About
Let's get it done!
I get things done, complex things, big things, often crazy hard…
Articles by Tom
Activity
-
AI mega-news! 💥: AI is now VASTLY better than most humans at a wide range of intellectually extremely difficult tasks that not long ago were…
AI mega-news! 💥: AI is now VASTLY better than most humans at a wide range of intellectually extremely difficult tasks that not long ago were…
Shared by Tom Celinski, PhD
-
I invite you to update your beliefs on the progress of AI asap. OpenAI's o3 can be considered a first AGI by various measures. Software engineering…
I invite you to update your beliefs on the progress of AI asap. OpenAI's o3 can be considered a first AGI by various measures. Software engineering…
Liked by Tom Celinski, PhD
Experience
Education
-
The Australian National University
-
Activities and Societies: ANU Jujutsu Club
• Accepted for post-graduate study at Oxford University, UK
• Chose to stay at ANU to study under Brenan McCarragher (ex-MIT)
• Published 11 peer-reviewed papers
• Presented at a number of leading international conferences. -
-
-
-
First person ever to be admitted to the ANU Distinguished Scholars Program in Computer Science (mentored by Prof. Richard Brent)
Publications
-
Learning and adaptation of sensory perception models in robotic systems
Proceedings of the 2000 IEEE International Conference on Robotics and Automation
Other authors -
Achieving efficient data fusion through integration of sensory perception control and sensor fusion
Proceedings of the1999 IEEE International Conference on Robotics and Automation
Other authors -
Determining the value of monitoring for dynamic monitor selection
Proceedings of the 1998 IEEE International Conference on Robotics and Automation
Other authors -
An adaptive sensory perception controller for robotic systems
Proceedings of the 2000 IEEE International Conference on Robotics and Automation
Other authors
Patents
-
Cameras and networked security systems and methods
US WO 2014144628 A3
A system includes a remote server and a device having a wireless transceiver, microphone, and processing circuit. The processing circuit is configured to monitor the microphone for a siren signature. The processing circuit is configured to use the wireless transceiver to send information to the remote server in response to a detection of the siren signature. The remote server causes wireless cameras located near the device to capture a current image and to send the captured image to the remote…
A system includes a remote server and a device having a wireless transceiver, microphone, and processing circuit. The processing circuit is configured to monitor the microphone for a siren signature. The processing circuit is configured to use the wireless transceiver to send information to the remote server in response to a detection of the siren signature. The remote server causes wireless cameras located near the device to capture a current image and to send the captured image to the remote server for further distribution.
-
Media data synchronization in a wireless network
US US 7539889 B2
A method of keeping global time in a wireless network, the method includes reading a Time Synchronization Function (TSF) to provide an initial time base. An interconnected clock control circuit is employed to read the TSF time from the circuitry used to read the TSF and to implement a local clock based on time values read from the TSF.
-
Media data transfer in a network environment
US US 8462627 B2
In a wireless network environment, a method of transmitting data from a source device to a set of sink devices, the method comprising the steps of: (a) initially the source device broadcasting packet data collectively to each of the sink devices; (b) the sink devices collecting packet data and identifying missing packets that have been missed; (c) upon a sink device detecting a missed a packet, the sink device separately requesting the transmission of the missed packet by the source device; and…
In a wireless network environment, a method of transmitting data from a source device to a set of sink devices, the method comprising the steps of: (a) initially the source device broadcasting packet data collectively to each of the sink devices; (b) the sink devices collecting packet data and identifying missing packets that have been missed; (c) upon a sink device detecting a missed a packet, the sink device separately requesting the transmission of the missed packet by the source device; and (d) the source device separately sending missed data packets.
-
Networked security system
US US 20160105847 A1
A method of communicating between a wireless security device and a security server through an access point includes estimating a link latency between a time of transmission of a message from the wireless security device and a time at which a response is received from the security server. A polling mode is enabled in which the access point will hold messages received by the access point that are directed to the wireless security device while the device is in a sleep state, without discarding the…
A method of communicating between a wireless security device and a security server through an access point includes estimating a link latency between a time of transmission of a message from the wireless security device and a time at which a response is received from the security server. A polling mode is enabled in which the access point will hold messages received by the access point that are directed to the wireless security device while the device is in a sleep state, without discarding the messages for a threshold period of time. The wireless security device may be placed in a sleep state and woken after a wake time determined based on the estimated link latency, and receives any messages received by the access point during the sleep state.
-
Networked security system
US WO 2014144601 A1
A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the security device, the registration request being encrypted using an initial registration key. A device identifier and rotation key unique to the security device are transmitted to the security device. A first session key request is received at the security server from the security device, the request being encrypted using the rotation key.…
A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the security device, the registration request being encrypted using an initial registration key. A device identifier and rotation key unique to the security device are transmitted to the security device. A first session key request is received at the security server from the security device, the request being encrypted using the rotation key. A first session key is transmitted to the security device in response. One or more communications, encrypted using the first session key, is received at the security server from the security device. A second session key request is received at the security server from the security device after the first session key has expired, the request encrypted using the rotation key. A second session key is transmitted to the security device in response.
-
Systems and methods for configuration of wireless camera
US 20160105406
Systems and methods for configuring a wireless camera to connect to a wireless access point are provided. The systems and methods include wirelessly connecting to a client device and transmitting an encryption key to the client device. The systems and methods also include receiving encrypted data from the client device and decrypting the data using the encryption key. The encrypted data may include an identifier and an access code. The systems and methods further include wirelessly connecting…
Systems and methods for configuring a wireless camera to connect to a wireless access point are provided. The systems and methods include wirelessly connecting to a client device and transmitting an encryption key to the client device. The systems and methods also include receiving encrypted data from the client device and decrypting the data using the encryption key. The encrypted data may include an identifier and an access code. The systems and methods further include wirelessly connecting to the wireless access point using the decrypted data.
-
Unification of multimedia devices
US US 7987294 B2
Described herein are various methods and systems relating to the unification of media devices, and more specifically to the provision of wireless audio systems. In overview, two or more wireless speaker subsystem units substantially autonomously form a single wireless audio system having its own control interface. This control interface is used to apply operational changes across the wireless audio system, such as volume adjustment. That is, an operational change may be applied to the system as…
Described herein are various methods and systems relating to the unification of media devices, and more specifically to the provision of wireless audio systems. In overview, two or more wireless speaker subsystem units substantially autonomously form a single wireless audio system having its own control interface. This control interface is used to apply operational changes across the wireless audio system, such as volume adjustment. That is, an operational change may be applied to the system as a whole, and this change is subsequently implemented by each of the individual wireless speaker subsystem units.
Languages
-
English
Native or bilingual proficiency
-
Polish
Native or bilingual proficiency
-
German
Elementary proficiency
Recommendations received
16 people have recommended Tom
Join now to viewMore activity by Tom
-
The AI march towards general intelligence continues. Are we there? No. Does it matter? NO! Why not? Because these systems are incredibly useful…
The AI march towards general intelligence continues. Are we there? No. Does it matter? NO! Why not? Because these systems are incredibly useful…
Shared by Tom Celinski, PhD
-
This is definitely worth your time if you carry weather risk exposure!
This is definitely worth your time if you carry weather risk exposure!
Shared by Tom Celinski, PhD
-
𝗧𝗵𝗶𝘀 𝗶𝘀 𝗵𝗮𝗻𝗱𝘀-𝗱𝗼𝘄𝗻 𝗼𝗻𝗲 𝗼𝗳 𝘁𝗵𝗲 𝗕𝗘𝗦𝗧 𝗮𝗻𝗱 𝗦𝗜𝗠𝗣𝗟𝗘𝗦𝗧 𝗶𝗹𝗹𝘂𝘀𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗼𝗳 𝗠𝗟𝗢𝗽𝘀 𝘆𝗼𝘂'𝗹𝗹 𝗲𝘃𝗲𝗿…
𝗧𝗵𝗶𝘀 𝗶𝘀 𝗵𝗮𝗻𝗱𝘀-𝗱𝗼𝘄𝗻 𝗼𝗻𝗲 𝗼𝗳 𝘁𝗵𝗲 𝗕𝗘𝗦𝗧 𝗮𝗻𝗱 𝗦𝗜𝗠𝗣𝗟𝗘𝗦𝗧 𝗶𝗹𝗹𝘂𝘀𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗼𝗳 𝗠𝗟𝗢𝗽𝘀 𝘆𝗼𝘂'𝗹𝗹 𝗲𝘃𝗲𝗿…
Liked by Tom Celinski, PhD
-
And this is exactly why companies / start-ups that don't own, high quality, unique, valuable datasets will not make it (or at least not make it big)…
And this is exactly why companies / start-ups that don't own, high quality, unique, valuable datasets will not make it (or at least not make it big)…
Shared by Tom Celinski, PhD
-
2 days ago, one of our customers asked us: ⁉️ How do you get building entrances out of all the data we send to you? ⁉️ Do you use building…
2 days ago, one of our customers asked us: ⁉️ How do you get building entrances out of all the data we send to you? ⁉️ Do you use building…
Liked by Tom Celinski, PhD
-
You think GenAI is all hype? I humbly disagree - just take a look at this!
You think GenAI is all hype? I humbly disagree - just take a look at this!
Shared by Tom Celinski, PhD
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More