Abstract:
Channels are assigned to a plurality of transmitters (206) in a radio communication system. First, interference constraints are defined (402) for the plurality of transmitters, and channel capacity required to handle traffic for each of the plurality of transmitters is measured (404). Then a mathematical programming technique is applied (406) to minimize the total number of channels assigned in the system, consistent with the interference constraints and the channel capacity required. The programming technique is selected from an integer programming technique (414) and a linear programming technique (408).
Abstract:
A communication system, including base transmitters (113) and base receivers (115) for transmitting and receiving messages to and from selective call transceivers (116), is used for selecting an optimal base transmitter (113) for transmitting messages to a selective call transceiver (116) that cannot identify its location within the communication system. The communication system selects an optimal base transmitter (113) having a highest of a plurality of probabilities for successfully transmitting a selective call message to the selective call transceiver (116) as a function of overlap between transmission coverage areas of the plurality of base transmitters (113) and a reception coverage area of the at least one base receiver (115) that received a negative acknowledge message from the selective call transceiver (116). After selecting the optimal base transmitter (113), the communication system causes the optimal base transmitter (113) to transmit the selective call message to the selective call transceiver (116).
Abstract:
A method and apparatus is used for transmitting an outbound message (408) in a two-way messaging system having a plurality of cells employing frequency reuse. The controller (112) of the two-way messaging system divides ones of the plurality of cells into a plurality of rings based on radio frequency propagation and interference environment. The controller (112) then sends to a portable selective call transceiver (122) a notification of the outbound message (408). In response, the controller (112) receives information sufficient to determine an identity of one of the plurality of rings in which the portable selective call transceiver (122) has determined itself to be located, and transmits the outbound message (408) to the portable selective call transceiver (122), utilizing a frequency reuse plan in accordance with the identity.
Abstract:
Embodiments infer position information using captured content items. A computing device such as a mobile computing or a cloud service analyzes one or more content items to generate information describing the content items. For content items that include photographs, for example, the photographs are processed to identify faces, objects, places, text, etc. The generated information is compared to reference content items (e.g., image comparison), user data (e.g., calendar data, contact information, etc.), and/or public data (e.g., address information, event information, etc.) to identify at least one match. Location information associated with the matched reference content items, user data, and/or public data is obtained. A position is determined for the content items based on the location information obtained from the matched reference content item, user data, and/or public data. In some embodiments, the obtained location information is used to refine a position determined using a beacon-based positioning service.
Abstract:
An RF fingerprinting methodology is generalized to include non-RF related factors. For each fingerprinted tile, there is an associated distance function between two fingerprints (the training fingerprint and the test fingerprint) from within that tile which may be a linear or non-linear combination of the deltas between multiple factors of the two fingerprints. The distance function for each tile is derived from a training dataset corresponding to that specific tile, and optimized to minimize the total difference between real distances and predicted distances. Upon receipt of an inference request, a result is derived from a combination of the fingerprints from the training dataset having the least distance per application of the distance function. Likely error for the tile is also determined to ascertain whether to rely on other location methods.
Abstract:
Managing use of a location sensor on a computing device for energy efficiency. The location sensor is briefly initialized to measure the signal quality. The measured signal quality is compared to pre-defined signal criteria values. The signal criteria values correspond to acceptable energy consumption, for example. If the signal criteria values are satisfied, location information for the computing device is obtained. Otherwise, the location sensor is disabled without obtaining the location information. In some embodiments, a lower-energy location sensor is used to obtain location information to determine whether to enable a higher-energy location sensor based on expected energy consumption.
Abstract:
Storing and retrieving beacon reference data in a truncated cuckoo hash table. Checksums of beacon identifiers associated with beacons are used to retrieve beacon reference data describing locations of the beacons in a hash table. The data is stored in one or more hash tables by cuckoo hashing to eliminate aliasing. The hash tables are provided to devices such as mobile devices. The devices retrieve the beacon reference data from the tables based using beacon identifiers of observed beacons. Location information for the devices is inferred using the retrieved beacon reference data. The cuckoo hash tables consume less memory storage space and obfuscate the beacon reference data.
Abstract:
The invention concerns a method (300) and communications unit (112) for selective receipt of group calls. The method can include the steps of—at a communications unit—receiving (314) a request to participate in a group call having at least one identification and having a plurality of participating members, comparing (316) the identification associated with the group call with a set of predefined blocking configurations and selectively blocking (318) the request to participate in the group call based on the comparison of the identification associated with the group call with the set of predefined blocking configurations.
Abstract:
A mobile device (106) comprising a processing system (206) including an inter-processor manager (308), and a plurality of processors (304-306) coupled to the inter-processor manager, wherein two or more of the plurality of processors are capable of processing a service application, and wherein the inter-processor manager is programmed to receive (402) a request to delegate the service application to at least one of the plurality of processors, select (406) an optimal one of the plurality of processors (304-306) to execute the service application according to a plurality of projected energy consumptions of the service application corresponding to each of the plurality of processors, and delegate (408) the service application to the optimal processor for execution.
Abstract:
A system, method and computer readable medium for communicating data over a voice channel on a wireless device (300) is disclosed. The method on a wireless device (300) includes establishing an audio connection with a second device and providing an interface (326) for a user for sending data to the second device. The method further includes detecting the activation of the interface (326) by the user and sending a first data to the second device during the audio connection with the second device, wherein the quality of the audio connection is not affected by the sending. The method further includes receiving a second data from the second device, the second data being associated with the first data and preferably synchronizing the first data with the second data. Information, such as Vcard information, can be wirelessly exchanged between devices communicating data over a voice channel during an audio connection.