摘要:
A three-dimensional pose of the head of a subject is determined based on depth data captured in multiple images. The multiple images of the head are captured, e.g., by an RGBD camera. A rotation matrix and translation vector of the pose of the head relative to a reference pose is determined using the depth data. For example, arbitrary feature points on the head may be extracted in each of the multiple images and provided along with corresponding depth data to an Extended Kalman filter with states including a rotation matrix and a translation vector associated with the reference pose for the head and a current orientation and a current position. The three-dimensional pose of the head with respect to the reference pose is then determined based on the rotation matrix and the translation vector.
摘要:
Techniques for managing the load of an access channel in a wireless communication system are described. In an aspect, the load of the access channel may be controlled by having each terminal regulates its use of the access channel (e.g., its rate of system access) based on a rate control algorithm (e.g., token bucket). The rate control algorithm may maintain information on past activities of a terminal and may regulate the use of the access channel by the terminal based on its past activities in order to control the access channel load and achieve fairness. The system may determine at least one parameter value for the rate control algorithm based on load conditions and may broadcast the at least one parameter value to terminals. Each terminal may regulate its use of the access channel based on the at least one parameter value received from the system.
摘要:
In some aspect restricted access nodes are assigned to a designated common channel while access terminals that are in active communication with a macro access node may selectively be assigned to the designated channel. In some aspect an access terminal associated with macro access node may perform a handoff to a different carrier when the access terminal is in the vicinity of a coverage area of a restricted access node. In some aspect an access terminal associated with a macro access node may perform a handoff to a different carrier based on location information. In some aspect access to a restricted access node is controlled based on policy and/or based on operation of an access terminal associated with the restricted access node.
摘要:
Embodiments disclosed herein relate to a new set of radio link protocols (RLPs) configured to provide for efficient data transmission in a multi-link communication system. In an embodiment, an upper-layer packet is segmented into link-layer packets to be transmitted over a plurality of communication links, each including a first sequence number in accordance with a predetermined order. A second sequence number is further added to each link-layer packet to be transmitted for the first time. The second sequence number is configured to be in a sequence space associated with a particular communication link, and may be used for detection of missing packets.
摘要:
A method and apparatus for enhancing device performance through transport flow control is provided. The method may include determining that a level of user interest is indicated in at least one application of one or more applications, and modifying a transport flow associated with at least one of the one or more applications.
摘要:
Forward error correction scheduling techniques for an improved radio link protocol used in a wireless communication system, such as EV-DO. In one embodiment scheduling of the generation of repair symbols encoded to be transmitted along with source data is described. In another embodiment acknowledgment messages from a receiver are used to control the trailing edge of the protection window offered by the repair symbols. In another embodiment, non-acknowledgment messages from a receiver are used to control the generation of extra repair symbols. In another embodiment, a length field is used to avoid transmission of padding bytes over the air. In yet another embodiment, a symbol auxiliary field is appended to source symbols to indicate the padding bytes needed for symbol aligning thus avoiding the transmission of padding bytes over the air.
摘要:
Framing techniques for an improved radio link protocol used in a wireless communication system, such as EV-DO. In one embodiment scheduling of the generation of repair symbols encoded to be transmitted along with source data is described. In another embodiment acknowledgment messages from a receiver are used to control the trailing edge of the protection window offered by the repair symbols. In another embodiment, non-acknowledgment messages from a receiver are used to control the generation of extra repair symbols. In another embodiment, a length field is used to avoid transmission of padding bytes over the air. In yet another embodiment, a symbol auxiliary field is appended to source symbols to indicate the padding bytes needed for symbol aligning thus avoiding the transmission of padding bytes over the air.
摘要:
A method and system for providing asymmetric modes of operation in multi-carrier wireless communication systems. A method may assign a long code mask (LCM) to an information channel associated with a plurality of forward link carriers to transmit data from an access network to an access terminal; and multiplex the information channel on a reverse link carrier. The information channel may include one of data source channel (DSC), data rate control (DRC) and acknowledgment (ACK) information, and the multiplexing may be code division multiplexing (CDM). The AN may instruct the AT on whether to multiplex the DSC information based on feedback from the AT. The method may further offset the ACK information on the reverse link to reduce the reverse link peak to average, CDM the information channel on an I-branch and on a Q-branch, and transmit the code division multiplexed information channel on the reverse link carrier.
摘要:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.