Patent application number | Description | Published |
20090055489 | Electronic mail delay adaptation - A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using other mechanisms to convey the information intended for delivery by e-mail. The mechanism may convey the information to the recipient once the delayed electronic mail message is received by the recipient's e-mail system. In this respect, the recipient may make arrangements to receive information in the e-mail message when the recipient expects to be away from his or her e-mail system. Additionally or alternatively, the recipient may choose to initiate out-of-band communication to the sender when the recipient receives an indication of a delayed electronic mail message. | 02-26-2009 |
20090055490 | Electronic mail delay adaptation - A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using other mechanisms to convey the information intended for delivery by e-mail. Delays may be detected using a low-latency channel to send notifications of e-mails to recipients. The notifications are likely to be received in advance of a delayed e-mail, allowing an intended e-mail recipient to detect that delivery of an e-mail has been delayed. The recipient may adapt to the delay in delivery, when a notification is received without a corresponding electronic mail message. The notification may be small relative to an e-mail message but may include enough information to allow the recipient to identify the subject matter of the corresponding e-mail message, an importance level of the e-mail message, a preferred mechanism of the sender for out-of-band communications, and/or the location from which the e-mail was sent. | 02-26-2009 |
20090055491 | Electronic mail delay adaption - A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using other mechanisms to convey the information intended for delivery by e-mail. Though, other reactions to delays are possible, including rescheduling events premised on delivery of information by e-mail. The system may use a low-latency notification channel in parallel with a channel used for e-mail delivery to detect actual delays for a specific e-mail message. Additionally, the system may detect potential delays based on historical delay information or other information indicating that a path over which an e-mail is to be sent may be experiencing delivery delays and may adapt to a potential delay before a message likely to experience the delay is sent. | 02-26-2009 |
20090055502 | Electronic mail delay adaptation - A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using mechanisms other than the initially intended path to convey the information intended for delivery by e-mail. A possible adaptation is reprioritization of an e-mail message that is found to be experiencing a delay. | 02-26-2009 |
20090089438 | INTELLIGENT NETWORK ADDRESS LOOKUP SERVICE - An intelligent lookup service for a network is provided for clients of a network requesting services of the network that intelligently determines, based on a service requirement of the requested service, optimal service endpoint(s) for providing the requested service. The intelligent lookup service can incorporate predetermined mapping policy and traffic measurements into the determination. In addition, a feedback loop is provided from clients and/or service endpoints to the lookup service concerning measurements about prior connections in the network. The lookup service can include a set of beacons distributed in the network and against which measurements about the network are recorded. A client receives, from the lookup service in response to a request for a network address, a set of candidate service endpoints that pertain to the requested network address and the client connects to one of the candidate service endpoints based on policy or context. | 04-02-2009 |
20090161554 | COOPERATIVE DIAGNOSIS OF WEB TRANSACTION FAILURES - A client-based collaborative approach called WebProfiler is used for diagnosing Web transaction failures. The WebProfiler leverages end-host cooperation to pool together observations on the success or failure of Web transactions from multiple vantage points. These observations are utilized by a collaborative blame attribution algorithm to identify a suspect network entity that caused the Web transaction failure. | 06-25-2009 |
20090209349 | PREDICTION OF NETWORK PATH QUALITY AMONG PEER NETWORKING DEVICES - The claimed subject matter provides a system and/or a method that facilitates connectivity within a peer-to-peer networking environment. A client can transmit a request to connect with a host for peer-to-peer networking. A server can generate a list that includes at least one host that matches the request from the client. A predictor engine can reduce the list by at least one matched host based upon a predictor, wherein the predictor is at least one of an Internet Protocol history predictor, a prefix history predictor, or a geography predictor. | 08-20-2009 |
20100027419 | INVERSE MULTIPLEXING HETEROGENEOUS WIRELESS LINKS FOR HIGH-PERFORMANCE VEHICULAR CONNECTIVITY - Systems and methods are provided that enable high-performance Internet access on board moving vehicles. In an illustrative implementation, an exemplary wireless data communications environment comprises a PluriBus module, an instruction set comprising at least one instruction set to process data for wireless communication between a cooperating component onboard a moving vehicle and other cooperating wireless components, and one or more multiple wide-area wireless communications links. In an illustrative operation, the PluriBus module can perform one more wireless communications techniques comprising opportunistic erasure coding such that coded packets can be sent in the event that there are openings in the one or more wireless communication links' capacity and transmitting the data packets along the one or more wireless communications links that is estimated (e.g., in real time) to offer efficient delivery of data packets. | 02-04-2010 |
20100027563 | EVOLUTION CODES (OPPORTUNISTIC ERASURE CODING) PLATFORM - Systems and methods are provided that allow for the opportunistic erasure coding of data packets by employing an exemplary evolution code. In an illustrative implementation an exemplary computing environment comprises an evolution code engine and an instruction set comprising at least one instruction to instruct the evolution code to process data for communication between two or more components of the exemplary computing environment. The use of evolution coding mitigates packet losses along one or more communication paths. In an illustrative operation, coded packets are created by XOR-ing data packets together such that a coded packet can recover a lost data packet using other received packets. | 02-04-2010 |
20100076933 | TECHNIQUES FOR RESOURCE LOCATION AND MIGRATION ACROSS DATA CENTERS - An exemplary system includes a front-end component to receive requests for resources in a data center and configured to associate each request with identifying information, to locate one or more resources for each request and to store, in a log file, the identifying information and information about the location of the one or more resources; one or more distributed computation and storage components to acquire log file information and configured to analyze log information to decide if one or more resources associated with one or more requests should be migrated to a data center in a different geographical location; and a location service component to receive decisions made by the one or more distributed computation and storage components and configured to inform the front-end component when a decision causes one or more resources to be migrated to a data center in a different geographical location to thereby allow the front-end component to re-direct future requests for the one or more migrated resources to the data center in the different geographical location. Various other devices, systems and methods are also described. | 03-25-2010 |
20100105409 | PEER AND COMPOSITE LOCALIZATION FOR MOBILE APPLICATIONS - A system and method for peer based localization system using radio technology, such as Bluetooth or Wi-Fi ad-hoc technology that enables mobile devices such as cell phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, etc. to discover their physical location relative to one another. In addition, the peer based localization can use a plurality of radio technologies to increase the accuracy of the physical location estimates. Additionally or alternatively, the peer based localization technique can be combined with infrastructure based location techniques, such as triangulation, GPS, or infrastructure based Wi-Fi localization in order to transpose virtual coordinates into physical coordinates. | 04-29-2010 |
20100179753 | Estimating Time Of Arrival - Described herein is a system that includes a location determiner component that receives a first geographic location of a personal computing device of a first individual, wherein the first geographic location is indicative of a current geographic location of the first individual. The system also includes an estimator component that receives a second geographic location that is different from the first geographic location. The estimator component determines an estimated time of arrival for the first individual at the second geographic location based at least in part upon the received first geographic location, wherein the estimator component outputs the estimated time of arrival to a second individual. | 07-15-2010 |
20100202298 | NETWORK COORDINATE SYSTEMS USING IP INFORMATION - Systems and methods that improve predictions of network latency in network coordinate systems (NCS) based on combining Internet topology information therewith. Topology information can be incorporated into the NCS by system/methodologies represented by geographic bootstrapping; autonomous system (AS) correction; history prioritization; symmetric updates or a combination thereof. Such can improve latency estimation between nodes when using a virtual coordinate system based on latency measurements between nodes. | 08-12-2010 |
20100311395 | NEARBY CONTACT ALERT BASED ON LOCATION AND CONTEXT - Attributes including presence and organization information for contacts of a subscriber are used in determining a subset of contacts matching a predefined criterion. Determined subset of contacts is sent as an alert to notify the subscriber to the subsets' nearby proximity. | 12-09-2010 |
20100316205 | CALL ROUTING AND PRIORITIZATION BASED ON LOCATION CONTEXT - Called parties in an enhanced communication system are provided location information associated with a calling party to help them determine whether they should accept the call. Alternatively, automatic call routing may be performed based on location context information associated with the calling party such as whether the caller is calling from a regular location association with him/her or an extra-ordinary location. | 12-16-2010 |
20110087924 | Diagnosing Abnormalities Without Application-Specific Knowledge - Methods, articles, and systems for determining a probable cause of a component's abnormal behavior are described. To determine the probable cause, a computing device computes, for one or more pairs of components having dependency relationships, a likelihood that behavior of one component of a pair is impacting behavior of the other component of the pair. This computing is based on joint historical behavior of the pair of components. The computing device then determines that one of a plurality of components is a probable cause of the abnormal behavior based on the computed likelihoods. | 04-14-2011 |
20120079507 | MANAGEMENT AND MARKETPLACE FOR DISTRIBUTED HOME DEVICES - A home device management technique is described that allows a user to manage a network of distributed home devices. Special application modules, driver modules, and service exchange ports are employed. Each application modules implements some functionality in the home, preferably using one or more devices in the home distributed system. Each driver module provides the logic for operating one or multiple distributed home devices and is capable of receiving commands from application modules and sending them to devices, detecting events for an associated type of home device, translating the detected event into a format usable by the application modules and notifying the application modules of the events. Events are communicated between the application modules and the driver modules by using one or more service exchange ports. Access control policies are employed to control access to the home devices. The application and driver modules can be obtained over a network from a home marketplace that can also determine their compatibility and interoperability with the home devices. | 03-29-2012 |
20120129546 | PATH PROGRESSION MATCHING FOR INDOOR POSITIONING SYSTEMS - A path progression matching system and method that uses path progression to find a current position of a mobile device in an indoor environment and a path history to find the path of the mobile device to get to the current position. Embodiments of the system and method use path history information, constraints, and optimization measures such as the use of received signal strength indicator (RSSI) weighted correlation coefficients. Embodiments of the system and method include a unified probabilistic model that uses path history and allows multiple constraints to be applied simultaneously. Embodiments of the system and method also include a path progression module having a first-stage progression module, which finds a starting location for the path progression matching, a second-stage module, which begins building a path history, and a third-stage progression module, which uses the path history to find the current position and path. | 05-24-2012 |
20120131129 | NETWORK LATENCY ESTIMATION FOR MOBILE DEVICES - Embodiments calculate an estimated latency between computing devices. A latency service aggregates latency records defining latency measurements and corresponding latency factors from a plurality of computing devices. From the aggregated latency records, the latency service defines relationships between the latency measurements and the corresponding latency factors. Responsive to a request for an estimated latency from a mobile computing device, the latency service applies the defined relationships to estimate the latency based on the latency factors associated with the received request. In some embodiments, the estimated latency includes three portions: a first latency value representing the latency from the mobile computing device to a cell site, a second latency value representing the latency from the cell site to an access point, and a third latency value representing the latency from the access point to a destination computing device. | 05-24-2012 |
20120166598 | DISTRIBUTED NETWORK COORDINATE SYSTEM - This document relates to a distributed network coordinate system. One implementation provides computer-readable storage media including instructions that may cause a processor to perform certain acts. For example, the acts may include storing an initial network location of a first device in a network. The network may include the first device and a second device. The acts may also include monitoring one or more network performance metrics related to existing application communications with the second device, and determining an updated network location of the first device, based on the initial network location and the network performance metrics. Aspects of network health can be derived from monitoring changes in the network locations of various devices within the coordinate system. | 06-28-2012 |
20120260336 | NETWORK ACCOUNTABILITY AMONG AUTONOMOUS SYSTEMS - In one kind of DoS attack, malicious customers may try to send a large number of filter requests against an innocent customer. In one implementation, a Filter Request Server (FRS) may allow a customer against who a filter request is made to dispute the implicit accusation of the filter request or stop sending malicious traffic. If the customer claims innocence, the FRS may log destination addresses of data packets sent by the customer and identify and ignore false filter requests if these filter requests come from customers who do not correspond to one or more of the destination addresses that have previously been logged by the FRS. | 10-11-2012 |
20130018581 | ACTIVATING AND DEACTIVATING SENSORS FOR DEAD RECKONINGAANM Sidhu; Gursharan S.AACI SeattleAAST WAAACO USAAGP Sidhu; Gursharan S. Seattle WA USAANM Agarwal; SharadAACI SeattleAAST WAAACO USAAGP Agarwal; Sharad Seattle WA US - An identification is made as to when a device is at an anchor location, which can be a proximity zone along an edge of a dead zone or a location where a signal from a beacon is detected. In response to the device being at the anchor location, one or more inertial sensors can be activated and data from the one or more inertial sensors collected to determine a position of the device using dead reckoning. Alternatively, in response to the device being at the anchor location, a determination is made as to when to deactivate one or more inertial sensors from which data is collected to determine the position of the device using dead reckoning. | 01-17-2013 |
20130018629 | CROWD SOURCING BASED ON DEAD RECKONINGAANM Sidhu; Gursharan S.AACI SeattleAAST WAAACO USAAGP Sidhu; Gursharan S. Seattle WA USAANM Agarwal; SharadAACI SeattleAAST WAAACO USAAGP Agarwal; Sharad Seattle WA US - An identification is made as to when a device is at an anchor location, which can be a proximity zone along an edge of a dead zone or a location where a signal from a beacon is detected. In response to the device being at an anchor location, recording of crowd sourcing data based on dead reckoning starts. Recording crowd sourcing data based on dead reckoning includes identifying one or more signals received by a device while the device is at each of multiple positions. For each of the multiple positions, both an indication of the position determined based at least in part on dead reckoning and an indication of the one or more signals received while the device is at that position are recorded. | 01-17-2013 |
20130042154 | Adaptive and Distributed Approach to Analyzing Program Behavior - An analysis management system (AMS) is described that analyzes the in-field behavior of a program resource installed on a collection of computing devices, such as mobile telephone devices or the like. In operation, the AMS can instruct different devices to collect data regarding different observation points associated with the program resource, thus spreading the reporting load among the devices. Based on the data that is collected, the AMS can update a dependency graph that describes dependencies among the observation points associated with the program resource. The AMS can then generate new directives based on the updated dependency graph. The AMS can also use the dependency graph and the collected data to infer information regarding observation points that is not directly supplied by the collected data. | 02-14-2013 |
20130053053 | LOCALIZATION OF MOBILE COMPUTING DEVICES IN INDOOR ENVIRONMENTS - Various technologies pertaining to localizing multiple mobile computing devices in an indoor environment are described. Pairs of microphone arrays are selectively positioned in an indoor environment. A localization service assigns a frequency and schedule to a mobile telephone, and the mobile telephone begins outputting vibrations at the assigned frequency and in conformance with the assigned schedule. The microphone arrays sense the vibrations, and angles between the microphone arrays, respectively, and the mobile computing device are computed based upon the sensed vibrations. Such angles are subsequently employed to compute the location of the mobile computing device in the indoor environment. | 02-28-2013 |
20130110454 | MULTI-STAGE DEAD RECKONING FOR CROWD SOURCING | 05-02-2013 |
20130122854 | PROVIDING PER-APPLICATION RESOURCE USAGE INFORMATION - An environment is described in which a processing system provides application-level usage information to users. In one scenario, for example, the processing system may provide personal usage information to a user who is operating a user device. The personal usage information itemizes the amount of data (and/or other resources) that has been consumed by each application run by the user device. In another scenario, the processing system may provide expected usage information associated with at least one candidate application provided by a marketplace system. The expected usage information describes an expected consumption of data (and/or other resources) by the candidate application upon running the candidate application by the user device. The processing system can tailor the expected usage information that it sends to a particular user based on user profile data. The user profile data describes a manner in which users operate applications. | 05-16-2013 |
20130158867 | POWER-EFFICIENT ACTIVATION OF A DEVICE MOVEMENT SENSOR MODULE - The functionality described herein allows a user device to determine an appropriate juncture at which to initiate processing within a GNSS dead zone in an energy-efficient manner. In one implementation, the functionality employs a sensor management module for determining when to activate a device movement sensor module provided by a user device. When activated, the user device uses the device movement sensor module to perform any environment-specific processing, such as a dead-reckoning process for determining incremental positions within the venue. Further, in a crowd-sourcing application, the user device may report the incremental positions together with beacon information to remote processing functionality. | 06-20-2013 |
20130254749 | DYNAMICALLY PROVIDING APPLICATION ANALYTIC INFORMATION - Methods and systems for dynamically providing application analytic information are provided herein. The method includes inserting instrumentation points into an application file via an application analytic service and dynamically determining desired instrumentation points from which to collect application analytic data. The method also includes receiving, at the application analytic service, the application analytic data corresponding to the desired instrumentation points and analyzing the application analytic data to generate application analytic information. The method further includes sending the application analytic information to a client computing device. | 09-26-2013 |
20130295872 | MOBILE DEVICE EMERGENCY SERVICE - Mobile device emergency service techniques are described. In embodiments, a client device includes one or more modules implemented at least partially in hardware and configured to implement an emergency service. The emergency service configured to support operations including generating a user interface for display on a display device, receiving one or more inputs usable to form an emergency contacts list that includes a plurality of emergency contacts, and causing the emergency contacts list to be communicated to one or more other client devices for use in generating a message to be communicated automatically and without user intervention to the emergency contacts in the emergency contacts list responsive to a trigger. | 11-07-2013 |
20130303143 | MOBILE DEVICE SAFE DRIVING - In embodiments of mobile device safe driving, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a driving mode lock screen. The transition to display the driving mode lock screen occurs without receiving a PIN code entered on the device lock screen. The mobile device implements a safe driving service that is implemented to activate a safe driving mode of the mobile device, and disable features of the mobile device while the safe driving mode is activated. | 11-14-2013 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 11-14-2013 |
20130344893 | LOCALIZATION OF MOBILE COMPUTING DEVICES IN INDOOR ENVIRONMENTS - Various technologies pertaining to localizing multiple mobile computing devices in an indoor environment are described. Pairs of microphone arrays are selectively positioned in an indoor environment. A localization service assigns a frequency and schedule to a mobile telephone, and the mobile telephone begins outputting vibrations at the assigned frequency and in conformance with the assigned schedule. The microphone arrays sense the vibrations, and angles between the microphone arrays, respectively, and the mobile computing device are computed based upon the sensed vibrations. Such angles are subsequently employed to compute the location of the mobile computing device in the indoor environment. | 12-26-2013 |
20140040467 | Network Latency Estimation For Mobile Devices - Embodiments calculate an estimated latency between computing devices. A latency service aggregates latency records defining latency measurements and corresponding latency factors from a plurality of computing devices. From the aggregated latency records, the latency service defines relationships between the latency measurements and the corresponding latency factors. Responsive to a request for an estimated latency from a mobile computing device, the latency service applies the defined relationships to estimate the latency based on the latency factors associated with the received request. In some embodiments, the estimated latency includes three portions: a first latency value representing the latency from the mobile computing device to a cell site, a second latency value representing the latency from the cell site to an access point, and a third latency value representing the latency from the access point to a destination computing device. | 02-06-2014 |
20140070991 | ESTIMATING AND PREDICTING STRUCTURES PROXIMATE TO A MOBILE DEVICE - The description relates to mobile device location. One example can identify global navigation satellite system (GNSS) satellites expected to be in line-of-sight of a mobile device. This example can detect differences between received GNSS data signals and expected GNSS data signals from the expected GNSS satellites. The example can also determine a direction from the mobile device of an obstruction that is causing at least some of the detected differences. | 03-13-2014 |
20140082214 | REDUCING NETWORK USAGE OF COMPUTING DEVICE - Methods and systems for reducing network usage of a computing device are provided herein. The method includes receiving a network call relating to a network transfer from an application at an application programming interface of the computing device. The method also includes determining whether the network transfer is relevant to a current state of the application and procrastinating the network transfer if it is not relevant to the current state of the application. | 03-20-2014 |
20140337524 | DISTRIBUTED NETWORK COORDINATE SYSTEM - This document relates to a distributed network coordinate system. One implementation provides computer-readable storage media including instructions that may cause a processor to perform certain acts. For example, the acts may include storing an initial network location of a first device in a network. The network may include the first device and a second device. The acts may also include monitoring one or more network performance metrics related to existing application communications with the second device, and determining an updated network location of the first device, based on the initial network location and the network performance metrics. Aspects of network health can be derived from monitoring changes in the network locations of various devices within the coordinate system. | 11-13-2014 |
20140380282 | MONITORING MOBILE APPLICATION PERFORMANCE - Aspects of the subject disclosure are directed towards monitoring application performance during actual use, particularly mobile application performance. Described is instrumenting mobile application binaries to automatically identify a critical path in user transactions, including across asynchronous-call boundaries. Trace data is logged by the instrumented application to capture UI manipulations, thread execution, asynchronous calls and callbacks, UI updates and/or thread synchronization. The trace data is analyzed to assist developers in improving application performance. | 12-25-2014 |
20150039756 | PROVIDING PER-APPLICATION RESOURCE USAGE INFORMATION - An environment is described in which a processing system provides application-level usage information to users. In one scenario, for example, the processing system may provide personal usage information to a user who is operating a user device. The personal usage information itemizes the amount of data (and/or other resources) that has been consumed by each application run by the user device. In another scenario, the processing system may provide expected usage information associated with at least one candidate application provided by a marketplace system. The expected usage information describes an expected consumption of data (and/or other resources) by the candidate application upon running the candidate application by the user device. The processing system can tailor the expected usage information that it sends to a particular user based on user profile data. The user profile data describes a manner in which users operate applications. | 02-05-2015 |