摘要:
A method and corresponding apparatus are provided to detect false answer supervision by determining false answer supervision as either as a function of a number of completed calls of short duration or as a function of a distribution of differences between timestamps of alert signals and timestamps of connect signals used to complete calls, detecting false answer supervision based on the indicator of false answer supervision determined by either functions separately or in combination, and affecting a decision in response to the detecting.
摘要:
The present disclosure relates to a method for avoiding deadends in a constrained simulation. The method may include analyzing a first deadend during a simulation and a first constraint of the simulation. The method may further include determining if the first constraint causes the first deadend. If the first constraint causes the first deadend, the method may also include defining a first lookahead constraint corresponding to the first constraint. The method may additionally include rerunning a first previous cycle in the simulation while adding the first lookahead constraint to the simulation.
摘要:
Aspects of the present invention concern a method and system for scheduling a request for execution on multiple processors. This scheduler divides processes from the request into a set of domains. Instructions in the same domain are capable of executing the instructions associated with the request in a serial manner on a processor without conflicts. A relative processor utilization for each domain in the set of the domains is based upon a workload corresponding to an execution of the request. If there are processors available then the present invention provisions a subset of available processors to fulfill an aggregate processor utilization. The aggregate processor utilization is created from a combination of the relative processor utilization associated with each domain in the set of domains. If processors are not needed then some processors may be shut down. Shutting down processors in accordance with the schedule saves energy without sacrificing performing.
摘要:
A method to determine if a rogue device is connected to a specific wired network from dynamic host control protocol (DHCP) requests on the wired network. These DHCP requests are analyzed to determine the type of device issuing the request. Once the type of device has been determined, it can be checked against a list of authorized device types. If the device issuing the DHCP request is not an authorized device type, then it can be determined that the suspect device is a rogue that is connected to the specific wired network. Additionally, even if the system of the present invention determines that it is an authorized device type, if the device is not one of the few authorized devices of this type, e.g. because its MAC address is not recognized as that of one of the authorized devices, the system can flag the suspect as a rogue.
摘要:
A method, system and apparatus for routing data through a network based on the content or semantics of the data. Semantic routing engines route the data through the network based upon information maintained in routing tables. The routing tables used to route the content through the network are derived by aggregating information about either content consumers or content producers into ontological.
摘要:
A method, system and apparatus for routing data through a network based on the content or semantics of the data. Semantic routing engines route the data through the network based upon information maintained in routing tables. The routing tables used to route the content through the network are derived by aggregating information about either content consumers or content producers into ontological trees.
摘要:
A system and method for providing cost-effective broadband mobile services using a hybrid wireless network consisting of wide-area cellular (“3G”) supplemented by hotspot caches are provided. The proposed architecture uses opportunistic access of high-bandwidth wireless hotspot to dramatically reduce the cost per MB of media delivered to mobile end-users. The system also uses a “semantic multicast routing” approach to caching and delivering media based on individual user profiles.
摘要:
A data communication for a handoff mobile unit is maintained by data forwarding through neighboring mobile units in indoor wireless cellular communication networks operates such that, when the master unit has no available channels, the mobile unit switches over to master status to create an ad hoc cell. The mobile unit then pages neighboring slave mobile units for data forwarding assistance. The mobile unit chooses one or more slave mobile units and establishes wireless links with the chosen slave mobile units. These chosen mobile units then have two masters; one the master unit of the cell and the other the handoff mobile unit which has created the ad hoc cell. A list of the slave mobile units in the ad hoc cell is sent to the network server, and data communication proceeds with data forwarding through the chosen mobile slave units. When a channel becomes available with the master unit for the cell, the handoff mobile unit becomes a slave mobile unit to the master unit and the ad hoc cell is dissolved.
摘要翻译:通过在室内无线蜂窝通信网络中通过相邻移动单元的数据转发来维护用于切换移动单元的数据通信操作,使得当主单元没有可用信道时,移动单元切换到主状态以创建自组织小区 。 移动单元然后对相邻的从动单元进行页面数据转发协助。 移动单元选择一个或多个从属移动单元并与所选择的从属移动单元建立无线链路。 这些选择的移动单元然后有两个主人; 一个是小区的主单元,另一个是已经创建了自组织小区的切换移动单元。 Ad hoc小区中的从属移动单元的列表被发送到网络服务器,并且数据通信通过所选择的移动从属单元进行数据转发。 当信道对于小区的主单元可用时,切换移动单元变为主单元的从属移动单元,并且ad hoc小区被解散。
摘要:
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.
摘要:
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.