This document describes a technique for processing voice commands in a voice activated computing system. In particular, the system processes the voice commands and generates responses that take into consideration a user location as well as user interests. The system processes the voice commands to identify requests and trigger keywords. Based on the request and the trigger keywords, the system can communicate with one or more service providers to determine a list of candidate content items. The system then selects one or a list of content items from the list of candidate content items based on the user location and the user interest. The system can also use the user location and the user interests as factors in a bidding process in whi...
This document describes computer-implemented systems, methods, devices, and techniques for identifyi...
Recognition of a person that issued a voice command is necessary for a device that implements a voic...
Abstract An enhanced location system uses both IP address (e.g., subnet) and user ID information (e....
This document describes a technique for processing voice commands in a voice activated computing sys...
This document describes a technique for processing voice commands in a voice activated computing sys...
This document describes a technique for processing voice commands received by a voice activated comp...
This document describes a technique for processing voice commands received by a voice activated comp...
This document describes a technique for processing voice commands in a voice activated computing sys...
This document describes a technique for processing voice commands received by a voice activated comp...
This document describes a technique for processing voice commands in a voice activated computing sys...
The present disclosure describes systems and methods that can determine a context of an audible quer...
Systems and methods described herein allow for providing enhanced sitelinks in the voice activated c...
This document describes a technique for managing multiple sensors in one or more devices carried by ...
Systems and methods described herein allow for monetization of a virtual personal assistant by offer...
The ability to track objects in real time offers a wide range of beneficial applications that includ...
This document describes computer-implemented systems, methods, devices, and techniques for identifyi...
Recognition of a person that issued a voice command is necessary for a device that implements a voic...
Abstract An enhanced location system uses both IP address (e.g., subnet) and user ID information (e....
This document describes a technique for processing voice commands in a voice activated computing sys...
This document describes a technique for processing voice commands in a voice activated computing sys...
This document describes a technique for processing voice commands received by a voice activated comp...
This document describes a technique for processing voice commands received by a voice activated comp...
This document describes a technique for processing voice commands in a voice activated computing sys...
This document describes a technique for processing voice commands received by a voice activated comp...
This document describes a technique for processing voice commands in a voice activated computing sys...
The present disclosure describes systems and methods that can determine a context of an audible quer...
Systems and methods described herein allow for providing enhanced sitelinks in the voice activated c...
This document describes a technique for managing multiple sensors in one or more devices carried by ...
Systems and methods described herein allow for monetization of a virtual personal assistant by offer...
The ability to track objects in real time offers a wide range of beneficial applications that includ...
This document describes computer-implemented systems, methods, devices, and techniques for identifyi...
Recognition of a person that issued a voice command is necessary for a device that implements a voic...
Abstract An enhanced location system uses both IP address (e.g., subnet) and user ID information (e....