摘要:
Secure virtualizing of a mobile cellular device uses a cellular communication network having base transceiver station edge node servers. A virtualized-instance host server contains a virtualized instance of an enterprise environment. Base station controllers are in communication with and control the base transceiver stations. A mobile switching center in communication with the base station controllers contains the virtualized-instance host server. A cellular communication device is in communication with an edge node server, and an auxiliary data display entry device is in communication with the cellular communication device such that the virtualized instance of the enterprise environment is on the edge node server. Communications between the auxiliary display and data entry device are encrypted. In addition, movement of the cellular communication device within the cellular communication network are anticipated so that additional remote virtualized instances of the enterprise environment are provided on candidate future edge servers.
摘要:
A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context.
摘要:
A system and method that externalizes mobile device state migration (i.e., checkpointing) without being dependent upon any particular Edge Application (EdgeApp) proxy server or cellular network base station. In this manner, the Edge Application (EdgeApp) proxy server does not have to be aware of a migration process, yet will enable state information to be provided to other EdgeApp proxy/server nodes at the edge of the network (cell tower).
摘要:
Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity.
摘要:
Embodiments relate to reconciling different entity identifiers. A method of reconciling different entity identifiers of a same entity is provided. The method receives a plurality of series of location-time data items from a plurality of tracking systems that each track one or more entities. Each series of location-time data items is associated with an entity identifier. The method categorizes each location-data item into a space-time region. The method generates a track for each of the plurality of series of location-time data items based on the space-time regions into which the location-data items are categorized, and generates a track signature for each of the generated tracks based on a segment of the generated track. The method compares the track signatures to find matching track signatures. Based on a plurality of matching signatures, the method reconciles the plurality of entity identifiers associated with the plurality of matching signatures to a particular entity.
摘要:
Embodiments relate to reconciling different entity identifiers. A method of reconciling different entity identifiers of a same entity is provided. The method receives a plurality of series of location-time data items from a plurality of tracking systems that each track one or more entities. Each series of location-time data items is associated with an entity identifier. The method categorizes each location-data item into a space-time region. The method generates a track for each of the plurality of series of location-time data items based on the space-time regions into which the location-data items are categorized, and generates a track signature for each of the generated tracks based on a segment of the generated track. The method compares the track signatures to find matching track signatures. Based on a plurality of matching signatures, the method reconciles the plurality of entity identifiers associated with the plurality of matching signatures to a particular entity.
摘要:
Mechanisms are described to extract location information from unstructured text, comprising: building a language model from geo-tagged text; building a classifier for differentiating referred and physical location; given unstructured text, identifying referred location using the language model (that is, the location to which the unstructured text refers); given the unstructured text, identifying if referred location is also the physical location using the classifier; and predicting (that is, performing calculation(s) and/or estimation(s) of degree of confidence) of referred and physical location.
摘要:
Method and system are provided for optimization of mobile data communication using byte caching. The method includes: intercepting data communications at a base station, wherein the data communications are between a user equipment and a network; and implementing byte caching at the base station to optimize data transfer between the base station and a byte cache server in the network at a peering point; wherein the network containing the base station supports mobility management of data transfer to and from the user equipment. The method includes providing a byte cache server as a transparent proxy with byte caching functionality where traffic for the user equipment is no longer tunnelled.
摘要:
Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window.
摘要:
Mechanisms are provided for the compact storage of geographical geometries as a collection of points, where individual points are encoded as binary/ternary strings (with the property that points closer to each other share a longer binary/ternary prefix) and the geometry is encoded by compressing the binary/ternary representation of common-prefix points. Mechanisms are also provided for the representation of a geometry using a ternary string that allows efficient storage of arbitrary shapes (e.g., long line segments, oblong polygons) as opposed to binary representations that are more efficient when the geometries are square or nearly square shaped.