摘要:
For example, a wireless communication device may be configured to determine an expected interference-based value corresponding to an Uplink (UL) transmission from a wireless communication station (STA) in a Trigger-Based (TB) Multi-User (MU) UL transmission to be communicated from a plurality of STAs to the wireless communication device; to determine one or more transmit (Tx) configuration parameters for the STA based on the expected interference-based value corresponding to the UL transmission from the STA; and to transmit a trigger frame to trigger the TB MU UL transmission, the trigger frame including the one or more Tx configuration parameters to configure the UL transmission from the STA.
摘要:
Embodiments of an AP and wake up radio (WUR) non-AP station (STA) are generally described herein. The AP may transmit a WUR packet to wake up a wireless local area network (WLAN) radio of the WUR non-AP STA. A non-WUR portion of the WUR packet may include legacy fields and a BPSK mark to spoof high throughput (HT) devices receiving the WUR packet. The AP may transmit the BPSK mark in a channel that includes a lower guard band, a transmission bandwidth, and an upper guard band. The AP may encode the BPSK mark in accordance with: on-off keying (OOK) modulation in a center portion of the transmission bandwidth; and orthogonal frequency division multiplexing (OFDM) in a remaining portion of the transmission bandwidth that excludes the center portion.
摘要:
Systems and techniques for secure wireless low-power wake-up are described herein. A low-power wake-up receiver (LP-WUR) of a wireless device may receive a wake-up signal. The LP-WUR may extract a receiver ID token from the wake-up signal. The LP-WUR may then verify the receiver ID token and enable a main transceiver, different than the LP-WUR, when the verification passes to engage in wireless communications.
摘要:
Devices and techniques for out-of-band platform tuning and configuration are described herein. A device can include a telemetry interface to a telemetry collection system and a network interface to network adapter hardware. The device can receive platform telemetry metrics from the telemetry collection system, and network adapter silicon hardware statistics over the network interface, to gather collected statistics. The device can apply a heuristic algorithm using the collected statistics to determine processing core workloads generated by operation of a plurality of software systems communicatively coupled to the device. The device can provide a reconfiguration message to instruct at least one software system to switch operations to a different processing core, responsive to detecting an overload state on at least one processing core, based on the processing core workloads. Other embodiments are also described.
摘要:
Systems and methods may provide for conducting a reward determination for a plurality of sleep states to obtain a plurality of reward determinations with respect to a device. In addition, a sleep state may be selected for the device from the plurality of sleep states based at least in part on the plurality of reward determinations. In one example, false entry and missed opportunity probabilities may be determined for stochastic interrupts, wherein the reward determination is conducted based at least in part on the false entry and missed opportunity probabilities.
摘要:
Technologies for secure inter-virtual-machine shared memory communication include a computing device with hardware virtualization support. A virtual machine monitor (VMM) authenticates a view switch component of a target virtual machine. The VMM adds configures a secure memory view to access a shared memory segment. The shared memory segment may include memory pages of a source virtual machine or the VMM. The view switch component switches to the secure memory view without generating a virtual machine exit event, using the hardware virtualization support. The view switch component may switch to the secure memory view by modifying an extended page table (EPT) pointer. The target virtual machine accesses the shared memory segment via the secure memory view. The target virtual machine and the source virtual machine may coordinate ownership of memory pages using a secure view control structure stored in the shared memory segment. Other embodiments are described and claimed.
摘要:
Systems and methods may provide for identifying a workload cycle for a computing platform, wherein the workload cycle is to include a busy duration and an idle duration. Additionally, platform energy consumption information may be determined for the workload cycle, and a frequency setting may be selected for the busy duration based at least in part on the platform energy consumption information.
摘要:
Systems and methods may provide for conducting a reward determination for a plurality of sleep states to obtain a plurality of reward determinations with respect to a device. In addition, a sleep state may be selected for the device from the plurality of sleep states based at least in part on the plurality of reward determinations. In one example, false entry and missed opportunity probabilities may be determined for stochastic interrupts, wherein the reward determination is conducted based at least in part on the false entry and missed opportunity probabilities.
摘要:
Methods and systems may provide for accumulating sensor-based information from a plurality of mobile devices and identifying context information in the sensor-based information, wherein the context information is relevant to a particular mobile device in the plurality of mobile devices. Additionally, an operational recommendation may be sent to the particular mobile device based on the context information. In one example, the operational recommendation identifies one or more of a power management action, a performance management action, a wireless interface selection and a wireless access point selection.
摘要:
Embodiments of the present disclosure provide for determination of transmit power allocations and modulation and coding schemes for multiuser orthogonal frequency division multiple access downlink transmissions. Other embodiments may be described and claimed.