Abstract:
Mobile device localization using audio signals is described. In an example, a mobile device is localized by receiving a first audio signal captured by a microphone located at the mobile device and a second audio signal captured from a further microphone. A correlation value between the first audio signal and second audio signal is computed, and this is used to determine whether the mobile device is in proximity to the further microphone. In one example, the mobile device can receive the audio signals from the further microphone and calculate the correlation value. In another example, a server can receive the audio signals from the mobile device and the further microphone and calculate the correlation value. In examples, the further microphone can be a fixed microphone at a predetermined location, or the further microphone can be a microphone located in another mobile device.
Abstract:
A supply chain management platform. Product information is gathered to create a product catalog having atomic product records. The product records are linked to product offers from suppliers. A retailer can select product for integration into the retailer's product catalog. Orders from retailers are matched to product offers and assigned to the corresponding supplier for fulfillment of the order. Retailers and suppliers are given visibility in to the system to maximize efficiencies.
Abstract:
A resource allocation framework for wireless/wired networks is described. In an embodiment, methods of end host based traffic management are described which operate separately from the underlying access control protocol within the network (e.g. wireless MAC protocol or TCP). The rate limits for each flow are set based on per-flow weights, which may be user specified, and based on an estimate of the utilization of the shared resource and the rate limits are adjusted periodically so that the resource is not underutilized or saturated. Some embodiments compute a virtual capacity of the resource which is adjusted to optimize the value of the utilization and then the virtual capacity is shared between flows according to the per-flow weights. Methods for estimating the utilization of a wireless network and the capacity of a broadband access link are also described.
Abstract:
A sign pole guard designed to encapsulate a U-channel metal sign post with a sheet of transparent, flexible material having a reflective covering to provided better visibility and an added layer of protection for individuals who may come into physical contact with the sign post itself. In addition, the sign pole guard comprises a strip of transparent, flexible material to be affixed to the edging of a metal street sign for added protection.
Abstract:
Methods, software and apparatus are described which enable users to share and exchange clips from broadcast media using their mobile devices. Whilst watching broadcast media, a user can cause their mobile device to capture a clip, for example by pressing a button. The capture of the clip enables the user to show and share the clip with friends as part of a system of exchange.
Abstract:
Mobile device localization using audio signals is described. In an example, a mobile device is localized by receiving a first audio signal captured by a microphone located at the mobile device and a second audio signal captured from a further microphone. A correlation value between the first audio signal and second audio signal is computed, and this is used to determine whether the mobile device is in proximity to the further microphone. In one example, the mobile device can receive the audio signals from the further microphone and calculate the correlation value. In another example, a server can receive the audio signals from the mobile device and the further microphone and calculate the correlation value. In examples, the further microphone can be a fixed microphone at a predetermined location, or the further microphone can be a microphone located in another mobile device.
Abstract:
A resource allocation framework for wireless/wired networks is described. In an embodiment, methods of end host based traffic management are described which operate separately from the underlying access control protocol within the network (e.g. wireless MAC protocol or TCP). The rate limits for each flow are set based on per-flow weights, which may be user specified, and based on an estimate of the utilization of the shared resource and the rate limits are adjusted periodically so that the resource is not underutilized or saturated. Some embodiments compute a virtual capacity of the resource which is adjusted to optimize the value of the utilization and then the virtual capacity is shared between flows according to the per-flow weights. Methods for estimating the utilization of a wireless network and the capacity of a broadband access link are also described.
Abstract:
Pricing and charging arrangements available to communication network operators or service providers take account of factors such as taxes which affect the billable value and which may be put in place in many different ways and at variable times in relation to data processing exercises which need to be carried out. A system is provided which can be used in generating bills by applying modifying factors which can be changed or added to in a relatively easy manner. An object-oriented front end for a legacy system can be used in design and subsequently embedded. Programs developed in an object oriented environment are converted into instructions implementable by a procedurally based processing device. An activity hierarchy of functions is created for each object, a data subject area is created for each object and a main calling program specifies the relationship between the programs and data areas so as to retain encapsulation of the original object oriented definition. This is particularly useful for developing new systems in an object oriented environment which may then be embedded into existing procedurally based systems.
Abstract:
An instant messaging system provides instant message communication between computers, including multi-user computers. The system provides multiple concurrent instant message user logins on a multi-user computer, one of the multiple concurrent instant message user logins being a registered buddy of a user of a second computer. The second computer is provided an indication that the registered buddy is one of multiple concurrent instant message user logins on a multi-user computer. The user of the second computer can send a message appropriate to be viewed on the multi-user computer. A video display may be rendered concurrently with the multiple concurrent instant message user logins. Instant messages are rendered over a portion of the video display. As a result, the instant messaging can operate smoothly with multi-user computers, protecting the privacy of instant messaging while minimizing the disruptiveness of instant messaging to accommodate shared use of a multi-user computer.