Patent application number | Description | Published |
20090154432 | COMPUTER RADIO WITH PRE-DEFINED CONFIGURATION SET - A computer with a software defined radio that can be configured based on a wireless technology specification. The computer may negotiate with a second computer that also includes a software defined radio to define a set of wireless technology specifications and trigger events indicating when each of the wireless technology specifications is to be used. As the computers communicate, if a trigger event occurs, both computers may reconfigure their software defined radios using a different specification in the set. By appropriately defining the wireless technology specifications in the set and the trigger events, the computers can operate with configurations that allow communication despite events that might otherwise disrupt communication between the computers. | 06-18-2009 |
20090190535 | ORTHOGONAL FREQUENCY DIVISION MULTIPLE ACCESS WITH CARRIER SENSE - A communication system in which an access point and one or more devices communicating through the access point adaptively apply Orthogonal Frequency Division Multiple Access (OFDMA). The access point may assign orthogonal subcarriers to devices as in conventional OFDMA, but the access point senses activity on the subcarriers and selects subcarriers without activity for assignment. In an alternative approach, a device that is configured for OFDMA communication may receive a channel assignment from a device that does not support OFDMA. The OFDMA-capable device may use only a portion of the subcarriers in the assigned channel, which may be communicated to the non-OFDMA device. During the non-OFDMA device may then ignore unused subcarriers in error detection and correction to avoid incorrectly classifying communications as erroneous. Information about OFDMA capabilities, subcarrier assignments and subcarriers in use may be communicated as information elements in network control communications, such as beacons and probe messages. | 07-30-2009 |
20090248878 | AGGREGATING CONNECTION MAINTENANCE TO OPTIMIZE RESOURCE CONSUMPTION - Combining network connection maintenance operations that use a resource to extend battery life. Each of the network connections has a timer and a defined tolerance for early connection maintenance. After receiving notification of an event, the network connections are accessed to identify the connections for which a maintenance operation may be performed early based on the timer and the tolerance. In an embodiment, the maintenance operation includes sending a transmission control protocol (TCP) keep-alive packet on the connection. | 10-01-2009 |
20100138501 | END-TO-END VALIDATION IN A PUSH ENVIRONMENT - In a push environment having a communication path along which a service provides messages to a computing device via a gateway, an inactivity timeout value and a registration timeout value enable the computing device to detect failures in the communication path. An application executing on the computing device registers an application endpoint with the gateway. The application separately subscribes to the service to receive the messages. If there is inactivity in accordance with the inactivity timeout value, the application de-registers and re-registers with the gateway, and unsubscribes and re-subscribes with the service. | 06-03-2010 |
20100153969 | COMMUNICATION INTERFACE SELECTION ON MULTI-HOMED DEVICES - Configurable selection of communication interfaces on a multi-homed computing device. Application programs executing on the computing device define preferences, policies, and/or restrictions for use of the various communication interfaces. Responsive to a request from one of the application programs to communicate with a destination computing device, a list of the communication interfaces is created based on the preferences defined by the application program. The application program iteratively attempts to establish a connection to the destination computing device using each of the communication interfaces on the list. | 06-17-2010 |
20100306280 | Swarm-Based Synchronization Over a Network of Object Stores - An object set may be redundantly stored by a set of computers, each configured to store a local representation of corresponding objects. When a computer changes the object set (e.g., by adding or altering an object), the updated object may be synchronized across the computers by iteratively forming and using an ad hoc swarm network from the neighbors of a node storing the updated object. This swarm network may operate cooperatively, where each node distributes object chunks to other nodes as quickly as possible, and may disregard concepts of competitive swarm networks such as fairness and cheating avoidance, which may not apply to cooperative swarming and might otherwise slow the propagation of the object. An alternative “ask” technique may be included to identify and recover missed object updates, and a computing environment host may be included as an authoritative object source and/or as an object store of last resort. | 12-02-2010 |
20110179130 | AUTOMATED MODERATION OF DISCUSSION LISTS - Within a network-based discussion environment, a moderation mechanism is implemented to encourage posts of high relevancy. The moderation mechanism is configurable so as to support distributed access control. In one case, the moderation mechanism is configured to support an allocation of a limited number of responses to a user based on the number of new threads the user has started. | 07-21-2011 |
20120089720 | AGGREGATING CONNECTION MAINTENANCE TO OPTIMIZE RESOURCE CONSUMPTION - Combining network connection maintenance operations that use a resource to extend battery life. Each of the network connections has a timer and a defined tolerance for early connection maintenance. After receiving notification of an event, the network connections are accessed to identify the connections for which a maintenance operation may be performed early based on the timer and the tolerance. In an embodiment, the maintenance operation includes sending a transmission control protocol (TCP) keep-alive packet on the connection. | 04-12-2012 |
20130155980 | ORTHOGONAL FREQUENCY DIVISION MULTIPLE ACCESS WITH CARRIER SENSE - A communication system in which an access point and one or more devices communicating through the access point adaptively apply Orthogonal Frequency Division Multiple Access (OFDMA). The access point may assign orthogonal subcarriers to devices as in conventional OFDMA, but the access point senses activity on the subcarriers and selects subcarriers without activity for assignment. In an alternative approach, a device that is configured for OFDMA communication may receive a channel assignment from a device that does not support OFDMA. The OFDMA-capable device may use only a portion of the subcarriers in the assigned channel, which may be communicated to the non-OFDMA device. During the non-OFDMA device may then ignore unused subcarriers in error detection and correction to avoid incorrectly classifying communications as erroneous. Information about OFDMA capabilities, subcarrier assignments and subcarriers in use may be communicated as information elements in network control communications, such as beacons and probe messages. | 06-20-2013 |
20130185810 | CONTROLLED SERIALIZATION AND/OR DESERIALIZATION - Among other things, one or more techniques and/or systems are provided for controlling the serialization of data into a serialized structure and/or the deserialization of data from the serialized structure. That is, a first client may request serialization of data comprising one or more entities. Entities that the first client has permission to serialize may be serialized for inclusion within a serialized structure, which may be encrypted. A set of deserialization permissions specifying which entities may be accessed by which clients may be defined for the serialized structure. In this way, one or more entities within the serialized structure may be deserialized for a second client based upon evaluating the second client against the set of deserialization permissions to determine which entities the second client has permission to access. The serialized structure may otherwise remain encrypted to provide sustained protection of serialized data comprised therein. | 07-18-2013 |
20130254779 | COMMUNICATION INTERFACE SELECTION ON MULTI-HOMED DEVICES - Configurable selection of communication interfaces on a multi-homed computing device. Application programs executing on the computing device define preferences, policies, and/or restrictions for use of the various communication interfaces. Responsive to a request from one of the application programs to communicate with a destination computing device, a list of the communication interfaces is created based on the preferences defined by the application program. The application program iteratively attempts to establish a connection to the destination computing device using each of the communication interfaces on the list. | 09-26-2013 |