Patent application number | Description | Published |
20080215311 | DISCRIMINATIVE TRAINING OF LANGUAGE MODELS FOR TEXT AND SPEECH CLASSIFICATION - Methods are disclosed for estimating language models such that the conditional likelihood of a class given a word string, which is very well correlated with classification accuracy, is maximized. The methods comprise tuning statistical language model parameters jointly for all classes such that a classifier discriminates between the correct class and the incorrect ones for a given training sentence or utterance. Specific embodiments of the present invention pertain to implementation of the rational function growth transform in the context of a discriminative training technique for n-gram classifiers. | 09-04-2008 |
20100318348 | APPLYING A STRUCTURED LANGUAGE MODEL TO INFORMATION EXTRACTION - One feature of the present invention uses the parsing capabilities of a structured language model in the information extraction process. During training, the structured language model is first initialized with syntactically annotated training data. The model is then trained by generating parses on semantically annotated training data enforcing annotated constituent boundaries. The syntactic labels in the parse trees generated by the parser are then replaced with joint syntactic and semantic labels. The model is then trained by generating parses on the semantically annotated training data enforcing the semantic tags or labels found in the training data. The trained model can then be used to extract information from test data using the parses generated by the model. | 12-16-2010 |
20100332313 | USER SELECTABLE ADVERTISING NETWORKS - The claimed subject matter provides a system and/or a method that facilitates user selectable advertising networks. Advertising content can be formed into cohesive subsets of advertising. These subsets can be related to criteria to facilitate selection between available subsets of advertising content. A selection component can facilitate selection of the available subsets of advertising content based on these criteria. The criteria can be related to user preferences. Further the criteria can relate to explicit user preferences such as opt-in or opt-out indicia. The user can be presented with more relevant advertising content where user selection of advertising networks occurs. | 12-30-2010 |
20120284247 | INTEGRATING APPLICATIONS WITHIN SEARCH RESULTS - Computer-readable media, computer systems, and computing methods are provided for implicitly discovering applications using a query or search results, where the query does not explicitly target a particular application. A search engine is used to receive a user-initiated query and to employ a keyword of the query to generate an initial set of search results. Characteristics of the search results are identified and applications that are relevant to the characteristics are determined. The determination of relevant applications include: accessing an application manifest that manages a mapping between applications and predefined characteristics; comparing the characteristics of the search results against the predefined characteristics of the application manifest to determine a match; and, when a match exists between the search-result characteristics and the predefined characteristics, identifying applications mapped to the matched characteristics as being relevant to the search results. These identified applications are presented in response to the query. | 11-08-2012 |
20120284256 | LOCATION-AWARE APPLICATION SEARCHING - Computer-readable media, computer systems, and computing methods are provided for implicitly discovering applications that have a corresponding location. Initially, an application manifest is constructed that maintains a mapping between apps and their respective geographic boundaries. In operation, upon detecting a location signal being transmitted from a mobile device, the location signal is employed to identify a set of valid applications. Generally, the location signal represents location-based information entered to or received from the mobile device. Identifying the set of valid applications involves comparing the location signal against the application manifest and, based on the comparison, designating those apps that are mapped to geographic boundaries that meet the location signal as the set of valid applications. Upon identifying the set of valid applications, a selection of apps included within the set of valid applications is sent to the mobile device for display to the user within a operational context. | 11-08-2012 |
20120323898 | SURFACING APPLICATIONS BASED ON BROWSING ACTIVITY - Applications are surfaced to a user during browsing without requiring a specific search by the user. The applications can be selected for surfacing to the user based on the network address entered into the address bar of a browser, the content of the page corresponding to the network address, or a combination thereof. Applications may be selected for surfacing based on a partial address entered into the address bar and/or based on the web page content that is currently visible in the browser display. | 12-20-2012 |
20130215125 | SURFACING BUSINESS APPLICATIONS BASED ON CALLING ACTIVITIES - Computer-readable media, computer systems, and computing methods are provided for discovering applications using phone-number information. Initially, an application uploaded to an application marketplace is targeted. Phone numbers associated with the targeted application are discovered by identifying attributes of the targeted application from metadata associated therewith in the application marketplace, and identifying the phone numbers that reach at least one business affiliated with the targeted application or are relevant to the identified attributes of the targeted application. The associated phone numbers are mapped to the targeted application and maintained within an application manifest. Upon detecting user-initiated call-based operation(s) at a client device, the phone number(s) involved in the call-based operation(s) are compared against the application manifest to determine relevant applications. The relevant applications are distributed to the client device for presentation within a phone-number context, such as placing an outgoing call, receiving an incoming call, or reviewing a call-history log. | 08-22-2013 |
Patent application number | Description | Published |
20080300872 | SCALABLE SUMMARIES OF AUDIO OR VISUAL CONTENT - Providing for browsing a summary of content formed of keywords that can scale to a user-defined level of detail is disclosed herein. Components of a system can include a summarization component that extracts keywords related to the content and associates the keywords with portions thereof, and a zooming component that displays a number of keywords based on a keyword/keyphrase relevance rank and a zoom factor. Additionally, a speech to text component can translate speech associated with the content into text, wherein the keywords are extracted from the translated text. Consequently, the claimed subject matter can present a variable hierarchy of keywords to form a scalable summary of such recorded content. | 12-04-2008 |
20090199235 | VIDEO CONTEXTUAL ADVERTISEMENTS USING SPEECH RECOGNITION - Embodiments of a computer-implemented advertisement display system are disclosed. In one embodiment, the system includes a speech recognition component that processes a video clip and produces a corresponding collection of speech recognition data indicative of an audio portion of the video clip. The system also includes a collection of advertising material. An advertisement selection component selects an advertisement from the collection of advertising material based on the corresponding collection of speech recognition data. The system also includes a display. An advertisement presentation component displays an indication of the selected advertisement on the display during a simultaneous display of the video clip. | 08-06-2009 |
20090203361 | PROVIDING RELEVANT ADVERTISEMENTS OR OTHER CONTENT BASED ON A COMMUNICATIONS IDENTIFIER - Described is a technology by which a communications identifier such as a telephone number is used in selecting relevant content (e.g., an advertisement) for outputting as audible and/or visible information to a destination device. The communications identifier is used like a search term/keyword to determine content relevant to that identifier. A telephone number may be the identifier, selected based on a partially-dialed or actually dialed number, or a user's current scrolling position among listed telephone numbers. A telephone number of an incoming call may be used as the identifier. Profile data and/or state data may be used in selecting relevant content. Some of the profile data may be mined based on previous user activities. In one example, the content may be provided via a remote source of the content, and used immediately or cached for later use (e.g., output). | 08-13-2009 |
20090265242 | PRIVACY-CENTRIC AD MODELS THAT LEVERAGE SOCIAL GRAPHS - The claimed subject matter relates to an architecture that can mitigate privacy concerns in connection with ad targeting or data collection. In particular, architecture can be included in a personal mobile communication device such as a cell phone. During communication transactions between the host device and a peer device, shared information can be extracted either from content included in the communication or from metadata. Based upon the shared information, a social graph maintained on the host device can be updated. In addition, the host device can receive a large set of ads and select or tailor a custom ad from the set based upon the social graph. | 10-22-2009 |
20110025816 | ADVERTISING AS A REAL-TIME VIDEO CALL - The claimed subject matter provides systems and/or methods that effectuate distribution of advertising as real-time video calls. The system can include devices that detect whether or not a mobile device associated with a user is in the vicinity of a retail establishment, ascertains whether or not the proximate mobile device is receptive to receipt of advertising from the retail establishment, negotiates with the mobile device to determine at least one user preference with respect to a real-time video call, and based on the ascertained user preferences, downloads the appropriate real-time video call to the mobile device and/or establishes a live audio-visual connection with a representative of the retail establishment, wherein during the live audio-visual connection negotiations between the user and the representative is effectuated and the user comprehends that they are communicating with a famous personality. | 02-03-2011 |
20120215630 | VIDEO CONTEXTUAL ADVERTISEMENTS USING SPEECH RECOGNITION - Embodiments of a computer-implemented advertisement display system are disclosed. In one embodiment, the system includes a speech recognition component that processes a video clip and produces a corresponding collection of speech recognition data indicative of an audio portion of the video clip. The system also includes a collection of advertising material. An advertisement selection component selects an advertisement from the collection of advertising material based on the corresponding collection of speech recognition data. The system also includes a display. An advertisement presentation component displays an indication of the selected advertisement on the display during a simultaneous display of the video clip. | 08-23-2012 |
Patent application number | Description | Published |
20110195726 | COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device. | 08-11-2011 |
20130097022 | COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device. | 04-18-2013 |
20150050911 | COMMERCIALLY SUBSIDIZED MOBILE COMMUNICATION DEVICES AND SERVICES - Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device. | 02-19-2015 |
Patent application number | Description | Published |
20080288519 | Format Negotiation for Media Remoting Scenarios - Format negotiation for media remoting involves at least one media data format. In an example embodiment, a media format negotiation for playing media data is begun between a server and a client. The media data format is transferred from the server to the client. A notification that indicates if an attempt at the client to construct a media topology responsive to the media data format was a success or a failure is transferred from the client to the server. Whether and/or how the media data is to be transferred from the server to the client may be impacted by the notification. | 11-20-2008 |
20090153585 | Changing Visual Content Communication - Techniques for presenting changing visual content, including video, animation and so on, as an overlay are discussed. Changing visual content, included in a visual presentation, may be identified from other visual elements included in the visual presentation. The changing visual content may be manipulated based on available resources associated with presenting the changing visual content as an overlay for a client. | 06-18-2009 |
20090193340 | Enabling a Graphical Window Modification Command to be Applied to a Remotely Generated Graphical Window - Techniques relating to enabling a graphical window modification command to be applied to a remotely generated graphical window are described. In one instance, a process detects a user command to modify a remotely generated application graphical window in a remote terminal session. The process determines whether to initiate the user command at a local machine upon which the remotely generated application graphical window is displayed or at a remote machine which generated the remotely generated application graphical window. | 07-30-2009 |
20090248802 | Systems and Methods for Managing Multimedia Operations in Remote Sessions - Techniques relating to managing multimedia transmissions in terminal services scenarios are described. In an example, a method sends a user-interface component from a server to a remote client. The exemplary method further streams a media component for presentation on the remote client in combination with the user-interface component and the media presentation is tracked but not displayed by the server. | 10-01-2009 |
20100077019 | REDIRECTION OF MULTIPLE REMOTE DEVICES - Example embodiments of the present disclosure provide techniques for multiple audio device capture and playback during a remote desktop session. A custom device manager may instantiate proxy audio input and output devices on the server corresponding to each real device on the client computer. The proxy devices may redirect their respective audio input and output data to the physical device on the client. In an embodiment, multiple audio devices may be instantiated during a remote session, and multiple independent audio streams may be redirected to the selected device on the client computer. | 03-25-2010 |
20110154214 | Offloading Content Retrieval And Decoding In Pluggable Content-Handling Systems - Systems, methods and computer-readable storage media are disclosed for offloading content retrieval and decoding in pluggable content-handling systems. This may be accomplished by the server sending the client a frame that comprises video as two parts—the un-decoded video data, and the rest of the frame. The client then uses the application content handler to decode video image corresponding to the video data and combine it with the rest of the frame to recreate the frame. The server may execute a proxy for content handler to perform the communications to retrieve the media. The client may execute content handler using a stub application that corresponds to content handler, such that operations content handler performs are performed as if it were interacting with the application. | 06-23-2011 |
20110219112 | DETECTION OF END-TO-END TRANSPORT QUALITY - In various embodiments, methods and systems are disclosed for the real time detection of network conditions in conjunction with a remote presentation protocol. The link quality may represent the quality of the end-to-end connection between client and server with upper and lower bounds on the injection of additional traffic used for measurement. In some embodiments, the measurement technique may be selected based on the type of measurement that is desired. Accuracy may be maintained by selecting the type of measurement used based on current and previous network conditions. In one embodiment, a state model is used to determine the frequency of measurement and to determine when the measurements have produced a stable estimate of the link quality. | 09-08-2011 |
20110219122 | REMOTE CONTENT CLASSIFICATION AND TRANSMISSION USING MULTIPLE TRANSPORT CHANNELS - In various embodiments, methods and systems are disclosed for the implementation of multiple transport channels between the client and server. Each of the channels may be adapted to efficiently communicate data for a particular data type and thus be particularly well suited for its data-element characteristics and the detected link characteristics between the client and server. | 09-08-2011 |
20120173739 | FORMAT NEGOTIATION FOR MEDIA REMOTING SCENARIOS - Format negotiation for media remoting involves at least one media data format. In an example embodiment, a media format negotiation for playing media data is begun between a server and a client. The media data format is transferred from the server to the client. A notification that indicates if an attempt at the client to construct a media topology responsive to the media data format was a success or a failure is transferred from the client to the server. Whether and/or how the media data is to be transferred from the server to the client may be impacted by the notification. | 07-05-2012 |
20130275495 | Systems and Methods for Managing Multimedia Operations in Remote Sessions - Techniques relating to managing multimedia transmissions in terminal services scenarios are described. In an example, a method sends a user-interface component from a server to a remote client. The exemplary method further streams a media component for presentation on the remote client in combination with the user-interface component and wherein the media presentation is tracked but not displayed by the server. | 10-17-2013 |
20140082061 | FORMAT NEGOTIATION FOR MEDIA REMOTING SCENARIOS - Format negotiation for media remoting involves at least one media data format. In an example embodiment, a media format negotiation for playing media data is begun between a server and a client. The media data format is transferred from the server to the client. A notification that indicates if an attempt at the client to construct a media topology responsive to the media data format was a success or a failure is transferred from the client to the server. Whether and/or how the media data is to be transferred from the server to the client may be impacted by the notification. | 03-20-2014 |
20140169207 | DETECTION OF END-TO-END TRANSPORT QUALITY - In various embodiments, methods and systems are disclosed for the real time detection of network conditions in conjunction with a remote presentation protocol. The link quality may represent the quality of the end-to-end connection between client and server with upper and lower bounds on the injection of additional traffic used for measurement. In some embodiments, the measurement technique may be selected based on the type of measurement that is desired. Accuracy may be maintained by selecting the type of measurement used based on current and previous network conditions. In one embodiment, a state model is used to determine the frequency of measurement and to determine when the measurements have produced a stable estimate of the link quality. | 06-19-2014 |
20150054835 | CHANGING VISUAL CONTENT COMMUNICATION - Techniques for presenting changing visual content, including video, animation and so on, as an overlay are discussed. Changing visual content, included in a visual presentation, may be identified from other visual elements included in the visual presentation. The changing visual content may be manipulated based on available resources associated with presenting the changing visual content as an overlay for a client. | 02-26-2015 |
Patent application number | Description | Published |
20090086640 | UNCOVERING THE DIFFERENCES IN BACKBONE NETWORKS - The claimed subject matter provides systems and/or methods that discover comparative differences in performance of Internet Service Provider networks. The system can include devices, components, and/or processes that partitions measurement processes into cycles and measures at least one Internet Service Provider network every cycle, develops and distributes to interrogation nodes a list of destination Internet Protocol (IP) addresses to interrogate, and utilizes results delivered or retrieved from interrogation nodes to generate a report on the comparative performance of Internet Service Provider networks queried. | 04-02-2009 |
20090086741 | UNCOVERING THE DIFFERENCES IN BACKBONE NETWORKS - The claimed subject matter provides systems and/or methods that uncovers detailed differences in the performance of different Internet Service Provider ISP) networks. The system can include components, devices, and/or processes that utilize a list of target Internet Service Provider (ISP) networks to create a list of Internet Protocol (IP) addresses to interrogate, distribute the list of addresses to measurement nodes and obtains in return probing results from the measurement nodes, the probing results employed thereafter to provide comparative performance metrics associated with the target Internet Service Provider (ISP) networks. | 04-02-2009 |
20090088089 | CONTROL CHANNEL NEGOTIATED INTERMITTENT WIRELESS COMMUNICATION - A dual mode communication device utilizes a control channel to exploit diversity, history, and context in advance of establishing a broadband data exchange session on a broadband but shorter range wireless data channel, maximizing productive use of such a session. Appropriate diversity for the negotiated session further enhance data transfer, including path diversity, radio technology diversity (e.g., WiMax, Wi-Fi, ultra wideband, Bluetooth), antenna diversity (e.g., MIMO), modulation diversity (e.g., rate selection for 802.11, or symbol length selection to combat multi-path fading), and frequency diversity (e.g., 2.4 GHz versus 5 GHz). Historical information about channel characteristics optimize the selection of channel parameters with respect to the diversity choices. In addition, context information such as location and speed can be used to categorize the historical information that is collected to further optimize channel parameters. | 04-02-2009 |
20090286534 | INTER-CONTROLLER ROAM MANAGEMENT AND PREDICTION FOR VOICE COMMUNICATIONS - A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point. | 11-19-2009 |
20090323600 | ADAPTING CHANNEL WIDTH FOR IMPROVING THE PERFORMANCE OF WIRELESS NETWORKS - The subject invention relates to a system and/or methodology that provide improved wireless networking performance by dynamically adapting the channel width. A dynamic adaptation component adjust the channel width based on at least one characteristic of a wireless network, the characteristics can include but are not limited to range, power consumption, throughput, signal to noise ratio (SNR), resilience to delay spread, data rate, and capacity. Additionally, an optimization component can determine an optimum channel width. | 12-31-2009 |
20100020774 | INTERACTIVE WiFi CONNECTIVITY FOR MOVING VEHICLES - Systems and methods are provided to enable high-performance Internet access on board moving vehicles using WiFi data communication protocols. In an illustrative implementation, an exemplary wireless data communications environment comprises a ViFi module, an instruction set comprising at least one instruction set to process data for wireless communication between a cooperating component onboard a moving vehicle and other cooperating wireless components, and one or more wide-area wireless communications links. In an illustrative operation, the ViFi module can perform one or more wireless communications techniques to exploit macro-diversity and opportunistic receptions by cooperating WiFi base stations to minimize disruptions for mobile clients. The exemplary ViFi module can communicate data to and from one or more cooperating WiFI base stations such that the one or more base stations can operatively opportunistically overhear a packet, and can probabilistically relay the packet to the intended next hop. | 01-28-2010 |
20100027419 | INVERSE MULTIPLEXING HETEROGENEOUS WIRELESS LINKS FOR HIGH-PERFORMANCE VEHICULAR CONNECTIVITY - Systems and methods are provided that enable high-performance Internet access on board moving vehicles. In an illustrative implementation, an exemplary wireless data communications environment comprises a PluriBus module, an instruction set comprising at least one instruction set to process data for wireless communication between a cooperating component onboard a moving vehicle and other cooperating wireless components, and one or more multiple wide-area wireless communications links. In an illustrative operation, the PluriBus module can perform one more wireless communications techniques comprising opportunistic erasure coding such that coded packets can be sent in the event that there are openings in the one or more wireless communication links' capacity and transmitting the data packets along the one or more wireless communications links that is estimated (e.g., in real time) to offer efficient delivery of data packets. | 02-04-2010 |
20100027563 | EVOLUTION CODES (OPPORTUNISTIC ERASURE CODING) PLATFORM - Systems and methods are provided that allow for the opportunistic erasure coding of data packets by employing an exemplary evolution code. In an illustrative implementation an exemplary computing environment comprises an evolution code engine and an instruction set comprising at least one instruction to instruct the evolution code to process data for communication between two or more components of the exemplary computing environment. The use of evolution coding mitigates packet losses along one or more communication paths. In an illustrative operation, coded packets are created by XOR-ing data packets together such that a coded packet can recover a lost data packet using other received packets. | 02-04-2010 |
20110032833 | OPTIMIZATION OF TRAFFIC ROUTING FOR DATA CENTER SERVICES - Techniques and systems for providing optimization of traffic routing for data centers are disclosed herein. In some embodiments, a method may include identifying a plurality of available source sites and paths or routes between an online service provider (OSP) and a destination prefix. A traffic manager may measure a cost for each of the plurality of available paths. In some instances, the traffic manager may also measure a performance value for each of the available paths. The traffic manager may then select one of the available source sites and paths as a preferred source site and path that has a minimized cost for an instance of the performance value when compared to other paths of the plurality of available source sites and paths. In further embodiments, the traffic manager may rewrite a routing table and DNS mapping to implement the preferred source site and path as the default source site and path between the OSP and the destination prefix. | 02-10-2011 |
20110087924 | Diagnosing Abnormalities Without Application-Specific Knowledge - Methods, articles, and systems for determining a probable cause of a component's abnormal behavior are described. To determine the probable cause, a computing device computes, for one or more pairs of components having dependency relationships, a likelihood that behavior of one component of a pair is impacting behavior of the other component of the pair. This computing is based on joint historical behavior of the pair of components. The computing device then determines that one of a plurality of components is a probable cause of the abnormal behavior based on the computed likelihoods. | 04-14-2011 |
20110246897 | INTERACTIVE VISUALIZATION TO ENHANCE AUTOMATED FAULT DIAGNOSIS IN NETWORKS - Described is a visual analytics system for network diagnostics. The visual analytics system obtains network diagnostic-related information from a diagnostic system. The visual analytics system includes an interactive user interface that displays the representations of network components, including network machines and, zero or more links between those components, (e.g., as appropriate based upon selection or dynamic conditions). The user interface includes a main network view that displays representations of network components, a diagnostics view that displays suggested diagnosis results obtained from the diagnostic system, and a performance counter view that displays performance counter data. User interaction with one of the views correspondingly changes the displays in the other views. The system allows effective exploration of multiple levels of detail, e.g., variable, component, edge level and network levels, for example, via flexible navigation across these levels from the top, the bottom, or anywhere in the middle, while retaining context. | 10-06-2011 |
20120079507 | MANAGEMENT AND MARKETPLACE FOR DISTRIBUTED HOME DEVICES - A home device management technique is described that allows a user to manage a network of distributed home devices. Special application modules, driver modules, and service exchange ports are employed. Each application modules implements some functionality in the home, preferably using one or more devices in the home distributed system. Each driver module provides the logic for operating one or multiple distributed home devices and is capable of receiving commands from application modules and sending them to devices, detecting events for an associated type of home device, translating the detected event into a format usable by the application modules and notifying the application modules of the events. Events are communicated between the application modules and the driver modules by using one or more service exchange ports. Access control policies are employed to control access to the home devices. The application and driver modules can be obtained over a network from a home marketplace that can also determine their compatibility and interoperability with the home devices. | 03-29-2012 |
20120239596 | CLASSIFICATION OF STREAM-BASED DATA USING MACHINE LEARNING - The described implementations relate to data classification. One implementation includes identifying one or more likely classifications for an incoming data item using an algorithm. The implementation can also include providing the one or more identified classifications to a user. A selection of an individual identified classification for the incoming data item can be received from the user. The algorithm can be refined to reflect the selection by the user. | 09-20-2012 |
20120324228 | PLATFORM THAT FACILITATES PRESERVATION OF USER PRIVACY - Described herein are technologies pertaining to preserving privacy of users of mobile computing devices. Two users of two mobile computing devices share a quantization scheme for quantizing location data using a predefined quantization interval. The two users additionally share a private key that is utilized to encrypt locations obtained by the two computing devices that have been quantized using the shared quantization scheme. Encrypted, quantized locations are compared in a cloud computing service in connection with answering location-based queries, where the comparison is undertaken without the cloud computing service decrypting the encrypted, quantized locations. | 12-20-2012 |
20130042154 | Adaptive and Distributed Approach to Analyzing Program Behavior - An analysis management system (AMS) is described that analyzes the in-field behavior of a program resource installed on a collection of computing devices, such as mobile telephone devices or the like. In operation, the AMS can instruct different devices to collect data regarding different observation points associated with the program resource, thus spreading the reporting load among the devices. Based on the data that is collected, the AMS can update a dependency graph that describes dependencies among the observation points associated with the program resource. The AMS can then generate new directives based on the updated dependency graph. The AMS can also use the dependency graph and the collected data to infer information regarding observation points that is not directly supplied by the collected data. | 02-14-2013 |
20130158974 | MODELING AND PREDICTING CONTROL SYSTEM BEHAVIOR THROUGH FAST-FORWARDING - Methods and systems for modeling and predicting control system behavior through fast-forwarding are provided herein. The method includes obtaining sets of equivalent inputs, time zones, and a user-defined stop time. The method also includes taking a primary checkpoint of a main instance of a control system in response to a user input. The method includes fast-forwarding the control system by generating a secondary instance from the main instance at the primary checkpoint and subjecting the secondary instance to each combination of an input from each of the sets of equivalent inputs in each time zone. The method includes taking a secondary checkpoint from the primary checkpoint for each combination. For each secondary checkpoint, the method includes fast-forwarding the control system by generating a tertiary instance from the secondary instance and subjecting the tertiary instance to each combination as long as a time does not exceed the user-defined stop time. | 06-20-2013 |
20130254749 | DYNAMICALLY PROVIDING APPLICATION ANALYTIC INFORMATION - Methods and systems for dynamically providing application analytic information are provided herein. The method includes inserting instrumentation points into an application file via an application analytic service and dynamically determining desired instrumentation points from which to collect application analytic data. The method also includes receiving, at the application analytic service, the application analytic data corresponding to the desired instrumentation points and analyzing the application analytic data to generate application analytic information. The method further includes sending the application analytic information to a client computing device. | 09-26-2013 |
20140093079 | SECURELY JOINING A SECURE WIRELESS COMMUNICATIONS NETWORK - Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network. | 04-03-2014 |
20140113623 | INTER-CONTROLLER ROAM MANAGEMENT AND PREDICTION FOR VOICE COMMUNICATIONS - A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point. | 04-24-2014 |
20140184803 | Secure and Private Tracking Across Multiple Cameras - A technique for multi-camera object tracking is disclosed that preserves privacy of imagery from each camera or group of cameras. This technique uses secure multi-party computation to compute a distance metric across data from multiple cameras without revealing any information to operators of the cameras except whether or not an object was observed by both cameras. This is achieved by a distance metric learning technique that reduces the computing complexity of secure computation while maintaining object identification accuracy. | 07-03-2014 |
20140195689 | SWAN: ACHIEVING HIGH UTILIZATION IN NETWORKS - Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer transferring it. A hierarchical system is utilized whereby requests from lower layers are aggregated before being provided to upper layers, and allocations received from upper layers are distributed to lower layers. To maximize network utilization, paths through the network are reconfigured by identifying specific types of packets that are to be flagged in a specific manner, and then by further identifying specific routing rules to be applied in the transmission of such packets. Network reconfiguration is performed on an incremental basis to avoid overloading a path, and capacity can be reserved along one or more paths to prevent such overloading. Background data is agnostic as to specific transmission times and is utilized to prevent overloading due to reconfiguration. | 07-10-2014 |
20140380282 | MONITORING MOBILE APPLICATION PERFORMANCE - Aspects of the subject disclosure are directed towards monitoring application performance during actual use, particularly mobile application performance. Described is instrumenting mobile application binaries to automatically identify a critical path in user transactions, including across asynchronous-call boundaries. Trace data is logged by the instrumented application to capture UI manipulations, thread execution, asynchronous calls and callbacks, UI updates and/or thread synchronization. The trace data is analyzed to assist developers in improving application performance. | 12-25-2014 |
Patent application number | Description | Published |
20090103481 | MAINTAINING MULTIPLE, SIMULTANEOUS WIRELESS NETWORK CONNECTIONS USING A SINGLE RADIO - A method and apparatus for managing simultaneous virtual connections with multiple wireless networks. A plurality of ports in a hardware driver may be each associated with a corresponding wireless network and maintain a unique MAC state relative to other ports. Each port may have a corresponding virtual NIC that communicates directly with the radio hardware via a hardware virtualization layer that multiplexes communication between the virtual NICs and the radio hardware. Simultaneous virtual connections may be made with one or more infrastructure networks or adhoc networks, and/or the computer may function as an access point for one or more of the networks. | 04-23-2009 |
20090254924 | OPERATING SYSTEM INTERFACES FOR VIRTUAL WIFI AND SOFTAP CAPABLE DRIVERS - Some embodiments of the invention provide an interface between programmed instructions (e.g., an operating system) and a miniport driver configured to communicate with radio hardware on a computer. The interface may include components operable to invoke various wireless connectivity-related functionality implemented by the radio hardware and/or miniport driver. The functionality may, for example, include a capability whereby the computer may maintain simultaneous connections on a plurality of wireless networks using a single radio, and/or a capability whereby the computer may function as an access point for a wireless network. | 10-08-2009 |
20090303921 | LOW COST MESH NETWORK CAPABILITY - A wireless device that utilizes a single network interface to simultaneously connect to an infrastructure network and a mesh network. The device has a driver layer with a media access control module for each network type. A multiplexing module and transceiver module within the driver can direct received information associated with one of the networks to an appropriate media access control and then to an appropriate network adapter. For transmitted data, the multiplexing module can receive data from the application layer through an appropriate network adapter and route it to an appropriate media access control module for processing. The processed data can be interleaved by the transceiver for transmission. | 12-10-2009 |
20100157960 | WIRELESS ACCESS POINT SUPPORTING CONTROL BY MULTIPLE APPLICATIONS - A computing device configurable as a wireless network access point that can be controlled from multiple applications. The computing device provides an interface through which applications may input commands to change the state of the access point. The interface responds to these commands and other events, such as association or disassociation of a wireless client, in a manner that does not disrupt the applications or devices using the access point. To determine an appropriate response to any event, the interface may maintain state information, including a count of the number of applications and/or wireless devices that have taken action indicating an operating state of the wireless access point. | 06-24-2010 |
20110142014 | REMOTE WIRELESS SERVICE INVOCATION WITH EFFICIENT POWER USE ON TARGET WIRELESS DEVICE - A protocol for operation of wireless devices enables a wireless device to remotely and securely invoke a service on a target wireless device without requiring the user of the target wireless device to take any action and without requiring the target wireless device to use power unnecessarily. Mutual authentication is executed while the target wireless device remains in a low power discoverable mode. The discoverable mode includes discovery windows separated by inactive windows when the radio of the target wireless device is powered down. | 06-16-2011 |
20110314326 | MONITORING SERVICE ENDPOINTS - Today, data networks are ever increasing in size and complexity. For example, a datacenter may comprise hundreds of thousands of service endpoints configured to perform work. To reduce network wide degradation, a load balancer may send work requests to healthy service endpoints, as opposed to unhealthy and/or inoperative service endpoints. Accordingly, among other things, one or more systems and/or techniques for monitoring service endpoints, which may be scalable for large scale networks, are provided. In particular, a consistent hash function may be performed to generate a monitoring scheme comprising assignments of service endpoints to monitoring groups. In this way, multiple monitoring components may monitor a subset of endpoints to ascertain health status. Additionally, the monitoring components may communicate between one another so that a monitoring component may know heath statuses of service endpoints both assigned and not assigned to the monitoring component. | 12-22-2011 |