Patent application number | Description | Published |
20080226130 | Automated Location Estimation Using Image Analysis - An implementation of automated location estimation using image analysis is described. In this implementation, an image of a place is obtained and matched with previously stored images. The matching may be achieved by employing methods based on key feature extraction algorithm, color histogram analysis, pattern matching or other image comparison techniques. Upon determining a match, the location information associated with the matched previously stored images provides the location. The location information may be in the form of location tags or location keywords and the location information may be used by the user or other applications for the purposes of location determination. The above technique also allows for the user to enter location information to improve accuracy. The location information may also be assigned to the previously stored images residing in local and remote databases for users and applications to automatically assign information or keywords to images. | 09-18-2008 |
20080263061 | Self-Tuning Index for Flash-Based Databases - Techniques for self-tuning indices for databases, including flash-based databases, are described. Using a data tree structure wherein the nodes of the data tree may operate in two modes (e.g. disk mode or log mode), a self-tuning index determines whether it is more economical to perform a requested operation on a node in its current mode or in an alternate mode. The operation is then performed on the node using the more economical mode. | 10-23-2008 |
20080263114 | EFFICIENT ACCESS OF FLASH DATABASES - Techniques for efficient access to flash databases are described. In one implementation, a method includes performing an operation on a flash database, supplementing at least one portion of a node translation table corresponding to at least one node involved in the operation, and semantically compressing at least one portion of the node translation table. The semantic compression includes discarding at least one log entry that is rendered obsolete by at least one subsequent log entry, and incrementing a version number of the log entries corresponding to the at least one portion of the node translation table. In further embodiments, discarding at least one log entry includes discarding at least one log entry that is at least one of opposed by or overruled by at least one subsequent log entry. | 10-23-2008 |
20080263196 | Programming techniques for distributed multi-party networks - Architecture for programming in a distributed computing environment where different components of a system are owned or controlled by different entities and heterogeneous in terms of resource availability and a willingness to share. Multiple devices can be programmed when a task requires human intervention. Method are described for using a tolerance level provided by the application developer to control the execution of the application instructions at multiple devices with varying resources, and for using an involvement level provided by the sensor or computing device owner for the purpose of automatically adapting the execution of application code at multiple devices to suit the individual owner's willingness to share resources, and the capabilities of resources available with that owner. Code distribution allows an application developed by one entity to be distributed to multiple devices owned by multiple entities, where each of the entities has varying connectivity, resource availability, and sharing willingness. | 10-23-2008 |
20080273796 | Image Text Replacement - Image text enhancement techniques are described. In an implementation, graphically represented text included in an original image is converted into process capable text. The process capable text may be used to generate a text image which may replace the original text to enhance the image. In further implementations the process capable text may be translated from a first language to a second language for inclusion in the enhanced image. | 11-06-2008 |
20080310707 | VIRTUAL REALITY ENHANCEMENT USING REAL WORLD DATA - Techniques for enhancing virtual reality using transformed real world data are disclosed. In some aspects, a composite reality engine receives a transmission of the real world data that is captured by embedded sensors situated in the real world. The real world data is transformed and integrated with virtual reality data to create a composite reality environment generated by a composite reality engine. In other aspects, the composite reality environment enables activation of embedded actuators to modify the real world from the virtual reality environment. In still further aspects, techniques for sharing sensors and actuators in the real world are disclosed. | 12-18-2008 |
20080320087 | SWARM SENSING AND ACTUATING - Sensing information from a multitude of remote sources can provide a user with a vast amount of information as well as a better granularity of the information. A user can also actuate or move remote sources to obtain the desired information or more information and/or to expend energy in a remote location with one or more of the remote sources. Thus, a swarm or large group of devices, sensors, actuators, equipment, and so on can be utilized to provide a user with a desired action. | 12-25-2008 |
20090089610 | RAPID CRASH RECOVERY FOR FLASH STORAGE - Recovery is expedited for crashes involving flash memory. Rather than requiring an entire flash memory to be read to reconstruct lost information, only a subset of the memory need be read thereby reducing system down, among other thing. In particular, state information such as a logical to physical mapping is captured via a checkpoint operation periodically. Moreover, a deterministic usage pattern is employed to facilitate recovery of actions performed after a checkpoint. | 04-02-2009 |
20090119246 | AUTOMATED CAPTURE OF INFORMATION GENERATED AT MEETINGS - Meeting information is collected in an automatic or automated manner utilizing user devices among other devices likely to be present at meetings. Devices can detect the occurrence of a meeting and initiate data capture. Subsequently, aggregated data can be processed to facilitate access and/or dissemination of the data. For instance, data can be contextualized and/or indexed. Further, data can be generated in or converted to forms more suitable for information distribution (e.g., summary, points of interest . . . ). | 05-07-2009 |
20090125918 | SHARED SENSING SYSTEM INTERFACES - Various interfaces such as application programming interfaces (APIs) are employed to allow developers to construct applications that use multiple shared sensors. In one instance, a coordinator can be utilized to facilitate coordination of sensor data contributors and applications desirous of utilizing such data. Standardized interfaces can be employed to aid interaction between all entities including contributors, applications and a coordinator, amongst others. | 05-14-2009 |
20090327478 | SELECTION OF SENSORS FOR MONITORING PHENOMENA CONSIDERING THE VALUE OF INFORMATION AND DATA SHARING PREFERENCES - A system that facilitates selecting a sensor from amongst a plurality of sensors from which to request data is described. The system includes a receiver component that receives a value of information for data that corresponds to a segment of a phenomenon model that models a phenomenon. The receiver component also receives user-defined preferences regarding sharing data from at least one sensor. The system further includes a selector component that selects the at least one sensor from amongst a plurality of sensors based at least in part upon the value of information and the preferences. The determination of the value ascribed to sensors may include considerations of the utilitarian benefit of reduction of uncertainty to a population of people. | 12-31-2009 |
20100063644 | ENERGY COST REDUCTION AND AD DELIVERY - The claimed subject matter provides a system and/or a method that facilitates managing energy consumption with an energy sink device in order to reduce energy costs. An energy sink device can consume a portion of energy. An interface component can receive a portion of data related to at least one of a real time energy rate or a user presence. An energy manager can dynamically control the energy sink device for efficient consumption of the portion of energy for reduced energy costs based at least in part upon the evaluation of the portion of received data. The energy manager can leverage the real time energy rate and the user presence in order to employ at least one of a power on the energy sink device, a power off the energy sink device, or an adjust a setting for the energy sink device. | 03-11-2010 |
20100185456 | MEDICATION MANAGEMENT SYSTEM - A system that monitors and tracks compliance to a medication regimen or schedule is provided. The system can measure and track dosage amounts together with the time in which tablets, pills or liquid are removed from a container. The information can be stored for compliance analysis. Additionally, the system can alter a user of a dosage schedule thereby enhancing compliance. | 07-22-2010 |
20100262842 | Computational Energy Measurement Without Hardware Support - Techniques and technologies are disclosed herein for measuring and managing energy consumption of the individual hardware components and software modules of various systems and devices. Such techniques and technologies do not require the addition of hardware to the systems (or devices), the modification of software modules hosted by the systems, or other modifications to the systems. Moreover, some of the techniques and technologies measure the energy consumed by the individual software modules as a result of the hardware operations which they call. | 10-14-2010 |
20110003583 | SELECTION OF SENSORS FOR MONITORING PHENOMENA CONSIDERING THE VALUE OF INFORMATION AND DATA SHARING PREFERENCES - A method disclosed herein includes the act of computing a value of information for obtaining data from a personal sensor of a user for utilization in a utilitarian computing application, wherein a mobile computing device comprises the personal sensor of the user. The method further includes the act of requesting that the mobile computing device transmit a data packet to the computing device based at least in part upon the value of information for obtaining data from the personal sensor of the user. | 01-06-2011 |
20110213997 | VIRTUAL MACHINE POWER CONSUMPTION MEASUREMENT AND MANAGEMENT - Embodiments of the virtual machine power metering system and method measure the power consumption of individual virtual machines. Power meter measurements for a physical host server are converted into individual virtual machine power meters that measure the power consumption of each individual virtual machine residing on the host server. The virtual machine power consumption is computed by generating a power model using the total power consumption of the host server and resource utilization for a virtual machine. Optimal power model coefficients are computed using the power model. The energy used by the virtual machine is computed using one of two embodiments. Embodiments of the system and method also can be used to obtain the power consumption for a specific activity (such as a service, request, or search query). In addition, the virtual machine power metering can be used for virtual machine power capping to allow power oversubscription in virtualized environments. | 09-01-2011 |
20110239010 | MANAGING POWER PROVISIONING IN DISTRIBUTED COMPUTING - One or more computers manage power consumption in a plurality of computers by repeatedly evaluating power consumption of pluralities of computers such that any given plurality of computers is evaluated by aggregating indicia of power consumption of the individual computers in the given plurality. The evaluation identifies or predicts pluralities of computers that are over-consuming power and identifies pluralities of computers that are under-consuming power. A first plurality of computers identified as over-consuming power are sent messages to instruct some of its comprising computers or virtual machines (VMs) to lower their computational workload. A second plurality of computers identified as under-consuming power are sent messages instructing the other computers to increase their computation workload. | 09-29-2011 |
20120005490 | PREDICTIVE COMPUTING DEVICE POWER MANAGEMENT - The described implementations relate to predictive computing device energy management. One implementation measures resource usage of a computing device that employs a power policy. This implementation also estimates resource usage of the computing device having at least one different power policy without actually running the at least one different power policy on the computing device. | 01-05-2012 |
20120023492 | WORKLOAD INTERFERENCE ESTIMATION AND PERFORMANCE OPTIMIZATION - Architecture that facilitates the estimation of interference among workloads (e.g., virtual machines) due to sharing of a shared resource (e.g., a shared cache of a computer processor), and optimization of a desired performance objective such as power or energy use in the presence of the interference. Estimation is to the extent of interference by characterizing the nature of shared resource usage and its effect on performance. Performance optimization is accomplished using metrics based on the above estimation, or alternatively, an explicit measurement of the interference effects. Methods are employed to estimate interference on the workload's performance with changes in availability of the shared resource or with combinations of other workloads sharing the same resource and allocating workloads to one or more physical computers or resources to workloads such that a desired performance objective is optimized. The methods can include allocating workloads on demand. | 01-26-2012 |
20120148091 | Location Estimation Using Image Analysis - An implementation of location estimation using image analysis is described. In this implementation, an image of a place is obtained and matched with previously stored images. The matching may be achieved by employing methods based on key feature extraction algorithm, color histogram analysis, pattern matching or other image comparison techniques. Upon determining a match, the location information associated with the image provides the location. The location information may be in the form of location tags or location keywords and the location information may be used by the user or other applications for the purposes of location determination. The technique allows for the user to enter location information. The location information may be assigned to the previously stored images residing in local and remote databases for users and applications to assign information or keywords to images. | 06-14-2012 |
20120151055 | Low Energy Mobile Information Delivery - The subject disclosure is directed towards delivering information to mobile devices in an energy and bandwidth efficient manner by sending information only when the device user is likely to use the information. The information is delivered proactively based on user attention being paid to the device or the user's anticipated attention, corresponding to sensed state data and other state data. Also described is a proxy that interfaces with legacy information servers or the like, such as to emulate the mobile device, so that information delivery from such sources can be deferred until needed by the user. Device energy is conserved and user disruptions reduced by computing an inference as to when the user is likely to be interested in the communicated information, and downloading based upon the inference. | 06-14-2012 |
20120239323 | Virtual Machine Power Usage Estimations - Provided herein is power usage estimation that may be applied to computing devices. Further, the power usage estimation may be determined per each thread, process and/or program running on the computing device, such as, for example, a virtual machine. Power meters may be associated with individual components in a computing device, the sum of the power consumption of the computing components being equal to the total power consumption of the computing device. Metrics for usage by a process may be associated with each component, from which power consumption profiles based on component usage by a process may be created. Estimations of power usage may be used in contracting, billing, ranking, system control, priority, output and the like. Estimations of power usage may also include a power consumption “learning” phase and a way of incorporating previously disregarded base power usage into the estimate of power consumption by a process. | 09-20-2012 |
20120268249 | ENERGY EFFICIENT LOCATION DETECTION - In a device, one or more low energy sensors are used to determine a mobility state of the device. Based on both the mobility state of the device and one or more places of interest for the device, a determination is made as to when to use a high energy sensor to determine a location of the device. One of the one or more places of interest for the device within which the device is located at any particular time can be determined based on the mobility state of the device and/or the location of the device as determined by the high energy sensor. | 10-25-2012 |
20120280035 | MAGNETIC STRIPE-BASED TRANSACTIONS USING MOBILE COMMUNICATION DEVICES - Magnetic stripe-based transaction enabled mobile communication device embodiments are presented which generally involve a mobile communication device which has been configured to perform transactions that heretofore were completed using a magnetic stripe found on magnetic-stripe cards. In one general embodiment, a mobile communication device generates magnetic stripe data which is used to perform a magnetic stripe-based transaction. To this end, the mobile communication device includes a magnetic stripe device and a computing device. The computing device stores the magnetic stripe data, and the magnetic stripe device is employed to transfer the stored magnetic stripe information so that it can be used to conduct transactions as if a traditional magnetic stripe card were being used. | 11-08-2012 |
20120284194 | SECURE CARD-BASED TRANSACTIONS USING MOBILE PHONES OR OTHER MOBILE DEVICES - A “Portable Card Generator” is implemented within a portable device, such as a mobile phone, and provides various techniques for writing secure account information from user selected accounts to a “wildcard” having rewritable magnetic stripes, rewritable RFID tags, and/or rewritable smartcard circuitry. The account information is retrieved by the portable device from local or remote stores of user accounts. Once that account information is written, the wildcard is then available for immediate use for credit card or debit-type payments, loyalty card use, etc. Consequently, by providing a credit card sized object having a rewriteable magnetic stripe, RFID tag, and/or smartcard circuitry, in combination with account information for various credit cards, debit cards, consumer loyalty cards, insurance cards, ID cards or badges, etc., the user is no longer required to physically carry those cards in order to use the corresponding accounts within existing card-based infrastructures. | 11-08-2012 |
20120290865 | Virtualized Application Power Budgeting - Virtualized application power budgeting can manage power budgeting for multiple applications in data centers. This power budgeting may be done in intelligent and/or dynamic ways and may be useful for updating power budgets, resolving conflicts in requests for power, and may improve the efficiency of the distribution of power to multiple applications. | 11-15-2012 |
20120317578 | Scheduling Execution of Complementary Jobs Based on Resource Usage - The subject disclosure is directed towards executing jobs based on resource usage. When a plurality of jobs is received, one or more jobs are mapped to one or more other jobs based on which resources are fully utilized or overloaded. The utilization of these resources by the one or more jobs complements utilization of these resources by the one or more other jobs. The resources are partitioned at one or more servers in order to efficiently execute the one or more jobs and the one or more other jobs. The resources may be partitioned equally or proportionally based on the resource usage or priorities. | 12-13-2012 |
20130159223 | Virtual Sensor Development - Embodiments include processes, systems, and devices for developing a virtual sensor. The virtual sensor includes one or more inference models. A decision engine utilizes an inference model associated with a mobile device to determine another inference model that is configured to accept physical sensor data from another mobile device. In this way, the virtual sensor can be developed for use with many mobile devices using initial inference models developed for a small number of mobile devices or a single mobile device. Embodiments also include methods to select mobile devices from which to request physical sensor data for virtual sensor input. Embodiments also include architectures that provide a library of virtual sensors. | 06-20-2013 |
20130173513 | CONTEXT-BASED DEVICE ACTION PREDICTION - The described implementations relate to automatically performing device actions. One implementation can obtain a contextual value of a contextor. The implementation can decide, using a decision engine, whether to perform an action on a computing device based on the contextual value. In an instance when the decision engine decides that the action is to be performed, the implementation can perform the action on the computing device. The implementation can also update the decision engine using feedback related to the action. As a specific example, the action can be prelaunching an application before a user has requested to execute the application. Prelaunching the application can reduce application latency relative to waiting for the user to request to execute the application before launching the application. | 07-04-2013 |
20130174128 | Estimating Application Energy Usage in a Target Device - Embodiments provide implementations for estimating a test application's energy usage on a target device based on execution of the test application. Resource usage associated with the execution of the test application is measured. The measured resource usage is input into a power model of the target device to estimate the energy that the test application uses when executed on the target device. An emulation system is configured to execute the test application in a virtual execution environment using resource scaling and simulated target device application programming interfaces to substantially simulate the corresponding capabilities of the target device. | 07-04-2013 |
20140149768 | VIRTUALIZED APPLICATION POWER BUDGETING - Virtualized application power budgeting can manage power budgeting for multiple applications in data centers. This power budgeting may be done in intelligent and/or dynamic ways and may be useful for updating power budgets, resolving conflicts in requests for power, and may improve the efficiency of the distribution of power to multiple applications. | 05-29-2014 |
20140192722 | SELECTION OF SENSORS FOR MONITORING PHENOMENA CONSIDERING THE VALUE OF INFORMATION AND DATA SHARING PREFERENCES - A method disclosed herein includes the act of computing a value of information for obtaining data from a personal sensor of a user for utilization in a utilitarian computing application, wherein a mobile computing device comprises the personal sensor of the user. The method further includes the act of requesting that the mobile computing device transmit a data packet to the computing device based at least in part upon the value of information for obtaining data from the personal sensor of the user. | 07-10-2014 |
20140201741 | WORKLOAD INTERFERENCE ESTIMATION AND PERFORMANCE OPTIMIZATION - Architecture that facilitates the estimation of interference among workloads (e.g., virtual machines) due to sharing of a shared resource (e.g., a shared cache of a computer processor), and optimization of a desired performance objective such as power or energy use in the presence of the interference. Estimation is to the extent of interference by characterizing the nature of shared resource usage and its effect on performance. Performance optimization is accomplished using metrics based on the above estimation, or alternatively, an explicit measurement of the interference effects. Methods are employed to estimate interference on the workload's performance with changes in availability of the shared resource or with combinations of other workloads sharing the same resource and allocating workloads to one or more physical computers or resources to workloads such that a desired performance objective is optimized. The methods can include allocating workloads on demand. | 07-17-2014 |
20140351613 | VIRTUAL MACHINE POWER CONSUMPTION MEASUREMENT AND MANAGEMENT - Embodiments of the virtual machine power metering system and method measure the power consumption of individual virtual machines. Power meter measurements for a physical host server are converted into individual virtual machine power meters that measure the power consumption of each individual virtual machine residing on the host server. The virtual machine power consumption is computed by generating a power model using the total power consumption of the host server and resource utilization for a virtual machine. Optimal power model coefficients are computed using the power model. The energy used by the virtual machine is computed using one of two embodiments. Embodiments of the system and method also can be used to obtain the power consumption for a specific activity (such as a service, request, or search query). In addition, the virtual machine power metering can be used for virtual machine power capping to allow power oversubscription in virtualized environments. | 11-27-2014 |