulary database 30. Optionally, the memory may contain one or more application programs 112, 114. Examples of application programs include word processors, software dictionaries, and foreign language translators. Speech synthesis software may also be provided as an application program, thereby allowing the reduced keyboard disambiguating system to function as a communication aid. Therefore, the output, in this case, might be vocally output from the speaker.
In certain embodiments, the storage 104 includes cues 123, actions 125, and a mapping 124 between the two. Broadly, the cues 123 describe environment of the device 101 and user performed actions of configuring the device and operating its application programs. The actions 125 represent associated user actions involving the device 101. The nature, meaning, and characteristics of the cues 123 and actions 125 are described in greater detail below in conjunction with the details operation of the system of
One aspect of the discussion herein concerns to symbols and sequences of symbols, which, when combined, make an object or part of an object. A typical example of a symbol is a character in any language, such as a letter, digit, punctuation mark, or any other symbol from a language. A typical example of an object or part of an object is a word or part of a word. However, the discussion herein equally applies to Japanese kana and Korean jamos. Also, it should be noted that the objects do not have to be linguistic, as the claimed disambiguating system herein can be used to predict icons, phone numbers, or inventory records, as long as a type of symbolic string representation is present. Therefore, it should be appreciated that use of the terms such as letter, word, word stem, and the like are not limited to only those applications, and are used to facilitate ease of reading and understanding the discussion herein.
For purposes of the discussion herein, T9 systems comprise at least three components:
Alphabetic T9 and Chinese T9 implementations can include the following supplemental databases;
When the user enters an active key sequence, Alphabetic T9 checks its databases (LDB, UDB, CDB, and MDB) for words that match the key sequence.
The Alphabetic T9 selection list is designed to provide the words a user most likely desires, based on 1) how frequently the user enters the word, 2) how common the word is in the language and 3) the previous context in which the keys were entered, so that the words appear at the beginning of the selection list,
The relative order of selection-list items depends on which databases are enabled and which features, such as selection list reordering and word completion and word prediction, are enabled.
The first word in Alphabetic T9's selection list is active by default. The term active word refers to the currently active selection-list word.
An example of the selection list order is given below. It is assumed that keys have been entered and no T9 database or database features are disabled.
When the user accepts the active word by moving the cursor off the word (pressing keys that correspond to the T9 key values T9 KEYRIGHT, or T9 KEYLEFT) Alphabetic T9;
When the user accepts the active word by entering a space (pressing keys that correspond to the T9 key value T9 KEYSPACE) Alphabetic T9 performs the actions above, as well as the following actions:
As discussed above, some hardware aspects of the present disclosure concern the device of
Exemplary Digital Data Processing Apparatus
As mentioned above, data processing entities of this disclosure may be implemented in various forms. One example is a digital data processing apparatus, as exemplified by the hardware components and interconnections of the digital data processing apparatus 200 of
The apparatus 200 includes a processor 202, such as a microprocessor, personal computer, workstation, controller, microcontroller, state machine, or other processing machine, coupled to digital data storage 204. In the present example, the storage 204 includes a fast-access storage 206, as well as nonvolatile storage 208. The fast-access storage 206 may comprise random access memory (“RAM”), and may be used to store the programming instructions executed by the processor 202. The nonvolatile storage 208 may comprise, for example, battery backup RAM, EEPROM, flash PROM, one or more magnetic data storage disks such as a “hard drive”, a tape drive, or any other suitable storage device. The apparatus 200 also includes an input/output 210, such as a line, bus, cable, electromagnetic link, or other means for the processor 202 to exchange data with other hardware external to the apparatus 200.
Despite the specific foregoing description, ordinarily skilled artisans (having the benefit of this disclosure) will recognize that the apparatus discussed above may be implemented in a machine of different construction, without departing from the scope of the invention. As a specific example, one of the components 206, 208 may be eliminated; furthermore, the storage 204, 206, and/or 208 may be provided on-board the processor 202 or even provided externally to the apparatus 200.
Signal-Bearing Media
In carrying out the data processing aspects of this disclosure, various of these may employ one or more computer-readable signal-bearing media. Such media tangibly embody a program of machine-readable instructions executable by a digital processing apparatus as described below. In one example, the machine-readable instructions are executable to carry out various functions related to this disclosure, such as the operations described in greater detail below. In another example, the instructions upon execution serve to install a software program upon a computer, where such software program is independently executable to perform other functions related to this disclosure, such as the operations described below.
In any case, the signal-bearing media may take various forms. In the context of
Logic Circuitry
In contrast to the signal-bearing media and digital data processing apparatus discussed above, a different embodiment of this disclosure uses logic circuitry instead of computer-executed instructions to implement various processing aspects.
Depending upon the particular requirements of the application in the areas of speed, expense, tooling costs and the like, this logic may be implemented by constructing an application-specific integrated circuit (ASIC) having thousands of tiny integrated transistors. Such an ASIC may be implemented with CMOS, TTL, VLSI, or another suitable construction. Other alternatives include a digital signal processing chip (DSP), discrete circuitry (such as resistors, capacitors, diodes, inductors, and transistors), field programmable gate array (FPGA), programmable logic array (PLA), programmable logic device (PLD), and the like.
Operations
Having described various structural features of the present disclosure, the operational aspects of the disclosure will now be described.
Predicting the Next Word
Alphabetic T9 creates a selection list of predicted words. The maximum number of predicted words in the selection list depends on the literal value of the #define constant T9 MAXCDBMATCHES. Unless a different value is assigned, this constant is set to 6.
The user selects and accepts a predicted word using the same process used in T9 for selecting and accepting a word. After the user accepts a predicted word (310), Alphabetic T9 processes the word (316) (312). It will be appreciated by those skilled in the art that the disclosed system may be applied to other disambiguation systems than T9, as well as other forms of T9 than Alphabetic T9.
Processing Words
The following discussion describes an example of how to implement and operate an Alphabetic T9 Context Database (CDB). A CDB contains information on recently entered words. Alphabetic T9 uses this information to include predicted and completed words in the selection list. Whereas Alphabetic T9 checks its other databases only for words that match the current active key sequence, Alphabetic T9also checks the CDB for the most recently accepted word: i.e. the most recently entered non-active word. CDB words do not necessarily have to match the active word to be included in the selection list. For predicted words, which appear only when there is no active key sequence (in one embodiment), the CDB match depends on the word before the active word. For completed CDB words, the match depends on both the word before the active word and the key sequence of the active word.
If Alphabetic T9 finds in the CDB the word the user has entered, Alphabetic T9 suggests the word that immediately follows in the CDB as a predicted word. For example; if the CDB contains the word pair “text message” and the user enters the word “text” and then presses the Space key, Alphabetic T9 places “message” in the selection list as a predicted word,
Also, if Alphabetic T9 finds in the CDB the word the user has entered, Alphabetic T9 suggests the word that immediately follows in the CDB as a completed word if the word matches the active key sequence, although the completed word contains additional characters. For example, if the CDB contains the word pair “text message” and the user enters the word “text,” adds a space, and then enters the key sequence 6-3-7-7, which corresponds to the first four letters in the word “message”, Alphabetic T9 places “message” in the selection list as a completed word.
In one embodiment, CDB word completion operates independently of UDB custom-word completion, LDB word completion, and MDB word completion.
Implementing a CDB
To implement an Alphabetic T9 CDB: the integration layer should:
The implementation process described above assumes the CDB is stored in non-volatile memory and that CDB data are copied to RAM before activating CDB operations. If a different storage model is used, some of the steps above may not apply.
Allocating Persistent Memory
The integration layer must allocate persistent memory to store the CDB. When the integration layer activates CDB operations by calling T9 AWCdbActivate, it copies the CDB from persistent memory to RAM. The database is referenced as an instance of the CDB Data Structure (T9 AWCdblnfo).
Activating CDB Operations
If there is no existing CDB, e.g. the first time CDB operations are activated on the device, the integration layer must initialize all T9 AWCdbInfo structure fields values to 0. If the integration layer has copied an existing CDB from persistent memory to RAM, it should not modify any T9 AWCdbInfo structure field values.
The integration layer activates CDB operations by calling T9 AWCdbActivate. When the integration layer calls this function, it provides a pointer to an instance of the CDB Data Structure (T9AWCdbInfo) for which it has allocated memory.
After the integration layer has activated enabled CDB operations, Alphabetic T9 automatically searches the CDB. The type of information Alphabetic T9 searches the CDB for depends on whether there is an active key sequence:
A CDB's size is indicated by the value of T9AWCdbInfo.wDataSize. The wDataSize field indicates the total size of T9AWCdbInfo. This includes the data area, where CDB data are stored several related variables used by T9, and any structure-padding bytes added by the compiler environment.
If T9's Function API is used, it is not necessary to set the value of T9AWCdbInfo.wDataSize directly. Instead, the size of the CDB data area is provided as an argument to the function T9AWCdbActivate. While handling the function, T9 sets the value of T9AWCdbInfo.wDataSize.
One can make the CDB area as large wanted, but it must be at least T9MINCDBDATABYTES bytes It is recommended, however, that the CDB be 1800*T9SYMBOLWIDTH bytes in size.
Resetting the CDB
When the integration layer activates CDB operations, Alphabetic T9 ensures the integrity of the database by:
If Alphabetic T9 detects a problem, it resets the CDB, which deletes all CDB data. This process occurs without any action by the integration layer, and Alphabetic T9 does not notify the integration layer that the CDB has been reset. The integration layer can explicitly reset the CDB by calling T9AWCdbReset. Under most circumstances, the integration layer does not need to call this function.
Indicating the Integration Layer Writes Data to the CDB
If the CDB is stored in a memory area that Alphabetic T9cannot write to, the integration layer must write data to the database. Also, one may wish to have the integration layer write data to the CDB if it is desired to monitor what is written to the database or maintain a shadow copy of the CDB in non-volatile storage.
The integration layer informs Alphabetic T9 that it writes data by calling T9AWSetCdbWriteByOEM.
After the integration layer calls this event, Alphabetic T9 requests that the integration layer write data by calling T9REQCDBWRITE. If it is no longer necessary for the integration layer to write data to the CDB, the integration layer calls T9AWClrCdbWriteByOEM to indicate that Alphabetic T9 can write data directly.
Disabling Next-Word Prediction
When CDB operations are activated, T9 by default provides predicted words, i.e. words the user may want to enter, based on the words the user has already entered. Next-word prediction is available in both Ambiguous and Multitap text-entry modes.
Alphabetic T9 places predicted words in the selection list when the word the user has just entered is found in the CDB as the first part of one or more word pairs. Whatever word appears in the CDB after each instance of the word the user has just entered is provided as a predicted word.
It is possible to disable this functionality if one wants to use only CDB word completion, and not next-word prediction, in an Alphabetic T9implementation. To disable CDB word completion the integration layer calls T9AWClrCdbPrediction. To re-enable next-word prediction, the integration layer calls T9 AWSetCdbPrediction,
Disabling CDB Word Completion
When CDB operations are activated, Alphabetic T9 by default places in the selection list completed CDB words that match the active sequence (and contain additional characters) if the word immediately before the active word is in the CDB immediately before the completed word(s). One can disable this functionality if one want to use only next-word prediction, and not CDB word completion, in an Alphabetic T9 implementation. To disable CDB word completion, the integration layer calls T9AWClrCdbCompletion. To re-enable CDB word completion, the integration layer calls T9AWSetCdbCompletion.
Note that CDB word completion operates independently of UDB custom word completion, LDB word completion, and MDB word completion. Many of the words in a CDB are also in other Alphabetic T9 databases. Alphabetic T9 suppresses these duplicates from the selection list. However, the potential effect of this duplication on other API events functions should be noted. For example, a UDB custom word that is deleted from the database still appears in the selection list if that word is also in the CDB. Likewise, if one were to disable LDB word completion, words in the LDB still appear in the selection list as completed words if they are also in the CDB and CDB word completion is enabled.
Handling T9 Requests
Depending on how the CDB is implemented, the integration layer may need to handle the following T9 request;
The integration layer should copy the CDB data to persistent memory when it terminates Alphabetic T9 if the database has been modified during the T9 session. T9 increments the value of T9AWCdbInfo.wUpdateCounter whenever it modifies the database. The integration layer can determine whether the database has been modified by comparing the value of wUpdateCounter after the session to its value before the session. If the value is different, the integration layer must copy the updated CDB data to persistent memory. Note that it is likely that T9 modifies the CDB during every session.
Operating an Alphabetic T9 CDB
Alphabetic T9 CDB operations consist of the following tasks:
Alphabetic T9 automatically adds data to the CDB. Note that if the CDB is stored in a memory area that T9 cannot write to, the integration layer must write data to the CDB.
Retrieving Data from a CDB
Alphabetic T9 automatically retrieves data from the CDB.
Deleting Data from a CDB
Alphabetic T9 does not permit users or the integration layer to delete words from the database. Instead, Alphabetic T9 automatically begins deleting the oldest words in the database when it is nearly full. This removal process is referred to as garbage collection, and it occurs without any action by the user or integration layer.
Operation
In one embodiment, saved context data are used to return a prediction of the next word upon pressing the space, and to filter the word completions after entering key strokes. This, in principle, allows a user to reduce the number of keystrokes by quickly retrieving words that are correctly predicted based on the previous word or words. This completion feature is presently implemented by saving user entered text in a Context DataBase (CDB), and returning those words that match context and keystrokes.
NWP saves the recently entered user text and uses that text to predict the next word that the user enters. For example, if the user has typed the phrases ‘hello Leslie,’ hello Inger’ and ‘Hello Helena’ in the recent past, when the user types and accepts the word ‘hello’ by hitting space, the system suggests:
If the user does not accept one of these words, but rather continues typing, the system uses context to prioritize completions presented to the user. In an embodiment employing a 12-key input device, if the above user types the 4 key after hitting space, the selection list presented to the user is:
After a space, the context database (CDB) objects make up the entire selection list. After pressing ambiguous keys, CDB objects appears as follows:
System state tracks completions after space with:
After a user selects ambiguous keys, system state tracks CDB completions in the preexisting way:
API
The T9 API consists of a global structure which holds word, wordlist, and buffer information that is used by the customer, and a set of events or functions for building, accepting, and deleting words, scrolling through word lists, and more. In alphabetic T9, the API structure is referred to as the T9AWFieldInfo structure (often referred to as pAWFieldInfo). The T9AWFieldInfo contains data that is specific to alphabetic T9. The T9AWFieldInfo structure contains another structure, T9FieldInfo (often referred to as pFieldInfo), which contains general word data that is also used in Japanese, Chinese, and Korean T9.
New API structure data and functions were added to T9 to implement NWP. The NWP feature is active if the host has allocated space for the context database and set the pFieldInfo→pCdbInfo to a non-zero value.
The following function API event is added to activate the CDB:
To set writing configuration:
To clear writing configuration:
To reset the CDB:
To break CDB context:
To fill context buffer.
To get word prediction:
To clear buffer but retain context,
To turn off CDB completion:
To turn on CDB completion,
To turn off CDB completion:
To turn on CDB completion;
The following request type is added:
This is used to request writes to CDB it external write is on.
There is no additional direct access to write to the CDB through the API.
Internal CDB Interfaces
Two interfaces to the CDB exist in the T9 embodiment:
And:
Functions
Adds Saves word to context buffer and add to context database. This function is called only after a space has been entered.
This function retrieves context matches from the CDB.
This function resets the CDB.
This function activates the CDB.
Database
Present minimum database size requirements are 1800* symbol width (300 words*6 chars/word*symbolwidth bytes/char). This is 1800 for one-byte systems, and 3600 for two-byte systems.
The CDB saves recently entered text in the same form that the user enters it, The text is stored in a circular buffer. New words overwrite the least recent word in the CDB.
The CDB has global information in its header.
Reads
When requesting a word from the CDB, the system word builder passes a context buffer. Using the context buffer the CDB retrieves context matches in order of recency.
Writes
When the space key is hit or white space is entered explicitly, the built word is written to the CDB. This happens in both ambiguous and multitap (MT) modes. The word also goes through its normal RUDB processing. There is no garbage cleanup in the CDB.
Context Buffer
A context buffer is maintained. The context buffer is updated on the pressing of space key and is cleared with any action that tends to lose context, such as cursoring and clearing. In a word API this is attached to the flushword function of a separate confirm function.
Functional Description
In the T9 embodiment, the NWP feature is active if:
a) the compile includes the code for this feature, and
b) the field info member pFieldInfo→pCdbinfo points to valid memory.
The functional elements that apply when the next word prediction feature is active in T9 are listed below:
NOTE: Even though the word ‘the’ is the most common word in the English language, in this context, ‘tie’ is presented first in the list. It is the most likely candidate when preceeded by the word ‘bow.’
Context Predictions and Completions in Multitap
Use Case:
CDB completions appear ahead of UDB completions.
Use Case:
Leading word is agnostic to case, trailing word is case sensitive. If space is hit with caps-lock on, the predicted word is entirely in upper case
Use Case:
CDB completions appear ahead of UDB completions.
Use Case:
CDB completions appear ahead of UDB completions.
Use Case:
CDB completions appear ahead of UDB completions.
Use Case:
CDB processing occurs on the addition of space character, whether or not the context word was entered in a user maintained MyWords database.
Other Examples
Although this disclosure includes reference to various exemplary embodiments, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention.
For example, user actions or inputs can affect the automatic changing of the device's state based on context. For example, the system might use context to change a mobile telephone from ‘ring’ to ‘vibrate’, during the time that the calendar shows that the user is in a meeting. Another embodiment uses location context to increase the mobile telephone volume when the user is outside or when the telephone detects high levels of background noise. In another embodiment, the system learns the user habits. For example, based on the learned user action, the system is able to offer services to the user that the user may not be aware of. In another embodiment, word prediction is based on the previous word context (bigram context), but might also use the previous ‘n’ words (trigram context, etc).
Using Environmental Cues to Predict & implement User Actions
The example of
In step 502, the device 101 detects cues. In one example, the CPU 100 stores a list of detected cues in 123 in the storage 104 (
In step 502, then, the device 101 detects all available cues. This involves the CPU 100 evaluating the state of the sensors 55, operating system 106; application programs 112/114, and processing this input as needed to determine the nature and extent of the presently occurring cues Some examples of cues include;
Broadly, in step 503 the CPU 100 monitors and analyzes operation of the device 101 to identify any user actions that can be associated with the cues from step 502. In other words, step 503 learns which if any cues and combinations of cues are relevant predictors of which of user actions. “User actions” include virtually any action that the user, by operating the user input 54, can instruct the device 101 to perform, such as configuring the device and operating its application programs. Without any intended limitation, some examples as to configuring the device include switching to hands-free or voice navigation driving mode, causing associated cell phone to enter a silent or vibrate mode, adjusting display brightness, etc. Some further examples as to operating application programs include opening an application program, closing a program, existing or entering a given mode of program operation, selecting a given menu entry in a program, configuring settings of a program, etc.
As shown by 503a, step 503 may performed on a repeating basis, such as continuously, periodically, on a non-periodic schedule, etc. In one example, step 503 detects user actions and maintains a running list of user actions. In the example of
Step 503 may establish a threshold of required likelihood, such as 100% (=always) or a lesser threshold, defining a minimum probability relationship between a set of cues and its resultant user action.
In step 503 the mapping 124 may be constructed in various ways. For example, the mapping 124 may be prepared by using a neural network or by constructing an associative array. In another example, the mapping 124 may be prepared by empirical data, for example, by randomly assigning cues to user actions and continually refining this model by discarding unworkable cue-action links and reinforcing proven cue-action links. Another example of how to prepare the mapping 124 is specifically described below, under the heading “One Example of Mapping,”
For each user action 123 that step 503 found a corresponding cue 124 (or cue combination) to be a relevant predictor, the CPU 100 (step 504) plans one or more machine-executed actions to (1) configure the device in anticipation of this action, or (2) cause the device carry out the next user action, (3) or to priority certain interpretations of inherently ambiguous user-entered text.
In the case of configuring the device in anticipation of user action, this may involve configuring hardware or software settings starting or ceasing or minimizing or maximizing an application program, opening or closing a menu advancing to a given point in a menu structure, or any other action to expedite or assist with implementation of the user action. In the case of causing the device to perform the next user action, this operation involves causing the device 101 to carry out the action that the user is predicted to do anyway In the case of prioritizing certain interpretations of ambiguous user-entered text: this involves favoring a disambiguated interpretation of handwriting, telephone keypad, or other user text input that is consistent with the cue. As shown by 504a: step 504 may performed on a repeating basis such as continuously, periodically, on a non-periodic schedule, etc. in order to maintain a sufficiently refined list of predictive actions.
As to predictive actions configuring the device 101, the following shows some examples of these.
As to predictive actions relating to disambiguation, some examples of these include
In an alternative to the preceding description, instead of identifying historical associations between user actions and cues, step 503 may propose user action that is logically appropriate for the cues even if such action has never been taken. Even more particularly, step 503 may propose that ambiguously entered user text be prioritized according to an context indicated by certain cues. This user action, as discussed below: is carried out in step 508b. As a further example of the foregoing alternative embodiment, step 503 may propose automatically favoring a user's screen name as the best interpretation of a user-entered key sequences whenever the user is operating an instant messaging application. In another example, step 503 proposes automatically favoring text (such as zip code, address, city, state, etc.) consistent with a cue of detected geographic location. In still another example, step 503 may propose automatically favoring interpretations of user entered text consistent with the time of day, day of week, month, or year in order to remain consistent with a cue of detected time. In still another example, step 503 may propose automatically favoring interpretations of user entered text consistent with a form field in response to a cue indicating that a text entry cursor lies in a given field.
After step 504, step 506 monitors for occurrence of one of the cues or cue combinations that was found to constitute a relevant predictor of a user action and mapped to that action in step 503. In the absence of any such cues, step 506 repeats (506c) to wait for the next relevant cue. Whenever the CPU 100 finds that a relevant predictor has occurred (506a, 506b), the CPU 1010 performs the correlated (via 124) machine-executed action (125/504) in steps 508a or 508b. These actions, planned in step 504 and discussed above, include anticipating the next user action (508a) and prioritizing inherently ambiguous user text entry (508b).
The following examples illustrate some examples of steps 506, 508a, and namely, detecting a relevant predictor and performing a correlated predictive action. In one example, where the device 101 is implemented as a cell phone, the device detects (506) street noise, the CPU 100 automatically switches (508a) to hands-free or voice navigation driving mode. In another example, when the device 101 detects (506) arrival of a meeting time recorded in an integrated calendar program: the device 101 automatically puts (508a) an associated cell phone into a silent or vibrate mode. In another example, when the device 101 detects (506) that the user has performed a first menu entry the CPU 100 automatically configures (508a) the menu to include or highlight an expected follow-up menu entry. As a more particular example of this, when the device 101 finds (506) that the user has performed a cut function inside an application program, the device 101 may automatically restructure, prune, or otherwise modify the “edit” menu (508a) to highlight the “paste” action; similar activity may be conducted for search/replace or other related menu entries.
As another example, when the device 101 detects (506) that the user has entered a settings mode of the device 101 and chosen an input method or language, the device 101 anticipates (508a) the user opening his/her favorite messaging application by automatically configuring (508a) the device 101 to bypass the normal menu tree and open the messaging application automatically, or to present a prominent option in a settings window or elsewhere along with the anticipated user action. The device 101 may also present an option “display regular menu” in case the anticipated action turns out to be incorrect. As another example, when the device 101 detects (506) that the user has taken a picture with the flash turned on, the device 101 anticipates (508a) that the photo editing tool palette needs to include the “red eye” removal tool; or, further, by making red eye detection and selection the first step when the user next launches the photo editing application with that picture.
As another example of 506/508a, when the device 101 detects (506) user completion of a given application program, the device 101 automatically opens (508a) another application program. For example, the device 101 may have teamed that the user always opens a “note pad” application after completing a phone call. In another example, the device 101 responds to user completion of a phone call to his psychic (506) by initiating (508a) an instant message to the user's stockbroker.
The following illustrates some examples of steps 506/508b, and namely, detecting a relevant predictor and performing a correlated predictive action relating to disambiguation. In one example, when the device 101 detects (506) that the user has an instant messaging application open, the device 101 automatically promotes (506b) the user's screen name as the best interpretation of a user-entered key sequence. In another example, when the device 101 detects (506a) a geographic location obtained from an integrated or remotely coupled GPS unit, the device 101 favors (506b) interpretations of user entered text consistent with that geographic location such as the city, state, or a nearby street address. More particularly, when the device 110, using data from an integrated or remotely coupled GPS unit, senses a geographic location near Queen Anne Ave N and W Galer St., Seattle, Wash., the device 101 automatically promotes 98119 as the best interpretation of a user-entered key sequence in a zip code field.
In another example, when the device 101, using data from an integrated or remotely coupled clock, senses (506a) the date and/or time, the device 101 automatically promotes (508b) words consistent with the time of day, time of year, month, etc. For example, if the user enters “Let's go out for” in an instant messaging application, the machine 101 may promote or suggest “lunch” when the time is near noon. As another example, if the user types “I want to go”, the machine 101 may promote or favor “skiing” in the winter and “swimming” in the summer. As another example, when device 101 detects (506a) that the cursor, in a currently open application, is located in certain form field, the disambiguation operation favors (508b) interpretations of user entered text consistent with the field.
After each performance of an action (508a, 508b), the process 500 returns to step 506 to check for the next predictor.
One Example of Mapping
As mentioned above, the mapping operation of step 503 (
The following provides an additional, more specific example of the mapping operation of step 503 (
The following are some exemplary rules: (1) if sponsor-attendees=mitchell and department-attendees=scs then location=weh5309, weh5311, Oakland, (2) if group-name=cs-faculty then location=weh4623: (3) if department-attendees=scs and position-attendees=grad-student and course-name=nil then location=weh5309, weh5307, unknown, (4) if seminar-type=ai then location=weh4623, weh5409, (5) if course-name=ml-course then location=weh4623, weh4601, unknown.
The rules generated by the learning sequence are variable in length. When a new instance is encountered, the learning sequence checks all rules against it. The rules whose antecedents are true for the current instance are considered to be eligible to vote on the target value. Each conformed rule votes for its most frequent antecedent value and the number of votes is same as the weight for the rule. In various embodiments, initially, all conformed rules have equal vote (since they all have the same initial weight, e.g., one),
The learning sequence then aggregates the votes and predicts the target value. In various embodiments, the learning sequence predicts the target value with the majority vote. If no rule antecedent is true, a default majority value is predicted from the last m outcomes.
In various embodiments, the learning sequence decreases the weight if the local pre-diction by a participating rule is incorrect, irrespective of the correctness of the global outcome. In various embodiments, the decrement is by half. In various embodiments, when the local prediction is correct but the global outcome is incorrect, the learning sequence measures the vote deficit for the actual prediction. After that, the learning sequence increases the weights for all the rules that had the correct local prediction in the event the global outcome failed to predict correctly. In various embodiments, the weights are increased equally. This boosts the vote for the correct target value.
In various embodiments, when a rule (and the global outcome) predicts correctly, the learning sequence increments its weight conservatively. The technique conjectures that this reward raises the confidence (weight) of the rule for future predictions. In various embodiments 0.1 is employed as the reward value. In various embodiments, different reward values may be employed. Liberally rewarding the rules eventually may lead to a drop in the performance, so this parameter is generally selected carefully. Moreover, experiments appear to suggest a small linear increase in weight performs much better than exponential increase. In various embodiments, if the weight of any rule falls below a user-defined threshold, the rule is removed from the ruleset.
In various embodiments, if the antecedent of any rule matches the current instance but the target value is not present in the consequent, the learning sequence updates the rule by replacing the oldest target value with the current one. Further, in various embodiments, if the prediction is incorrect, the learning sequence updates the instance space by replacing the oldest instance with the current one. New rules are generated the same way as the initial rules, and redundancy is removed. New rules are each assigned a weight, in various embodiments, the weight of one. The learning sequence then uses this updated model for subsequent instance. The model is thus updated incrementally.
While the foregoing disclosure shows a number of illustrative embodiments, it will be apparent to those skilled in the art that various changes and modifications can be made herein without departing from the scope of the invention as defined by the appended claims. Accordingly, the disclosed embodiment are representative of the subject matter which is broadly contemplated by the present invention, and the scope of the present invention fully encompasses other embodiments which may become obvious to those skilled in the art, and that the scope of the present invention is accordingly to be limited by nothing other than the appended claims.
All structural and functional equivalents to the elements of the above-described embodiments that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the present claims. Moreover, it is not necessary for a device or method to address each and every problem sought to be solved by the present invention, for it to be encompassed by the present claims. Furthermore, no element, component, or method step in the present disclosure is intended to be dedicated to the public regardless of whether the element, component, or method step is explicitly recited in the claims. No claim element herein is to be construed under the provisions of 35 U.S.C. 112, sixth paragraph, unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the phrase “step for.”
Furthermore, although elements of the invention may be described or claimed in the singular, reference to an element in the singular is not intended to mean “one and only one” unless explicitly so stated, but shall mean “one or more”. Additionally, ordinarily skilled artisans will recognize that operational sequences must be set forth in some specific order for the purpose of explanation and claiming, but the present invention contemplates various changes beyond such specific order.
In addition, those of ordinary skill in the relevant art will understand that information and signals may be represented using a variety of different technologies and techniques. For example, any data, instructions, commands, information, signals, bits, symbols, and chips referenced herein may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, other items, or a combination of the foregoing.
Moreover, ordinarily skilled artisans will appreciate that any illustrative logical blocks, modules, circuits, and process steps described herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, DVD, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. In another example, the processor and the storage medium may reside in an ASIC.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
This application is a continuation-in-part of the following application, and claims the benefit thereof in accordance with 35 USC 120: U.S. application Ser. No. 10/866,634 entitled “Contextual Prediction of User Words and User Actions,” filed on Jun. 10, 2004. The '634 application is a continuation-in-part of U.S. application Ser. No. 10/176,933, entitled Explicit Character Filtering of Ambiguous Text Entry, filed Jun. 20, 2002. The '634 application also claimed the benefit under 35 USC 119 of U.S. Provisional Application No. 60/504,240 which was filed on Sep. 19, 2003. The '933 application was a continuation-in-part of U.S. application Ser. No. 09/454,406, filed on Dec. 31, 1999. The '933 application also claimed the benefit under 35 USC 119 of U.S. Provisional Application No. 60/110,890 which was filed on Dec. 4, 1998. The present application also claims the benefit under 35 USC 119 of U.S. Provisional Application No. 60/734,840, which was filed Nov. 9, 2005. The entirety of the foregoing applications is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
3967273 | Knowlton | Jun 1976 | A |
4003025 | Hilliard et al. | Jan 1977 | A |
4164025 | Dubnowski et al. | Aug 1979 | A |
4191854 | Coles | Mar 1980 | A |
4339806 | Yoshida | Jul 1982 | A |
4360892 | Endfield | Nov 1982 | A |
4396992 | Hayashi et al. | Aug 1983 | A |
4427848 | Tsakanikas | Jan 1984 | A |
4442506 | Endfield | Apr 1984 | A |
4464070 | Hanft et al. | Aug 1984 | A |
4481508 | Kamei et al. | Nov 1984 | A |
4544276 | Horodeck | Oct 1985 | A |
4586160 | Amano et al. | Apr 1986 | A |
4649563 | Riskin | Mar 1987 | A |
4661916 | Baker et al. | Apr 1987 | A |
4669901 | Feng | Jun 1987 | A |
4674112 | Kondraske et al. | Jun 1987 | A |
4677659 | Dargan | Jun 1987 | A |
4679951 | King et al. | Jul 1987 | A |
4744050 | Hirosawa et al. | May 1988 | A |
4754474 | Feinson | Jun 1988 | A |
RE32773 | Goldwasser et al. | Oct 1988 | E |
4791556 | Vilkaitis | Dec 1988 | A |
4807181 | Duncan, IV et al. | Feb 1989 | A |
4817129 | Riskin | Mar 1989 | A |
4866759 | Riskin | Sep 1989 | A |
4872196 | Royer et al. | Oct 1989 | A |
4891786 | Goldwasser | Jan 1990 | A |
4969097 | Levin | Nov 1990 | A |
5018201 | Sugawara | May 1991 | A |
5031206 | Riskin | Jul 1991 | A |
5041967 | Ephrath et al. | Aug 1991 | A |
5067103 | Lapeyre | Nov 1991 | A |
5109352 | O'Dell | Apr 1992 | A |
5128672 | Kaehler | Jul 1992 | A |
5131045 | Roth | Jul 1992 | A |
5133012 | Nitta | Jul 1992 | A |
5163084 | Kim et al. | Nov 1992 | A |
5200988 | Riskin | Apr 1993 | A |
5210689 | Baker et al. | May 1993 | A |
5218538 | Zhang | Jun 1993 | A |
5229936 | Decker et al. | Jul 1993 | A |
5255310 | Kim et al. | Oct 1993 | A |
5258748 | Jones | Nov 1993 | A |
5288158 | Matias | Feb 1994 | A |
5289394 | Lapeyre | Feb 1994 | A |
5303299 | Hunt et al. | Apr 1994 | A |
5305205 | Weber et al. | Apr 1994 | A |
5339358 | Danish et al. | Aug 1994 | A |
5371851 | Pieper et al. | Dec 1994 | A |
5373290 | Lempel et al. | Dec 1994 | A |
5388061 | Hankes | Feb 1995 | A |
5392338 | Danish et al. | Feb 1995 | A |
5406480 | Kanno | Apr 1995 | A |
5535421 | Weinreich | Jul 1996 | A |
5559512 | Jasinski et al. | Sep 1996 | A |
5586198 | Lakritz | Dec 1996 | A |
5623261 | Rose | Apr 1997 | A |
5642522 | Zaenen et al. | Jun 1997 | A |
5664896 | Blumberg | Sep 1997 | A |
5680511 | Baker et al. | Oct 1997 | A |
5748512 | Vargas | May 1998 | A |
5786776 | Kisaichi et al. | Jul 1998 | A |
5797098 | Schroeder et al. | Aug 1998 | A |
5805911 | Miller | Sep 1998 | A |
5818437 | Grover et al. | Oct 1998 | A |
5825353 | Will | Oct 1998 | A |
5828991 | Skiena et al. | Oct 1998 | A |
5847697 | Sugimoto | Dec 1998 | A |
5855000 | Waibel et al. | Dec 1998 | A |
5896321 | Miller et al. | Apr 1999 | A |
5917890 | Brotman et al. | Jun 1999 | A |
5917941 | Webb et al. | Jun 1999 | A |
5926566 | Wang et al. | Jul 1999 | A |
5936556 | Sakita | Aug 1999 | A |
5937380 | Segan | Aug 1999 | A |
5937422 | Nelson et al. | Aug 1999 | A |
5945928 | Kushler et al. | Aug 1999 | A |
5952942 | Balakrishnan et al. | Sep 1999 | A |
5953541 | King et al. | Sep 1999 | A |
5960385 | Skiena et al. | Sep 1999 | A |
5963671 | Comerford et al. | Oct 1999 | A |
5999950 | Krueger et al. | Dec 1999 | A |
6005498 | Yang et al. | Dec 1999 | A |
6009444 | Chen | Dec 1999 | A |
6011554 | King et al. | Jan 2000 | A |
6041323 | Kubota | Mar 2000 | A |
6044347 | Abella et al. | Mar 2000 | A |
6054941 | Chen | Apr 2000 | A |
6073101 | Maes | Jun 2000 | A |
6098086 | Krueger et al. | Aug 2000 | A |
6104317 | Panagrossi | Aug 2000 | A |
6120297 | Morse, III et al. | Sep 2000 | A |
6130628 | Schneider-Hufschmidt et al. | Oct 2000 | A |
6169538 | Nowlan et al. | Jan 2001 | B1 |
6172625 | Jin et al. | Jan 2001 | B1 |
6178401 | Franz et al. | Jan 2001 | B1 |
6204848 | Nowlan et al. | Mar 2001 | B1 |
6208966 | Bulfer | Mar 2001 | B1 |
6219731 | Gutowitz | Apr 2001 | B1 |
6223059 | Haestrup | Apr 2001 | B1 |
6286064 | King et al. | Sep 2001 | B1 |
6304844 | Pan et al. | Oct 2001 | B1 |
6307548 | Flinchem et al. | Oct 2001 | B1 |
6307549 | King et al. | Oct 2001 | B1 |
6346894 | Connolly et al. | Feb 2002 | B1 |
6362752 | Guo et al. | Mar 2002 | B1 |
6363347 | Rozak | Mar 2002 | B1 |
6377965 | Hachamovitch et al. | Apr 2002 | B1 |
6392640 | Will | May 2002 | B1 |
6407679 | Evans et al. | Jun 2002 | B1 |
6421672 | McAllister et al. | Jul 2002 | B1 |
6424743 | Ebrahimi | Jul 2002 | B1 |
6453281 | Walters et al. | Sep 2002 | B1 |
6466232 | Newell et al. | Oct 2002 | B1 |
6502118 | Chatterjee | Dec 2002 | B1 |
6542170 | Williams et al. | Apr 2003 | B1 |
6559778 | Hillmering | May 2003 | B1 |
6567075 | Baker et al. | May 2003 | B1 |
6574597 | Mohri et al. | Jun 2003 | B1 |
6584179 | Fortier et al. | Jun 2003 | B1 |
6633846 | Bennett et al. | Oct 2003 | B1 |
6636162 | Kushler et al. | Oct 2003 | B1 |
6646573 | Kushler et al. | Nov 2003 | B1 |
6665640 | Bennett et al. | Dec 2003 | B1 |
6684185 | Junqua et al. | Jan 2004 | B1 |
6686852 | Guo | Feb 2004 | B1 |
6711290 | Sparr et al. | Mar 2004 | B2 |
6728348 | Deneberg et al. | Apr 2004 | B2 |
6734881 | Will | May 2004 | B1 |
6738952 | Yamamuro | May 2004 | B1 |
6751605 | Gunji et al. | Jun 2004 | B2 |
6757544 | Rangarajan et al. | Jun 2004 | B2 |
6789231 | Reynar et al. | Sep 2004 | B1 |
6801190 | Robinson et al. | Oct 2004 | B1 |
6801659 | O'Dell | Oct 2004 | B1 |
6807529 | Johnson et al. | Oct 2004 | B2 |
6848080 | Lee et al. | Jan 2005 | B1 |
6864809 | O'Dell et al. | Mar 2005 | B2 |
6885317 | Gutowitz | Apr 2005 | B1 |
6912581 | Johnson et al. | Jun 2005 | B2 |
6920420 | Lin | Jul 2005 | B2 |
6934564 | Laukkanen et al. | Aug 2005 | B2 |
6947771 | Guo et al. | Sep 2005 | B2 |
6955602 | Williams | Oct 2005 | B2 |
6956968 | O'Dell et al. | Oct 2005 | B1 |
6973332 | Mirkin et al. | Dec 2005 | B2 |
6982658 | Guo | Jan 2006 | B2 |
6985933 | Singhal et al. | Jan 2006 | B1 |
7006820 | Parket et al. | Feb 2006 | B1 |
7013258 | Su et al. | Mar 2006 | B1 |
7020849 | Chen | Mar 2006 | B1 |
7027976 | Sites | Apr 2006 | B1 |
7057607 | Mayoraz et al. | Jun 2006 | B2 |
7061403 | Fux | Jun 2006 | B2 |
7075520 | Williams | Jul 2006 | B2 |
7095403 | Lyustin et al. | Aug 2006 | B2 |
7098896 | Kushler et al. | Aug 2006 | B2 |
7107204 | Liu et al. | Sep 2006 | B1 |
7139430 | Sparr et al. | Nov 2006 | B2 |
7152213 | Pu et al. | Dec 2006 | B2 |
7224292 | Lazaridis et al. | May 2007 | B2 |
7256769 | Pun et al. | Aug 2007 | B2 |
7257528 | Ritchie et al. | Aug 2007 | B1 |
7263238 | Singh | Aug 2007 | B2 |
7272564 | Phillips et al. | Sep 2007 | B2 |
7313277 | Morwing et al. | Dec 2007 | B2 |
7349576 | Hotsberg | Mar 2008 | B2 |
7386454 | Gopinath et al. | Jun 2008 | B2 |
7387457 | Jawerth et al. | Jun 2008 | B2 |
7389235 | Dvorak | Jun 2008 | B2 |
7395203 | Wu et al. | Jul 2008 | B2 |
7437001 | Morwing et al. | Oct 2008 | B2 |
7466859 | Chang et al. | Dec 2008 | B2 |
7546529 | Reynar et al. | Jun 2009 | B2 |
7598890 | Park et al. | Oct 2009 | B2 |
7626574 | Kim | Dec 2009 | B2 |
7679534 | Kay et al. | Mar 2010 | B2 |
7712053 | Kay et al. | May 2010 | B2 |
7881936 | Longe et al. | Feb 2011 | B2 |
8036878 | Assadollahi | Oct 2011 | B2 |
8095364 | Longe et al. | Jan 2012 | B2 |
20020019731 | Masui et al. | Feb 2002 | A1 |
20020038207 | Mori et al. | Mar 2002 | A1 |
20020054135 | Noguchi et al. | May 2002 | A1 |
20020072395 | Miramontes | Jun 2002 | A1 |
20020097227 | Chu et al. | Jul 2002 | A1 |
20020119788 | Parupudi et al. | Aug 2002 | A1 |
20020123367 | Savolainen et al. | Sep 2002 | A1 |
20020126097 | Savolainen | Sep 2002 | A1 |
20020135499 | Guo | Sep 2002 | A1 |
20020145587 | Watanabe | Oct 2002 | A1 |
20020152075 | Kung et al. | Oct 2002 | A1 |
20020188448 | Goodman et al. | Dec 2002 | A1 |
20030011574 | Goodman | Jan 2003 | A1 |
20030023420 | Goodman | Jan 2003 | A1 |
20030023426 | Pun et al. | Jan 2003 | A1 |
20030036411 | Kraft | Feb 2003 | A1 |
20030054830 | Williams et al. | Mar 2003 | A1 |
20030078038 | Kurosawa et al. | Apr 2003 | A1 |
20030088398 | Guo et al. | May 2003 | A1 |
20030095102 | Kraft et al. | May 2003 | A1 |
20030101060 | Bickley | May 2003 | A1 |
20030104839 | Kraft et al. | Jun 2003 | A1 |
20030119561 | Hatch et al. | Jun 2003 | A1 |
20030144830 | Williams | Jul 2003 | A1 |
20030179930 | O'Dell | Sep 2003 | A1 |
20030193478 | Ng | Oct 2003 | A1 |
20030212563 | Ju et al. | Nov 2003 | A1 |
20040049388 | Roth et al. | Mar 2004 | A1 |
20040052355 | Awada et al. | Mar 2004 | A1 |
20040067762 | Balle | Apr 2004 | A1 |
20040104896 | Suraqui | Jun 2004 | A1 |
20040122666 | Ahlenius | Jun 2004 | A1 |
20040127197 | Roskind | Jul 2004 | A1 |
20040127198 | Roskind et al. | Jul 2004 | A1 |
20040135774 | La Monica | Jul 2004 | A1 |
20040140956 | Kushler et al. | Jul 2004 | A1 |
20040153963 | Simpson et al. | Aug 2004 | A1 |
20040153975 | Williams et al. | Aug 2004 | A1 |
20040155869 | Robinson et al. | Aug 2004 | A1 |
20040163032 | Guo et al. | Aug 2004 | A1 |
20040169635 | Ghassabian | Sep 2004 | A1 |
20040201607 | Mulvey et al. | Oct 2004 | A1 |
20040203656 | Andrew et al. | Oct 2004 | A1 |
20040243257 | Theimer | Dec 2004 | A1 |
20040259598 | Wagner et al. | Dec 2004 | A1 |
20040267528 | Roth et al. | Dec 2004 | A9 |
20050017954 | Kay et al. | Jan 2005 | A1 |
20050080625 | Bennett et al. | Apr 2005 | A1 |
20050114770 | Sacher et al. | May 2005 | A1 |
20060010206 | Apacible et al. | Jan 2006 | A1 |
20060028450 | Suraqui | Feb 2006 | A1 |
20060129928 | Qiu | Jun 2006 | A1 |
20060136408 | Weir et al. | Jun 2006 | A1 |
20060155536 | Williams et al. | Jul 2006 | A1 |
20060158436 | LaPointe et al. | Jul 2006 | A1 |
20060173807 | Weir et al. | Aug 2006 | A1 |
20060190822 | Basson et al. | Aug 2006 | A1 |
20060193519 | Sternby | Aug 2006 | A1 |
20060236239 | Simpson et al. | Oct 2006 | A1 |
20060239560 | Sternby | Oct 2006 | A1 |
20070094718 | Simpson | Apr 2007 | A1 |
20070203879 | Templeton-Steadman et al. | Aug 2007 | A1 |
20070276814 | Williams | Nov 2007 | A1 |
20070285397 | LaPointe et al. | Dec 2007 | A1 |
20080130996 | Sternby | Jun 2008 | A1 |
Number | Date | Country |
---|---|---|
0313975 | May 1989 | EP |
0319193 | Jun 1989 | EP |
0464726 | Jan 1992 | EP |
0540147 | May 1993 | EP |
0651315 | May 1995 | EP |
0660216 | Jun 1995 | EP |
0732646 | Sep 1996 | EP |
0751469 | Jan 1997 | EP |
1031913 | Aug 2000 | EP |
1035712 | Sep 2000 | EP |
1296216 | Mar 2003 | EP |
1320023 | Jun 2003 | EP |
1324573 | Jul 2003 | EP |
1341156 | Sep 2003 | EP |
1347361 | Sep 2003 | EP |
1347362 | Sep 2003 | EP |
1522920 | Apr 2005 | EP |
2298166 | Aug 1996 | GB |
2383459 | Jun 2003 | GB |
1986-282965 | Dec 1986 | JP |
A 1990-117218 | May 1990 | JP |
03-141460 | Jun 1991 | JP |
A 1993-265682 | Oct 1993 | JP |
8006939 | Jan 1996 | JP |
1997-134243 | May 1997 | JP |
A 1997-114817 | May 1997 | JP |
A 1997-212503 | Aug 1997 | JP |
11-312046 | Nov 1999 | JP |
W 2001-509290 | Jul 2001 | JP |
2001-224075 | Aug 2001 | JP |
2001-251395 | Sep 2001 | JP |
2002-014856 | Jan 2002 | JP |
2002-014956 | Jan 2002 | JP |
2002-141996 | May 2002 | JP |
A 2002-351862 | Dec 2002 | JP |
2003-116179 | Apr 2003 | JP |
2003-196273 | Jul 2003 | JP |
476033 | Feb 2002 | TW |
559783 | Nov 2003 | TW |
WO8200442 | Feb 1982 | WO |
WO-8200442 | Feb 1982 | WO |
WO9007149 | Jun 1990 | WO |
WO9627947 | Sep 1996 | WO |
WO9704580 | Feb 1997 | WO |
WO9705541 | Feb 1997 | WO |
WO 0035091 | Jun 2000 | WO |
WO03058420 | Jul 2003 | WO |
WO03060451 | Jul 2003 | WO |
WO-2004003721 | Jan 2004 | WO |
WO2004111871 | Jun 2004 | WO |
WO-2004110040 | Dec 2004 | WO |
WO2004111812 | Mar 2006 | WO |
WO2006026908 | Mar 2006 | WO |
Entry |
---|
Dey, A.K. and Abowd, G.D. (1999). Towards a better understanding of context and context-awareness. GVU Technical Report GIT-GVU-99-22, GVU Center, 1999. |
P.Coppola, et al. MoBe: a framework for context-aware mobile applications. In: Proc. of Workshop on Context Awareness for Proactive Systems (CAPS2005), Helsinki University Press, 2005; ISBN: 952-10-2518-2. |
A. Schmidt, et al. Advanced interaction in context. In Proceedings of First International Symposium on Handheld and Ubiquitous Computing, pp. 89-101, Karlsruhe, Germany, Sep. 1999. |
D.P. Siewiorek, et al. SenSay: a context-aware mobile phone. In Proceedings of the 7th IEEE International Symposium on Wearable Computers, pp. 248-249. IEEE Press, 2003. |
Ajioka, Y. Anzai, Y. “Prediction of Nexet Alphabets and Words of Four Sentences by Adaptive Injunctions” IJCNN-91-Seattle: Int'l Joint Conference on Neural Networks (Cat. No. 91CH3049-4) p. 897, vol. 2; IEEE, NY, NY 1991 USA. |
Martin, T.Azvine, B., “Learning User Models for an Intelligent Telephone Assistant”; Proceedings Joint 9th IFSA World Congress and 20th NAFIPS Intnl. Conf. (Cat. No. 01TH8569) Part vol. 2, p. 669-674 vol. 2; IEEE 2001, Piscataway, NJ, USA. |
Yang, Y., Pedersen, J., “A Comparative Study on Feature Selection in Text Categorization”; 1997; Proceedings of ICML'1997; pp. 412-420. |
Kronlid, F., Nilsson, V. “TreePredict, Improving Text Entry on PDA's”; 2001; Proceedings of the Conf. on Human Factors in Computing Systems (CHI2001), ACM press, pp. 441-442. |
Zernik, U., “Language Acquisition: Coping with Lexical Gaps”, Aug. 22-27, 1988; Proceedings for the 12th Int'l Conf. on Computational Linguistics; Budapest, Hungary, pp. 796-800. |
Gavalda, M. “Epiphenomenal Grammar Acquisition with GSG”; May 2000; Proceedings of the Workshop on Conversational Systems of the 6th Conf. on Applied Natural Language Processing and the 1st Conf. of the N. American Chapter of the Assoc. for Computational Linguistics (ANLP/NAACL-2000), Seattle, Washington. |
Cockburn, A., Siresena, “Evaluating Mobile Text Entry with Fastap™ Keyboard”; 2003; People and Computers XVII (vol. 2): British Computer Society conf. on Huma computer Interaction. Bath, England. pp. 77-80. |
Butts, L., Cockburn, A., “An Evaluation of Mobile Phone Text Input Methods”, University of Canterbury, Dept of Computer Science, Christchurch, New Zealand AUIC2002, Melbourne Australia, Conferences in Research and Practice in Information Technology, vol. 7; Copyright 2001, Australian Computer Society. |
Shieber, S., Baker, E., “Abbreviated Text Input”, Jan. 12-15, 2003; Harvard University, Cambridge, MA, USA shieber@deas.harvard.edu ellie@eecs.harvard.edu; IUI'03, ACM 1-58113-586-6/3/0001. |
Rosa, J. “Next Word Prediction in a Connectional Distributed Representation System”; 2002 IEEEE Intnl Conference on Systems, man and Cybernetics; Conf. Proceedings (Cat. No. 02CH37349) Part vol. 3, p. 6, Yasmine Hammamet, Tunisia, Oct. 2002. |
Rosa, J., “A Biologically Motivated Connectionist System for Predicting the Next Word in Natural Language Sentences”, 2002 Ieeee Intnl Conference on Systems, man and Cybernetics; Conf. Proceedings (Cat. No. 02CH37349) Part vol. 4, p. 6, Yasmine Hammamet, Tunisia, Oct. 2002. |
Motorola Lexicus Technologies & SOK's iTAP page; Sep. 2002; retrieved from: vvww.motorola.com/lexicus/html/itap—FAQ.html. |
MacKenzie, et al.; “TextEntry for Mobile Computing: Models and Methods, Theory and Practice”; Sep. 2002; retrieved from website: www.yorku.ca/mack/hci3.html. |
Arnott, J.L., et al; Probabilistic Character Disambiguation for Reduced Keyboards Using Small Text Samples; Dept. Math & comp. Sci.; Univ of Dundee, Dundee, Tayside, Scotland; AAC Augmentative and Alternative Communication ; vol. 8, Sep. 1992; Copyright 1992 by ISAAC. |
Demasco, Patrick W., et al., “Generating Text From Compressed Input: An Intelligent Interface for People with Sever Motor Impairments”, Communications of the ACM, vol. 35 No. 5, May 1992, pp. 68-78. |
James, Christina L., et al., “Text Input for Mobile Devices: Comparing Model Prediction to Actual Performance”, SIGCHI '01, Seattle, WA, Mar. 31-Apr. 4, 2001, pp. 365-371 [ACM 1-58113-327-8/01/0003]. |
MacKenzie, I. Scott, et al., “LetterWise: Prefix-based Disambiguation for Mobile Text Input”, UIST '01, Orlando, FL, Nov. 11-14, 2001, pp. 111-120 [ACM 1-58113-438-x/01/11]. |
Xu, Jinxi, et al., “Corpus-Based Stemming Using Cooccurrence of Word Variants”, ACM Transactions on Information Systems, vol. 16 No. 1, Jan. 1998, pp. 61-81 [ACM 1046-8188/98/0100-0061]. |
Press Release from Tegic Communications, “America Online, Inc. Acquires Tegic Communications”, Dec. 1, 1999, pp. 1-3 (downloaded from: www.tegic.com/pressreleases/pr—aolacquisition.html). |
News Release from Zi Corporation, “Zi Claims Second Patent Victory Against Tegic Communications, a unit of AOL Time Warner”, Mar. 14, 2002, pp. 1-2 (downloaded from: www.zicorp.com/pressreleases/031402.html). |
Summary Judgment Orders, Zi Corporation, Inc. v. Tegic Communications, Inc., Mar. 13, 2002, pp. 1-7 (downloaded from: www.zicorp.com/pressreleases/031402.html). |
Silfverberg, Miika, et al., “Bringing Text Input Beyond the Desktop”, CHI 2000, The Hague, Amsterdam, Apr. 1-6, 2000, pp. 9-16 [ACM 1-58113-216-6/00/04]. |
“Latest Philips Wireless Handset Ships With T9 Text Input in China”, Business Wire, Nov. 9, 1999, pp. 1-2 (downloaded from: www.businesswire.com/webbox/bw.110999/193130342.htm). |
Tygran, Amalyan, “T9 or Text Predicative Input in Mobile Telephones”, Business Wire, Jul. 23, 2001, pp. 1-5 (downloaded from: web.archive.org/wweb/20010723054055/http://wvvw.digit-life.com/articles/mobilet9/). |
James, Christina, et al., “Bringing Text Input Beyond the Desktop”, CHI 2000, Seattle, WA, Apr. 1-6, 2000, pp. 49-50. |
Kushler, Cliff, “AAC Using a Reduced Keyboard”, downloaded from: www.dintne.jp/doc/english/Us—Eu/conf/csun—98/csun98—140.htm, Web Posted Mar. 3, 1998, pp. 1-4. |
http://www.pinyin.info/readings/texts/ideographic—myth.html. The Ideographic Myth. 1984. |
http://www.ling.upenn.edu/courses/Fall—2003/ling001/reading—writing.html. What is writing? Linguistics 001. Lecture 19. Reading and Writing 2003. |
Making multi-tap Intelligent; retrieved Feb. 7, 2006 from website: http://www.zicorp.com/ezitap.htm. |
Tapless ppd Gen3.0; retrieved Feb. 7, 2006 from website: http://www.tapless.biz/. |
WordLogic for Handheld Computers—http://web.archive.org/web/20051030092534/www.wordlogic.com/products-predictive-keyboard-handheld-prediction.asp ; Oct. 30, 2005; retrieved from webarchive.org. |
http://pitecan.com/OpenPOBox/info/index.html ; Jul. 23, 2001. |
Welcome to the Nuance Corporate Website; retrieved on Feb. 7, 2006 from website: http://www.nuance.com/. |
Suhm B., et al. “Multimodal Error Correction for Speech User Interfaces” ACM Transactions on Computer-Human Interaction, vol. 8. Mar. 2001. |
Oviatt,S. “Mutual Disambiguation of Recognition Errors in a Multimodal Architecture.” Chi 99. May 15-29, 1999. |
Foulds, R., et al. “Lexical Prediction Techniques Applied to Reduce Motor Requirements for Augmentative Communication,” RESNA 10th Annula Conference, San Jose, California, 1987, pp. 115-117. |
Foulds, R., et al., “Statistical Disambiguation of Multi-Character Keys Applied to Reduce Motor Requirements for Augmentative and Alternative Communication,” AAC Augmentative and Alternative Communication (1987), pp. 192-195. |
IBM Technical Disclosure Bulletin, “Speed Keyboard for Data Processor,” vol. 23, 3 pages, Jul. 1980. IBM Corp., 1993. |
Kamphuis, H., et al., “Katdas; A Small Number of Keys Direct Access System,” RESNA 12th Annual Conference, New Orleans, Louisiana, 1989, pp. 278-279. |
King, M.T., “JustType-Efficient Communication with Eight Keys,” Proceedings of the RESNA '95 Annual Conference, Vancouver, BC, Canada, 1995, 3 pages. |
Kreifeldt, J.G., et al., “Reduced Keyboard Designs Using Disambiguation,” Proceedings of the Human Factors Society 33rd Annual Meeting, 1989, pp. 441-444. |
Levine, S.H., “An Adaptive Approach to Optimal Keyboard Design for Nonvocal Communication,” IEEE, 1985, pp. 334-337. |
Levine, S.H., et al., “Adaptive Technique for Customized Interface Design With Application to Nonvocal Communication,” RESNA 9th Annual Conference, Minneapolis, Minnesota, 1986, pp. 399-401. |
Levine, S.H., et al., “Computer Disambiguation of Multi-Character Key Text Entry: An Adaptive Design Approach,” IEEE, 1986, pp. 298-301. |
Levine, S.H., et al., “Multi-Character Key Text Entry Using Computer Disambiguation,” RESNA 10th Annual Conference, San Jose, California, 1987, pp. 177-178. |
Matias, E., et al., “Half-QWERTY: Typing With One Hand Using Your Two-Handed Skills,” Conference Companion, CHI '94 (Apr. 24-28, 1994), pp. 51-52. |
Minneman, S.L., “A Simplified Touch-Tone Telecommunication Aid for Deaf and Hearing Impaired Individuals,” RESNA 8th Annual Conference, Memphis Tennessee, 1985, pp. 209-211. |
Oommen, B.J., et al., “Correction to ‘An Adaptive Learning Solution to the Keyboard Optimization Problem’.” IEEE Transactions on Systems, Man and Cybernetics, vol. 22, No. 5 (Oct. 1992) pp. 1233-1243. |
Smith, Sidney L., et al., “Alphabetic Data Entry Via the Touch-Tone Pad: A Comment,” Human Factors, 13(2), Apr. 1971, pp. 189-190. |
Sugimoto, M., et al., “SHK: Single Hand Key Card for Mobile Devices,” CHI 1996 (Apr. 13-18, 1996), pp. 7-8. |
Swiffin, A.L., et al., “Adaptive and Predictive Techniques in a Communications Prosthesis,” AAC Augmentative and Alternative Communication, (1987), pp. 181-191. |
Swiffin, A.L., et al., “PAL: An Effort Efficient Portable Communication Aid and Keyboard Emulator,” RESNA 8th Annual Conference, Memphis, Tennessee, 1985, pp. 197, 199. |
Witten, I.H., Principles of Computer Speech, New York: Academic Press, (1982), pp. 246-253. |
Sugimoto, Masakatsu; “Single Hand Input Scheme for English and Japanese Text”; Dec. 1997; Fujitsu Sci. Tech. J., vol. 33 No. 2, pp. 189-195. |
Masui, “POBox: An efficient Text Input Method for Handheld and Ubiquitous Computers”; Sep. 1999; in Proc. of the International Symposium on Handheld and Ubiquitious Computing (HUC '99), pp. 289-300. |
Number | Date | Country | |
---|---|---|---|
20060247915 A1 | Nov 2006 | US |
Number | Date | Country | |
---|---|---|---|
60504240 | Sep 2003 | US | |
60734840 | Nov 2005 | US | |
60110890 | Dec 1998 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10866634 | Jun 2004 | US |
Child | 11379747 | US | |
Parent | 10176933 | Jun 2002 | US |
Child | 10866634 | US | |
Parent | 09454406 | Dec 1999 | US |
Child | 10176933 | US |