Patent application number | Description | Published |
20080200181 | Self-Configuring Wireless Network Location System - Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor signals transmitted by one or more transceiver devices and records information about these signals. One or more analysis or inference engines may be deployed to obtain the recorded signal information and the air monitor locations to determine a location of the one or more wireless transceivers devices deployed in the environment. | 08-21-2008 |
20080201109 | Wireless Performance Analysis System - Wireless adapters are installed on one or more general purpose computing devices and are connected via a wireless network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor wireless signals transmitted between transceiver devices and access points and records information about these signals. One or more analysis or inference engines may be deployed to analyze the signals received from the air monitors to obtain optimum performance and connectivity information about the wireless network. | 08-21-2008 |
20080209273 | Detect User-Perceived Faults Using Packet Traces in Enterprise Networks - Exemplary methods, computer-readable media, and systems for detecting a fault by a packet trace, includes monitoring at least one packet transmitted to or received from, an computing device of an end user, between one or more computing devices implementing at least one of a service or an application on an enterprise network. The process also includes identifying whether an abnormal condition occurred on the computing device of the end user based on monitoring at least one packet transmitted to or received from, the computing device of the end user; and detecting a fault by using an algorithm based on monitoring at least one packet transmitted or received from, the computing device of the end user; wherein the fault indicates a desired course of action did not occur while the computing device of the end user uses at least one of the service or the application in the enterprise network. | 08-28-2008 |
20080222068 | Inferring Candidates that are Potentially Responsible for User-Perceptible Network Problems - Candidates that are potentially responsible for user-perceptible network problems may be inferred. In an example embodiment, a system includes an inference engine to produce a list of candidates that are potentially responsible for user-perceptible network problems, with the candidates being network components that may include both services and network elements. A response to a service request may be a non response, an incorrect response, an untimely correct response, or a timely correct response. The user-perceptible network problems may include the untimely correct response as well as the non response and the incorrect response. In another example embodiment, a method includes monitoring a network and producing a list of candidates that are potentially responsible for user-perceptible network problems. The candidates of the list may include both services and network elements of the monitored network. | 09-11-2008 |
20080222287 | Constructing an Inference Graph for a Network - Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components. | 09-11-2008 |
20080247344 | Signaling Over Cellular Networks to Reduce the Wi-Fi Energy Consumption of Mobile Devices - Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged in a voice over internet protocol (VoIP) call via the Wi-Fi interface. When a VoIP call is initiated on the device, or when the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is automatically enabled. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point. The server then initiates a direct call, wherein VoIP technology is used by the mobile device, between the mobile device and a VoIP calling device. | 10-09-2008 |
20080248749 | SIGNALING OVER CELLULAR NETWORKS TO REDUCE THE WI-FI ENERGY CONSUMPTION OF MOBILE DEVICES - Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged. When the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is enabled if the device answers the wake up call and the Wi-Fi interface is available. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point. | 10-09-2008 |
20080279101 | Context-Based Routing in Multi-hop Networks - Context-based routing in multi-hop networks involves using a context-based routing metric. In a described implementation, respective path values are calculated for respective ones of multiple paths using the context-based routing metric. A path is selected from the multiple paths responsive to the calculated path values. Data is transmitted over at least one link of the selected path. In an example embodiment, the context-based routing metric is ascertained responsive to an estimated service interval (ESI) of a bottleneck link of each path of the multiple paths. In another example embodiment, the context-based routing metric is ascertained responsive to an expected resource consumption (ERC) metric. In an example embodiment of path selection, the path is selected using a context-based path pruning (CPP) technique that involves maintaining multiple local contexts at each intermediate node, with each local context representing at least one partial path. | 11-13-2008 |
20080316982 | Managing Dense Wireless Access Point Infrastructures in Wireless Local Area Networks - Techniques for enhancing the throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent the discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using central policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN—without interrupting/disrupting the client device's access. | 12-25-2008 |
20080320108 | Management Policies For Dense Wireless Access Point Infrastructures in Wireless Local Area Networks - Techniques for enhancing the throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent the discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using certain policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN—without interrupting/disrupting the client device's access. | 12-25-2008 |
20090034457 | Dynamic Channel-Width Allocation in Wireless Networks - Techniques for enhancing throughput capacity and/or bandwidth distribution fairness among APs in a wireless network are described. Specifically, a channel frequency profile which includes a center frequency and channel-width (i.e., channel bandwidth) is dynamically assigned to each of one or more APs in a wireless network. The assigned channel frequency profile for each AP is based, at least in part, on the current composition of the wireless network including, its topology and traffic load distribution. In this regard, each AP's channel frequency profile can be continuously or periodically changed such that the entire available frequency spectrum is effectively utilized and/or interference between APs is avoided or limited. This, in turn, enhances the throughput capacity and/or bandwidth distribution fairness of the wireless network. | 02-05-2009 |
20090088089 | CONTROL CHANNEL NEGOTIATED INTERMITTENT WIRELESS COMMUNICATION - A dual mode communication device utilizes a control channel to exploit diversity, history, and context in advance of establishing a broadband data exchange session on a broadband but shorter range wireless data channel, maximizing productive use of such a session. Appropriate diversity for the negotiated session further enhance data transfer, including path diversity, radio technology diversity (e.g., WiMax, Wi-Fi, ultra wideband, Bluetooth), antenna diversity (e.g., MIMO), modulation diversity (e.g., rate selection for 802.11, or symbol length selection to combat multi-path fading), and frequency diversity (e.g., 2.4 GHz versus 5 GHz). Historical information about channel characteristics optimize the selection of channel parameters with respect to the diversity choices. In addition, context information such as location and speed can be used to categorize the historical information that is collected to further optimize channel parameters. | 04-02-2009 |
20090135751 | Low Power Operation of Networked Devices - Methods of reducing power consumption of networked devices are described. When a main processor and associated hardware in a computing device is powered down, a processing element, with lower power consumption than the main processor, performs networking functions on behalf of the main processor. The processing element monitors events and wakes the main processor when defined criteria are satisfied. In an embodiment, these network functions may be to maintain existing network connections and/or establish new network connections and the defined criteria may relate to messages received by the device which are analyzed by the processing element running the application layer code and these criteria may be configurable by a user of the device. | 05-28-2009 |
20090185514 | WIRELESS COMMUNICATIONS ENVIRONMENT OVERLAY - A method is provided, wherein the method comprises identifying nearby wireless communication access points (APs) to which a client computing environment can cooperate with to communicate and receive data through a subscription to a neighborcast group from indentified nearby cooperating access points such that illustratively the neighborcast group comprises a communications overlay between cooperating client computing environments employing the identified nearby wireless communications access points. In an illustrative implementation, a wireless communications environment comprises at least two client computing environments comprising a communications overlay engine operable to process at least one instruction from an exemplary instruction set to perform one or more wireless communications operations over the exemplary communications overlay comprising scanning for cooperating client computing environments and/or wireless access points and/or RSS servers, subscribing to the communications overlay group, and publishing data for consumption by cooperating components of the wireless communications overlay. | 07-23-2009 |
20090323600 | ADAPTING CHANNEL WIDTH FOR IMPROVING THE PERFORMANCE OF WIRELESS NETWORKS - The subject invention relates to a system and/or methodology that provide improved wireless networking performance by dynamically adapting the channel width. A dynamic adaptation component adjust the channel width based on at least one characteristic of a wireless network, the characteristics can include but are not limited to range, power consumption, throughput, signal to noise ratio (SNR), resilience to delay spread, data rate, and capacity. Additionally, an optimization component can determine an optimum channel width. | 12-31-2009 |
20100023788 | Reducing Power Consumption by Offloading Applications - Methods of reducing power consumption in a computing device are described in which file sharing applications which are running in the background are offloaded onto a lower power subsystem and the rest of the computing device can be put into a low power state. The lower power subsystem runs application stubs which autonomously execute a subset of the operations performed by a file sharing application which was previously running on the computing device. Before the rest of the computing device goes into the low power state, application state information is passed to the lower power subsystem for use by the application stubs. In an example, the application stub may continue to download files whilst the rest of the computing device is in standby or is shutdown and the application state information may include details of the files that are to be downloaded. | 01-28-2010 |
20100074125 | DISCOVERING COMMUNICATION RULES IN A NETWORK TRACE - The claimed subject matter provides a system and/or a method that facilitates managing a network by mining a communication rule. An analysis engine can employ a packet trace within a network in order to provide timing information, wherein the network includes at least one of a host, a protocol, or an application. A traffic evaluator can extract a communication rule for the network based upon an activity matrix generated from the timing information in which the activity matrix includes at least one of a row of a time window for the packet trace and a column for a flow in the packet trace. | 03-25-2010 |
20100105409 | PEER AND COMPOSITE LOCALIZATION FOR MOBILE APPLICATIONS - A system and method for peer based localization system using radio technology, such as Bluetooth or Wi-Fi ad-hoc technology that enables mobile devices such as cell phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, etc. to discover their physical location relative to one another. In addition, the peer based localization can use a plurality of radio technologies to increase the accuracy of the physical location estimates. Additionally or alternatively, the peer based localization technique can be combined with infrastructure based location techniques, such as triangulation, GPS, or infrastructure based Wi-Fi localization in order to transpose virtual coordinates into physical coordinates. | 04-29-2010 |
20100128628 | Context-Based Routing in Multi-hop Networks - Context-based routing in multi-hop networks involves using a context-based routing metric. In a described implementation, respective path values are calculated for respective ones of multiple paths using the context-based routing metric. A path is selected from the multiple paths responsive to the calculated path values. Data is transmitted over at least one link of the selected path. In an example embodiment, the context-based routing metric is ascertained responsive to an estimated service interval (ESI) of a bottleneck link of each path of the multiple paths. In another example embodiment, the context-based routing metric is ascertained responsive to an expected resource consumption (ERC) metric. In an example embodiment of path selection, the path is selected using a context-based path pruning (CPP) technique that involves maintaining multiple local contexts at each intermediate node, with each local context representing at least one partial path. | 05-27-2010 |
20100179753 | Estimating Time Of Arrival - Described herein is a system that includes a location determiner component that receives a first geographic location of a personal computing device of a first individual, wherein the first geographic location is indicative of a current geographic location of the first individual. The system also includes an estimator component that receives a second geographic location that is different from the first geographic location. The estimator component determines an estimated time of arrival for the first individual at the second geographic location based at least in part upon the received first geographic location, wherein the estimator component outputs the estimated time of arrival to a second individual. | 07-15-2010 |
20100301992 | Channel Discovery and Disconnection in Networks Over White Spaces and Other Portions of the Spectrum - Functionality is described for discovering a channel within an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by investigating spectrum units within the spectrum for the presence of the channel. In one case, the functionality operates by investigating the spectrum units in linear succession; in another case, the functionality advances in a staggered fashion over the available spectrum. Functionality is also described for handling disconnection by a node from a channel. The functionality allows the node to convey its disconnection status to other communication participants. In one case, various aspects of the functionality are implemented by performing analysis in the time domain. | 12-02-2010 |
20100304678 | Spectrum Assignment for Networks Over White Spaces and Other Portions of the Spectrum - Functionality is described by selecting a channel in an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by identifying spectrum that is available to all nodes involved in communication (where the nodes are associated with non-privileged entities). The functionality then generates a suitability assessment for each candidate channel within the available spectrum. The functionality selects a channel having the most desirable suitability assessment. The functionality can form a suitability assessment for a candidate channel of arbitrary width, e.g., by combining suitability assessments associated with constituent spectrum units within the candidate channel. | 12-02-2010 |
20110032892 | DYNAMIC TIME-SPECTRUM BLOCK ALLOCATION FOR COGNITIVE RADIO NETWORKS - Dynamic time-spectrum block allocation for cognitive radio networks is described. In one implementation, without need for a central controller, peer wireless nodes collaboratively sense local utilization of a communication spectrum and collaboratively share white spaces for communication links between the nodes. Sharing local views of the spectrum utilization with each other allows the nodes to dynamically allocate non-overlapping time-frequency blocks to the communication links between the nodes for efficiently utilizing the white spaces. The blocks are sized to optimally pack the available white spaces. The nodes regularly readjust the bandwidth and other parameters of all reserved blocks in response to demand, so that packing of the blocks in available white spaces maintains a fair distribution of the overall bandwidth of the white spaces among active communication links, minimizes finishing time of all communications, reduces contention overhead among the nodes contending for the white spaces, and maintains non-overlapping blocks. | 02-10-2011 |
20110211517 | EFFICIENT AND RELIABLE MULTICAST OVER A Wi-Fi NETWORK - A “Wi-Fi Multicaster” provides a practical and efficient Wi-Fi multicast system for environments having potentially large numbers of Wi-Fi clients. Significantly, the Wi-Fi Multicaster does not require any changes to the 802.11 protocol, or to the underlying Wi-Fi infrastructure. In various embodiments, the Wi-Fi Multicaster uses pseudo-broadcast, and augments it with destination control, association control and optional proactive FEC (forward error correction) to improve multicast performance. More specifically, the Wi-Fi Multicaster system converts multicast packets to targeted unicast transmissions. To minimize the amount of airtime consumed, the Wi-Fi Multicaster uses destination control in combination with various algorithms for association control. Further, in various embodiments, the Wi-Fi Multicaster includes an adaptive, proactive FEC scheme to reduce overall packet losses. Finally, to overcome the challenges posed by encryption protocols such as 802.1x, the Wi-Fi Multicaster uses a “virtual multicast interface” that allows clients to “share” a common key for each multicast. | 09-01-2011 |
20110231469 | ENERGY-AWARE CODE OFFLOAD FOR MOBILE DEVICES - A method described herein includes an act of, at a mobile computing device, receiving an indication that a portion of code of a program executing on the mobile computing device is to be offloaded to a second computing device for execution on the second computing device, wherein the indication is based at least in part upon an estimated energy savings of the mobile computing device by offloading the portion of the code for execution on the second computing device. The method also includes an act of transmitting data to the second computing device that causes the second computing device to execute the portion of the code. | 09-22-2011 |
20110271345 | DETECTION OF ROGUE WIRELESS DEVICES FROM DYNAMIC HOST CONTROL PROTOCOL REQUESTS - A method to determine if a rogue device is connected to a specific wired network from dynamic host control protocol (DHCP) requests on the wired network. These DHCP requests are analyzed to determine the type of device issuing the request. Once the type of device has been determined, it can be checked against a list of authorized device types. If the device issuing the DHCP request is not an authorized device type, then it can be determined that the suspect device is a rogue that is connected to the specific wired network. Additionally, even if the system of the present invention determines that it is an authorized device type, if the device is not one of the few authorized devices of this type, e.g. because its MAC address is not recognized as that of one of the authorized devices, the system can flag the suspect as a rogue. | 11-03-2011 |
20110306375 | TRANSMITTING DATA IN A WIRELESS WHITE SPACE NETWORK - There is provided a computer-implemented method for transmitting data over a wireless network using white spaces. A first white space transmission channel is determined for communicating with mobile client devices. Wireless communication takes place with the mobile client devices over the first white space transmission channel. If the first white space transmission channel becomes unavailable to one of the mobile client devices because of the presence of a primary user on the first white space transmission channel, a different white space transmission channel is determined for communicating with the mobile client device that is affected. The first white space transmission channel may become unavailable to the affected mobile client device, for example, because a primary user begins using the first white space transmission channel in proximity to the affected device. The primary user may be a wireless microphone. Thereafter, communication with the affected wireless device takes place on the different white space transmission channel, while unaffected devices continue to communicate on the first white space transmission channel. Also provided are an exemplary wireless base station and an exemplary mobile client device. | 12-15-2011 |
20110317019 | ENABLING WHITE SPACE NETWORKS INDEPENDENT OF LOW-THRESHOLD SENSING - Described is a technology by which a remote or local geo-location service provides white space information that one or more client devices and/or base stations may use to determine which white spaces are available for use, e.g., for wireless networking. Because of the information, low-threshold sensing is not needed by the client devices and/or base stations to know which white spaces are available. The service computes the available white spaces for a given location based upon television transmitter parameters, elevation data, and information received regarding any operational wireless microphones. | 12-29-2011 |
20110317632 | Integrating White Space Support into a Network Stack - Described is incorporating white space networking components into a network stack. A user mode spectrum access control component determines which white space channels are currently allowed for use based upon policy, current operating status and availability information obtained from one or more sources. A white space service (e.g., in the WLAN service) receives the availability information. The white space service includes a discovery module that discovers other nodes, and a channel migration module that changes from the current channel to another channel if the current channel is no longer allowed for use. A kernel mode (NDIS layer) white space driver through a miniport driver controls the channel in use as the current channel. An automatic configuration module is provided that switches to Wi-Fi network communication when a Wi-Fi network is present, and switches back when a Wi-Fi network is not present. | 12-29-2011 |
20120014313 | OPPORTUNISTIC USE OF WIRELESS NETWORK STATIONS AS REPEATERS - Implementation of opportunistic use of stations in a wireless network as repeaters is described. In one implementation, a station detects the existence of rate anomaly in a wireless network. In response to the rate anomaly, the station may transform into a software repeater for certain other neighboring stations. The repeater function allows for the relaying of packets sent by these neighboring stations to the access point and vice versa. The other neighboring stations, owing to their relative proximity to the repeater station, transmit data at a higher rate to the repeater station. Thus, the removal of the slower stations reduces clogging of the access point and increases the overall data rate within the wireless network. Further, a zero-overhead network coding protocol may be implemented in conjunction with the repeater function to increase capacity of the wireless network. | 01-19-2012 |
20120148068 | COEXISTENCE OF WHITE SPACE DEVICES AND WIRELESS NARROWBAND DEVICES - Architecture that enables wireless narrowband devices (e.g., wireless microphones) and white space devices to efficiently coexist on the same telecommunications channels, while not interfering with the usability of the wireless narrowband device. The architecture provides interference detection, strobe generation and detection and, power ramping and suppression (interference-free coexistence with spectrum efficiency). The architecture provides the ability of the white space device to learn about the presence of the microphone. This can be accomplished i using a geolocation database, reactively via a strober device, and/or proactively via the strober device. The strober device can be positioned close to the microphone receiver and signals the presence of a microphone to white space devices on demand. The strober device takes into consideration the microphone's characteristics as well as the relative signal strength from the microphone transmitter versus the white space device, in order to enable maximum use of the available white space spectrum. | 06-14-2012 |
20120244847 | TRANSFER OF DATA-INTENSIVE CONTENT BETWEEN PORTABLE DEVICES - Described herein are technologies that facilitate transfer of data-intensive content between portable telephones. Phones are configured to transmit data indicative of phone location to a proxy server by way of respective cellular network data connections. When a user of a phone wishes to acquire content that is labeled as shareable on another phone, the user of the phone initiates a location-based request, which causes the proxy server to provide a list of phones that are estimated to be in Wi-Fi range of such phone. The user thereafter selects a particular phone, and the proxy server instructs that phone to activate its Wi-Fi radio. The phone of the user additionally activates its Wi-Fi radio, and a peer-to-peer connection between phones is established. Thereafter, rich content is transferrable between the phones. | 09-27-2012 |
20120294232 | SHORT-RANGE NODES WITH ADAPTIVE PREAMBLES FOR COEXISTENCE - Wireless protocols in the unlicensed spectrum are developed for different requirements in terms of transmit range and power, which makes it difficult for multiple nodes having disparate transmit ranges to coexist in the same unlicensed spectrum. A short-range wireless node uses adaptive preambles to signal presence to long-range wireless nodes outside of its transmit range. In addition, a long-range wireless node detects an adapter preamble and backs-off transmissions for reservation period dedicated to short-range nodes. | 11-22-2012 |
20120294233 | Long-Range Nodes with Adaptive Preambles for Coexistence - Wireless protocols in the unlicensed spectrum are developed for different requirements in terms of transmit range and power, which makes it difficult for multiple nodes having disparate transmit ranges to coexist in the same unlicensed spectrum. A short-range wireless node uses adaptive preambles to signal presence to long-range wireless nodes outside of its transmit range. In addition, a long-range wireless node detects an adapter preamble and backs-off transmissions for reservation period dedicated to short-range nodes. | 11-22-2012 |
20130023216 | CLOUD SERVICE FOR OPTIMIZING WHITE-SPACE NETWORKS COEXISTENCE - The coexistence of a plurality of different wireless networks that concurrently operate in a common geographic region is optimized. A query is received from a wireless node requesting advice on specific portions of a radio frequency spectrum to use. A spectrum recommendation procedure is then run to generate advice on recommended portions of the radio frequency spectrum for the wireless node to use in order to minimize one or more of interference in the spectrum, or noise in the spectrum, or contention in the spectrum. A recommendation reply is then sent to the wireless node which includes information specifying the recommended portions of the radio frequency spectrum for the wireless node to use in order to minimize one or more of interference in the spectrum, or noise in the spectrum, or contention in the spectrum. | 01-24-2013 |
20130053054 | USING PREDICTIVE TECHNOLOGY TO INTELLIGENTLY CHOOSE COMMUNICATION - Selecting communication settings. A method includes observing at least one of present, prior, or anticipated future movement of a user. Based on the observed user movement, embodiments may predict one or more future locations of the user. Based on the one or more future locations of the user, a communication setting of a device is selected to be used by the user. | 02-28-2013 |
20130128793 | SIGNALING OVER CELLULAR NETWORKS TO REDUCE THE WI-FI ENERGY CONSUMPTION OF MOBILE DEVICES - Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged. When the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is enabled if the device answers the wake up call and the Wi-Fi interface is available. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point. | 05-23-2013 |
20130141576 | DETERMINING THREATS BASED ON INFORMATION FROM ROAD-BASED DEVICES IN A TRANSPORTATION-RELATED CONTEXT - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured to perform vehicular threat detection based on information received at a road-based device, such as a sensor or processor that is deployed at the side of a road. An example AEFS receives, at a road-based device, information about a first vehicle that is proximate to the road-based device. The AEFS analyzes the received information to determine threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user. | 06-06-2013 |
20130142347 | VEHICULAR THREAT DETECTION BASED ON AUDIO SIGNALS - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured perform vehicular threat detection based at least in part on analyzing audio signals. An example AEFS receives data that represents an audio signal emitted by a vehicle. The AEFS analyzes the audio signal to determine vehicular threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined vehicular threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user. | 06-06-2013 |
20130142365 | AUDIBLE ASSISTANCE - Techniques for sensory enhancement and augmentation are described. Some embodiments provide an audible assistance facilitator system (“AAFS”) configured to provide audible assistance to a user via a hearing device. In one embodiment, the AAFS receives data that represents an utterance of a speaker received by a hearing device of the user, such as a hearing aid, smart phone, media device, or the like. The AAFS identifies the speaker based on the received data, such as by performing speaker recognition. The AAFS determines speaker-related information associated with the identified speaker, such as by determining an identifier (e.g., name or title) of the speaker, by locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AAFS then informs the user of the speaker-related information, such as by causing an audio representation of the speaker-related information to be output via the hearing device. | 06-06-2013 |
20130142393 | VEHICULAR THREAT DETECTION BASED ON IMAGE ANALYSIS - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured perform vehicular threat detection based at least in part on analyzing image data. An example AEFS receives data that represents an image of a vehicle. The AEFS analyzes the received data to determine vehicular threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined vehicular threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user. | 06-06-2013 |
20130144490 | PRESENTATION OF SHARED THREAT INFORMATION IN A TRANSPORTATION-RELATED CONTEXT - Techniques for ability enhancement are described. In some embodiments, devices and systems located in a transportation network share threat information with one another, in order to enhance a user's ability to operate or function in a transportation-related context. In one embodiment, a process in a vehicle receives threat information from a remote device, the threat information based on information about objects or conditions proximate to the remote device. The process then determines that the threat information is relevant to the safe operation of the vehicle. Then, the process modifies operation of the vehicle based on the threat information, such as by presenting a message to the operator of the vehicle and/or controlling the vehicle itself. | 06-06-2013 |
20130144595 | LANGUAGE TRANSLATION BASED ON SPEAKER-RELATED INFORMATION - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to automatically translate utterances from a first to a second language, based on speaker-related information determined from speaker utterances and/or other sources of information. In one embodiment, the AEFS receives data that represents an utterance of a speaker in a first language, the utterance obtained by a hearing device of the user, such as a hearing aid, smart phone, media player/device, or the like. The AEFS then determines speaker-related information associated with the identified speaker, such as by determining demographic information (e.g., gender, language, country/region of origin) and/or identifying information (e.g., name or title) of the speaker. The AEFS translates the utterance in the first language into a message in a second language, based on the determined speaker-related information. The AEFS then presents the message in the second language to the user. | 06-06-2013 |
20130144603 | ENHANCED VOICE CONFERENCING WITH HISTORY - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance voice conferencing among multiple speakers. Some embodiments of the AEFS enhance voice conferencing by recording and presenting voice conference history information based on speaker-related information. The AEFS receives data that represents utterances of multiple speakers who are engaging in a voice conference with one another. The AEFS then determines speaker-related information, such as by identifying a current speaker, locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS records conference history information (e.g., a transcript) based on the determined speaker-related information. The AEFS then informs a user of the conference history information, such as by presenting a transcript of the voice conference and/or related information items on a display of a conferencing device associated with the user. | 06-06-2013 |
20130144619 | ENHANCED VOICE CONFERENCING - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance voice conferencing among multiple speakers. In one embodiment, the AEFS receives data that represents utterances of multiple speakers who are engaging in a voice conference with one another. The AEFS then determines speaker-related information, such as by identifying a current speaker, locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS then informs a user of the speaker-related information, such as by presenting the speaker-related information on a display of a conferencing device associated with the user. | 06-06-2013 |
20130144623 | VISUAL PRESENTATION OF SPEAKER-RELATED INFORMATION - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to determine and present speaker-related information based on speaker utterances. In one embodiment, the AEFS receives data that represents an utterance of a speaker received by a hearing device of the user, such as a hearing aid, smart phone, media player/device, or the like. The AEFS identifies the speaker based on the received data, such as by performing speaker recognition. The AEFS determines speaker-related information associated with the identified speaker, such as by determining an identifier (e.g., name or title) of the speaker, by locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS then informs the user of the speaker-related information, such as by presenting the speaker-related information on a display of the hearing device or some other device accessible to the user. | 06-06-2013 |
20130165138 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. | 06-27-2013 |
20130165139 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a query from a radio-frequency identification object associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting a query from a radio-frequency identification object associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. | 06-27-2013 |
20130165140 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of an inertial impact associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting an indication of an inertial impact associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. | 06-27-2013 |
20130165141 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a query from a radio-frequency identification object associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting a query from a radio-frequency identification object associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. | 06-27-2013 |
20130165148 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a mobile device location query using digital signal processing and presenting an indication of location of the mobile device at least partially based on receiving the location query. Additionally, systems and methods are described relating to means for accepting a mobile device location query using digital signal processing and means for presenting an indication of location of the mobile device at least partially based on receiving the location query. | 06-27-2013 |
20130165158 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to determining a specified time period of non-movement in a mobile device and presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. Additionally, systems and methods are described relating to means for determining a specified time period of non-movement in a mobile device and means for presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. | 06-27-2013 |
20130165159 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a mobile device location query using digital signal processing and presenting an indication of location of the mobile device at least partially based on receiving the location query. Additionally, systems and methods are described relating to means for accepting a mobile device location query using digital signal processing and means for presenting an indication of location of the mobile device at least partially based on receiving the location query. | 06-27-2013 |
20130165160 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to determining a specified time period of non-movement in a mobile device and presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. Additionally, systems and methods are described relating to means for determining a specified time period of non-movement in a mobile device and means for presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. | 06-27-2013 |
20130165161 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of an inertial impact associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting an indication of an inertial impact associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. | 06-27-2013 |
20130172004 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. | 07-04-2013 |
20130174128 | Estimating Application Energy Usage in a Target Device - Embodiments provide implementations for estimating a test application's energy usage on a target device based on execution of the test application. Resource usage associated with the execution of the test application is measured. The measured resource usage is input into a power model of the target device to estimate the energy that the test application uses when executed on the target device. An emulation system is configured to execute the test application in a virtual execution environment using resource scaling and simulated target device application programming interfaces to substantially simulate the corresponding capabilities of the target device. | 07-04-2013 |
20130223308 | ENGERY EFFICIENT MAXIMIZATION OF NETWORK CONNECTIVITY - The minimization of the amount of power consumed by an electronic device in acquiring or maintaining network connectivity with a network may extend the battery life of the electronic device. When the electronic device has established a communication connection with a wireless access point, the electronic device cycles a network interface controller of the electronic device between a power on state and a power off state without terminating the communication connection. Accordingly, the electronic device powers on a main processor of the electronic device when the network interface controller detects a beacon during the power on state that indicates the wireless access point has a buffered data frame for the electronic device. | 08-29-2013 |
20130290755 | ENERGY-AWARE CODE OFFLOAD FOR MOBILE DEVICES - A method described herein includes an act of, at a mobile computing device, receiving an indication that a portion of code of a program executing on the mobile computing device is to be offloaded to a second computing device for execution on the second computing device, wherein the indication is based at least in part upon an estimated energy savings of the mobile computing device by offloading the portion of the code for execution on the second computing device. The method also includes an act of transmitting data to the second computing device that causes the second computing device to execute the portion of the code. | 10-31-2013 |
20130301606 | LOAD AWARE RESOURCE ALLOCATION IN WIRELESS NETWORKS - A technique for resource allocation in a wireless network (for example, an access point type wireless network), which supports concurrent communication on a band of channels, is provided. The technique includes accepting connectivity information for the network that supports concurrent communication on the band of channels. A conflict graph is generated from the connectivity information. The generated conflict graph models concurrent communication on the band of channels. A linear programming approach, which incorporates information form the conflict graph and rate requirements for nodes of the network, can be utilized to maximize throughput of the network. | 11-14-2013 |
20130303138 | TRANSFER OF DATA-INTENSIVE CONTENT BETWEEN PORTABLE DEVICES - Described herein are technologies that facilitate transfer of data-intensive content between portable telephones. Phones are configured to transmit data indicative of phone location to a proxy server by way of respective cellular network data connections. When a user of a phone wishes to acquire content that is labeled as shareable on another phone, the user of the phone initiates a location-based request, which causes the proxy server to provide a list of phones that are estimated to be in Wi-Fi range of such phone. The user thereafter selects a particular phone, and the proxy server instructs that phone to activate its Wi-Fi radio. The phone of the user additionally activates its Wi-Fi radio, and a peer-to-peer connection between phones is established. Thereafter, rich content is transferrable between the phones. | 11-14-2013 |
20130303195 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of a traveled path of at least one mobile device over a specified time period; determining, using a microprocessor, a predicted location of the at least one mobile device at least partly based on receiving the indication of the traveled path over a specified time period; and presenting an indication of the predicted location of the at least one mobile device at least partially based on accepting an indication of a traveled path and determining a predicted location of the at least one mobile device. | 11-14-2013 |
20130346762 | OPTIMIZING BATTERY USE FOR KNOWN FUTURE LOAD - Methods for optimizing battery use for a known future load are described. In an embodiment, one or more battery cells are selected from a set of battery cells to provide power to a computing-based device. The battery cells are selected based on discharge profile data for each battery cell and both the current power requirement and a known future power requirement of the computing-based device. The known future power requirement is calculated based on information available to the operating system running on the computing-based device. In some examples, one or more battery cells may also be selected for charging when a power source is available and these cells may be selected based on charge profile data and the known future power requirement. The selection of the battery cells may also be made in order to satisfy a battery optimization goal, which may be defined by a user. | 12-26-2013 |
20140019786 | ENERGY-EFFICIENT TRANSMISSION OF CONTENT OVER A WIRELESS CONNECTION - Energy efficient transmission of content can be provided using a variety of techniques. In an example technique, portions of content can be transmitted from a first computing device to a second computing device for display. A wireless radio of the first computing device can be placed into a low power mode between transmissions of the portions of content. In another example technique, one or more portions of content can be decoded, displayed, encoded, and transmitted by a first computing device for mirroring on a second computing device. One or more other portions of the content can be transmitted in encoded format to the second device without being decoded and displayed by the first device. In another example technique, a wireless radio of a first device can be placed into a low power mode in between transmission of commands to a second computing device to control content. | 01-16-2014 |
20140044038 | In-Frame Acknowledgments and Retransmissions - Implementations for retransmitting erroneous portions within a transmission frame are described. A sender transmits a transmission frame and the receiver performs error detection on portions of the transmission frame in order to determine if any are received in error. The receiver sets up a feedback channel and transmits acknowledgements to the receiver to indicate that one or more portions have been received and to identify any portions that are received with errors. At least some of the acknowledgements are transmitted prior to receipt of the entire transmission frame. The sender retransmits any portions that are identified as being erroneous within the transmission frame. | 02-13-2014 |
20140051467 | Spectrum Allocation for Base Station - Embodiments include processes, systems, and devices that allow a white space base station to request available frequency ranges for white space transmission in a local area. A white space finder service models a primary user device's transmission signal propagation area using terrain data associated with the local area of the primary user device. The white space finder service also determines, based on the location of the white space base station and the modeled propagation area, one or more locally available, non-interfering frequency ranges and provides them to the white space base station. The white space base station compares the provided frequency ranges to policies and selects one or more of the available frequencies that accommodate the policies. The white space base station also maps the transmission frequency ranges to virtual frequency ranges for transmission by a software-defined radio employing spectrum virtualization. | 02-20-2014 |