Abstract:
A system and method for facilitating automatic detection of a type of wireless network is provided. In accordance with an aspect of the present invention, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted network requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled network supporting WPA and/or an IEEE 802.1x enabled network not supporting WPA. In accordance with an aspect of the present invention, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identities a type of an available wireless network. Identification can be based, for example, upon information received in an information element and/or iterative probing of the wireless network beacon.
Abstract:
Video streams are generated using a combination of Multiple Bit Rate (MBR) encoding and Scalable Video Coding (SVC). Capabilities and requests of the clients are used in determining the video streams to generate as well as what video streams to deliver to the clients. The clients are placed into groups based on a resolution capability of the client. For each resolution grouping, MBR is used for generating spatial streams and SVC is used for generating temporal and quality streams.
Abstract:
The generation and delivery of key frames to clients of a video conference are performed in response to a need for a synchronization point. Instead of automatically sending a key frame periodically to each of the clients in the video conference, a key frame is sent to one or more clients upon the occurrence of an event in the video conference. For example, a key frame may be sent to a client when the client joins the video conference. A key frame may also be sent to a client that has packet loss, upon the request of a client, a speaker change within the video conference, when a new stream is added by the client, and the like. The clients in the video conference that are not affected by the event continue to receive predicted frames.
Abstract:
Video streams are generated using a combination of Multiple Bit Rate (MBR) encoding and Scalable Video Coding (SVC). Capabilities and requests of the clients are used in determining the video streams to generate as well as what video streams to deliver to the clients. The clients are placed into groups based on a resolution capability of the client. For each resolution grouping, MBR is used for generating spatial streams and SVC is used for generating temporal and quality streams.
Abstract:
An improved mouth guard designed for use with protective equipment such as helmets and other head gear is disclosed. The invention provides a convenient means to temporarily affix the mouth guard to sports equipment, or other object when the mouth guard is removed, rather than using a conventional or traditional tethering strap. The disclosed mouth guard can be quickly removed from a user's mouth and quickly attached to a helmet component, player's finger, or other piece of equipment to allow the mouth guard to remain rigidly affixed to the player without a loose tethering strap such as used in conventional mouth guards. The invention also is applicable to other mouth guard devices which may be used for dental treatment applications to secure a dental appliance temporarily when removed from the user's mouth.
Abstract:
A method and system for managing power consumption in a portable computing device having a network interface module is presented. A power management module receives inputs from other modules and determines when the network interface module is to be put in a doze state for a predetermined number of beacon intervals to conserve power consumption in the network interface module. The network interface module in a device that is associated with a network is put in the doze state after an event has occurred including when a scan has been performed, after a delayed sleep timer has expired, and after a beacon transmission has been completed and no traffic is buffered for the device. The delayed sleep time is set based on the estimated round trip time of a packet.
Abstract:
An air plenum includes a main body that is sized to enclose at least a portion of a device. The main body extends a distance beyond a port provided on the device and also defines an opening therein that is substantially aligned with the port provided on the device. A cover sized to substantially cover the opening in the main body includes a recessed portion that is inset with respect to a non-recessed portion of the cover by a distance that is about equal to the distance by which the main body extends beyond the port provided on the device. The recessed portion defines an opening therein that is substantially aligned with the port so that the recessed portion in the cover allows a user to access the port on the device.
Abstract:
A spread spectrum noise shaper uses a modulation technique to achieve a greater signal-to-noise or signal-to-interference ratio (SNR or SIR). The technique doubles the system SIR, in principle. This doubling yields a doubling in system capacity. SNR is increased by receiving the spread spectrum signal in the presence of less noise near the edge of the spread spectrum bandwidth. The technique requires only small additions to a conventional spread spectrum system, in the form of an extra modulator at the transmitter, and an extra demodulator and filter at the receiver.
Abstract:
A method and system for establishing a multiparty session with a mesh configuration by sending out invitations to endpoints in parallel is provided. To initiate a session, an initiating endpoint sends invitations in parallel to the endpoints that are to be in the session. When the initiating endpoint receives an acceptance, it then sends to the accepting endpoint an indication of the other endpoints that are currently in the session. When an accepting endpoint receives the indication of the endpoints in the session, the accepting endpoint sends an invitation to establish a dialog to each of the indicated endpoints. When an endpoint that is in the session receives such an invitation, it can automatically accept the invitation because it is already participating in the session.