摘要:
An “RFID-Based Inference Platform” provides various techniques for using RFID tags in combination with other enterprise sensors to track users and objects, infer their interactions, and provide these inferences for enabling further applications. Specifically, observations are collected from combinations of RFID tag reads and other enterprise sensors including electronic calendars, user presence identifiers, cardkey access logs, computer logins, etc. Given sufficient observations, the RFID-Based Inference Platform automatically differentiates between tags associated with or affixed to people and tags affixed to objects. The RFID-Based Inference Platform then infers additional information including identities of people, ownership of specific objects, the nature of different “zones” in a workspace (e.g., private office versus conference room). These inferences are then used to enable various applications including object tracking, automated object ownership determinations, automated object cataloging, automated misplaced object alerts, video annotations, automated conference room scheduling, semi-automated object image catalogs, object interaction query systems, etc.
摘要:
An “RFID-Based Inference Platform” provides various techniques for using RFID tags in combination with other enterprise sensors to track users and objects, infer their interactions, and provide these inferences for enabling further applications. Specifically, observations are collected from combinations of RFID tag reads and other enterprise sensors including electronic calendars, user presence identifiers, cardkey access logs, computer logins, etc. Given sufficient observations, the RFID-Based Inference Platform automatically differentiates between tags associated with or affixed to people and tags affixed to objects. The RFID-Based Inference Platform then infers additional information including identities of people, ownership of specific objects, the nature of different “zones” in a workspace (e.g., private office versus conference room). These inferences are then used to enable various applications including object tracking, automated object ownership determinations, automated object cataloging, automated misplaced object alerts, video annotations, automated conference room scheduling, semi-automated object image catalogs, object interaction query systems, etc.
摘要:
An “RFID-Based Inference Platform” provides various techniques for using RFID tags in combination with other enterprise sensors to track users and objects, infer their interactions, and provide these inferences for enabling further applications. Specifically, observations are collected from combinations of RFID tag reads and other enterprise sensors including electronic calendars, user presence identifiers, cardkey access logs, computer logins, etc. Given sufficient observations, the RFID-Based Inference Platform automatically differentiates between tags associated with or affixed to people and tags affixed to objects. The RFID-Based Inference Platform then infers additional information including identities of people, ownership of specific objects, the nature of different “zones” in a workspace (e.g., private office versus conference room). These inferences are then used to enable various applications including object tracking, automated object ownership determinations, automated object cataloging, automated misplaced object alerts, video annotations, automated conference room scheduling, semi-automated object image catalogs, object interaction query systems, etc.
摘要:
A system and methodologies are disclosed for determining the geographic location of an Internet host. A first method infers host location based on the DNS names of the host of interest or other nearby network nodes. A second method employs network delay measurements from geographically distributed locations to triangulate the coordinates of the host. A third method couples partial host-to-location mapping information obtained from one or more sources with BGP or other routing information in order to infer location of the host of interest.
摘要:
Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
摘要:
A technique is disclosed that can efficiently control congestion, while supporting heterogeneity for streaming data among multiple computers in a network. A plurality of nodes is divided into a plurality of distribution trees within a computer network, wherein the data is divided into a plurality of prioritized layers. When a node experiences packet loss, the location of the congestion is inferred. If the congestion is at or near the outgoing link, outgoing traffic is shed to alleviate the congestion by shedding child node(s) receiving descriptions in the least important layer of data that the child node(s) are receiving. Similarly, if the congestion is at or near the incoming link, incoming traffic is shed by shedding parent nodes that are sending descriptions in the least important layer of data that the node is receiving. Nodes with available bandwidth are further instructed to subscribe to additional descriptions.
摘要:
Class information is leveraged to facilitate in grouping identifications (ID) to allow ID range-to-class mapping information to be determined. ID range-to-class inference techniques are employed to determine similarities of IDs associated with a class, creating ID range-to-class mapping. Identifications can include Internet Protocol (IP) addressing, telephone numbers, and other sequenceable forms of identification for users and/or computing devices. Classes can include user location, age, income, gender, language, and/or other classifications. Thus, IP address ranges, for example, can be mapped to user geographic locations using an inference technique, specifically a “GeoInference” technique. The inference techniques quickly detect IP proxy usage and identify and eliminate outliers within a given IP range, substantially increasing the accuracy of user location data. Complementary data sources can be employed to facilitate in increasing data accuracy.
摘要:
A method of reducing bandwidth limitations to send events to a set of interested clients within a pre-defined time period as quickly and fairly as possible. The clients can be re-distributed among the servers in a network such that the delay due to server overloading is minimized by moving clients from an overloaded server to a server with available bandwidth. In addition, the latency of client-server communications can be incorporated into an estimation of download times, and the servers can then initiate delivery to respective clients based on those download times. By staggering the send times to account for heterogeneous latencies, more clients can receive the event at the same time, and a fairness of distribution can be achieved.
摘要:
A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
摘要:
Communication software to aid portable computers monitor, and correct problems accessing a network through a wireless access point. The software controls the exchange of information with other portable computers in the vicinity of the wireless access point. The information exchanged may be used to diagnose problems at the wireless layer, the network layer, the transport layer or the application layer. The information exchanged may provide information about the configuration of computers that successfully or unsuccessfully communicate through the wireless access point. A portable computer receiving this configuration information may compare it to similar information about its own configuration to diagnose problems. Such software may be of particular benefit for portable computers experiencing difficulty connecting to a network at a wireless hot spot.