摘要:
A system and method for vertical handoff between different types of wireless networks. A network allocation vector of a first wireless network is sampled for a period of time. The network allocation vector may include a transmission time advertised by a sender in the first wireless network. A network allocation vector occupation is calculated. The calculation of the network allocation vector may include calculating a ratio of an amount of time that the network allocation vector is busy during the time period to a total amount of time during the time period. A wireless network quality of service measure is calculated as a function of the network allocation vector occupation. A vertical handoff may be initiated from a second wireless network to the first wireless network based at least in part on the calculated wireless network quality of service measure.
摘要:
A resource allocation of multiple compressed AV streams delivered over the Internet is disclosed that achieves end-to-end optimal quality through a multimedia streaming TCP-friendly transport (MSTFP) protocol that adaptively estimates the network bandwidth while smoothing the sending rate. Resources allocated dynamically according to a media encoding distortion and network degradation algorithm. A scheme is also disclosed for dynamically estimating the available network bandwidth for streaming of objects, such as MPEG4 multiple video objects, in conjunction with the MSTFP protocol. The scheme can account for packet-loss rates to minimize end-to-end distortion for media delivery.
摘要:
An implementation of a technology, described herein, for transmitting compressed network transport-layer-protocol headers in a speedy, efficient, inferentially synchronized, and robust manner. An implementation, described herein, models the transmission of compressed headers to the congestion procedure of the network transport-layer protocol (e.g., TCP's). Doing so, the sender of the compressed headers can infer whether the receiver correctly received them. Unlike the slow direct synchronization employed by conventional schemes, this implementation of the present claimed invention inferentially synchronizes by modeling after the congestion procedure of the network transport-layer protocol. This is inherently faster than direct synchronization. Since the implementation performs well over both noiseless and noisy links, it is particularly suited to use over wireless communications channels. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
摘要:
A middle layer network protocol enhancement, virtual connectivity (VC) makes the network attachment point changes of local and remote peers transparent to applications that use network services. A virtual connectivity module local to each peer translates communication connection parameters from apparent to real and vice versa, as well as sending and receiving secure connection updates directly to and from peers. Unlike Mobile IP, no routing infrastructure modifications are required. A subscribe-notify service provides connection update notifications when direct peer-to-peer connection updates are not possible, for example, when two communicating peers move simultaneously or when the moving peer is communicating with a peer behind network address translation (NAT). Methods for detecting these conditions are disclosed, as is a virtual connectivity protocol and virtual connectivity module architecture.
摘要:
A depth construction module is described that receives depth images provided by two or more depth capture units. Each depth capture unit generates its depth image using a structured light technique, that is, by projecting a pattern onto an object and receiving a captured image in response thereto. The depth construction module then identifies at least one deficient portion in at least one depth image that has been received, which may be attributed to overlapping projected patterns that impinge the object. The depth construction module then uses a multi-view reconstruction technique, such as a plane sweeping technique, to supply depth information for the deficient portion. In another mode, a multi-view reconstruction technique can be used to produce an entire depth scene based on captured images received from the depth capture units, that is, without first identifying deficient portions in the depth images.
摘要:
Predictive, multi-layer caching architectures may be used to predict which elements a user is most likely to navigate to within a collection of elements associated with a predefined layout and, in response, to increase the accessibility of these elements to a client device of the user. For instance, the techniques may utilize a predictive, multi-layer caching architecture for storing these predicted elements to decrease the latency to render these images if the user navigates within the collection of elements in the predicted manner. The collection of elements may comprise images (e.g., a 3D model, a map, etc.), video files, audio files, text files, or any other type of file that is consumable on a client device.
摘要:
A depth construction module is described that receives depth images provided by two or more depth capture units. Each depth capture unit generates its depth image using a structured light technique, that is, by projecting a pattern onto an object and receiving a captured image in response thereto. The depth construction module then identifies at least one deficient portion in at least one depth image that has been received, which may be attributed to overlapping projected patterns that impinge the object. The depth construction module then uses a multi-view reconstruction technique, such as a plane sweeping technique, to supply depth information for the deficient portion. In another mode, a multi-view reconstruction technique can be used to produce an entire depth scene based on captured images received from the depth capture units, that is, without first identifying deficient portions in the depth images.
摘要:
A power management technique for a network including a plurality of computing devices. The power management technique includes identifying an order in which one or more devices of the plurality of computing devices can transmit data within the prescribed time period. In one aspect, the number of wakeups are reduced for the computing devices within the network by increasing a number of adjacent channel time allocation periods within a prescribed time period that share a common computing device. In one aspect, the network can be based on Time Division Multiple Access (TDMA).
摘要:
Orthogonal pulse polarity modulation involves wireless communication in which the polarity of modulating pulses are set responsive to positive and negative character values of a corresponding code sequence. In a described implementation, data is converted to chip waveforms, spectrum lines are removed, and pulses are appropriately shaped. For example, a data bit stream may be converted into chip waveforms using a bit stream-to-symbol segmenter, a symbol-to-code sequence mapper, and a code sequence-to-chip waveform transformer. The polarities of respective individual chips in a given chip waveform match the signs of respective individual characters in a corresponding code sequence.
摘要:
Orthogonal pulse polarity modulation involves wireless communication in which the polarity of modulating pulses are set responsive to positive and negative character values of a corresponding code sequence. In a described implementation, data is converted to chip waveforms, spectrum lines are removed, and pulses are appropriately shaped. For example, a data bit stream may be converted into chip waveforms using a bit stream-to-symbol segmenter, a symbol-to-code sequence mapper, and a code sequence-to-chip waveform transformer. The polarities of respective individual chips in a given chip waveform match the signs of respective individual characters in a corresponding code sequence.