Abstract:
In one illustrative example, a mobile communication device has a plurality of software applications including an Internet browser application, an electronic mail (e-mail) communication application, and an audio or video player application. The mobile device is adapted to receive, from wireless communication networks or through use thereof, available quality of service data for the wireless networks and store the corresponding data in association with each network identification. The available quality of service data includes at least a bandwidth criterion and a delay criterion associated with each wireless network. For each one of the software applications, the mobile device is adapted to execute the software application; identify, based on the stored quality of service data, one or more wireless networks having a bandwidth criterion and a delay criterion that best match a bandwidth requirement and a delay requirement, respectively, of the executed software application; and select, based on the identifying, an available wireless network for communication using the executed software application.
Abstract:
A cellular communications system may include at least one base station and at least one mobile cellular communications device. More particularly, the at least one mobile cellular communications device may include a controller, at least one user input device connected to the controller, and a wireless transceiver cooperating with the controller for attempting to establish a wireless communications link with at least one base station, and if the wireless communications link cannot be established, then continuing to attempt to establish the wireless communications link at a first attempt rate. Moreover, if a user provides a request to access the at least one base station via the at least one user input device, then the controller may continue to attempt to establish the wireless communications link based upon a second attempt rate greater than the first attempt rate.
Abstract:
Techniques to dynamically manage wireless connections using feature prioritization are described. For example, a mobile computing device may comprise a connection management module operative to access a list of one or more wireless networks, compare feature set information for the one or more wireless networks, select a wireless network based on the comparison, and initiate a wireless connection using the selected wireless network, wherein the feature set information is contained in the list. Other embodiments are described and claimed.
Abstract:
A cellular communications system may include at least one base station selectively denying attempts to establish wireless communications links therewith, and wirelessly transmitting denial messages for denied attempts. The system may further include at least one mobile cellular communications device including a wireless transceiver and a controller cooperating therewith for attempting to establish a wireless communications link with the at least one base station having a quality of service (QoS) level associated therewith. If a denial message is received, the controller continues to attempt to establish the wireless communications link at a first attempt rate. Yet, if the wireless communications link cannot be established with the desired QoS level, and if no denial message is received, then the controller continues to attempt to establish the wireless communications link at a second attempt rate different than the first attempt rate.
Abstract:
The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals.
Abstract:
A method and apparatus for improved timer based registration for a mobile device with a network, the network having a standard slot cycle time for interrupts, the method comprising the steps of: receiving, at the mobile device, a system parameter message from the network, the message having a value indicating a frequency for periodic registration; setting a timer value on a timer at the mobile device, the timer value being greater than the standard slot cycle time; setting a counter to count expiration of the timer; starting the timer; upon expiration of the timer, decrementing the counter; upon the counter reaching zero, waiting for a paging slot to communicate with the network; and sending a registration message to the network on the paging slot.
Abstract:
According to the embodiments of the techniques of this application, a wireless data device or other data node sends solicitation messages periodically to a wireless gateway, such as a PDSN, when there is no data traffic between the wireless data device and a wireless data network. Each solicitation message resets the simple IP inactivity timer on the wireless gateway. When multiple wireless data devices send solicitation messages, the interval between subsequent transmissions of solicitation messages is randomised to reduce the probability of collision with the solicitations from other devices on the same wireless link. The solicitation timer, for instance, may be based on the simple IP inactivity timer setting on the wireless network, and the number of wireless data devices that the wireless data network serves. Expiration of the solicitation timer at the wireless data device or other data node causes the next solicitation message to be sent from or on behalf of the wireless data device.
Abstract:
An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.
Abstract:
The present invention relates to the discovery that specific human taste receptors in the T2R taste receptor family respond to particular bitter compounds present in, e.g., coffee. Also, the invention relates to the discovery of specific compounds and compositions containing that function as bitter taste blockers and the use thereof as bitter taste blockers or flavor modulators in, e.g., coffee and coffee flavored foods, beverages and medicaments. Also, the present invention relates to the discovery of a compound that antagonizes numerous different human T2Rs and the use thereof in assays and as a bitter taste blocker in compositions for ingestion by humans and animals.
Abstract:
An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.