摘要:
A traffic sensing system for collecting information on traffic conditions is provided. A traffic sensing system includes a traffic sensing server and a mobile traffic sensing device that sends traffic reports to the traffic sensing server. An MTS device may use an accelerometer integrated into a smart phone to detect potholes, to detect when the vehicle is braking, to detect whether the MTS device is being transported via a vehicle or a pedestrian, to detect horns sounding, and so on. The MTS device reports the various conditions to the traffic sensing server for accurate assessment of traffic conditions at stretches of road through which vehicles transporting MTS devices travel.
摘要:
A client-based collaborative approach called WebProfiler is used for diagnosing Web transaction failures. The WebProfiler leverages end-host cooperation to pool together observations on the success or failure of Web transactions from multiple vantage points. These observations are utilized by a collaborative blame attribution algorithm to identify a suspect network entity that caused the Web transaction failure.
摘要:
Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
摘要:
A system and method is provided for evaluating the effectiveness of data encryption for hiding the identity of the source of Web traffic. A signature is constructed from encrypted Web traffic for a Web page sent by a target Web site, and the signature is compared with archived traffic signatures obtained by accessing various Web pages of interest in advance. If the signature of the detected encrypted Web traffic matches a stored traffic signature beyond a pre-set statistical threshold, a positive match is found, and the source of the traffic is identified. Countermeasures for reducing the reliability of source identification based on traffic signature matching are provided.
摘要:
A method of reducing bandwidth limitations to send events to a set of interested clients within a pre-defined time period as quickly and fairly as possible. The clients can be re-distributed among the servers in a network such that the delay due to server overloading is minimized by moving clients from an overloaded server to a server with available bandwidth. In addition, the latency of client-server communications can be incorporated into an estimation of download times, and the servers can then initiate delivery to respective clients based on those download times. By staggering the send times to account for heterogeneous latencies, more clients can receive the event at the same time, and a fairness of distribution can be achieved.
摘要:
A platform that facilities preservation of user privacy with respect to location-based applications executing on mobile computing devices is described. The platform registers triggers that are set forth by location-based applications, where a trigger specifies one or more rules and includes a location constraint. The platform causes a sensor on the mobile computing device to output location data, and the platform determines if the trigger has been satisfied by comparing the location constraint with the location data. If the trigger is satisfied, the platform transmits a callback to the application. Accordingly, the application does not receive location data from the sensor.
摘要:
A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using mechanisms other than the initially intended path to convey the information intended for delivery by e-mail. A possible adaptation is reprioritization of an e-mail message that is found to be experiencing a delay.
摘要:
A traffic sensing system for collecting information on traffic conditions is provided. A traffic sensing system includes a traffic sensing server and a mobile traffic sensing device that sends traffic reports to the traffic sensing server. An MTS device may use an accelerometer integrated into a smart phone to detect potholes, to detect when the vehicle is braking, to detect whether the MTS device is being transported via a vehicle or a pedestrian, to detect horns sounding, and so on. The MTS device reports the various conditions to the traffic sensing server for accurate assessment of traffic conditions at stretches of road through which vehicles transporting MTS devices travel.
摘要:
Notifying a user that an email message sent to the user was not received by the user. Users can register to receive notifications. When a sender sends an email message to a recipient, a separate notification also may be sent to a notification service that populates and controls access to an email notification list. Each notification in the list may comprise a hash of the content of the email message that it represents. A recipient module may be configured to check the notification list periodically and/or in response to a recipient's instructions, and compare notifications to the email messages received for the recipient to determine whether any email messages intended for the recipient were not received. If it is determined from the notifications that an email message was not received, a notice may be sent to the sender, which my include a request that the sender re-send the email message.
摘要:
One or more mobile devices and a cloud server computing device are utilized to provide Internet access to one or more client computing devices. One of the clients is designated as a Wi-Fi access point. The Wi-Fi access point implements a reverse-infrastructure Wi-Fi mode which tethers available mobile devices and other clients to the access point. The cloud server periodically computes an optimal number of the mobile devices to be used for data striping, and transmits a webpage to a requesting client by striping data associated with the webpage across the optimal number of the mobile devices.