Abstract:
An integrated circuit (IC) includes a first I/O cell, a logic cell, a trigger signal generation circuit, and a second I/O cell having a voltage selection pin. I/O interfaces of the first I/O cell receive first and second supply voltages, respectively, and I/O interfaces of the second I/O cell receive third and fourth supply voltages, respectively. The first I/O cell generates a first trigger signal when the first supply voltage reaches a first predetermined voltage. The logic cell receives the first trigger signal and generates a safe-state signal. The trigger signal generation circuit generates a second trigger signal when the third supply voltage reaches a second predetermined voltage. The voltage selection pin receives the safe-state signal and the second trigger signal and sets the second I/O cell in a safe-state mode, which protects the second I/O cell from over voltage damage.
Abstract:
A system for reducing dynamic power consumption of a wakeup source includes a receiver interface coupled to the wakeup source. A data packet, received by the receiver interface, transmits the data packet to the wakeup source. The wakeup source processes the data packet to identify a predetermined code for initiating a wakeup sequence. The wakeup source is put into a deep sleep mode if it is idle for a predetermined time period.
Abstract:
The invention relates to a data packet transmission process in a communication system comprising at least one terminal (UE) communicating with a base station (BS), the process comprising at least one transmission (S4) of the data packet with a given power, from the terminal to the base station based on a HARQ scheme to obtain a residual packet error rate PERres after a number of transmissions Trn, the process being characterised in that it comprises a step (S) for the joint selection of the following parameters: the number of transmissions Trn; the target packet error rate PERtg(i) of each transmission i, where i=1, . . . , Trn, to arrive at the residual packet error rate PERres; and the modulation and coding scheme m corresponding to each target packet error rate PERtg(i) so as to minimise the data packet transmission power.
Abstract:
The system and method of information or presentation projection allows a user to present information to single or multiple screens without need of additional cables. Universal Plug and Play (UPnP) is used to advertise, find, and control the display devices. A reverse Terminal Service (TS) session is used to connect the display to the user's machine. Attendance at and receipt of the presentation is addressed from both a presenter side and from an attendee side through a subscription model. This subscription model is facilitated and security of the presentation is addressed through the use meeting invitations. These invitations are generated by the presenter, and may be requested by the attendees.
Abstract:
Methods and computer readable mediums are described that facilitate inviting user entities on a network. The method may include initiating a first application for sending an invitation by a first user entity on a first endpoint, selecting a second user entity to receive the invitation, and selecting an activity. The method may also include sending from the first endpoint to the second user entity the invitation to participate in the activity if the first endpoint determines the activity is supported by a computing application on the first endpoint.
Abstract:
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
Abstract:
Collaboration between collaborative endpoints may be facilitated by a serverless publication service of a collaborative services platform. The serverless publication service may be configured to accept communicative connections from the collaborative endpoints. Users of the collaborative services platform may publish their associated collaborative presences with the serverless publication service. For example, the collaborative presence of a user may include information with respect to valid collaborative endpoints for the user and collaborative capabilities at those endpoints. Subscriptions to published collaborative presences may be placed through the serverless publication service. A collaborative presence subscribe message may specify a subscription to a collaborative presence of a user. Upon receipt of a presence subscribe message, if there is no subscription policy with respect to the sender, the recipient may be queried for a subscription policy with respect to the sender. The subscription may be accepted in accordance with the subscription policy.
Abstract:
Establishing proof of authorized receipt of information between two recipients involves a sender developing an asymmetric key pair and sending one key to each of the two recipients. A first recipient develops a challenge and sends it to the second recipient. The second recipient uses a first key to encrypt the challenge and return it to the first recipient. The first recipient decrypts the response using the second key. A correct response allows the first recipient to trust that the second recipient has an authorized copy of the information because they each have a key associated with the information that came from the sender. No prior relationship between the recipients is assumed and a public key infrastructure is not required.
Abstract:
A semiconductor integrated circuit (IC) chip includes at least one core logic module located in a central area of the chip and having a core input/output (I/O) and a plurality of I/O pads disposed on a periphery of the chip. Narrow logic blocks including buffers and delay elements separate the core logic module from the I/O pads. The core I/O is coupled to the I/O pads by way of the buffers and delay elements of the narrow logic blocks.
Abstract:
A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.