摘要:
Disclosed is a general model and method for computing performance bounds in multi-hop wireless networks. Rather than focusing on computing asymptotic performance bounds under assumptions of homogeneity or randomness in the network topology and/or workload, the present invention accommodates any given network, technology, interference model, routing paradigm, and workload. Using a conflict graph to formally characterize the impact of wireless interference on the performance of multi-hop wireless networks, methods for computing upper and lower bounds on the capacity of a given wireless network are detailed. Besides computing network capacity, the model and method disclosed can also enable or benefit other applications including maximizing fairness and minimizing maximum link utilization.
摘要:
A technique is disclosed that can efficiently control congestion, while supporting heterogeneity for streaming data among multiple computers in a network. A plurality of nodes is divided into a plurality of distribution trees within a computer network, wherein the data is divided into a plurality of prioritized layers. When a node experiences packet loss, the location of the congestion is inferred. If the congestion is at or near the outgoing link, outgoing traffic is shed to alleviate the congestion by shedding child node(s) receiving descriptions in the least important layer of data that the child node(s) are receiving. Similarly, if the congestion is at or near the incoming link, incoming traffic is shed by shedding parent nodes that are sending descriptions in the least important layer of data that the node is receiving. Nodes with available bandwidth are further instructed to subscribe to additional descriptions.
摘要:
A computer network has links for carrying data among computers, including one or more client computers. Packet loss rates are determined for the client computers and, based on the loss rates, a number of possible sets of solutions for the loss rates at each of the links are generated. The sets of possible solutions are subjected to a statistical analysis. Based on the results of the analysis, a determination is made regarding which of the links are excessively lossy.
摘要:
Humans identify location and directions based on visual cues, such as landmarks, rather than a precise coordinate grid. A database of landmarks can be used to determine the location of a user who can merely describe their location in the same manner they would to any human contact. The location of the user can be determined based on the landmarks described in the input, and the areas from which all of those landmarks are visible. Various databases can be used, including text-based and three-dimensional. Similarly, various mechanisms can be used to determine the user's location, including hierarchical approaches, query optimization approaches, and visibility percentage approaches. Ultimately, the user's location can be determined without the need for expensive, dedicated infrastructure, without compromising the user's security, and without subjecting the user to system outages.
摘要:
A method for managing data communication of a mobile device in a mobile network is provided. The method may include receiving a request, at a cloud proxy, to retrieve Internet data from the Internet. The request may originate from an application, and the Internet data may have a plurality unique objects. The method may also include aggregating the Internet data and two or more of the unique objects from the Internet. Furthermore, the method may include forwarding the Internet data and the two or more unique objects to the mobile device in one transmission.
摘要:
Inferring location of a mobile computing device in an indoor environment and crowdsourcing radio frequency data are described herein. A location of the mobile computing device in the indoor environment is inferred based upon known physical constraints of the indoor environment and data from an inertial sensor of the mobile computing device, wherein an initial location in the indoor environment of the mobile computing device is unknown, a heading offset of the mobile computing device is arbitrary, and wherein a placement of the mobile computing device on a user is arbitrary.
摘要:
The problem signature extraction technique extracts problem signatures from trace data collected from an application. The technique condenses the manifestation of a network, software or hardware problem into a compact signature, which could then be used to identify instances of the same problem in other trace data. For a network configuration, the technique uses as input a network-level packet trace of an application's communication and extracts from it a set of features. During the training phase, each application run is manually labeled as GOOD or BAD, depending on whether the run was successful or not. The technique then employs a learning technique to build a classification tree not only to distinguish between GOOD and BAD runs but to also sub-classify the BAD runs into different classes of failures. Once a classification tree has been learned, problem signatures are extracted by walking the tree, from the root to each leaf.
摘要:
A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using other mechanisms to convey the information intended for delivery by e-mail. The mechanism may convey the information to the recipient once the delayed electronic mail message is received by the recipient's e-mail system. In this respect, the recipient may make arrangements to receive information in the e-mail message when the recipient expects to be away from his or her e-mail system. Additionally or alternatively, the recipient may choose to initiate out-of-band communication to the sender when the recipient receives an indication of a delayed electronic mail message.
摘要:
A method scheduling outgoing communication in a mobile device is provided. The method includes receiving a signal quality profile for an area in which the device is located. The method further includes receiving a signal from a user application stored on the device that requests the mobile device to make the outgoing communication. Additionally, the method includes determining a current location, a speed, a direction, and a signal quality associated with the device and determining whether the signal quality is above a certain threshold. If not, the method includes predicting a future time at which the signal quality will be above the threshold based at least on the current location, the speed, the direction, the signal quality, and the signal quality profile. Finally, the method includes scheduling the outgoing communication from the mobile device at the future time.
摘要:
Described herein are technologies pertaining to protecting user privacy in connection with attribute-based matching services. A user registers with a platform that includes a plurality of non-collaborating partitions, where registration includes transmitting a message to the platform that indicates that the user has one or more attributes corresponding thereto. Through selective encryption and a communications protocol amongst the partitions, none of the partitions are able to ascertain that the user has the attributes. Acting in conjunction, however, the plurality of partitions perform rich attribute