Patent application number | Description | Published |
20150127392 | SYSTEMS AND METHODS FOR TICKETED EVENT NOTIFICATIONS - Computing systems and methods for automatically providing event-related notifications to users are provided. Purchased-ticket events can be identified by scraping user emails. Ticket information such as dates and locations of events can also be gathered. User friends such as contacts in the user's social networks that have purchased tickets for the identified events may be identified. For future events, the user can be notified of friends that are attending the event, event-related vendor offers, ticket resale alerts, and event-time alerts. For past events, the user can be notified of shared comments or photos from friends or others. Consumers in a common geographical area with the user that have purchased tickets for the same events can also be identified. The user can be notified of identified neighbors attending the event or a community chat webpagc for the event can be provided. | 05-07-2015 |
20150134371 | SYSTEMS AND METHODS FOR AUTOMATIC SCRAPBOOK GENERATION - Computing systems and methods for facilitating automatic generation and maintenance of an online scrapbook are provided. The online scrapbook may be a repository of ticketed-event information and associated photos, comments or other mementos associated with the ticketed events. The scrapbook may include a timeline of future and past purchased-ticket events and associated links for inviting others to future events, reselling tickets to future events, sharing events with others through social networking, displaying photos of past events, or commenting on past or future events. Events for the webpage may be identified through a user account on a ticket server or by scraping a user's email account for event-related emails. The photos may be gathered from social networking sites associated with the user and sorted by event based on the time, location, or content of the photo. | 05-14-2015 |
20150154513 | SYSTEMS AND METHODS FOR ENHANCED TICKET SALES - Computing systems and methods for enhanced ticket sales are provided. The enhanced ticket sales may include presentation of community-sourced seat information to a potential ticket buyer that describes the human experience of sitting in each particular seat at a venue. The community-sourced seat information for each particular seat can be photos, comments, or other data that have been gathered by a ticket server from online content posted by people that have attended previous events in that seat. The online content can be gathered from email accounts, social network accounts, or other online sources. In this way, the human experience of some or all of the people who have sat in a particular seat at various events, as recorded in photos, comments, articles or other online data, can be collected, filtered, and provided to a potential purchaser of a ticked for that seat. | 06-04-2015 |
Patent application number | Description | Published |
20130311530 | APPARATUS AND METHOD FOR SELECTING ELEMENTS OF A VECTOR COMPUTATION - An apparatus and method are described for performing a vector reduction. For example, an apparatus according to one embodiment comprises: a reduction logic tree comprised of a set of N-1 reduction logic blocks used to perform reduction in a single operation cycle for N vector elements; a first input vector register storing a first input vector communicatively coupled to the set of reduction logic blocks; a second input vector register storing a second input vector communicatively coupled to the set of reduction logic blocks; a mask register storing a mask value controlling a set of one or more multiplexers, each of the set of multiplexers selecting a value directly from the first input vector register or an output containing a processed value from one of the reduction logic blocks; and an output vector register coupled to outputs of the one or more multiplexers to receive values output passed through by each of the multiplexers responsive to the control signals. | 11-21-2013 |
20130332701 | APPARATUS AND METHOD FOR SELECTING ELEMENTS OF A VECTOR COMPUTATION - An apparatus and method are described for selecting elements to be used in a vector computation. For example, a method according to one embodiment includes the following operations: specifying whether to identify the first, last or next after last active element of an input mask register using an immediate value; identifying the first, last or next after last active element in the input mask register according to the immediate value; reading a value from an input vector register corresponding to the identified first, last or next after last active element in the input mask register; and writing the value to an output vector register. | 12-12-2013 |
20140089634 | APPARATUS AND METHOD FOR DETECTING IDENTICAL ELEMENTS WITHIN A VECTOR REGISTER - An apparatus, system and method are described for identifying identical elements in a vector register. For example, a computer implemented method according to one embodiment comprises the operations of: reading each active element from a first vector register, each active element having a defined bit position within the first vector register; reading each element from a second vector register, each element having a defined bit position within the second vector register corresponding to a bit position of a current active element in the first vector register; reading an input mask register, the input mask register identifying active bit positions in the second vector register for which comparisons are to be made with values in the first vector register, the comparison operations comprising: comparing each active element in the second vector register with elements in the first vector register having bit positions preceding the bit position of the current active element in the second vector register; and setting a bit position in an output mask register equal to a true value if all of the preceding bit positions in the first vector register are equal to the bit in the current active bit position in the second vector register. | 03-27-2014 |
20140096119 | LOOP VECTORIZATION METHODS AND APPARATUS - Loop vectorization methods and apparatus are disclosed. An example method includes setting a dynamic adjustment value of a vectorization loop; executing the vectorization loop to vectorize a loop by grouping iterations of the loop into one or more vectors; identifying a dependency between iterations of the loop as; and setting the dynamic adjustment value based on the identified dependency. | 04-03-2014 |
20140181580 | SPECULATIVE NON-FAULTING LOADS AND GATHERS - According to one embodiment, a processor includes an instruction decoder to decode an instruction to read a plurality of data elements from memory, the instruction having a first operand specifying a storage location, a second operand specifying a bitmask having one or more bits, each bit corresponding to one of the data elements, and a third operand specifying a memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the instruction, to read one or more data elements speculatively, based on the bitmask specified by the second operand, from a memory location based on the memory address indicated by the third operand, and to store the one or more data elements in the storage location indicated by the first operand. | 06-26-2014 |
20140189288 | INSTRUCTION TO REDUCE ELEMENTS IN A VECTOR REGISTER WITH STRIDED ACCESS PATTERN - A vector reduction instruction with non-unit strided access pattern is received and executed by the execution circuitry of a processor. In response to the instruction, the execution circuitry performs an associative reduction operation on data elements of a first vector register. Based on values of the mask register and a current element position being processed, the execution circuitry sequentially set one or more data elements of the first vector register to a result, which is generated by the associative reduction operation applied to both a previous data element of the first vector register and a data clement of a third vector register. The previous data element is located more than one element position away from the current element position. | 07-03-2014 |
20140189323 | APPARATUS AND METHOD FOR PROPAGATING CONDITIONALLY EVALUATED VALUES IN SIMD/VECTOR EXECUTION - An apparatus and method for propagating conditionally evaluated values. For example, a method according to one embodiment comprises: reading each value contained in an input mask register, each value being a true value or a false value and having a bit position associated therewith; for each true value read from the input mask register, generating a first result containing the bit position of the true value; for each false value read from the input mask register following the first true value, adding the vector length of the input mask register to a bit position of the last true value read from the input mask register to generate a second result; and storing each of the first results and second results in bit positions of an output register corresponding to the bit positions read from the input mask register. | 07-03-2014 |
20140223139 | SYSTEMS, APPARATUSES, AND METHODS FOR SETTING AN OUTPUT MASK IN A DESTINATION WRITEMASK REGISTER FROM A SOURCE WRITE MASK REGISTER USING AN INPUT WRITEMASK AND IMMEDIATE - Embodiments of systems, apparatuses, and methods for performing in a computer processor generation of a predicate mask based on vector comparison in response to a single instruction are described. | 08-07-2014 |
20140237303 | APPARATUS AND METHOD FOR VECTORIZATION WITH SPECULATION SUPPORT - An apparatus and method are described for detecting and responding to fault conditions in a processor. For example, one embodiment of a method comprises: reading each active element in succession from a first vector register, each active element specifying an address for a gather or load operation; detecting one or more fault conditions associated with one or more of the active elements; for each active element read in succession prior to a detected fault condition on an element other than the first active element, storing the data loaded from an address associated with the active element in a first output vector register; and for each active element associated with the detected fault condition and following the detected fault condition, setting a bit in an output mask register to indicate the detected fault condition. | 08-21-2014 |
20150186183 | Instruction and Logic for Cache-Based Speculative Vectorization - A processor includes a decoder to decode an instruction, a scheduler to schedule the instruction, and an execution unit to execute the instruction. The instruction is to load a memory operation applicable to a quantity of addresses into an execution vector. The execution vector includes a plurality of vector positions for respective addressees. The instruction is further to evaluate, for a given address in the execution vector at a vector position, whether a cache indicates that a previous memory operation was performed at a higher vector position than the vector position of the given address. The instruction is also to determine, based on the evaluation whether the cache indicates that the previous memory operation was performed at a higher vector position than the vector position of the given address, whether the memory operation will cause a memory error. | 07-02-2015 |
20150268940 | AUTOMATIC LOOP VECTORIZATION USING HARDWARE TRANSACTIONAL MEMORY - Technologies for automatic loop vectorization include a computing device with an optimizing compiler. During an optimization pass, the compiler identifies a loop and generates a transactional code segment including a vectorized implementation of the loop body including one or more vector memory read instructions capable of generating an exception. The compiler also generates a non-transactional fallback code segment including a scalar implementation of the loop body that is executed in response to an exception generated within the transactional code segment. The compiler may detect whether the loop contains a memory read dependent on a condition that may be updated in a previous iteration or whether the loop contains a potential data dependence between two iterations. The compiler may generate a dynamic check for an actual data dependence and an explicit transactional abort instruction to be executed when an actual data dependence exists. Other embodiments are described and claimed. | 09-24-2015 |
20160092285 | Method and Apparatus for Approximating Detection of Overlaps Between Memory Ranges - A computer-implemented method for managing loop code in a compiler includes using a conflict detection procedure that detects across-iteration dependency for arrays of single memory addresses to determine whether a potential across-iteration dependency exists for arrays of memory addresses for ranges of memory accessed by the loop code. | 03-31-2016 |
Patent application number | Description | Published |
20110010332 | REPRESENTING AN OBJECT AS AN AGGREGATE OF IDENTIFIABLE PARTS SHAREABLE BY USERS OF A COLLABORATION SYSTEM - A computer that is programmed with collaboration software receives a change to be made to an object that can be of any type among several predetermined types such as message, document, contact, discussion and meeting. The object is represented as an aggregate of identifiable parts shareable by users, including at least a content part, a lock part, and an access-control part. Each version of the object is represented by a set of identifiers of these parts. In response to receipt of information identifying the change, the computer automatically identifies a specific part to be changed from among multiple parts of the object. Thereafter, the computer automatically creates a new instance of the specific part which contains the change as per the received information. The computer automatically stores a new version of the object as a new set that includes a new identifier of the new instance of the specific part. | 01-13-2011 |
20110010333 | REPRESENTING ATTACHMENTS OF OBJECTS IN A COLLABORATION SYSTEM USING METADATA COPIES - A computer that is programmed with software attaches one object (“from-object”) to another object (“to-object”) by preparing a new duplicate of certain metadata in the from-object, without copying any content of the from-object. The new duplicate metadata is stored in memory for use in identifying the from-object and the to-object as being attached. If the from-object itself has any existing attachments, e.g. to a group of additional objects, there already exists a group of existing metadatas that form existing attachments between the from-object and the group of additional objects. In such a case, the computer still prepares, without content copying, a group of new metadatas to identify the relationship between a corresponding additional object and the from-object. Some embodiments also identify the to-object within each metadata in the group of new metadatas, thereby to identify a path of objects through which an additional object is accessible. | 01-13-2011 |
20110010334 | SHARED STORAGE OF CATEGORIZATION, LABELING OR TAGGING OF OBJECTS IN A COLLABORATION SYSTEM - A computer that is programmed with collaboration software receives a new value of an attribute (or property or characteristic) which is specific to a label (or tag or category) as applied to an object managed by the computer. The computer does not use the new value to overwrite a corresponding old value in existing metadata. Instead, the computer is programmed to hold the new value in an incremental label application for the object. The computer is further programmed to respond to a request for the object's label application, by retrieving the incremental label application, and a full application of said label to said object. The computer uses attribute values in the incremental label application to update corresponding attribute values in a copy of the full label application, in a time sequence based on the time of creation of incremental label applications, thereby to generate a current label application. | 01-13-2011 |
20110071993 | METHOD AND SYSTEM FOR EFFICIENT ENFORCEMENT OF DERIVED LOCKS IN A HIERARCHICAL STRUCTURE - An improved approach is described for handling locks and locking for hierarchical structures. The approach efficiently captures lock information for hierarchical nodes as well as for the enforcement of derived locks. Support is provided for locking of leaf nodes as well as for locking of intermediate nodes. | 03-24-2011 |
20140074659 | RAMPED ORDERING FOR CLOUD SERVICES - Provisioning, managing and tracking of services provided by a cloud infrastructure system are described. A subscription request from a customer for one or more services provided by the cloud infrastructure system is received. The request includes a specification of services with different service levels for different time periods. A phased deployment of a customer's subscription order based on the service levels and time periods specified by the customer in the subscription order is then determined. | 03-13-2014 |
20140074788 | DATA SYNCHRONIZATION IN A CLOUD INFRASTRUCTURE - A synchronization infrastructure that synchronizes data stored between components in a cloud infrastructure system is described. A first component in the cloud infrastructure system may store subscription information related to a subscription order which may in turn be utilized by a second component in the cloud infrastructure system to orchestrate the provisioning of services and resources for the order placed by the customer. The synchronization architecture utilizes transactionally consistent checkpoints that describe the state of the data stored in the components to synchronize the data between these components. | 03-13-2014 |
20140075016 | OVERAGE FRAMEWORK FOR CLOUD SERVICES - Provisioning, managing and tracking of services provided by a cloud infrastructure system are described. A subscription request from a customer for one or more services provided by the cloud infrastructure system is received. Resources for the requested services are then provisioned. Resource usage information for the resources is collected and an overuse of the resources provisioned to the services in the subscription request, by a customer is determined. The overage information is provided to the customer. | 03-13-2014 |
20140075032 | DECLARATIVE AND EXTENSIBLE MODEL FOR PROVISIONING OF CLOUD BASED SERVICES - A method for offering a set of services is disclosed. The method may comprise storing, by a cloud infrastructure system, subscription order information identifying a service from a set of services provided by the cloud infrastructure system, the cloud infrastructure system comprising one or more computing devices. A computing device from the one or more computing devices may determine a service declaration for the service, the service declaration comprising information indicative of procedures for provisioning resources for enabling the service. A computing device from the one or more computing devices may cause the service to be provisioned based on the service declaration. | 03-13-2014 |
20140075034 | CUSTOMIZABLE MODEL FOR THROTTLING AND PRIORITIZING ORDERS IN A CLOUD ENVIRONMENT - A method for controlling the provisioning of a service associated with a customer order is disclosed. The method may comprise receiving, by a cloud infrastructure system, an order for a service from a plurality of service provided by the cloud infrastructure system, the cloud infrastructure system comprising one or more computing devices. Additionally, the method may comprise determining, by a computing device from the one or more computing devices, based upon a set of rules and system-related information, whether the order is to be forwarded for provisioning one or more resources for enabling the order. Then, based upon the determining, the method may forward the order for provisioning of the one or more resources or not forwarding the order for provisioning. | 03-13-2014 |
20140075499 | SECURITY INFRASTRUCTURE FOR CLOUD SERVICES - A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during processing of a customer's subscription order is described. The framework orders the security zones of components based on security levels and protects the transfer of information between components in security zones with different security levels. The assignment of a component to a security zone is based upon the sensitivity of the data handled by the components, the sensitivity of functions performed by the component, and the like. | 03-13-2014 |
20140143083 | SUBSCRIPTION ORDER GENERATION FOR CLOUD SERVICES - A framework for managing service components associated with a service subscribed to by a customer in a cloud infrastructure system is disclosed. The framework generates a subscription order for the customer based upon receiving a selection of service components from the customer. The framework identifies resource metrics associated with the service components selected by the customer and generates a subscription order for the customer based upon the service components and the resource metrics. | 05-22-2014 |
20150156218 | SECURITY INFRASTRUCTURE FOR CLOUD SERVICES - A framework for handling a secure interaction between components in a cloud infrastructure system that wish to transfer information between each other during processing of a customer's subscription order is described. The framework orders the security zones of components based on security levels and protects the transfer of information between components in security zones with different security levels. The assignment of a component to a security zone is based upon the sensitivity of the data handled by the components, the sensitivity of functions performed by the component, and the like. | 06-04-2015 |
20150363724 | REUSABLE ANONYMOUS SUBSCRIPTION - Anonymous reuse of cloud services in a computer network cloud infrastructure system is described. Cloud services can include infrastructure as a service (IAAS) storage and processing services, platform as a service (PAAS) database and Java services, and software as a service (SAAS) customer relationship management services. Upon subscribing to a cloud system, services can be configured from an existing pool of pre-provisioned services. When a service is to be decommissioned, its resources are returned back to the pool for reuse thereby minimizing the time to provision new resources as well as maximizing resource usage. | 12-17-2015 |
20150365301 | RULE BASED SUBSCRIPTION CLONING - Aspects of the present invention relate to techniques for providing a user with access to a service provided by a cloud infrastructure system based on an existing service. A user may be provided with a clone subscription based on a base subscription to an existing service provided by the cloud infrastructure system. A clone subscription can provide the user with an environment (e.g., a service) that is designated for one use (e.g., development and testing) different from another use (e.g., production) designed for a base subscription. Changes made to a base subscription may be propagated to the clone subscription based on rules. A clone subscription can be modified to vary the clone configuration independently from the base configuration. | 12-17-2015 |
20160070772 | DATA SYNCHRONIZATION IN A CLOUD INFRASTRUCTURE - A synchronization infrastructure that synchronizes data stored between components in a cloud infrastructure system is described. A first component in the cloud infrastructure system may store subscription information related to a subscription order which may in turn be utilized by a second component in the cloud infrastructure system to orchestrate the provisioning of services and resources for the order placed by the customer. The synchronization architecture utilizes transactionally consistent checkpoints that describe the state of the data stored in the components to synchronize the data between these components. | 03-10-2016 |
20160105372 | CUSTOMIZABLE MODEL FOR THROTTLING AND PRIORITIZING ORDERS IN A CLOUD ENVIRONMENT - A method for controlling the provisioning of a service associated with a customer order is disclosed. The method may comprise receiving, by a cloud infrastructure system, an order for a service from a plurality of service provided by the cloud infrastructure system, the cloud infrastructure system comprising one or more computing devices. Additionally, the method may comprise determining, by a computing device from the one or more computing devices, based upon a set of rules and system-related information, whether the order is to be forwarded for provisioning one or more resources for enabling the order. Then, based upon the determining, the method may forward the order for provisioning of the one or more resources or not forwarding the order for provisioning. | 04-14-2016 |
Patent application number | Description | Published |
20110096706 | METHODS AND APPARATUS FOR PAGING RECEPTION IN MULTIMODE WIRELESS NETWORKS - Methods and apparatus enabling a mobile device to receive paging notifications from multiple networks. In one embodiment of the present invention, a first device connected to a first network momentarily ignores the first network, to monitor a second network instead. The first device identifies and prioritizes a list of applications of the first network; the prioritized listing allows the first device to preempt one of its lower priority tasks to monitor the second network for paging messages instead. The described methods and apparatus enable e.g., GSM paging for Class B cellular devices which are connected to GPRS NMO-2 type networks. The Class B cellular device can ignore certain GPRS data (which is tolerant to error), to decode GSM paging channels, which would otherwise be missed. | 04-28-2011 |
20110143805 | METHOD AND APPARATUS TO IMPROVE THE ROBUSTNESS OF A WIRELESS COMMUNICATION LINK - A method and apparatus to improve the robustness of a wireless communication link between a base station and a mobile communication device. The method increases power selectively on portions of an uplink communication signal transmitted from the mobile communication device to the base station. The method monitors a quality metric value at the mobile communication device and sets the transmit power level of the first portion of an uplink communication signal to the first power level, if the monitored quality metric value is in a first range of quality values, or sets the transmit power level of the first portion of the uplink communication signal to a second power level, if the monitored quality metric value is in a second range of quality values. The first portion of the uplink communication signal includes control signals used by a base station to maintain connection of the wireless communication link. | 06-16-2011 |
20110195713 | METHODS FOR SELECTING CELLS IN CELLULAR TELEPHONE SYSTEMS - User equipment such as cellular telephones and other wireless electronic devices may communicate wirelessly with 2G and 3G cells in a cellular network. The cellular network may broadcast a list of primary scrambling codes corresponding to 3G cell sites that are potentially available for wirelessly communicating with the user equipment. The user equipment may perform an evaluation of primary scrambling code pilot signal strengths for each of the primary scrambling codes in the list. The user equipment may also maintain a record whenever a more extensive full primary scrambling code scan fails. If the evaluation reveals that at least one signal strength is sufficient, the cellular telephone may establish a corresponding 3G wireless link. If the evaluation does not identify any sufficiently strong 3G cells, a full pilot signal scan may be performed, provided that no full scans have failed within a predetermined time interval before the current time. | 08-11-2011 |
20110207459 | METHOD AND APPARATUS FOR CELL RESELECTION - A method of reselecting a mobile wireless communication device to a network subsystem before initiating a connection with a wireless communication network. A connection request is received by the mobile wireless communication device in response to a user input. Attributes of signals received by the mobile wireless communication device from multiple network subsystems in the wireless communication network are measured over a period of time. The mobile wireless communication device is associated with one of the network subsystems and not associated with other network subsystems. The mobile wireless communication device reselects to one of the network subsystems based on quality metrics generated from the measured received signal attributes. After reselection, the mobile wireless communication device initiates a connection through the reselected network subsystem. | 08-25-2011 |
20110256863 | METHOD AND APPARATUS FOR WIRELESS RADIO FREQUENCY TEST SIGNAL GENERATION - Generating a radio frequency test signal for a mobile wireless communication device from a set of scanned radio frequency data that represents a plurality of radio frequency channels over a sequence of time intervals. A segment of the set of scanned radio frequency data over a time interval is classified into one of several radio frequency environments. A subset of the segment of scanned radio frequency data is selected based on the classified radio frequency environment. A segment of the radio frequency test signal is generated using the selected subset of scanned radio frequency data. The steps of classifying, selecting and generating are repeated for each time interval in the sequence of time intervals. Classifying the segment of scanned radio frequency data into a radio frequency environment includes comparing a set of statistics extracted from the segment of scanned radio frequency data to pre-defined classification ranges. | 10-20-2011 |
20110319081 | FAST CELL SELECTION IN A MOBILE WIRELESS DEVICE - A method and apparatus for fast cell selection by a mobile wireless device. The mobile wireless device detects when a first wireless cell fails a set of stored suitability criteria and searches for and locates a set of candidate wireless cells to associate with. The mobile wireless device measures at least one received signal metric for each candidate wireless cell in the set of candidate wireless cells. When a candidate cell in the set of candidate wireless cells is identically the first wireless cell, the mobile wireless device evaluates the suitability of the candidate wireless cell using the stored set of suitability criteria for the first wireless cell and the measured at least one received signal metric for the candidate wireless cell. The mobile wireless communication device associates with the candidate wireless cell when the candidate wireless cell meets the stored set of suitability criteria. | 12-29-2011 |
20110320856 | METHOD AND APPARATUS FOR SELECTIVE READING OF SYSTEM INFORMATION IN A MOBILE WIRELESS DEVICE - A method to read selectively system information messages in a mobile wireless communication device. The mobile wireless device receives a first transmission of a multiple segment message through a radio frequency receiver. The mobile wireless device detects decoding errors in at least one of the received segments of the first transmission. In response to detecting decoding errors, the mobile wireless device selectively receives a first subset of segments in a second transmission of the multiple segment message. The mobile wireless device powers down at least a portion of the radio frequency receiver during receive time intervals for a second subset of segments in the second transmission. The first subset of segments in the second transmission corresponds to segments in the first transmission received with decoding errors. The second subset of segments in the second transmission corresponds to segments in the first transmission received without decoding errors. | 12-29-2011 |
20130244719 | METHODS AND APPARATUS FOR PARAMETER ADJUSTMENT DURING MEASUREMENT GAPS - Methods and apparatus for parameter (e.g., timing) adjustment in a wireless network. In one embodiment, the timing adjustment includes detection and compensation for one or more missed adjustment messages. In one variant, for certain designated events, a client device may ignore a timer expiration, and apply a previously stored timing advance (TA) command. For example, a user equipment (UE) will determine if a TA command has been missed during a measurement gap interval (such as e.g., to perform measurements on an unsynchronized network), and reuse the previous TA command value. Reusing the TA command value introduces negligible error, which can be corrected in existing error correction capabilities (e.g., OFDM cyclic prefixes, etc.). | 09-19-2013 |
20140018075 | Forced Cell or Radio Access Technology Reselection Responsive to Network Access Barring - A method and apparatus for forced cell/RAT reselection is disclosed. In one embodiment, a cellular mobile communication device may attempt to access a network through a serving cell. Responsive to determining that access to the network is barred through the serving cell, the mobile communication device may determine if another cell is available through which it may obtain access to the network. If another cell providing network access is available, the mobile communication device may force reselection from the serving cell to the new cell. If no other cell providing access to the network is available to the mobile communication device, a forced reselection of a radio access technology may be performed. | 01-16-2014 |
20140064165 | RADIO POWER SAVING TECHNIQUES FOR VIDEO CONFERENCE APPLICATIONS - In video conferencing over a radio network, the radio equipment is a major power consumer especially in cellular networks such as LTE. In order to reduce the radio power consumption in video conferencing, it is important to introduce an enough radio inactive time. Several types of data buffering and bundling can be employed within a reasonable range of latency that doesn't significantly disrupt the real-time nature of video conferencing. In addition, the data transmission can be synchronized to the data reception in a controlled manner, which can result in an even longer radio inactive time and thus take advantage of radio power saving modes such as LTE C-DRX. | 03-06-2014 |
20140126522 | METHODS AND APPARATUS FOR PAGING RECEPTION IN MULTIMODE WIRELESS NETWORKS - Methods and apparatus enabling a mobile device to receive paging notifications from multiple networks. In one embodiment of the present invention, a first device connected to a first network momentarily ignores the first network, to monitor a second network instead. The first device identifies and prioritizes a list of applications of the first network; the prioritized listing allows the first device to preempt one of its lower priority tasks to monitor the second network for paging messages instead. The described methods and apparatus enable e.g., GSM paging for Class B cellular devices which are connected to GPRS NMO-2 type networks. The Class B cellular device can ignore certain GPRS data (which is tolerant to error), to decode GSM paging channels, which would otherwise be missed. | 05-08-2014 |
20140198699 | Reducing Power Consumption in Voice over LTE Terminals using Semi Persistent Scheduling in Connected Discontinuous Reception Mode - A connection with a network that includes a base station (BS) may be established by a user device (UE) via a wireless connection, for conducting communications using semi persistent scheduling (SPS) in a connected discontinuous reception (C-DRX) mode. The SPS transmit periodicity may be adjusted with respect to the SPS activation command and the SPS interval UL (for uplink). Data may then be transmitted during the C-DRX On-Duration periods according to the determined SPS transmit periodicity. In some embodiments, the SPS transmit periodicity is adjusted such that following a first C-DRX On-Duration period when an SPS activation command is received, SPS data transmission occurs a specified number of subframes earlier during each subsequent C-DRX On-Duration period than in the first C-DRX On-Duration period. The SPS data transmission in each subsequent C-DRX On-Duration period may take place as soon as the UE device wakes up during the On-Duration period. | 07-17-2014 |
20140219151 | REDUCING POWER CONSUMPTION IN CONNECTED MODE DISCONTINUOUS RECEPTION - A method for reducing power consumption in connected mode discontinuous reception is disclosed. The method can include a wireless communication device sending a transmission for a pending HARQ retransmission process and receiving an ACK for the transmission. The method can further include the wireless communication device determining a subset of remaining uplink transmission opportunities in the pending HARQ retransmission process to monitor for an uplink grant in response to receiving the ACK and monitoring the subset of remaining uplink transmission opportunities for an uplink grant. The method can additionally include the wireless communication device entering a sleep state for any uplink transmission opportunities remaining in the pending HARQ retransmission process after monitoring the subset of remaining uplink transmission opportunities in an instance in which an uplink grant for the pending HARQ retransmission process is not received for any of the subset of remaining uplink transmission opportunities. | 08-07-2014 |
20140219246 | SRVCC HANDOVER INDICATION FOR REMOTE PARTY TO VOICE CALL - A method for providing indication of an SRVCC handover is disclosed. The method can include a first wireless communication device participating in a voice call with a second wireless communication device via a connection between the first wireless communication device and a first network. The method can further include the first wireless communication device determining a condition indicative of an impending SRVCC handover of the first wireless communication device from the first network to a legacy network. In response to the condition, the method can additionally include the first wireless communication device formatting a message including an indication that the first wireless communication device is going to perform the SRVCC handover and sending the message to the second wireless communication device prior to performance of the SRVCC handover. | 08-07-2014 |
20140241232 | MBSFN-AWARE ADAPTIVE CHANNEL ESTIMATION - Apparatus and methods for channel estimation in a Multimedia Broadcast Multicast Service (MBMS) Single Frequency Network (MBSFN) are disclosed. A representative method includes a wireless communication device receiving multiple frames, each frame including multiple subframes, each subframe including multiple symbols. The wireless communication device determines whether subframes include MBMS data or not. For subframes that include MBMS data, the wireless communication device excludes all or certain symbols of the subframes that include MBMS data from a channel estimation process. The wireless communication device determines whether the subframes include MBMS data based at least in part on a channel impulse response and/or a channel energy response for one or more symbols of the subframes. | 08-28-2014 |
20140362162 | RADIO POWER SAVING TECHNIQUES FOR VIDEO CONFERENCE APPLICATIONS - In video conferencing over a radio network, the radio equipment is a major power consumer especially in cellular networks such as LTE. In order to reduce the radio power consumption in video conferencing, it is important to introduce an enough radio inactive time. Several types of data buffering and bundling can be employed within a reasonable range of latency that doesn't significantly disrupt the real-time nature of video conferencing. In addition, the data transmission can be synchronized to the data reception in a controlled manner, which can result in an even longer radio inactive time and thus take advantage of radio power saving modes such as LTE C-DRX. | 12-11-2014 |
20140362830 | ENHANCING JITTER BUFFER PERFORMANCE THROUGH RADIO LEVEL FEEDBACK - A jitter buffer in a Voice over LTE receiver may be influenced by radio level feedback (RLF) from both local and remote endpoints to preemptively adjust the jitter buffer delay in anticipation of predicted future losses that have a high probability of occurring. The radio events of the RLF and the scenarios that trigger the preemptive adjustments may be identified, and their use may be expressed in terms of mathematical formulas. In prior art designs, the instantaneous jitter is derived from a weighted history of the media stream, and consequently only packets that have already arrived are used to compute the instantaneous jitter to adjust the length of the buffer. By providing and using RLF from both local and remote endpoints, the anticipated delay—for packets that have not yet arrived—may be used to preemptively adjust the buffer, thereby minimizing packet loss without introducing unnecessary delay. | 12-11-2014 |
20150105078 | METHOD AND APPARATUS FOR CELL RESELECTION - A method of reselecting a mobile wireless communication device to a network subsystem before initiating a connection with a wireless communication network. A connection request is received by the mobile wireless communication device in response to a user input. Attributes of signals received by the mobile wireless communication device from multiple network subsystems in the wireless communication network are measured over a period of time. The mobile wireless communication device is associated with one of the network subsystems and not associated with other network subsystems. The mobile wireless communication device reselects to one of the network subsystems based on quality metrics generated from the measured received signal attributes. After reselection, the mobile wireless communication device initiates a connection through the reselected network subsystem. | 04-16-2015 |
20150230182 | Methods and Apparatus for Improving Power Consumption in a Wireless Network - Methods and apparatus for power optimization in e.g., a wireless mobile device. In one embodiment, the optimization is effected via intelligent idle mode current drain management. In an exemplary LTE cellular network context, the user equipment (UE) only powers on its transceiver for a subset of Discontinuous Reception (DRX) cycles based on e.g., the quality of the radio environment, power considerations, location, etc. For example, if a UE has not moved, and its radio reception quality is good, the UE is likely to successfully receive a paging notification (i.e., without multiple attempts). Consequently, the UE configures itself to receive only a single paging indication. | 08-13-2015 |
20150237549 | FAST CELL SELECTION IN A MOBILE WIRELESS DEVICE - A method and apparatus for fast cell selection by a mobile wireless device. The mobile wireless device detects when a first wireless cell fails a set of stored suitability criteria and searches for and locates a set of candidate wireless cells to associate with. The mobile wireless device measures at least one received signal metric for each candidate wireless cell in the set of candidate wireless cells. When a candidate cell in the set of candidate wireless cells is identically the first wireless cell, the mobile wireless device evaluates the suitability of the candidate wireless cell using the stored set of suitability criteria for the first wireless cell and the measured at least one received signal metric for the candidate wireless cell. The mobile wireless communication device associates with the candidate wireless cell when the candidate wireless cell meets the stored set of suitability criteria. | 08-20-2015 |
20150351060 | ENHANCING JITTER BUFFER PERFORMANCE THROUGH RADIO LEVEL FEEDBACK - A jitter buffer in a Voice over LTE receiver may be influenced by radio level feedback (RLF) from both local and remote endpoints to preemptively adjust the jitter buffer delay in anticipation of predicted future losses that have a high probability of occurring. The radio events of the RLF and the scenarios that trigger the preemptive adjustments may be identified, and their use may be expressed in terms of mathematical formulas. Previously, the instantaneous jitter was derived from a weighted history of the media stream, and consequently only packets that had already been received were used to compute the instantaneous jitter to adjust the length of the buffer. By providing and using RLF from both local and remote endpoints, the anticipated delay—for packets that have not yet arrived—may be used to preemptively adjust the buffer, thereby minimizing packet loss without introducing unnecessary delay. | 12-03-2015 |
20160100131 | Radio Power Saving Techniques for Video Conference Applications - In video conferencing over a radio network, the radio equipment is a major power consumer especially in cellular networks such as LTE. In order to reduce the radio power consumption in video conferencing, it is important to introduce an enough radio inactive time. Several types of data buffering and bundling can be employed within a reasonable range of latency that doesn't significantly disrupt the real-time nature of video conferencing. In addition, the data transmission can be synchronized to the data reception in a controlled manner, which can result in an even longer radio inactive time and thus take advantage of radio power saving modes such as LTE C-DRX. | 04-07-2016 |
Patent application number | Description | Published |
20130210420 | METHODS AND APPARATUS FOR IMPROVING POWER CONSUMPTION IN A WIRELESS NETWORK - Methods and apparatus for power optimization in e.g., a wireless mobile device. In one embodiment, the optimization is effected via intelligent idle mode current drain management. In an exemplary LTE cellular network context, the user equipment (UE) only powers on its transceiver for a subset of Discontinuous Reception (DRX) cycles based on e.g., the quality of the radio environment, power considerations, location, etc. For example, if a UE has not moved, and its radio reception quality is good, the UE is likely to successfully receive a paging notification (i.e., without multiple attempts). Consequently, the UE configures itself to receive only a single paging indication. | 08-15-2013 |
20130267232 | APPARATUS AND METHODS FOR RESOLVING INCOMPLETE MESSAGE CONTENT IN NETWORKS - Methods and apparatus for resolving incomplete message content in networks. Various embodiments of the present disclosure are directed to correction and recovery of incomplete measurement report configuration messages within a Long Term Evolution (LTE) network. Specifically, within certain LTE networks, existing messaging may be incomplete in regards to various nearby ancillary networks, but still sufficient with regards to measurement requirements of the LTE network itself. Since the mobile device can continue operation within the LTE network, the mobile device can safely ignore or correct the measurement report configuration message. | 10-10-2013 |
20130318029 | DISTRIBUTED ORDER ORCHESTRATION SYSTEM WITH EXTENSIBLE FLEX FIELD SUPPORT - A distributed order orchestration system publishes one or more newly generated artifacts that are generated as a result of generating one or more extensible flex fields to a rule dictionary. The distributed order orchestration system then imports the one or more newly generated artifacts within the rule dictionary as one or more facts. The distributed order orchestration system then creates one or more rules for the rule dictionary that references the one or more facts. | 11-28-2013 |
20140106810 | Method and Apparatus to Improve the Robustness of a Wireless Communication Link - A method and apparatus to improve the robustness of a wireless communication link between a base station and a mobile communication device. The method increases power selectively on portions of an uplink communication signal transmitted from the mobile communication device to the base station. The method monitors a quality metric value at the mobile communication device and sets the transmit power level of the first portion of an uplink communication signal to the first power level, if the monitored quality metric value is in a first range of quality values, or sets the transmit power level of the first portion of the uplink communication signal to a second power level, if the monitored quality metric value is in a second range of quality values. The first portion of the uplink communication signal includes control signals used by a base station to maintain connection of the wireless communication link. | 04-17-2014 |
20150092644 | System and Method for Audio Frame Generation Alignment with LTE Transmission Opportunities - A station that generates data packets to be transmitted by the station such that the data packets spend a minimum amount of time in a buffer prior to transmission. The method includes receiving a specification for a connected discontinuous reception (C-DRX) cycle, the specification indicating when a plurality of onDurations of the C-DRX cycle occurs, the onDurations having a predetermined interval therebetween, receiving data at a known time relative to the C-DRX cycle, determining a modification to a conversion process that converts the data to data packets such that the data packets are stored in a buffer at a subframe immediately preceding one of the onDurations subsequent to the known time, performing the conversion process based upon the modification and storing the data packets at the subframe immediately preceding the one of the onDurations. In one embodiment, the data is raw audio data and the data packets are audio packets. | 04-02-2015 |
Patent application number | Description | Published |
20130024278 | LOWER BANDWIDTH SOLUTIONS USING ADLITE RICH MEDIA - The present invention provides techniques relating to rich media advertising. Techniques are provided in which an advertiser-provided image-based component of an advertisement creative is matched with an advertiser-provided audio component of the advertisement creative. A rich media advertisement may be served that includes the image-based component and a synchronously presented audio component. Utilization of the rich media advertisement may be provided as an option to an advertiser to advertising utilizing a video advertisement, such as an option that may be used to target lower bandwidth users. | 01-24-2013 |
20130024279 | ADLITE RICH MEDIA SOLUTIONS WITHOUT PRESENTATION REQUIRING USE OF A VIDEO PLAYER - The present invention provides techniques relating to rich media advertising. Techniques are provided in which an advertiser-provided image-based component of an advertisement creative is matched with an advertiser-provided audio component of the advertisement creative. A rich media advertisement may be served that includes the image-based component and a synchronously presented audio component. Presentation of the rich media advertisement on a user computer may not require downloading or utilization of a video player. | 01-24-2013 |
20130024887 | USING COMPANION ADS IN ADLITE RICH MEDIA - The present invention provides techniques relating to rich media advertising. Techniques are provided in which an advertiser-provided image-based component of an advertisement creative is matched with an advertiser-provided audio component of the advertisement creative. A rich media advertisement may be served that includes the image-based component and a synchronously presented audio component. The image-based component and the audio-based component may be elements of a companion advertisement. | 01-24-2013 |
20130282808 | System and Method for Generating Contextual User-Profile Images - Methods and systems for generating contextual user-profile image on a webpage include capturing textual content provided by a user at the webpage. The textual content is parsed to identify keywords related to context. The keywords are contextually analyzed to identify one or more mood indicators. Current mood of the user is identified based on the one or more mood indicators. One or more modifiers for applying to the user-profile image are determined. The user-profile image is updated to incorporate the modifiers so as to reflect the current mood of the user. The updated user-profile image is returned to the webpage for rendering, in response to the textual content received from the user. | 10-24-2013 |
20130318175 | METHOD AND SYSTEM FOR GENERATING RECIPIENTS WHILE COMPOSING ELECTRONIC MAILS - A computer-implemented method of generating recipients while composing electronic emails includes identifying a trigger from a user in response to the user composing an electronic mail (email). The computer-implemented method also includes receiving one or more alphabets subsequent to the trigger. The alphabets imply a recipient of the email. Further, the computer-implemented method includes fetching email addresses comprising the one or more alphabets from an address book corresponding to the user. Furthermore, the computer-implemented method includes displaying a list of the email addresses to the user. Moreover, the computer-implemented method includes filling appropriate fields in response to the user selecting one of the email addresses. | 11-28-2013 |
20140006399 | METHOD AND SYSTEM FOR RECOMMENDING WEBSITES | 01-02-2014 |
20140019460 | TARGETED SEARCH SUGGESTIONS - Methods and systems for providing search suggestions are disclosed. A webpage is analyzed. Terms from the webpage are extracted based on analyzing the webpage. At least one suggestions is generated based on the extracted terms, wherein each of the at least one suggestion is actionable. | 01-16-2014 |
20140380199 | SYSTEM AND METHOD FOR CONTEXTUALLY ENRICHING CONTENT OF A REFERRER PAGE WHEN RETURNING FROM A LANDING PAGE - Methods and systems for providing content on a webpage includes rendering a webpage having a plurality of page areas. Each of the plurality of page areas is associated with an entity having display content. Selection of one of the plurality of page areas is detected. The selection causes a landing page to be rendered in place of the webpage. A return to the webpage from the landing page is detected. In response to the return, the selected page area of the webpage is modified to include at least one additional entity having associated display content. | 12-25-2014 |
20150032740 | PERSONAL TRENDS MODULE - A system and method for generating a personalized trends module includes steps of: for a given user, producing a social timeline by logging content posted on the given user's accounts on social media sites; analyzing the social timeline for recently posted content to derive an interim summary of first trending topics for the given user; receiving from a content personalization platform an in-stream feed of second trending topics based on the user's recent on-line activity including page views, queries, and clicks; augmenting the social timeline with the second trending topics from the in-stream feed to produce an interim list of third trending topics; ranking the third trending topics by source category using a frequency index; selecting the highest ranking third trending topics from each source category; and presenting a personalized trends module with positions allocated to the highest ranking third trending topics. | 01-29-2015 |
20150149502 | AUTOMATIC DRAFT EMAIL NOTIFICATION - A system and method for automatic draft email notification includes the following steps or acts performed while a user is engaged with a first email in an active email session: retrieving a value from the first email to use as a search term; accessing draft emails associated with the user; determining if the search term from the first email matches a corresponding string in the draft emails associated with the user; and presenting the draft emails that match the search term as a listing of selectable draft emails. | 05-28-2015 |
20160034592 | PERSONAL TRENDS MODULE - A system and method for generating a personalized trends module includes steps of: for a given user, producing a social timeline by logging content posted on the given user's accounts on social media sites; analyzing the social timeline for recently posted content to derive an interim summary of first trending topics for the given user; receiving from a content personalization platform an in-stream feed of second trending topics based on the user's recent on-line activity including page views, queries, and clicks; augmenting the social timeline with the second trending topics from the in-stream feed to produce an interim list of third trending topics; ranking the third trending topics by source category using a frequency index; selecting the highest ranking third trending topics from each source category; and presenting a personalized trends module with positions allocated to the highest ranking third trending topics. | 02-04-2016 |